SlideShare a Scribd company logo
1 of 45
Linux Networking and Security Chapter 11 Network Security Fundamentals
Network Security Fundamentals ,[object Object],[object Object],[object Object],[object Object]
Reviewing Threats to Your Network ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Reviewing Threats to Your Network ,[object Object],[object Object],[object Object],[object Object]
Reviewing Threats to Your Network ,[object Object],[object Object],[object Object],[object Object]
Reviewing Threats to Your Network
Using Advanced Routing and Firewalls ,[object Object],[object Object],[object Object]
Using Advanced Routing and Firewalls
Introducing IP Chains ,[object Object],[object Object],[object Object],[object Object]
Introducing IP Chains
Introducing IP Chains
Network Address Translation ,[object Object],[object Object],[object Object]
Network Address Translation
Transparent Proxying ,[object Object],[object Object],[object Object]
Transparent Proxying
Transparent Proxying
Graphical Firewall Configuration Utilities ,[object Object],[object Object],[object Object]
Graphical Firewall Configuration Utilities
Graphical Firewall Configuration Utilities
Graphical Firewall Configuration Utilities
Graphical Firewall Configuration Utilities
Graphical Firewall Configuration Utilities
Graphical Firewall Configuration Utilities
Using NetFilter and IP Tables ,[object Object],[object Object],[object Object],[object Object]
Using NetFilter and IP Tables ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Commercial Firewall Products ,[object Object],[object Object],[object Object],[object Object]
Encrypting Network Traffic ,[object Object],[object Object],[object Object],[object Object],[object Object]
Encrypting Network Traffic ,[object Object],[object Object],[object Object],[object Object]
Encrypting Network Traffic
Encrypting Network Traffic
Other Tunneling Protocols
Other Tunneling Protocols ,[object Object],[object Object],[object Object]
Other Tunneling Protocols ,[object Object],[object Object],[object Object],[object Object]
Creating a Virtual Private Network ,[object Object],[object Object]
Creating a VPN
Creating a VPN
Creating a VPN
Creating a VPN
Configuring Security Services
Chapter Summary ,[object Object],[object Object],[object Object],[object Object]
Chapter Summary ,[object Object],[object Object],[object Object]
Chapter Summary ,[object Object],[object Object],[object Object]
Chapter Summary ,[object Object],[object Object],[object Object]
Chapter Summary ,[object Object],[object Object],[object Object],[object Object]
Chapter Summary ,[object Object],[object Object]

More Related Content

What's hot

Chapter 02
Chapter 02Chapter 02
Chapter 02
cclay3
 
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
chhoup
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutions
eroglu
 
IP Protocol Security
IP Protocol SecurityIP Protocol Security
IP Protocol Security
David Barker
 
Cisco Router As A Vpn Server
Cisco Router As A Vpn ServerCisco Router As A Vpn Server
Cisco Router As A Vpn Server
mmoizuddin
 

What's hot (19)

Chapter 02
Chapter 02Chapter 02
Chapter 02
 
I ptable
I ptableI ptable
I ptable
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilities
 
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
 
Types of VPN
Types of VPNTypes of VPN
Types of VPN
 
security problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suitesecurity problems in the tcp/ip protocol suite
security problems in the tcp/ip protocol suite
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Network security at_osi_layers
Network security at_osi_layersNetwork security at_osi_layers
Network security at_osi_layers
 
IP Security
IP SecurityIP Security
IP Security
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutions
 
Firewalls
FirewallsFirewalls
Firewalls
 
IP Protocol Security
IP Protocol SecurityIP Protocol Security
IP Protocol Security
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
IP tables and Filtering
IP tables and FilteringIP tables and Filtering
IP tables and Filtering
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Cisco Router As A Vpn Server
Cisco Router As A Vpn ServerCisco Router As A Vpn Server
Cisco Router As A Vpn Server
 
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg
Ethical hacking   chapter 8 - Windows Vulnerabilities - Eric VanderburgEthical hacking   chapter 8 - Windows Vulnerabilities - Eric Vanderburg
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 

Viewers also liked (8)

Presentacion del negocio mayo 2011
Presentacion del negocio mayo 2011 Presentacion del negocio mayo 2011
Presentacion del negocio mayo 2011
 
Forn solar
Forn solarForn solar
Forn solar
 
Effective Twitter Practices for Businesses - Dane Jackson - Social Media Cons...
Effective Twitter Practices for Businesses - Dane Jackson - Social Media Cons...Effective Twitter Practices for Businesses - Dane Jackson - Social Media Cons...
Effective Twitter Practices for Businesses - Dane Jackson - Social Media Cons...
 
N2N - ERP Integration Services Showcase
N2N - ERP Integration Services ShowcaseN2N - ERP Integration Services Showcase
N2N - ERP Integration Services Showcase
 
Chapter 06
Chapter 06Chapter 06
Chapter 06
 
U.S. in World War I
U.S. in World War IU.S. in World War I
U.S. in World War I
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
 

Similar to Chapter 11

Network Security
Network SecurityNetwork Security
Network Security
Jaya sudha
 

Similar to Chapter 11 (20)

Firewalls
FirewallsFirewalls
Firewalls
 
Linux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic ControlLinux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic Control
 
Firewalls
FirewallsFirewalls
Firewalls
 
PC 106 PPT-07
PC 106 PPT-07PC 106 PPT-07
PC 106 PPT-07
 
v
vv
v
 
Firewall
FirewallFirewall
Firewall
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptx
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
 
Firewalls
FirewallsFirewalls
Firewalls
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Welcome
WelcomeWelcome
Welcome
 
Computer networks - CBSE New Syllabus (083) Class - XII
Computer networks - CBSE  New Syllabus (083) Class - XIIComputer networks - CBSE  New Syllabus (083) Class - XII
Computer networks - CBSE New Syllabus (083) Class - XII
 
What Technology Lies Behind VPN
What Technology Lies Behind VPNWhat Technology Lies Behind VPN
What Technology Lies Behind VPN
 
authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)
 
Network Security
Network SecurityNetwork Security
Network Security
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 

More from cclay3

More from cclay3 (6)

Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 05
Chapter 05Chapter 05
Chapter 05
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
 
Chapter 03
Chapter 03Chapter 03
Chapter 03
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.