Download presentation
Presentation is loading. Please wait.
Published byMelvin Gallagher Modified over 9 years ago
1
11 CONFIGURING TCP/IP ADDRESSING AND SECURITY Chapter 11
2
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY2 OVERVIEW Understand IP addressing Manage IP subnetting and subnet masks Understand IP security terminology Manage Internet security features of Windows XP Configure and troubleshoot Windows Firewall Understand IP addressing Manage IP subnetting and subnet masks Understand IP security terminology Manage Internet security features of Windows XP Configure and troubleshoot Windows Firewall
3
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY3 UNDERSTANDING BINARY NUMBERS
4
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY4 CONVERTING DECIMAL ADDRESSES TO BINARY
5
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY5 CONVERTING BINARY ADDRESSES TO DECIMAL
6
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY6 USING CALCULATOR TO CONVERT NUMBERS
7
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY7 SUBNET MASKS
8
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY8 PROBLEMS WITH CLASSFUL ADDRESSES Wasted addresses Shortage of address blocks Excessive routing table entries Wasted addresses Shortage of address blocks Excessive routing table entries
9
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY9 SUBNETTING A LARGE NETWORK
10
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY10 CLASSLESS INTERDOMAIN ROUTING (CIDR)
11
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY11 SUPERNETS
12
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY12 SECURING IP COMMUNICATIONS Internet threats Protective technologies Configuring and managing Windows Firewall Monitoring Internet communications security Internet threats Protective technologies Configuring and managing Windows Firewall Monitoring Internet communications security
13
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY13 INTERNET THREATS Viruses (the oldest threat) Worms (the most persistent threat) Trojan horses Spyware Zombies Direct hacking Viruses (the oldest threat) Worms (the most persistent threat) Trojan horses Spyware Zombies Direct hacking
14
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY14 VIRUSES Take advantage of gullible users Infect document, graphics, and executable files Often include mass-mailing components Can carry destructive payloads Take advantage of gullible users Infect document, graphics, and executable files Often include mass-mailing components Can carry destructive payloads
15
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY15 WORMS Self-replicating Network-aware Use bugs in programs or systems to spread Can carry viruses or other payloads Self-replicating Network-aware Use bugs in programs or systems to spread Can carry viruses or other payloads
16
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY16 TROJAN HORSES Usually e-mailed or downloaded Appear to be a useful program or game Carry payload or back door application Usually e-mailed or downloaded Appear to be a useful program or game Carry payload or back door application
17
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY17 SPYWARE Has attributes of Trojan horses or worms Spies on its victim Might transmit marketing data or transmit personal data to the spyware author Has attributes of Trojan horses or worms Spies on its victim Might transmit marketing data or transmit personal data to the spyware author
18
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY18 ZOMBIES Payload of worm or Trojan horse Remotely controlled to attack network targets Participate in large-scale assaults on public Web sites Payload of worm or Trojan horse Remotely controlled to attack network targets Participate in large-scale assaults on public Web sites
19
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY19 DIRECT HACKING Relatively low incidence Hardest form of attack to defeat Relatively low incidence Hardest form of attack to defeat
20
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY20 PROTECTIVE TECHNOLOGIES Security Center Windows Firewall Internet Connection Sharing (ICS) Third-party utilities Security Center Windows Firewall Internet Connection Sharing (ICS) Third-party utilities
21
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY21 SECURITY CENTER
22
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY22 FIREWALL TERMINOLOGY Packet filtering Stateful packet filtering Exceptions (packet filter rules) Allowed traffic Rejected traffic Logging Packet filtering Stateful packet filtering Exceptions (packet filter rules) Allowed traffic Rejected traffic Logging
23
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY23 ENABLING WINDOWS FIREWALL
24
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY24 FIREWALL EXCEPTIONS
25
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY25 ADVANCED WINDOWS FIREWALL SETTINGS
26
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY26 MONITORING INTERNET SECURITY Windows Firewall monitoring Service logs Event logs Windows Firewall monitoring Service logs Event logs
27
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY27 WINDOWS FIREWALL ALERTS
28
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY28 WINDOWS FIREWALL LOGS
29
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY29 SERVER LOGS
30
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY30 SUMMARY IP addresses are 32-bit binary addresses. The network portion of IP addresses determines location. CIDR allows creation of custom netblocks. CIDR permits use of variable-length subnet masks. Windows Firewall blocks unauthorized packets. Windows Firewall exceptions allow specified traffic to pass through the firewall. Alerts and logs warn of attempted attacks. IP addresses are 32-bit binary addresses. The network portion of IP addresses determines location. CIDR allows creation of custom netblocks. CIDR permits use of variable-length subnet masks. Windows Firewall blocks unauthorized packets. Windows Firewall exceptions allow specified traffic to pass through the firewall. Alerts and logs warn of attempted attacks.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.