Proxy Servers & Firewalls
<ul><li>What is proxy ? </li></ul><ul><li>Main purpose of using proxies </li></ul><ul><li>How a proxy works ? </li></ul><u...
What is proxy ? Proxy Proxy is hardware / software Indirect access to other networks e.g INTERNET. all computers on the lo...
Main purpose of using proxies <ul><li>Improve Performance </li></ul><ul><ul><li>Act as Cache server </li></ul></ul><ul><ul...
Improve Performance <ul><li>Caching </li></ul><ul><ul><li>Reduce latency </li></ul></ul><ul><ul><li>Reduce Network Traffic...
Filter Requests <ul><li>Prevent access to some web sites!!! </li></ul><ul><ul><li>Categories web sites </li></ul></ul><ul>...
What do you need for  proxy installation? <ul><li>Proxy Software </li></ul><ul><ul><ul><li>Ms ISA Server , Squid , WinRout...
How a proxy works ? <ul><li>See the next Demo </li></ul>
IP  : 172.16.0.2 Gw : 172.16.0.1 IP  : 172.16.0.1 IP  : 217.219.66.2 Gw : 217.219.66.1 LAN INTERNET Proxy Server Source IP...
IP  : 172.16.0.2 Gw : 172.16.0.1 IP  : 217.219.66.2 Gw : 217.219.66.1 IP  : 172.16.0.1 Change Source IP Address LAN INTERN...
IP  : 217.219.66.2 Gw : 217.219.66.1 IP  : 172.16.0.1 Change Source IP Address  & Destination IP Address IP  : 172.16.0.2 ...
IP  : 217.219.66.2 Gw : 217.219.66.1 IP  : 172.16.0.1 Change Dest. IP Address IP  : 172.16.0.2 Gw : 172.16.0.1 LAN INTERNE...
IP  : 172.16.0.2 Gw : 172.16.0.1 IP  : 217.219.66.2 Gw : 217.219.66.1 IP  : 172.16.0.1 LAN INTERNET Proxy Server Source IP...
Proxy types <ul><li>Web proxies </li></ul><ul><li>SSL proxies </li></ul><ul><li>Transparent proxies </li></ul><ul><li>Open...
Popular hardware & software proxies Software Proxy Hardware Proxy Ms. ISA Server Cisco PIX Squid Blue Coat Kerio WinRoute ...
What is firewall ? Firewall Firewall is hardware / software protects the resources of a private network from users from ot...
Main purpose of using firewalls <ul><li>Packet filtering </li></ul><ul><ul><li>Analyzing packets </li></ul></ul><ul><li>Pr...
How a firewall works ? <ul><li>The FIREWALL can now: </li></ul><ul><ul><li>Log the attempt </li></ul></ul><ul><ul><li>Aler...
What firewall protects us from <ul><li>Remote login </li></ul><ul><li>Application backdoors  </li></ul><ul><li>Operating s...
Popular hardware & software firewalls Software Firewall Hardware Firewall Ms. ISA Server Cisco PIX Norton Internet Securit...
Thank You <ul><li>References : </li></ul><ul><li>www.cisco.com </li></ul><ul><li>www.isaserver.org </li></ul><ul><li>www.w...
Upcoming SlideShare
Loading in...5
×

Proxy servers-firewalls

1,126

Published on

Browser proxy, Network security, firewall, Animated process of proxy in computer

Published in: Education, Technology
3 Comments
1 Like
Statistics
Notes
No Downloads
Views
Total Views
1,126
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
65
Comments
3
Likes
1
Embeds 0
No embeds

No notes for slide

Transcript of "Proxy servers-firewalls"

  1. 1. Proxy Servers & Firewalls
  2. 2. <ul><li>What is proxy ? </li></ul><ul><li>Main purpose of using proxies </li></ul><ul><li>How a proxy works ? </li></ul><ul><li>Proxy types </li></ul><ul><li>Popular hardware & software proxies </li></ul><ul><li>What is firewall ? </li></ul><ul><li>Main purpose of using firewalls </li></ul><ul><li>How a firewall works ? </li></ul><ul><li>Firewall types </li></ul><ul><li>Popular hardware & software firewalls </li></ul>Objectives
  3. 3. What is proxy ? Proxy Proxy is hardware / software Indirect access to other networks e.g INTERNET. all computers on the local network have to go through it before accessing information on the Internet. Organization , universities , companies use proxy systems Proxy act as gateway Proxy act as Cache Server/Firewall Proxy share a connection to others LAN INTERNET
  4. 4. Main purpose of using proxies <ul><li>Improve Performance </li></ul><ul><ul><li>Act as Cache server </li></ul></ul><ul><ul><li>Bandwidth control </li></ul></ul><ul><li>Filter Requests </li></ul><ul><ul><li>Prevent access to some web sites!!! </li></ul></ul><ul><ul><li>Prevent access to some protocols </li></ul></ul><ul><ul><li>Time division </li></ul></ul><ul><li>Surfing Anonymously </li></ul><ul><ul><li>Browsing the WWW without any identification!!! </li></ul></ul>
  5. 5. Improve Performance <ul><li>Caching </li></ul><ul><ul><li>Reduce latency </li></ul></ul><ul><ul><li>Reduce Network Traffic </li></ul></ul><ul><ul><li>Caching can greatly speed up Internet access. If one or more Internet sites are frequently requested, they are kept in the proxy's cache, so that when a user requests them, they are delivered directly from the proxy's cache instead of from the original Internet site. </li></ul></ul><ul><ul><li>Caches diminish the need for network bandwidth, typically by 35% or more, by reducing the traffic from browsers to content servers. </li></ul></ul><ul><li>Bandwidth control </li></ul><ul><ul><li>Policy-based Bandwidth Limits </li></ul></ul><ul><ul><li>Deny by content type </li></ul></ul>INTERNET 64 Kbps 128 Kbps 512 Kbps 1 Mbps
  6. 6. Filter Requests <ul><li>Prevent access to some web sites!!! </li></ul><ul><ul><li>Categories web sites </li></ul></ul><ul><ul><ul><li>Adult/Sexually Explicit </li></ul></ul></ul><ul><ul><ul><li>Advertisements & Pop-Ups </li></ul></ul></ul><ul><ul><ul><li>Chat </li></ul></ul></ul><ul><ul><ul><li>Gambling </li></ul></ul></ul><ul><ul><ul><li>Games </li></ul></ul></ul><ul><ul><ul><li>Hacking </li></ul></ul></ul><ul><ul><ul><li>Peer-to-Peer </li></ul></ul></ul><ul><ul><ul><li>…… </li></ul></ul></ul><ul><ul><li>Check by content type </li></ul></ul><ul><ul><ul><li>.Exe / .Com </li></ul></ul></ul><ul><ul><ul><li>.Mid / .MP3 / .Wav </li></ul></ul></ul><ul><ul><ul><li>.Avi / .Mpeg / .Rm </li></ul></ul></ul>
  7. 7. What do you need for proxy installation? <ul><li>Proxy Software </li></ul><ul><ul><ul><li>Ms ISA Server , Squid , WinRoute , … </li></ul></ul></ul><ul><li>Server </li></ul><ul><li>At least 2 network cards </li></ul><ul><li>DIRECT INTERNET connection (Public IP Address) </li></ul><ul><li>Switch/Hub (elective) </li></ul><ul><li>Private IP Address </li></ul><ul><ul><ul><li>10.0.0.1/8 – 172.16.0.1/16 – 192.168.0.1/24 </li></ul></ul></ul>
  8. 8. How a proxy works ? <ul><li>See the next Demo </li></ul>
  9. 9. IP : 172.16.0.2 Gw : 172.16.0.1 IP : 172.16.0.1 IP : 217.219.66.2 Gw : 217.219.66.1 LAN INTERNET Proxy Server Source IP 172.16.0.2 www.yahoo.com Dest IP 209.191.93.52
  10. 10. IP : 172.16.0.2 Gw : 172.16.0.1 IP : 217.219.66.2 Gw : 217.219.66.1 IP : 172.16.0.1 Change Source IP Address LAN INTERNET Proxy Server Source IP 217.219.66.2 www.yahoo.com Dest IP 209.191.93.52 Source IP 172.16.0.2 www.yahoo.com Dest IP 209.191.93.52
  11. 11. IP : 217.219.66.2 Gw : 217.219.66.1 IP : 172.16.0.1 Change Source IP Address & Destination IP Address IP : 172.16.0.2 Gw : 172.16.0.1 LAN INTERNET Proxy Server Source IP 209.191.93.52 Dest IP 217.219.66.2
  12. 12. IP : 217.219.66.2 Gw : 217.219.66.1 IP : 172.16.0.1 Change Dest. IP Address IP : 172.16.0.2 Gw : 172.16.0.1 LAN INTERNET Proxy Server Source IP 209.191.93.52 Dest IP 217.219.66.2 Source IP 209.191.93.52 Dest IP 172.16.0.2
  13. 13. IP : 172.16.0.2 Gw : 172.16.0.1 IP : 217.219.66.2 Gw : 217.219.66.1 IP : 172.16.0.1 LAN INTERNET Proxy Server Source IP 209.191.93.52 Dest IP 172.16.0.2
  14. 14. Proxy types <ul><li>Web proxies </li></ul><ul><li>SSL proxies </li></ul><ul><li>Transparent proxies </li></ul><ul><li>Open proxies </li></ul>Proxy setting in IE
  15. 15. Popular hardware & software proxies Software Proxy Hardware Proxy Ms. ISA Server Cisco PIX Squid Blue Coat Kerio WinRoute Cyberoam 1st Up Net Server Alacer CCProxy CProxy Windows ICS WinGate
  16. 16. What is firewall ? Firewall Firewall is hardware / software protects the resources of a private network from users from other networks Organization , universities , companies use firewall systems Firewall can act as gateway Firewall can act as proxy Firewall filter Incoming & Outgoing information LAN INTERNET
  17. 17. Main purpose of using firewalls <ul><li>Packet filtering </li></ul><ul><ul><li>Analyzing packets </li></ul></ul><ul><li>Proxy service </li></ul><ul><ul><li>Provide access to other networks e.g INTERNET </li></ul></ul>  LAN INTERNET
  18. 18. How a firewall works ? <ul><li>The FIREWALL can now: </li></ul><ul><ul><li>Log the attempt </li></ul></ul><ul><ul><li>Alert the admin </li></ul></ul><ul><ul><li>Harden the firewall </li></ul></ul><ul><ul><li>Or reset a TCP/IP connection </li></ul></ul>Sniffing Mode 1) An attacker tries to compromise a service on the protected network. 2) The Firewall identifies the attempt . LOG Alert  Reset Harden
  19. 19. What firewall protects us from <ul><li>Remote login </li></ul><ul><li>Application backdoors </li></ul><ul><li>Operating system bugs </li></ul><ul><li>Denial of service </li></ul><ul><li>E-mail bombs </li></ul><ul><li>Viruses </li></ul><ul><li>SPAMs </li></ul><ul><li>Trojans </li></ul><ul><li>ICMP bombing </li></ul><ul><li>FTP brute force </li></ul><ul><li>Phishing </li></ul><ul><li>… . </li></ul>
  20. 20. Popular hardware & software firewalls Software Firewall Hardware Firewall Ms. ISA Server Cisco PIX Norton Internet Security Blue Coat Mcafee Internet Security Cyberoam ZoneAlarm Check Point Kerio NetScreen BlackICE D-link SECURESPOT Outpost WatchGuard
  21. 21. Thank You <ul><li>References : </li></ul><ul><li>www.cisco.com </li></ul><ul><li>www.isaserver.org </li></ul><ul><li>www.wikipedia.com </li></ul><ul><li>www.cert.org </li></ul><ul><li>www.isc.sans.org </li></ul><ul><li>www.zonelabs.com </li></ul><ul><li>www.symantec.com </li></ul><ul><li>www.mshdiau.ac.ir </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×