NETWORK SECURITY LAB Lab 8. Firewall and VPN.

Slides:



Advertisements
Similar presentations
Presentation Heading – font Arial
Advertisements

DSL-2730B, DSL-2740B, DSL-2750B.
Chief of Information Processing Office, CSEAS Kimiya Kitani Manual for Wireless Connection in Kyoto University - For Staffs.
© 2010 Delmar, Cengage Learning Chapter 1 Getting Started with Dreamweaver.
DSL-2870B How to Change ADSL Username and Password in your modem router How to Change Wireless Channel in your modem router How to Open Ports in your modem.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Module 5: Configuring Access for Remote Clients and Networks.
Choose a category: Install Episys Install Accessories Synergent Confidential Episys Version Synergent 2008Download latest guides from:
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Creating a UAA VPN Connection For Your Computer To Facilitate Polycom PVX – For Windows XP Last Modified On 10/25/2010 University of Alaska Anchorage,
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Chief of Information Processing Office, CSEAS Kimiya Kitani Manual for Wireless Connection in Kyoto University - For Visitors.
DVG-N5402SP.
POP Configuration Microsoft Outlook Express 6.x.
POP Configuration Microsoft Outlook What is POP? Short for Post Office Protocol, a protocol used to retrieve from a mail server. Most.
Mozilla Thunderbird Roderick Bautista Cheryl Knott Gyeong Lee Lee Raynes Kelly Santos.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
4-1 PSe_4Konf.503 EAGLE Getting Started and Configuration.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
DWR-113 FAQ’s 3G WiFi Router.
Course 201 – Administration, Content Inspection and SSL VPN
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Configuring the MagicInfo Pro Display
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Virtual Private Networking Allows any internet enabled computer to connect to STI network. Runs at your local connection speed. Must have username and.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
Lab How to Use WANem Last Update Copyright 2011 Kenneth M. Chipps Ph.D. 1.
1 HTML (Set Up Public Folder) Some material on these slides is taken directly from
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
An Introduction to IBM Systems Director
Copyright 2000 eMation SECURITY - Controlling Data Access with
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Module 5: Configuring Access for Remote Clients and Networks.
Regis: Academic Research Network: ARN ARN Getting Connected Drive Mapping SQL*Plus Spooling Your Work Presented by “SOETJAHJO”
Turning Windows 7 into a Web Server Ch 28. Understanding Internet Information Services.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
Configuring Network Connectivity Lesson 7. Skills Matrix Technology SkillObjective DomainObjective # Using the Network and Sharing Center Use the Network.
A guide to file sharing on Windows XP Peer to Peer File Sharing.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
1 Mapping a Drive on a USF IIS Server. 2 Mapping a Drive To map a drive to a network file directory in Windows you must be on a Microsoft local area network,
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
INTERNET APPLICATIONS CPIT405 Install a web server and analyze packets.
How to fix Error code 0x80072ee2 in Windows 8.1? Fix%20%20Update%20Error%200x80072EE2%20in%20Windows%20 8.1,%20Windows%2010!%20-%20Fix%20PC%20Errors.htm.
NX Documentation Using Windows IIS (Internet Information Services) as a http server for NX documentation.
Virtual Private Network Access for Remote Networks
Configuring ALSMS Remote Navigation
Microsoft Windows NT 4.0 Authentication Protocols
Virtual Private Networks
FTP - File Transfer Protocol
Creating a Windows 10 Virtual machine
1. Press the Power button or switch to flip on the printer, if it is turn off. 2. From the Home display screen on the product control panel, click the.
Installing the HP LaserJet Pro 500 color MFP M570 printer software in Windows on a Wireless Network & Wired Network.
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
Using the Virtual Private Network (VPN) on an iPad 2
Configuring Internet-related services
Connecting Remotely Winter 2014.
Fundamentals of Computer Networks
Agenda Create certificates for the GlobalProtect Portal, internal gateway, and external gateway. Attach certificates to a SSL-TLS Service Profile. Configure.
Chapter 10: Advanced Cisco Adaptive Security Appliance
Presentation transcript:

NETWORK SECURITY LAB Lab 8. Firewall and VPN

Coverage – Introduction to Firewall – Hands on at configuring Firewall – Introduction to VPN – Hands on at Configure VPN

Firewall - Introduction – Firewall is a network security mechanism that monitors and control incoming and outgoing network traffic based on pre-configured and customizable security rules ~Wikipedia

Types of Firewall – Hardware Firewalls – Software Firewalls – Hybrid Firewalls (Combination of HW and SW) • Software Firewalls – Protect a single computer – Norton Internet Security – McAfee Internet Security – Outpost – ISA Server • Hardware Firewalls – Protect a network – Cisco PIX – NetScreen – WatchGuard – Checkpoint

How Firewalls Work

Hands on – Configuring Firewall – Configuring webserver on Windows using IIS (Internet and Information Services) – Download 2 instances of Windows 7 with IE or MSEdge from here. Alternatively your instructor should provide you with the downloaded version of the virtual images. – Import the windows images in the Oracle virtual box

Hands on – 2 – Configuring webserver on Windows using IIS (Internet and Information Services) – Download 2 instances of Windows 7 with IE or MSEdge from here. Alternatively your instructor should provide you with the downloaded version of the virtual images. – Import the windows images in the Oracle virtual box

Hands on – 3 – Adding NAT Network to Oracle VirtualBox – In the Oracle Virtual Box main console click on: • Files -> Preferences

Hands on – 4 – Change the MAC address of one of the virtual images through the following steps – In the Virtual Box main console – Select a windows image and go to settings

Hands on – 4.1 – Add both the virtual images to NAT network and ensure that they are getting IP addresses

– Configure IIS and a demo website Hands on – 5 – Configure IIS and a demo website • Turn on both the virtual images and on one of the images configure IIS: • Login in to the virtual machine and go to control panel. • Set the view of the control panel by ‘Small Icons’ • Click on ‘Programs and Features’

Hands on – 6 – Click on ‘Turn Windows Features On or Off’ – And check the Internet Information & Services check box

Hands on – 7 – Configuring and hosting website in IIS – Click on Start and type ‘IIS’ and click on Internet Information Services. – Right Click on ‘Sites’ under ‘Connections Panel’ and click on ‘Add Website’

Hands on – 8 – On the following screen give the site name as Intranet and under Content Directory click on the button with 3 dots to set its path – Set the port number as ‘4444’

Hands on – 9 – Select the ‘wwwroot’ folder under C:\inetpub for the demo site and click on Ok

Hands on – 10 – click Ok on the main screen and the website is hosted and ready to be accessed: – Verify the hosted website through the browser by access the following url from the MSEdge browser in the virtual image • url: http://localhost:4444

Hands on – 11 – Access the hosted website from the another image connected to the same NAT Network. – Access virtual image 2 and in the browser access the demo website using the IP address of the virtual image 1 • Example: http://192.168.1.4:4444 – The reason the demo site is inaccessible is because the firewall on the hosted IIS server image is filtering the connection to the site.

Hands on – 12 – Configuring the firewall to allow access to the demo website. – Click on Start and type ‘Firewall’, from the listed options select Windows ‘Firewall with Advanced Security’ – In the console of the Firewall click on ‘Action’ menu and ‘New Rule’

Hands on – 13 – Click on Port radio button and click on Next – Type 4444 under specific local ports and click on Next

Hands on – 14 – Ensure Allow the connection is selected and click on next – Select all level from which this site can be accessed and click on Next

Hands on – 15 – Give the rule a name AllowIntranet and click on – Finish – Access the 192.168.1.5:4444 from the image 2 and check if it works

VPN- Introduction – A VPN (Virtual Private Network) is a secure communication tunnel between devices. – VPNs are used to protect private web traffic from uncalled for eavesdropping and interferences.

Technologies in VPN – PPTP VPN – L2TP VPN – Open VPN • Point to Point Tunneling Protocol • Obsolete due to security flaws – L2TP VPN • Layer 2 Tunneling Protocol • Security extension of PPTP • Uses L2TP Access Controller (LAC) and L2TP Network Server (LNS) – Open VPN • Set of configuration tools used to access hosted vpn services across the globe.

Hands on Configuring VPN – Using the same images of windows 7 • Using the image 192.168.1.4, hosting VPN Server: • Access the windows 7 image 2 and click on Start • Type \\192.168.1.5 and press enter key • It returns with windows showing only shared folders by the computer with IP address being accessed

Hands on - 2 – Access the Win7 image 1 • Click on Start -> Control Panel and click on Network and Sharing Center • In the following window Click on Change Adapter Settings • In the next screen, hit the ‘Alt + F’ keys on the keyboard to access the File Menu and click on New Incoming Connection

Hands on - 3 • Click on the IEUser check box and click on Next • On the next screen select the check box ‘Through the Internet’ and click on Next • In the next screen leave defaults and click on Allow access • On the next screen click on ‘close’

Hands on - 4 – Connecting from client Machine • On the vpn client virtual machine go to network settings : – Start -> control panel -> Network and Sharing Center • Click on ‘Set up a new connection or network’ • On the next screen click on ‘Connect to a work place’

Hands on - 5 – Connecting from client Machine • Click on ‘Use my internet connection’ on the next screen. • On the next screen enter the IP address of the image 1 on which VPN service was configured • On the last screen enter the username and password IEUser and Passw0rd! And click on connect

End