Download presentation
Presentation is loading. Please wait.
Published byJevon Ferrett Modified over 10 years ago
1
Personal Info 1 Prepared by: Mr. NHEAN Sophan Presenter: Mr. NHEAN Sophan Position: Desktop Support Company: Khalibre Co,. Ltd E-mail: sophan.nhean@gmail.com Tel: 0979514961 or 086493591 Skype: sophan.nhean Facebook: www.facebook.com/sophan.nhean
2
What Firewall can do to protect your Network? 2 Prepared by: Mr. NHEAN Sophan
3
Agenda 3 What is a firewall? What does a firewall do? What can’t a firewall do? Who need a firewall? How does a firewall work? What are the protection methods of firewall? How do we implement a firewall? Conclusion – Benefits of firewall Scenario Questions and Answers Prepared by: Mr. NHEAN Sophan
4
What is a firewall? 4 Firewall is a component or set of computer that restrict access between a protected network and the Internet or between a sets of networks. Protects networked computers from intentional hostile intrusion from outside. Places a bottleneck (or Choke Point) between the networks All communications must pass through the bottleneck – this gives us a single point of control Prepared by: Mr. NHEAN Sophan
5
What is a firewall? 5 There are two types of firewall Prepared by: Mr. NHEAN Sophan Hardware firewall device Fortinet Juniper CISCO ASA Software firewall program IP Chains & IPTables IPCop SELinux ISA
6
What can a firewall do? 6 A firewall examines all traffic routed between two networks to see if it meets certain criteria (allowed if it does, otherwise it dropped) Focus on security decision (Choke point) Enforce security policy Log Internet Activities efficiently Prepared by: Mr. NHEAN Sophan
7
What can a firewall do? 7 It filters traffic base on: Source and Destination IP address Source and Destination Port number Protocols used It protect your computer and personal information from: Hackers break into your system Can prevent some kind of virus Prepared by: Mr. NHEAN Sophan
8
What can't a firewall do? 8 A firewall can’t protect you against: Phishing scam, spyware or viruses spread through email. Malicious insider: people who gain physical access to your computer or network For an unprotected wireless network After network has been compromised Connections that don’t go through firewall (Modem users) Completely new threats Prepared by: Mr. NHEAN Sophan
9
Who need a firewall? 9 Anyone who is responsible for a private network that is connected to a public network. Big, Medium, and Small Enterprise Anyone who connect from single computer to internet via modem, etc. Prepared by: Mr. NHEAN Sophan
10
How does firewall work? 10 A firewall may allow all traffic through unless it meets certain criteria, or it may deny all traffic unless it meets certain criteria. Prepared by: Mr. NHEAN Sophan Outbound Inbound Basic Firewall Operation
11
What are the protection methods of firewall? 11 Packet Filtering Rejects TCP/IP packets from unauthorized hosts and/or connection attempts but unauthorized hosts Network Address Translation (NAT) Translates the addresses of internal hosts so as to hide them from the outside world Also known as IP masquerading Proxy Services Makes high level application level connections to external hosts on behalf of internal hosts to completely break the network connection between internal and external hosts Prepared by: Mr. NHEAN Sophan
12
How do we implement the firewall? 12 Determine the access denial methodology to use Determine Inbound access policy Determine Outbound access policy Decide whether to buy a complete firewall product, have one implemented by a systems integrator or implement one yourself. Prepared by: Mr. NHEAN Sophan
13
Benefits of firewall 13 Protects private Local Area Network form hostile intrusion from internet Block harmful packet to reach important resources Allows network administrators to offer access to specific types of Internet services to selected LAN users It can protect: Your Data: the information you keep on computers Your resource: the computers themselves Your reputation: Intruders on the Internet appear with your identity. Prepared by: Mr. NHEAN Sophan
14
Challenging question 14 Prepared by: Mr. NHEAN Sophan Is a firewall sufficient to secure my network or do I need anything else?
15
Scenario 15 Firewall Scenario Prepared by: Mr. NHEAN Sophan
16
Scenario 1: Saturday, Midnight 16 Prepared by: Mr. NHEAN Sophan
17
5 Minutes later 17 Prepared by: Mr. NHEAN Sophan
18
Scenario 2: Monday, Midnight 18 Prepared by: Mr. NHEAN Sophan Black Hacker OK, let’s try the Insurance company…. This should take about 5 minutes!
19
1 minutes later 19 Prepared by: Mr. NHEAN Sophan Information Security Manager Insurance Company
20
5 Hours later 20 Prepared by: Mr. NHEAN Sophan Black Hacker
21
21 Prepared by: Mr. NHEAN Sophan Source by Building Internet Firewalls Elizabeth D. Zwicky, Simon Cooper & D. Brent Chapman
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.