Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.

Slides:



Advertisements
Similar presentations
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Advertisements

Essential NetTools Pranay Kumar. Essential NetTools  This tool is a set of network tools useful in diagnosing networks and monitoring your computer's.
Jonas Lippuner. Overview IPCop  Introduction  Network Structure  Services  Addons Installing IPCop on a SD card  Hardware  Installation.
Firewalls and Intrusion Detection Systems
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
© Copyright 1997, The University of New Mexico C-1 Internet Service Provider Services What to do once you’re connected.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Wi-Fi Structures.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Amazon EC2 Quick Start adapted from EC2_GetStarted.html.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
4 Network Hardware & Software Network Operating systems: software controlling traffic on the network 2 types of s.ware: server software &client software.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Advanced Networking for DVRs
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
1 Linux Networking and Security Chapter 3. 2 Configuring Client Services Configure DNS name resolution Configure dial-up network access using PPP Understand.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Chapter 7: Using Windows Servers to Share Information.
PC Maintenance: Preparing for A+ Certification Chapter 25: The Internet.
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
Internal NetworkExternal Network. Hub Internal NetworkExternal Network WS.
Connecting to Network. ♦ Overview ► A network connection is required to communicate with other computers when they are in a network. Network interface.
Chapter 6: Packet Filtering
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
DSL-2544N Dual Band Wireless N600 Gigabit ADSL2+ Modem Router
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
The Internet Just the Facts. Protocols TCP/IP are the TRANSPORT protocols of the Internet Services use TCP/IP to connect to other computers on Internet.
Monitoring Your Network A College Approach Chris Bamber, IT Systems Manager Somerville College Confidentiality: The contents of this presentation and workshop.
Endian Firewall Community Edition Roy Hickman Technology Director Peck Community Schools #
TZO Troubleshooting Training for Agents By Erik Collett
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
Linux Networking and Security
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
ISA SERVER 2004 Group members : Sagar Bhakta – [intro] Orit Ahmed – [installation] Michael Wijaya [advantages] Rene Salazar - [features]
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
NETGEAR CONFIDENTIAL FVS338 ProSafe VPN Firewall 50.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
HOW TO GUIDE: INEXPENSIVE INTERNET PROTOCOL TELEPHONY SOLUTION Created by: Cameron Adkisson Eastern Kentucky University
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
© 2001, Cisco Systems, Inc. CSPFA 2.0—16-1 Chapter 16 Cisco PIX Device Manager.
Getting Connected to NGS while on the Road…
Top 5 Open Source Firewall Software for Linux User
Working at a Small-to-Medium Business or ISP – Chapter 8
Getting Connected to NGS while on the Road…
Chapter 10: Advanced Cisco Adaptive Security Appliance
Presentation transcript:

Nada Abdulla Ahmed

 SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall Express is configured via a web-based GUI and requires absolutely no knowledge of Linux to install or use.  SmoothWall Express enables you to easily build a firewall to securely connect a network of computers to the Internet.

The goals of the smoothwall can be summed up as:  Be simple enough to be installed by home users with no knowledge of Linux  Support a wide variety of network cards, modems and other hardware  Work with many different connection methods and ISPs from across the world  Manage and configure the software using a web browser  Run efficiently on older, cheaper hardware  Develop a supportive

Minimum Hardware Requirements Any Pentium class CPU and above with a recommended minimum of 128MB RAM 64bit build for Core 2 systems

SmoothWall Express supports the following network configuration types: ExplanationType a network interface card (NIC) to connect to the internal network it is protecting a modem or ISDN card to connect to the Internet or external network. Green (Red is modem/ISDN) a NIC to connect to the internal network it is protecting a NIC to connect to a de-militarized zone a modem or ISDN card to connect to the Internet or external network Green +Orange (Red is modem/ISDN) a NIC to connect to the Internet or external network. Green +Red Green +Orange + Red Green + Purple (Red is modem/ISDN) a NIC to connect to the internal network it is protecting a NIC to connect to a wireless network a NIC to connect to a de-militarized zone a modem or ISDN card to connect to the Internet or external network Green +Purple+Orange (Red is modem/ISDN ) a NIC to connect to the internal network it is protecting a NIC to connect to a wireless network a NIC to connect to the Internet or external network. Green + Purple+ Red a NIC to connect to the internal network it is protecting a NIC to connect to a wireless network a NIC to connect to a de-militarized zone a NIC to connect to the Internet or external network Green + Purple+ Orange + Red

Accessing SmoothWall Express for the First Time

SmoothWall Express offers these features:  Detailed reports wonderful system for everything related to the network  Supports LAN, DMZ, and Wireless networks, plus Extrnal  Cash fast with reports of sites visited  Has a filter to filter sites  There is more than its anti-virus and is updated automatically  You can make a vpn connect users to data encryption, confidentiality and protection  Has a great firewall you can control it with ease and customize  Free of all the system updates  You can access it from outside the network and control  The possibility of recording conversations  Through the quality of service to improve the quality and performance of the service

Control Tab :The Control section contain SmoothWall Express’s home page which is the main status page.

About Tab SmoothWall Express Status Displays a list of core and optional services.

Advanced :current configuration and resource usage about SmoothWall Express.

Traffic Graphs :Displays statistical graphical and numeric data based on traffic across SmoothWall Express’s network interfaces

Bandwidth Bars :Displays realtime network bandwidth usage bars.

Traffic Monitor: Displays realtime network bandwidth usage graphs.

Your SmoothWall Express : Displays credits and copyright information and enables you to register your SmoothWall Express and create a MySmoothWall profile.

SmoothWall Express Services Tab enable and manage web, instant messaging, POP3, SIP DHCP, dynamic DHCP and intrusion detection system services.

Instant Messaging Proxy : (IM) proxy service enables you to log IM conversations and file transfers on the green neatwork and the purple network if it is enabled

AV Scanning the POP3 Proxy : SmoothWall Express can Anti-Virus (AV) scan POP3 s as they are downloaded from external mail servers to clients running on the green and purple networks.

The Session Initiation Protocol SIP : able to proxy Real- time Transport Protocol (RTP) traffic, and will solve some of the problems involved in setting up VoIP behind NAT. Configuring the DHCP Service Dynamic DNS Static DNS Managing the Intrusion Detection System Configuring Remote Access using the secure shell (SSH) Configuring Time Settings the date and time, synchronise time with a network time server.

(IDS) detects potential security breach attempts from outside your network. This service only detects intrusion attempts, it does not prevent them.

Network Tab Managing incoming and outgoing traffic Controlling internal traffic and access to services Blocking specific IP Configuring timed access to the Internet Managing Quality of Service (QoS) Configuring Dial-up Connections Working with interfaces.

ip block block external IP addresses from accessing SmoothWall Express and any machines behind it.

We can configure up to five different dial-up connections that can be used to connect SmoothWall Express to an ISP via ISDN, USB ADSL or an analogue modem

Networking > interfaces to configure and edit network interfaces, DNS and gateway settings

VPN : SmoothWall Express enables you to create Pre-Shared Key, IPSec VPN connections to other SmoothWall Express systems or IPSec-compliant hosts which have static IP addresses

Accessing System Logs Tab 1. system

2. Web Proxy Logs

3. Firewall Logs

4. IDS Logs

5. Instant Messages Logs

6. Logs

SmoothWall Express Tools Tab IP Tools Ping Traceroute

shell : The web-based secure shell (SSH) remote access tool enables command line administration of the SmoothWall Express system through a web browser.

Maintenance Tab From time to time, security and product updates are rolled out to all SmoothWall Express systems. You can use SmoothWall Express to check for and install updates  Updating Automatically

 Updating Manually

The End