0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.

Slides:



Advertisements
Similar presentations
11/2/2013 2:02:38 AM 5864_ER_FED 1 Importing Certificates into Lotus Notes R6.
Advertisements

Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Lecture 10 Sharing Resources. Basics of File Sharing The core component of any server is its ability to share files. In fact, the Server service in all.
®® Microsoft Windows 7 Windows Tutorial 8 Connecting to Networks with Mobile Computing.
Welcome to the MIRC & NoName Script Tutorial Created by Buzz & Jet 1/31.
Module 5: Configuring Access for Remote Clients and Networks.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 19: Configuring Windows Firewall
File sharing. Connect the two win 7 systems with LAN card Open the network.
1 Enabling Secure Internet Access with ISA Server.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Implementing RADIUS AAA Phil & Rick. Content Terms and Concepts Access Control What is AAA? Benefits of AAA What is RADIUS? Microsoft IAS Overview Installation.
Remote Assistance  Using this program you can allow someone to work on your computer, chat with you and view your screen with your permission  The other.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Installing Active Directory on Windows Server 2008 R2 Installing Active Directory on a fresh Windows Server 2008 R2 machine in a home network. These instructions.
4-1 PSe_4Konf.503 EAGLE Getting Started and Configuration.
Advanced Networking for DVRs
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Back to content Final Presentation Mr. Phay Sok Thea, class “2B”, group 3, Networking Topic: Mail Client “Outlook Express” *At the end of the presentation.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
With Windows XP, you can share files and documents with other users on your computer and with other users on a network. There is a new user interface.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Copyright 2000 eMation SECURITY - Controlling Data Access with
Microsoft Internet Information Services 5.0 (IIS) By: Edik Magardomyan Fozi Abdurhman Bassem Albaiady Vince Serobyan.
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send.
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
Windows 7 Firewall.
Chapter 4 Initial Configuration Tasks. Understanding the Initial Configuration Tasks window Microsoft now provides a new feature, the Initial Configuration.
Network Security and Troubleshooting An in-service for users of Windows XP Pro on Windows Server 2003.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
1. Chapter 25 Protecting and Preparing Documents.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
The University of Oklahoma Virtual Private Network How it works.
Module 5: Designing Security for Internal Networks.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Module 10: Windows Firewall and Caching Fundamentals.
1 Terminology. 2 Requirements for Network Printing Print server Sufficient RAM to process documents Sufficient disk space on the print server.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
FTP COMMANDS OBJECTIVES. General overview. Introduction to FTP server. Types of FTP users. FTP commands examples. FTP commands in action (example of use).
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send messages,
These steps will guide you through installing the pcAnywhere Host software so that we can remote control your PC from NZ! Once installed, it will only.
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
Virtual Machines Module 2. Objectives Define virtual machine Define common terminology Identify advantages and disadvantages Determine what software is.
Remote Access Using a Netgear DG834 Router 1http://
ISite Main Window Open iSite v7.0 from your laptop (the Main window will appear) Auto-Discovery occurs on if connected to a iNFINITI Modem via a LAN, port.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
TECH TIP – Videoconferencing settings for Apple AirPort Extreme wireless access point. SYMPTOM / ISSUE After connecting a set-top videoconferencing system.
Configuring ALSMS Remote Navigation
6.6 Firewalls Packet Filter (=filtering router)
7 Steps to Set Up AT&T on MS Outlook | Customer Support Number
Setting Up CITRIX For HQ ACPERS BOA
Firewalls Chapter 8.
How to install and manage exchange server 2010 OP Saklani.
Presentation transcript:

0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager

1Gold 11 1Gold 11 Using LapLink in a Secure Environment Currently, corporations using LapLink 2000, LapLink Host and LapLink Gold (version 3.x) must modify their network security to successfully connect (inbound) through a firewall or router. Firewalls must have ports 1547 and 389 open for inbound and any port over 1024 open for outbound TCP/IP trafficFirewalls must have ports 1547 and 389 open for inbound and any port over 1024 open for outbound TCP/IP traffic Routers must have port forwarding enabled, with port 1547 mapped to the single computer running LapLink behind the firewall/routerRouters must have port forwarding enabled, with port 1547 mapped to the single computer running LapLink behind the firewall/router Security can be increased by using LapLink features, such as the Log-in List and CryptoAPI data encryption; however, any open ports on the firewall decrease the overall security of the networkSecurity can be increased by using LapLink features, such as the Log-in List and CryptoAPI data encryption; however, any open ports on the firewall decrease the overall security of the network The result … Many end users are left without LapLink’s remote access benefits and features because the Corporation’s network security requirements have greater priority. The new Firewall Service in LapLink Gold 11 addresses these concerns.

2Gold 11 2Gold 11 Benefits of the Firewall Service Network administrators do not open any ports or compromise firewall in any way Routers do not need port forwarding to find the computer running LapLink on the local network Packet filtering does not stop data packets at the external IP address Multiple computers behind the firewall can now run LapLink and receive connections from public networks such as the Internet

3Gold 11 3Gold 11 Limits of the Firewall Service This service is designed to work through one firewall. If both computers are behind firewalls, connection attempts will fail unless firewall configuration changes are made on the guest (remote) computer. To connect in through a firewall and use a DSL or cable modem connection on the guest computer, port forwarding must be configured for the DSL/cable modem. This service does not support firewalls that require “stateful inspection” of the connection or password authentication at the firewall.

4Gold 11 4Gold 11 Firewall Service Overview Firewall Service provides secure connections into computers behind firewalls and routers Computers running LapLink Gold 11 send publicly available information (such as IP address and LapLink computer names) to a server maintained by LapLink Inc. Server acts as a ‘proxy’ …sending messages, but no private customer data Final connection does not go through the LapLink firewall server Connections can not be spoofed because of ‘shared secret’ that includes the originating IP address

5Gold 11 5Gold 11 The computer behind the corporate firewall sends this information to the LapLink firewall server: Internet address (aka the ILS name, as configured in LapLink’s Internet Directory Options) IP address of the firewall LapLink computer name The firewall server and the computer keep the HTTP connection active so the port stays open through the corporate firewall. Notes: Notes: The LapLink computer name and the ILS name can be different. Some firewalls may send the computer’s IP address if 1:1 NAT is in use x xx How LapLink Connects through the Firewall … the magic!

6Gold 11 6Gold x xx The computer outside the firewall sends a message to the firewall server asking if it knows about the computer it wants to connect with (aka If the firewall server does know it sends external firewall IP address and the LapLink computer name to will use this information to help authenticate later. k x xx

7Gold 11 7Gold x xx x xx sends another message to the firewall server asking for a connection to The message includes ILS name, IP address and LapLink computer name me

8Gold 11 8Gold 11 The firewall server matches the ILS names x xx x xx me

9Gold 11 9Gold 11 The firewall server sends a message to requesting a connection to The message sends IP address and LapLink computer name x xx x xx e e

10Gold 11 10Gold 11 makes an outgoing connection to IP address, and sends her LapLink computer name, and the login name and password gave to her for her Address Book x xx x xx e e Sally *******

11Gold 11 11Gold x xx x xx e e Sally ******* checks IP address, the LapLink computer name and the login and password. uses the information that came from the firewall server, and his LapLink Log-in list to authenticate If everything matches, the connection reverses and connects back to through the port that connection to opened xxx Sally ******* LapLink opens File Transfer, or other LapLink services

12Gold 11 12Gold 11 Configuring the Firewall Service Tutorial George works from home and needs to transfer his files to Sally at her office. In this tutorial, you’ll learn how, using LapLink Gold 11, George now securely connects to Sally’s computer without the network administrator compromising the security of the firewall by opening a port. At the office, Sally configures LapLink in three areas. At the office, Sally configures LapLink in three areas. She changes LapLink’s Security to allow George to connect to her computer using LapLink services (for example, file transfer and remote control). She creates an entry in LapLink’s Address Book that tells the Firewall service it’s okay to let George connect to her. She publishes an Internet address to the Internet Directory Locator so that she doesn’t need to worry about knowing the IP address of her computer when George needs to connect to her. Some of the information she uses must match George’s computer, so she collaborates with him at some stages.

13Gold 11 13Gold 11 Here are the steps Sally follows to change LapLink’s Security: 1. 1.From LapLink’s Options menu, click Security. Or click the Security icon on the Link bar On the General tab, click Log-in List Only (Protected System).

14Gold 11 14Gold Click Log-in List, and then click Add Type a log-in name and a password Click any LapLink services that you want this user to use when connected to this computer Click Apply, and then OK until the Security dialog box closes. Note: Alternatively, you can set LapLink’s Security to Anybody (Public System). If you do so, click Public Privileges and set the LapLink services that you want everyone to use.

15Gold 11 15Gold 11 Here are the steps Sally follows to change LapLink’s Address Book: 1. 1.From LapLink’s Options menu, click Address Book. Or click the Address Book icon on the Link bar Click Add In the Description field, add information that meaningfully describes to you what this connection does. 4.In the Computer Name, add the LapLink computer name of the computer that is connecting to you from outside the firewall. Note: This is information that came from George. He found it by going to LapLink’s Options menu, and clicking Computer name. George used 5.In the Connection field, click Firewall.

16Gold 11 16Gold In the Security Information to send fields, type the login name and password that you need to connect to the other computer. (This information also came from George. He has changed his LapLink Log- in List to let Sally connect to him.) 7. 7.Click OK and then Close. Here are the steps Sally follows to publish her Internet Address to the Internet Directory Locator: 1. 1.From LapLink’s Options menu, click Internet Directory Options In the Internet address field, type a name that uniquely describes this computer. This can be an name or something else.

17Gold 11 17Gold 11 3.In Options, click both boxes. 4.Under Directory server, confirm that the LapLink directory server is selected. 5.Click Apply and then OK. 6.Watch for the icon to appear in the LapLink status tray. If necessary, go to LapLink’s Connect menu and click Publish My Internet Address. Note: Click Don’t show me this message again if you want LapLink to automatically publish your address. Sally’s computer at work is now configured for George to connect to her. She needs to remember to leave LapLink running, and make sure that her computer has access to the Internet.

18Gold 11 18Gold 11 At home, George configures LapLink in these two areas: He changes LapLink’s Security to match Sally’s ‘firewall’ Address Book entry. He creates an entry in LapLink’s Address Book that has Sally’s Internet Address and the log-in name and password she assigned for him. Here are the steps George follows to change LapLink’s Security, matching his Log-in List to Sally’s Address Book: 1. 1.From LapLink’s Options menu, click Security. Or click the padlock icon on the Link Bar On the General tab, click Log-in List Only (Protected System) Click Log-in List, and then click Add.

19Gold 11 19Gold Type the log-in name and password. Note: This is the information he gave to Sally for her Address Book For Services, click Firewall. (This is what tells Sally’s computer it’s okay for George to connect.) Click Apply, and then OK until the Security dialog closes.

20Gold 11 20Gold 11 Here are the steps George follows to create his Address Book entry: 1.From LapLink’s Options menu, click Address Book. Or click the Address Book icon on the Link bar. 2.Click Add. 3.In the Description field, add information that meaningfully describes to you what this connection does. 4.In the Computer Name, type the LapLink computer name of the computer that you are connecting to inside the firewall. ( Note: This is information that came from Sally. She found it by going to LapLink’s Options menu, and clicking Note: This is information that came from Sally. She found it by going to LapLink’s Options menu, and clicking Computer name. Sally used 5.In the Connection field, click Internet.

21Gold 11 21Gold For Services, click any LapLink service that you want to use. George is using File Transfer. Note: If you don’t have permission to use a service, you’ll see a message stating that Access is Denied In the Security Information to send fields, type the login name and password that you need to connect to the other computer. (This information came from Sally’s Log-in List.) 8. 8.Click OK and then Close.

22Gold 11 22Gold 11 Here are the steps George follows to connect to Sally: 1. 1.From LapLink’s Connect Over menu, click Internet Highlight the Address Book entry for the computer inside the firewall. (In George’s case, this is Sally’s work.) 3. 3.Click OK.

23Gold 11 23Gold 11 When the computers have connected, the file transfer (or other service) window appears on your screen. Here is what George saw.