IS07-Firewall - Firewalls Pintu R Shah In this unit....

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Firewalls Pintu R Shah
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
In this unit. . Introduction • Kinds of Firewalls • Filtering Services • DMZ Pintu R Shah MPSTME SVKM's NMIMS • Implementing policies (Default allow, Default Deny) on proxy • IDS • Types of IDS • Virtual Private Network 2
Background image of page 2
What is firewall? • Isolates organization’s internal net from larger Internet, allowing some packets to pass, blocking others. Pintu R Shah MPSTME SVKM's NMIMS 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
What Can Firewalls Do? • Manage and control network traffic • Authenticate access • Act as an intermediary Pintu R Shah MPSTME SVKM's NMIMS • Protect resources • Record and report on events 4
Background image of page 4
Firewalls Manage and Control Network Traffic Packet Inspection Source IP address Source port Destination IP address estination port Pintu R Shah MPSTME SVKM's NMIMS Destination port IP protocol Packet header information (that is, sequence numbers, checksums, data flags, payload information, and so on) Connections and State Stateful Packet Inspection 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Firewalls Authenticate Access • The firewall can require the input of a username and password. • use of certificates and public keys Pintu R Shah MPSTME SVKM's NMIMS • authentication can be handled through the use of pre-shared keys 6
Background image of page 6
Firewalls Act as an Intermediary • A proxy functions by effectively mimicking the host it is trying to protect. • In many cases, this function as a proxy is complemented by using a firewall that is Pintu R Shah MPSTME SVKM's NMIMS capable of inspecting the actual application data to ensure that it is legitimate and nonmalicious data. When functioning in this manner, the firewall is known as working as an application proxy 7
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Firewalls Protect Resources • The single most important responsibility of a firewall is to protect resources from threat. • This protection is achieved through the use of access control rules, stateful packet inspection, Pintu R Shah MPSTME SVKM's NMIMS application proxies, or a combination of all to prevent the protected host from being accessed in a malicious manner or being made susceptible to malicious traffic. 8
Background image of page 8
Events • Firewalls should support a number of types of alarms: – Console notification This is the simple process of presenting a notification to the console. The drawback of this alarm method is that it requires someone to be actively monitoring the console to know an alarm has been generated. – SNMP notification Simple Network Management Protocol Pintu R Shah MPSTME SVKM's NMIMS (SNMP) can be used to generate traps that are sent to a network management system (NMS) that is monitoring the firewall. – Paging notification When an event occurs, the firewall can be configured to send a page to an administrator. This page can be numeric or alphanumeric, depending on the type of pager carried by the administrator. – E-mail notification Similar to paging notification, but the firewall
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/04/2011 for the course IT 100 taught by Professor Rickdas during the Spring '11 term at University of Mumbai.

Page1 / 70

IS07-Firewall - Firewalls Pintu R Shah In this unit....

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online