2. Welcome to Introduction to Firewall Essentials This course is intended to provide you with an understanding of key concepts and theories associated with firewalls, security policies and attacks directed toward your network.
3.
4.
5.
6.
7.
8. Unit I - Chapter 1 What is a Firewall? Firewall Essentials
11. Company intranet Firewall Router Restricted Network Corporate Data Center Firewall Internet Firewall Location Firewall
12.
13.
14. IP Packet Components U. S. Mail Address Components Comments Destination IP address Street address and zip code Each host on an IP Internet or intranet must have a unique IP address Protocol Organization name The standard protocols above IP are TCP and UDP Destination port number Recipient name Identifies the network application to receive the packet Source IP address Sender’s return address So the application knows where to send replies Source port number Sender’s name To identify the application of the sending host for return packets Comparing IP Packet with a Letter Address
15.
16. LAN LAN To: 204.32.38.102 204.32.38.102 204.32.38.103 204.32.38.104 204.32.38.105 192.38.1.1 192.38.1.2 192.38.1.3 192.38.1.4 “ Mailing” a Letter
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28. Unit I - Chapter 2 Types of Firewalls Firewall Essentials
43. Unit I - Chapter 3 How Firewalls Work Firewall Essentials
44.
45.
46. Application Kernel Network Cards Proxy Application Level Kernel Level Network Card Level Possible Firewall Processing Locations - Packet Processing Locations Within a Firewall
47.
48. Field Purpose Source IP address Destination IP address Upper level protocol TCP source port number TCP destination port number Host address of sender Host address of service provider Different protocols offer different services A random number greater than 1024 Indicates service such as Telnet or HTTP Fields of Interest for Packet Filtering
83. Attacker Mail Server Target Mailbox Flood of E-mail to Target Denial of Service Mail Attack
84.
85. Attacker Network TCP Packet Copies Original TCP Packet Original TCP Packet Network Packet Sniffing Attack
86.
87. External 10.35.25.6 Internal 10.12.1.1 Internal 10.12.1.5 Packet Filter Reports source address to be 10.12.1.1 Filter assumes packet is from trusted source, and allows data into the network IP Spoof Attack
88. Unit III - Chapter 1 Firewall Features Firewall Essentials
89.
90.
91.
92.
93.
94.
95.
96.
97.
98.
99.
100.
101.
102.
103.
104.
105.
106.
107.
108.
109. LAN 192.168.1.3 192.168.1.4 192.168.1.1 192.168.1.2 Illegal IP address 192.168.1.2 Legal IP address 204.32.38.1 Internal External Address Mapping
110.
111. Day and Time Restrictions x FTP allowed FTP disallowed
115. Company intranet 1 Company intranet 2 Internet Firewall Firewall Not encrypted PRIVATE Not encrypted PRIVATE Encrypted PUBLIC Virtual Private Networks (VPNs)
116.
117. Unit III - Chapter 2 Security Policies Firewall Essentials