configuring tcp/ip addressing and security

Download Report

Transcript configuring tcp/ip addressing and security

1
Chapter 11
CONFIGURING
TCP/IP ADDRESSING
AND SECURITY
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
OVERVIEW
 Understand IP addressing
 Manage IP subnetting and subnet masks
 Understand IP security terminology
 Manage Internet security features of
Windows XP
 Configure and troubleshoot Windows
Firewall
2
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
UNDERSTANDING BINARY NUMBERS
3
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
4
CONVERTING DECIMAL ADDRESSES TO BINARY
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
5
CONVERTING BINARY ADDRESSES TO DECIMAL
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
USING CALCULATOR TO CONVERT NUMBERS
6
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
SUBNET MASKS
7
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
PROBLEMS WITH CLASSFUL ADDRESSES
 Wasted addresses
 Shortage of address blocks
 Excessive routing table entries
8
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
SUBNETTING A LARGE NETWORK
9
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
CLASSLESS INTERDOMAIN ROUTING (CIDR)
10
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
SUPERNETS
11
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
12
SECURING IP COMMUNICATIONS
 Internet threats
 Protective technologies
 Configuring and managing Windows Firewall
 Monitoring Internet communications
security
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
INTERNET THREATS
 Viruses (the oldest threat)
 Worms (the most persistent threat)
 Trojan horses
 Spyware
 Zombies
 Direct hacking
13
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
VIRUSES
 Take advantage of gullible users
 Infect document, graphics, and
executable files
 Often include mass-mailing components
 Can carry destructive payloads
14
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
15
WORMS
 Self-replicating
 Network-aware
 Use bugs in programs or systems to spread
 Can carry viruses or other payloads
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
TROJAN HORSES
 Usually e-mailed or downloaded
 Appear to be a useful program or game
 Carry payload or back door application
16
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
SPYWARE
 Has attributes of Trojan horses or worms
 Spies on its victim
 Might transmit marketing data or transmit
personal data to the spyware author
17
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
18
ZOMBIES
 Payload of worm or Trojan horse
 Remotely controlled to attack network
targets
 Participate in large-scale assaults on public
Web sites
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
DIRECT HACKING
 Relatively low incidence
 Hardest form of attack to defeat
19
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
PROTECTIVE TECHNOLOGIES
 Security Center
 Windows Firewall
 Internet Connection Sharing (ICS)
 Third-party utilities
20
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
SECURITY CENTER
21
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
FIREWALL TERMINOLOGY
 Packet filtering
 Stateful packet filtering
 Exceptions (packet filter rules)
 Allowed traffic
 Rejected traffic
 Logging
22
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
ENABLING WINDOWS FIREWALL
23
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
FIREWALL EXCEPTIONS
24
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
ADVANCED WINDOWS FIREWALL SETTINGS
25
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
MONITORING INTERNET SECURITY
 Windows Firewall monitoring
 Service logs
 Event logs
26
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
WINDOWS FIREWALL ALERTS
27
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
WINDOWS FIREWALL LOGS
28
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
SERVER LOGS
29
Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY
30
SUMMARY
 IP addresses are 32-bit binary addresses.
 The network portion of IP addresses determines
location.
 CIDR allows creation of custom netblocks.
 CIDR permits use of variable-length subnet masks.
 Windows Firewall blocks unauthorized packets.
 Windows Firewall exceptions allow specified traffic
to pass through the firewall.
 Alerts and logs warn of attempted attacks.