Presentation is loading. Please wait.

Presentation is loading. Please wait.

Software Firewalls © N. Ganesan, Ph.D.. Module Objectives Explore the features of a software firewall such as Zone Alarm Pro.

Similar presentations


Presentation on theme: "Software Firewalls © N. Ganesan, Ph.D.. Module Objectives Explore the features of a software firewall such as Zone Alarm Pro."— Presentation transcript:

1 Software Firewalls © N. Ganesan, Ph.D.

2 Module Objectives Explore the features of a software firewall such as Zone Alarm Pro

3 Introduction

4 Features Inbound traffic protection Outbound traffic protection Optional e-mail protection Optional antivirus monitoring

5

6 Types of Protection and Control Firewall Protection Program Control Privacy Protection Identity Protection

7

8 Protection Alerts Program alerts Firewall alerts

9

10

11

12 Program Alert Example In the following example, program alert for the ping command will be demonstrated

13

14

15

16

17 Firewall Event Informs intrusion efforts

18

19 Zoning for Access Control Internet zone –All computers fall into this category –They are generally unknown computers Trusted zone –Permission is automatically given to access computers in the trusted zone Bad zone –Access to computers in this zone are explicitly denied

20

21 Disconnecting from Internet Stop button Internet lock

22

23 Additional Information Use the help feature

24

25 Overview of ZoneAlarm Pro

26

27 Firewall Zone Settings High –Explicit permission must be given for access Medium –Access must be blocked explicitly

28 1 2 3

29

30

31

32 Blocked Zone Advanced control is possible for blocked zones

33

34

35 Adding and Removing Networks to and from Zones

36 Assigning Networks Networks can be assigned to trusted and internet zones based on: –Host/site –IP address –IP range –Subnet

37

38

39

40

41

42

43 Computers with Access In the previous example, the computers with the following range of IP address will have network access privilege –130.182.215.0 to 130.182.215.254 The values defined could also be edited

44

45 Can be removed as well.

46

47

48 Rule Based Access Control

49 Purpose Traffic can be controlled based on source address, destination address, protocol and time of the day

50

51 Expert Firewall Access control (allow of blocks) can be exercised based on the following parameters: –Source –Destination –Protocol –Time

52

53

54

55

56

57

58

59 Auto-Lock Auto lock can be set to be involved when the computer is inactive for a given period of time

60

61

62

63 Program Access Control

64 Individual Program Control This is perhaps the most frequently used option Access to the network for a program can be set to the following –Allow –Block X –Ask ?

65

66 Program Control Properties Allow –Allows the program to access the network Ask –Ask each time the program tries to access the network Block –Block access without asking In general, one may want to block the program acting as a server Moreover, whenever in doubt, access could be set to “Ask” As seen in the next slide, new program could also be added to the list of programs that need to be controlled with respect to network access

67

68

69 Individual program security.

70

71

72

73 Antivirus Monitoring

74

75 Email Protection

76

77

78 New attachment types can be added.

79 Privacy

80 1 2 3

81 Customizing cache cleaning.

82

83

84 Cookie Control, Ad Blocking and Mobile Code Control

85 1 2 3

86 Cookie control.

87 Ad blocking.

88 Mobile code execution control.

89 Site Access Control

90

91

92 ID Lock

93

94

95

96

97

98

99

100 Alerts and Logs

101

102

103

104

105

106

107 The End


Download ppt "Software Firewalls © N. Ganesan, Ph.D.. Module Objectives Explore the features of a software firewall such as Zone Alarm Pro."

Similar presentations


Ads by Google