CTP 204 2006-2007 FALL Firewalls, Filtering Properties
Download
Report
Transcript CTP 204 2006-2007 FALL Firewalls, Filtering Properties
CTP 204
2006-2007 FALL
Firewalls
Filtering Properties
Anti-virus Programs
WHAT IS A FIREWALL?
System or system group
Traffic conroller
FIREWALLS PROPERTIES
Contol the traffic
1. Let the traffic go
2. Stop the traffic
Block the packets
Provide a first line of defense
Make public network secure
Can not block viruses(disadvantage)
Block unauthorized access
How does a firewall work?
Create a guide table
Checks the packets
PACKET(Source IP,Sink IP,Source Port,Sink Port)
Compare them with firewall rules
Delete or checks guide table
PERSONAL FIREWALLS
Without a firewall:
Ftp(optional)
Http(optional)
Smtp
Pop3
PERSONAL SECURITY
Update the applications run on Internet
(Outlook,Internet Explorer, ICQ,MSN…)
Usa a firewall and close unused ports
(IPTABLES for Linux, NETFILTER for Windows)
Use a anti-virus program & always update
Disable Java, Java Script, ActiveX choice
Do not open the e-mails before searching for
virus
Always take back-up of important files
Create a boot disc for hard-disc failure
FIREWALL TYPES
Software based
Hardware based
FILTERING PROPERTIES
1. Packet Filtering
Check only source IP&port, sink IP&port
Do not follow session
2. Stateful Inspection
Check the packet flow characteristic for each session
Complex from other filtering but secure
3. NAT(Network Address Translation)
Session level
Block the IP address of the computers
Show nat address & use only one IP
4. Proxy
Application level
Filter ftp,telnet applications
Filter certain commands of an application
Watch or block the local network users connection
High level security
NAT MECANISM
STEPS OF HOW DOES THE
MECANISM WORKS
1.
2.
3.
4.
5.
6.
Take the packet from local network
Hold IP and port info of this packet
Make the source address self-address
Send packet to out world
Take the answer packet from out world
Check the tables and find the owner of the
packet
COMPARING NAT & PROXY
Both hides IP addresses of the computers
Both can be used when IP address not enough
Both install session(Only Proxy interfere content)
Both slow down the network(CPU-RAM)
NAT easier to set up
Proxy require settings for each client (Internet
Explorer,ICQ,MSN…)
Both are secure
FIREWALLS PERFORMANCE
Related with network performance
RAM and CPU should be higher when
NAT & PROXY installed
Operation system should be harmony with
firewall
INSTALLING FIREWALLS
1. CENTERAL building
2. MIXED building
CENTRAL Building
CENTRAL Building
Advantages
Easy to config
Securer
Disadvantages
Effect all segments
Difficult to back up
Difficult to upgrade according to each user
MIXED Building
MIXED Building
Advantages
Effect only one segment
Easy back-up
Used many different functions
Disadvantages
Expensive than central building
Can not generalize security politics
VLAN(VIRTUAL LAN)
•Seperate each group
•Makes the network
securer
•Supply more security
with firewall
FIREWALL SETTINGS
1. Direct connection to firewall:
Enter the rules to command line(console)
2. If has web surface:
Enter the rules on web server
3. Installing the firewall setting console to
another (secure)pc:
Enter the rules on that (secure)pc
WINDOWS FIREWALL
WINDOWS FIREWALL
Dangerous to open a new port for an unknown application
WINDOWS FIREWALL
ANTI-VIRUS PROGRAMS
COMMON PROPERTIES
Executable
Clonable
Hideable
Change a program codes
Change itself
VIRUS TYPES
1.
2.
3.
4.
5.
6.
7.
8.
File Virus
Command Runnable Virus
Boot Sector Virus
Script Virus
Macro
Worm
Trojan
Dailer
File Virus
Finishes with .com .bat .exe
Change file
Delete file
Command Runnable Virus
Roll the O\S files
Target command.com
Boot Sector Virus
Place to MBR(Master Boot Record)
Run before O\S
Script Virus
Roll from Internet Explorer,Outlook…
Active when a web site or e-mail opened
Macro
Use macro functions of MS-Office
Roll while opening
Worm
Roll using IP address & opened share files
Use RPC(Remote Procedure Call) of
WINDOWS
Roll to sharing files
Copy it-self
Block the Internet traffic
Trojan
Take the passwords of victim PC
Spy virus
No damage
Dailer
Effect dial-up users
Disconnect the user from Internet
Mute the modem
Connect to an operator abroad
Make user pay too much money
ANTI-VIRUS PROGRAM PROPERTIES
Check existing folders
Clean\Quarantine contagious virus
Block the virus from CD,disc,internet
How does a anti-virus program work?
Create a database
Update the database
Take the control of the computer
Check all imports to pc
COMPARING ANTI-VIRUS
PROGRAMS
http://anti-virus-softwarereview.toptenreviews.com/?ttreng=1&ttrke
y=anti-virus+programs