Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.

Slides:



Advertisements
Similar presentations
Microsoft Internet Security and Acceleration (ISA) Server 2004 Technical Overview
Advertisements

Guide to Network Defense and Countermeasures Second Edition
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
FIREWALLS Chapter 11.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Module 5: Configuring Access for Remote Clients and Networks.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Firewall Planning and Design Chapter 1. Learning Objectives Understand the misconceptions about firewalls Realize that a firewall is dependent on an effective.
Firewalls and Intrusion Detection Systems
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
A Guide to major network components
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Firewall Slides by John Rouda
1 Enabling Secure Internet Access with ISA Server.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Networking Components Mike Yardley LTEC 4550 Assignment 3
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Chapter 5 Networks Communicating and Sharing Resources
COEN 252 Computer Forensics
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Chapter 13 – Network Security
Common Devices Used In Computer Networks
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 11: Remote Access Fundamentals
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
3/5/2016Faculty : Trần Thị Ngọc Hoa1 From Proxy Server To ISA 2006  Overview  History  Functions  Caching Process  Caching Types  How does it work.
IS3220 Information Technology Infrastructure Security
I NTRODUCTION TO F IREWALLS. O VERVIEW OF F IREWALLS As the name implies, a firewall acts to provide secured access between two networks A firewall may.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Defining Network Infrastructure and Network Security Lesson 8.
Top 5 Open Source Firewall Software for Linux User
CONNECTING TO THE INTERNET
SECURING NETWORK TRAFFIC WITH IPSEC
Computer Data Security & Privacy
Securing the Network Perimeter with ISA 2004
Click to edit Master subtitle style
Firewalls.
Firewall Installation
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Building Your Own Firewall Chapter 10

Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain how enterprise firewalls work

Enterprise versus Desktop Firewalls Enterprise firewall Protects entire network or a network segment Can be a separate hardware appliance or software-only Desktop firewall Software-only firewall intended to be installed on one client computer on the network and provide protection only to that device Also known as a personal firewall

Enterprise Firewall

Desktop Firewalls Have generally replaced hardware firewalls for protection of a single device Intercept and inspect all data that enters or leaves the computer Traffic can generally be blocked by IP address, port address, or application Protects against rogue access points and worms

Desktop Firewalls

Rogue Access Point

Desktop Firewalls Help protect network by providing additional level of security at each network device Recent increase in popularity Popular desktop firewalls Tiny Personal Firewall Sygate Personal Firewall ZoneAlarm

Tiny Personal Firewall Unique for advanced security features Based on a technology certified by ICSA Made up of several different “engines” Includes an Intrusion Detection System (IDS) engine Uses sandbox technology to create a closed environment around an application and restrict access to resources

Firewall Engine Performs stateful packet inspection Filters network activity based on TCP/IP protocol Supports rules that link to specific applications (Application Filter) Ensures that an application program on the computer is the real program and not a Trojan horse Creates and checks MD5 signatures (checksums) of application programs

Tiny Personal Firewall Engine

Checksums

IDS Engine Report

Sandbox Technology Protects resources Device drivers Registry database that contains all configurations of the computer File system Shields and constantly monitors application programs to protect privacy and integrity of the computer system continued

Sandbox Technology Protects against active content programs being used to perform: Theft of information and data Remote access via Internet Manipulation of communication Deletion of files Denial of service

Tiny Personal Firewall Sandbox

Sandbox Objects

Sygate Firewalls Protect corporate networks and desktop systems from intrusion Prevent malicious attackers from gaining control of corporate information network Range in design from enterprise-based security systems to personal firewall systems Secure Enterprise Personal Firewall Pro

Sygate Secure Enterprise Top-of-the-line product that combines protection with centralized management Made up of Sygate Management Server (SMS) and Sygate Security Server SMS enables security managers to create a global security policy that applies to all users and groups Subgroups can be created within the global group Can produce detailed reports of firewall’s actions

Sygate Management Server

Sygate Personal Firewall Pro Designed for business users but lacks centralized management features Provides in-depth low-level tools for protecting computers from a variety of attacks

Sygate Personal Firewall Pro

Blocks or allows specific services and applications instead of restricting specific TCP network ports Fingerprinting system ensures that an application program is the real program and not a Trojan horse

Sygate Personal Firewall Pro

Provides flexibility over rules that govern the firewall Contains other features not commonly found on most desktop firewall products (eg, testing and connection) Protects against MAC and IP spoofing

Sygate Personal Firewall Pro

ZoneAlarm Firewalls Bi-directional; provide protection from incoming and outgoing traffic Pop-up windows alert users to intrusion attempts Four interlocking security services Firewall Application Control Internet Lock Zones

ZoneAlarm Firewall

Uses fingerprints to identify components of a program as well as the program itself Prevents malicious code from gaining control of computer Stops potentially malicious active content

ZoneAlarm Firewall Application Control Allows users to decide which applications can or cannot use the Internet Internet Lock Blocks all Internet traffic while computer is unattended or while Internet is not being used Zones Monitors all activities on the computer; sends an alert when a new application tries to access the Internet

Internet Lock Settings

Zone Security

ZoneAlarm Logging Options

Enterprise Firewalls Still perform bulk of the work in protecting a network First line of defense in a security management plan Provide “perimeter security” Allow security managers to log attacks that strike the network

Popular Enterprise Firewall Products Linksys firewall/router Microsoft Internet Security and Acceleration (ISA) server

Linksys Offers a wide variety of routers, hubs, wireless access points, firewalls, and other networking hardware Produces solid products that provide strong security and are easy to set up and use

Linksys Firewall/Router Comes in a variety of configurations Good solutions for connecting a group of computers to a high-speed broadband Internet connection or to a 10/100 Ethernet backbone and also support VPN

Linksys Firewall/Router Features an advanced stateful packet inspection firewall Does not block transmissions based on the application Supports system traffic logging and event logging

Linksys Firewall/Router Features Web filter Block WAN request Multicast pass through IPSec pass through PPTP pass through Remote management

Microsoft ISA Server 2000 Enterprise firewall that integrates with Microsoft Windows 2000 operating system for policy-based security and management Provides control over security, directory, virtual private networking (VPN), and bandwidth Available in two product versions ISA Server Standard Edition ISA Server Enterprise Edition

Microsoft ISA Server 2000 Provides two tightly integrated modes Multilayer firewall Web cache server Software uses a multihomed server Firewall protection is based on rules which are processed in a certain order

Multihomed Server

Order of Processing ISA Server Rules Incoming requests 1.Packet filters 2.Web publishing rules 3.Routing rules 4.Bandwidth rules Outgoing requests 1.Bandwidth rules 2.Protocol rules 3.Site and content rules 4.Routing rules 5.Packet filters

Microsoft ISA Server Policy Elements Schedules Bandwidth priorities Destination sets Client Address sets Content groups

Chapter Summary Types of firewalls currently available for enterprise, small office home office (SOHO), and single computer protection Features of these firewalls that provide the necessary protection to help keep a network or computer secure