CSCE 201 Windows XP Firewalls Fall 2010. Reading Windows XP help and Support: search on “Firewall” Tony Bradley, CISSP-ISSAP, Windows XP SP2 Firewall,

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
1 Topic 2 – Lesson 4 Packet Filtering Part I. 2 Basic Questions What is packet filtering? What is packet filtering? What elements are inside an IP header?
5-Network Defenses Dr. John P. Abraham Professor UTPA.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Firewall Lalitha Jammalamadaka. Agenda 1. Introduction 2.Types of firewalls 3.How a software firewall works 4.Methods to control traffic 5.Making the.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Security Firewall Firewall design principle. Firewall Characteristics.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Firewalls As Presented by Brian Dunn. Definition General Protects computer(s) from unauthorized access Types Hardware devices Software programs.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Lesson 19: Configuring Windows Firewall
Network security Process in which digital information are protected.
Firewall Slides by John Rouda
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Chapter 20 Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
Using Windows Firewall and Windows Defender
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
Chapter 6: Packet Filtering
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
BY OLIVIA WILSON AND BRITTANY MCDONALD Up Your Shields with Shields Up!
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Introduction to Firewalls TEC 236. What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
CSCE 522 Firewalls.
1.1 1 Purpose of firewall : –Control access to or from a protected network; –Implements network access policy connections pass through firewall and are.
Lesson 11: Configuring and Maintaining Network Security
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
NetTech Solutions Protecting the Computer Lesson 10.
Module 10: Windows Firewall and Caching Fundamentals.
CSCE 201 Network Security Firewalls Fall CSCE Farkas2 Traffic Control – Firewall Brick wall placed between apartments to prevent the spread.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
Role Of Network IDS in Network Perimeter Defense.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Windows Tutorial 5 Protecting Your Computer
Computer Data Security & Privacy
Introduction to Networking
Firewalls.
Information Security Session October 24, 2005
Firewalls Jiang Long Spring 2002.
Presentation transcript:

CSCE 201 Windows XP Firewalls Fall 2010

Reading Windows XP help and Support: search on “Firewall” Tony Bradley, CISSP-ISSAP, Windows XP SP2 Firewall, Is It Sufficient To Replace 3rd-party Personal Firewalls?, About.com CSCE Farkas2

3 Traffic Control – Firewall Brick wall placed between apartments to prevent the spread of fire from one apartment to the next Single, narrow checkpoint placed between two or more networks where security and audit can be imposed on traffic which passes through it

CSCE Farkas4 Firewall Hardware device or a software application and generally is placed at the perimeter of the network Private Network External Network Firewall

CSCE Farkas5 Firewall Objectives Act as the gatekeeper for all incoming and outgoing traffic Private Network External Network Proprietary data External attacks

Firewall Rules Restrict access to certain IP addresses or domain names Block certain types of traffic by blocking the TCP/IP ports they use Four basic approaches: – packet-filtering – circuit-level gateway – proxy server – application gateway CSCE Farkas6

Packet Filter Intercepts all traffic to and from the network Evaluates it against the firewall rules Rules use: source IP address, source port, destination IP address and destination port CSCE Farkas7

Circuit-level Gateway Blocks all incoming traffic to any host but itself Internally: the client machines establish a connection with the circuit-level gateway Outside world: all communication from your internal network seems to originate from the circuit-level gateway CSCE Farkas8

Proxy Server Boosts the performance of the network Hide the internal network topology (all communications appear to originate from the proxy server itself) Caches pages that have been requested to improve speed Filters traffic based on traffic info, ports and content Application Gateways: application specific proxy server CSCE Farkas9

Comparing Firewalls Filtering capability: – Packet filters: packet header information only – Application gateways: packet header and data content, application specific info Speed of detection – Packet filters: generally fast and uses limited resources – Application gateways: slower and uses more resources Use of traffic history – Packet filters: generally stateless (New systems: stateful packet filters) – Application gateways: generally stateful CSCE Farkas10

Home Users Home routers: – Come with built-in firewall – Generally simple packet filters Can block all incoming connections on all ports if desired Open connections as needed Examples: – Publish a web page from your computer: allow incoming traffic on Port 80 – Download files from outside using FTP: allow incoming connections on Port 21 CSCE Farkas11

Windows Firewalls Microsoft Windows XP Service Pack 2 (SP2), Windows Firewall is turned on by default You can install and run any firewall that you choose If you choose to install and run another firewall, turn off Windows Firewall CSCE Farkas12

Functionality Help block computer viruses and worms from reaching your computer Ask for your permission to block or unblock certain connection requests Allow to create a record (a security log), if you want one, that records successful and unsuccessful attempts to connect to your computer CSCE Farkas13

Not Supported Detect or disable computer viruses and worms if they are already on your computer Stop you from opening with dangerous attachments Block spam or unsolicited from appearing in your inbox CSCE Farkas14

To turn Windows Firewall on or off Must be logged on as an administrator To open Windows Firewall: click Start, click Control Panel, click Network and Internet Connections, and then click Windows Firewall On the General tab, click one of the following: – On (recommended) – Exceptions tab – Off (not recommended) CSCE Farkas15

Firewall Settings Exception Tab: when the firewall is turned on, some features of some types of programs are blocked – Unblock features: list the program on the Exceptions tab in Windows Firewall Advanced Options: – Set Windows Firewall settings for individual connections – Advanced tab, and then, under Network Connection Settings, click Settings CSCE Farkas16

Risk of Exceptions Exceptions make your computer is made more vulnerable Intruders often use software that scans the Internet looking for computers with unprotected connections Best Practices: – Only allow an exception when you really need it – Never allow an exception for a program that you don't recognize – Remove an exception when you no longer need it CSCE Farkas17

Add an Exception Open Windows Firewall. On the Exceptions tab, under Programs and Services, select the check box for the program or service that you want to allow, and then click OK. If the program (or service) that you want to allow is not listed: – Click Add Program. – In the Add a Program dialog box, click the program that you want to add, and then click OK. The program will appear, selected, on the Exceptions tab, under Programs and Services. Click OK. CSCE Farkas18

Open a Port Each port has a number. Many programs and services have predefined port numbers they use Open Windows Firewall. On the Exceptions tab, choose one of the following options: – To open a port for a program or service, select the check box for the program or service – To close a port for a program or service, clear the check box for the program or service CSCE Farkas19

Exception vs. Opening Port Adding an exception is preferable to opening a port – It is easier to do – You do not need to know which port number to use – Adding an exception helps provide security, because the firewall is only open while the program is waiting to receive the connection CSCE Farkas20

When to Block a Program? Firewall is turned on: a program on your computer attempts to accept connections from the Internet or a network  the firewall blocks the program from doing this and displays a message giving you the option to unblock the program Options: – Keep Blocking – Unblock – Ask Me Later CSCE Farkas21

Firewall Settings Apply to every user who logs on to the computer The message might be hidden behind the program  minimize or close the program Messages can be disabled by using Windows Firewall: Exceptions tab, clear the Display a notification when Windows Firewall blocks a program check box (not recommended) If Don't allow exceptions is selected on the General tab, you will not receive this message CSCE Farkas22

3 rd party firewalls From: Tony Bradley, CISSP-ISSAP, Windows XP SP2 Firewall, Is It Sufficient To Replace 3rd-party Personal Firewalls? Windows Firewall is much better than its Internet Connection Firewall (ICF) predecessor Still no match for a 3rd-party personal firewall solution CSCE Farkas23

Shortcomings of Windows Firewall Windows: does not monitor or block outbound traffic 3 rd party: monitors which programs attempt to initiate outbound communications and either alert the user or block the traffic when suspicious activity occurs Windows: relies on API's which can be disabled 3 rd party: Cannot be disabled without uninstalling CSCE Farkas24

Windows or 3 rd party? Use Windows and 3 rd party firewalls together? – No – Complicates setting and may create additional vulnerabilities Is SP2 of Windows sufficient? – For most home users: yes – For advanced home users: may not be enough CSCE Farkas25

Top 3 rd Party Firewalls Ranging in price between FREE and $50 on average – ZoneAlarm Pro 5 – PC-Cillin 2004 Internet Security – Norton Personal Firewall 2005 – McAfee Personal Firewall CSCE Farkas26

CSCE Farkas27 Without firewalls, nodes: – Are exposed to insecure services – Are exposed to probes and attacks from outside – Can be defenseless against new attacks – Network security totally relies on host security and all hosts must communicate to achieve high level of security – almost impossible

CSCE Farkas28 Firewall Advantages Protection for vulnerable services Controlled access to site systems Concentrated security Enhanced Privacy Logging and statistics on network use, misuse Policy enforcement

CSCE Farkas29 Firewall Disadvantages Restricted access to desirable services Large potential for back doors No protection from insider attacks No protection against data-driven attacks Cannot protect against newly discovered attacks – policy/situation dependent Large learning curve

CSCE Farkas30 Firewall Evaluation Level of protection on the private network ? – Prevented attacks – Missed attacks – Amount of damage to the network How well the firewall is protected? – Possibility of compromise – Detection of the compromise – Effect of compromise on the protected network Ease of use Efficiency, scalability, redundancy Expense