340 likes | 418 Views
Learn about the different types of firewalls, their properties, and how they work, including packet filtering and NAT mechanisms. Discover personal firewall benefits, security measures, and anti-virus programs to protect your system from threats. Compare NAT and proxy settings, firewall performance, and installation options for central and mixed buildings. Explore VLAN benefits and firewall settings for enhanced network security.
E N D
CTP 2042006-2007 FALLFirewallsFiltering PropertiesAnti-virus Programs
WHAT IS A FIREWALL? • System or system group • Traffic conroller
FIREWALLS PROPERTIES • Contol the traffic • Let the traffic go • Stop the traffic • Block the packets • Provide a first line of defense • Make public network secure • Can not block viruses(disadvantage) • Block unauthorized access
How does a firewall work? • Create a guide table • Checks the packets PACKET(Source IP,Sink IP,Source Port,Sink Port) • Compare them with firewall rules • Delete or checks guide table
PERSONAL FIREWALLS Without a firewall: • Ftp(optional) • Http(optional) • Smtp • Pop3
PERSONAL SECURITY • Update the applications run on Internet (Outlook,Internet Explorer, ICQ,MSN…) • Usa a firewall and close unused ports (IPTABLES for Linux, NETFILTER for Windows) • Use a anti-virus program & always update • Disable Java, Java Script, ActiveX choice • Do not open the e-mails before searching for virus • Always take back-up of important files • Create a boot disc for hard-disc failure
FIREWALL TYPES Software based Hardware based
FILTERING PROPERTIES • Packet Filtering • Check only source IP&port, sink IP&port • Do not follow session • Stateful Inspection • Check the packet flow characteristic for each session • Complex from other filtering but secure • NAT(Network Address Translation) • Session level • Block the IP address of the computers • Show nat address & use only one IP • Proxy • Application level • Filter ftp,telnet applications • Filter certain commands of an application • Watch or block the local network users connection • High level security
NAT MECANISM • STEPS OF HOW DOES THE MECANISM WORKS • Take the packet from local network • Hold IP and port info of this packet • Make the source address self-address • Send packet to out world • Take the answer packet from out world • Check the tables and find the owner of the packet
COMPARING NAT & PROXY • Both hides IP addresses of the computers • Both can be used when IP address not enough • Both install session(Only Proxy interfere content) • Both slow down the network(CPU-RAM) • NAT easier to set up • Proxy require settings for each client (Internet Explorer,ICQ,MSN…) • Both are secure
FIREWALLS PERFORMANCE • Related with network performance • RAM and CPU should be higher when NAT & PROXY installed • Operation system should be harmony with firewall
INSTALLING FIREWALLS • CENTERAL building • MIXED building
CENTRAL Building • Advantages • Easy to config • Securer • Disadvantages • Effect all segments • Difficult to back up • Difficult to upgrade according to each user
MIXED Building • Advantages • Effect only one segment • Easy back-up • Used many different functions • Disadvantages • Expensive than central building • Can not generalize security politics
VLAN(VIRTUAL LAN) • Seperate each group • Makes the network securer • Supply more security with firewall
FIREWALL SETTINGS • Direct connection to firewall: • Enter the rules to command line(console) • If has web surface: • Enter the rules on web server • Installing the firewall setting console to another (secure)pc: • Enter the rules on that (secure)pc
WINDOWS FIREWALL Dangerous to open a new port for an unknown application
ANTI-VIRUS PROGRAMS COMMON PROPERTIES • Executable • Clonable • Hideable • Change a program codes • Change itself
VIRUS TYPES • File Virus • Command Runnable Virus • Boot Sector Virus • Script Virus • Macro • Worm • Trojan • Dailer
File Virus • Finishes with .com .bat .exe • Change file • Delete file
Command Runnable Virus • Roll the O\S files • Target command.com
Boot Sector Virus • Place to MBR(Master Boot Record) • Run before O\S
Script Virus • Roll from Internet Explorer,Outlook… • Active when a web site or e-mail opened
Macro • Use macro functions of MS-Office • Roll while opening
Worm • Roll using IP address & opened share files • Use RPC(Remote Procedure Call) of WINDOWS • Roll to sharing files • Copy it-self • Block the Internet traffic
Trojan • Take the passwords of victim PC • Spy virus • No damage
Dailer • Effect dial-up users • Disconnect the user from Internet • Mute the modem • Connect to an operator abroad • Make user pay too much money
ANTI-VIRUS PROGRAM PROPERTIES • Check existing folders • Clean\Quarantine contagious virus • Block the virus from CD,disc,internet
How does a anti-virus program work? • Create a database • Update the database • Take the control of the computer • Check all imports to pc
COMPARING ANTI-VIRUS PROGRAMS http://anti-virus-software-review.toptenreviews.com/?ttreng=1&ttrkey=anti-virus+programs