Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to Firewall Technologies. Objectives Upon completion of this course, you will be able to: Understand basic concepts of network security Master.

Similar presentations


Presentation on theme: "Introduction to Firewall Technologies. Objectives Upon completion of this course, you will be able to: Understand basic concepts of network security Master."— Presentation transcript:

1 Introduction to Firewall Technologies

2 Objectives Upon completion of this course, you will be able to: Understand basic concepts of network security Master mandatory firewall technologies

3 3Com Confidential. 3 Contents Network Security Firewall Technologies

4 Network Security Overview Network security is a practical issue on the Internet Network security is a comprehensive technology Network security has two meanings: –Guarantee security of the internal LAN (away from illegal invasion) –Protect security of data exchange with the external network Perfection and update of the network security technology

5 Coverage of Network Security Coverage of network security –Prevent physical lines of the network from being easily attacked –Effectively identify legal and illegal users –Implement effective access control –Guarantee concealment of the internal network –Offer an effective anti-forgery means to focus on major data –Provide security management for network equipment and network topology –Provide virus protection –Improve security protection consciousness Category of network security devices

6 3Com Confidential. 6 Contents Network Security Firewall Technologies

7 Mandatory Firewall Technologies As for different kinds of potential security hazards on the network, the firewall must have the following security features: –Network isolation & access control –Attack defending –Network Address Translation (NAT) –Application Specific Packet Filter (ASPF) –ID authentication –Content filter –Security management

8 Network Isolation & Access Control Firewall Switch Trusted Zone Untrusted Zone DMZ Trusted Zone -> DMZ, accessing POP3 and SMTP services DMZ -> Trusted Zone, accessing no services Untrusted Zone -> DMZ, accessing POP3 and SMTP services DMZ -> Untrusted Zone, accessing all services Trusted Zone and Untrusted Zone cannot access each other Email Server

9 Attack Defending Firewall Trusted Zone Untrusted Zone DoS attack Hacker Normal user Prevent

10 Network Address Translation (NAT) Firewall Web Server 10.1.1.0/24 10.1.1.1210.190.100.23 10.1.1.100 → 210.190.100.23 10.1.1.100 ← 210.190.100.23

11 Application Specific Packet Filter (ASPF) Dynamically create and delete filter rules Monitor packets in the communication process

12 ID Authentication Firewall Access the Internet User name and password? Input the user name and password Authentication success Normal Internet access

13 Content Filter Normal website Harmful website Internet Harmful contents Healthy contents Filter harmful websites Remove malicious webpage contents

14 Security Management Internet Log buffer Monitoring terminal Console Log host SecPath

15 Summary Basic concepts of network security Mandatory firewall technologies

16 Thank you


Download ppt "Introduction to Firewall Technologies. Objectives Upon completion of this course, you will be able to: Understand basic concepts of network security Master."

Similar presentations


Ads by Google