Firewall intro

630 views
573 views

Published on

Published in: Business, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
630
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
54
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Firewall intro

  1. 1. An Introduction to Firewalls
  2. 2. Agenda <ul><li>Firewall Basics for the Beginning User </li></ul><ul><li>NUIT Firewall Offering </li></ul><ul><li>Case Study – Desktop Firewall Software Implementation for the Office of Alumni Relations and Development </li></ul><ul><li>Questions and Answers </li></ul>
  3. 3. What is a Firewall? <ul><li>A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer </li></ul>
  4. 4. Hardware vs. Software Firewalls <ul><li>Hardware Firewalls </li></ul><ul><ul><li>Protect an entire network </li></ul></ul><ul><ul><li>Implemented on the router level </li></ul></ul><ul><ul><li>Usually more expensive, harder to configure </li></ul></ul><ul><li>Software Firewalls </li></ul><ul><ul><li>Protect a single computer </li></ul></ul><ul><ul><li>Usually less expensive, easier to configure </li></ul></ul>
  5. 5. How does a software firewall work? <ul><li>Inspects each individual “packet” of data as it arrives at either side of the firewall </li></ul><ul><li>Inbound to or outbound from your computer </li></ul><ul><li>Determines whether it should be allowed to pass through or if it should be blocked </li></ul>
  6. 6. Firewall Rules <ul><li>Allow – traffic that flows automatically because it has been deemed as “safe” (Ex. Meeting Maker, Eudora, etc.) </li></ul><ul><li>Block – traffic that is blocked because it has been deemed dangerous to your computer </li></ul><ul><li>Ask – asks the user whether or not the traffic is allowed to pass through </li></ul>
  7. 7. What a personal firewall can do <ul><li>Stop hackers from accessing your computer </li></ul><ul><li>Protects your personal information </li></ul><ul><li>Blocks “pop up” ads and certain cookies </li></ul><ul><li>Determines which programs can access the Internet </li></ul>
  8. 8. What a personal firewall cannot do <ul><li>Cannot prevent e-mail viruses </li></ul><ul><ul><li>Only an antivirus product with updated definitions can prevent e-mail viruses </li></ul></ul><ul><li>After setting it initially, you can forget about it </li></ul><ul><ul><li>The firewall will require periodic updates to the rulesets and the software itself </li></ul></ul>
  9. 9. Considerations when using personal firewall software <ul><li>If you did not initialize an action and your firewall picks up something, you should most likely deny it and investigate it </li></ul><ul><li>It’s a learning process (Ex. Spooler Subsystem App) </li></ul><ul><li>If you notice you cannot do something you did prior to the installation, there is a good chance it might be because of your firewall </li></ul>
  10. 10. Examples of personal firewall software <ul><li>ZoneAlarm <www.zonelabs.com> </li></ul><ul><li>BlackICE Defender <http://blackice.iss.net> </li></ul><ul><li>Tiny Personal Firewall <www.tinysoftware.com> </li></ul><ul><li>Norton Personal Firewall <www.symantec.com> </li></ul><ul><li>***Please be sure to read the license agreement carefully to verify that the firewall can be legally used at home and/or the office. </li></ul>
  11. 11. Windows XP Firewall <ul><li>Currently *not* enabled by default </li></ul><ul><li>Enable under Start -> Settings -> Control Panel </li></ul><ul><li>Select Local Area Connection </li></ul><ul><li>Select the Properties button </li></ul><ul><li>Click the “Advanced” tab </li></ul>
  12. 12. Windows XP firewall
  13. 13. Updates to Windows XP Firewall <ul><li>*Will* be enabled in default installations of Windows XP Service Pack 2 </li></ul><ul><li>Ports will be closed except when they are in use </li></ul><ul><li>Improved user interface for easier configuration </li></ul><ul><li>Improved application compatibility when firewall is enabled </li></ul>
  14. 14. Mac OS X firewall <ul><li>*Not* enabled by default </li></ul><ul><li>Enable under System Preferences </li></ul><ul><li>Select Sharing </li></ul><ul><li>Click “Firewall” tab </li></ul><ul><li>Click “Start” button </li></ul>
  15. 15. Mac OS X firewall
  16. 16. NUIT Firewall Service
  17. 17. Why Netscreen? <ul><li>Comparison of the Big 3 </li></ul><ul><ul><li>Hardware vs. Software </li></ul></ul><ul><ul><li>Transparent Mode vs. Routing Mode </li></ul></ul><ul><ul><li>Distributed Management </li></ul></ul><ul><ul><li>Pricing Models </li></ul></ul>
  18. 18. The Process <ul><li>A Department requests a FW Consultation </li></ul><ul><li>TNS Organizes a Meeting </li></ul><ul><li>The Department Provides the List of Machines they want to Protect </li></ul><ul><li>TNS Measures Bandwidth Requirements </li></ul><ul><li>TNS Prepares a FW Proposal </li></ul><ul><li>The Department Makes their Decision </li></ul>
  19. 19. The Process continued... <ul><li>TNS Installs the FW in a Passive State </li></ul><ul><li>TNS Logs All Traffic from the Target Hosts </li></ul><ul><li>TNS Develops a Rule Set </li></ul><ul><li>The Department Oks the Rule Set </li></ul><ul><li>TNS Activates the Rule Set </li></ul><ul><li>Everyone's Happy =) </li></ul>
  20. 20. Final Notes <ul><li>Rule Management </li></ul><ul><li>Default Allow vs. Default Deny </li></ul><ul><li>Firewalls do NOT Solve the Entire Problem </li></ul>
  21. 21. Additional Information <ul><li>Visit the following websites: </li></ul><ul><li>http://www.it.northwestern.edu/reference/firewall/firewall_strategies_wp.html </li></ul><ul><li>http://www.juniper.net/netscreen_com.html </li></ul><ul><li>Or simply email: </li></ul><ul><ul><li>[email_address] </li></ul></ul><ul><ul><li>[email_address] </li></ul></ul>

×