Your SlideShare is downloading. ×
0
 
What is  ISA   Server :- ISA  server is a upgraded version of Microsoft proxy server 2.0 with inbuilt FIREWALL  PROXY FIRE...
Proxy server  :-  It’s a server which emulates as a web server 192.168.1.2 Client Proxy Server 192.168.1.1 Zoom.com Internet
HACKING : - Taking over your resources or attempt to bring down your server Types of ATTACK: - 1.  Foot printing :- The wa...
Types of  Attacks 1. Foot Printing The Art of gathering the complete security profiles of an  Organization or a Target Com...
Types of  Attacks 2. Scanning Scanning the System for Bugs and Loopholes in O/S Hacker uses scanning technique to determin...
Types of  Attacks 3. DOS Attack Denial of Service attack which is an attempt to get the  Services or the server down by ov...
Types of  Attacks 4. Exploits Exploits are usually Bugs in Applications or O/S which  can be Exploited by using a piece of...
Types of  Attacks 5. Trojan Horses Trojan Horses is program that pretends to be a useful tool But actually installs malici...
Types of  Attacks 6. Port Scanner Scanning the port to get into the Application E.G: Port Scanner, etc
What is a Firewall : -  A firewall protects networked computers from  intentional hostile intrusions Software Firewall : -...
Types of   FIREWALL Packet Filtering e.g..  ROUTERS Controls data transfer based on  Source & Destination IP Address  TCP/...
Application Gateway eg.  PROXY SERVER Packets are allowed based on type of application and IP address Filter Application s...
Statefull Multilayer Inspection This is a full fledged firewall which combines the aspects of other two types of firewalls...
Flavors of ISA Server Enterprise and Array policies Local only Policy based Support No limit 4 cpu’s only Scalability  Mul...
ISA Server requirements  : - <ul><li>Member server or Domain Controller </li></ul><ul><li>Service pack 1 or above </li></u...
Array considerations   Arrays allow a group of ISA Server computers to be treated and managed  as a single, logical entity...
Enterprise Vs Standalone Policies No . Only a local array policy can be applied. Yes . A single policy can be applied to a...
Enterprise  Tiered Policy  ISA Server Enterprise Edition supports two levels of policy: array level and enterprise level A...
ISA SERVER MODES 1. Firewall mode
<ul><li>ISA SERVER MODES </li></ul><ul><li>Firewall mode </li></ul><ul><li>Cache mode </li></ul>
<ul><li>ISA SERVER MODES </li></ul><ul><li>Firewall mode </li></ul><ul><li>Cache mode </li></ul><ul><li>Integrated mode </...
<ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul>
<ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing ...
<ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing ...
<ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing ...
<ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing ...
<ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing ...
<ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing ...
<ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing ...
<ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing ...
<ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing ...
<ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing ...
<ul><li>Types of Client </li></ul><ul><li>SECURE NAT  Clients </li></ul><ul><li>WEB  Clients </li></ul><ul><li>FIREWALL  C...
<ul><li>Access is Controlled  based on :- </li></ul><ul><li>Client address sets </li></ul><ul><li>Destination sets </li></...
Upcoming SlideShare
Loading in...5
×

Isa

495

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
495
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Isa"

  1. 2. What is ISA Server :- ISA server is a upgraded version of Microsoft proxy server 2.0 with inbuilt FIREWALL PROXY FIREWALL
  2. 3. Proxy server :- It’s a server which emulates as a web server 192.168.1.2 Client Proxy Server 192.168.1.1 Zoom.com Internet
  3. 4. HACKING : - Taking over your resources or attempt to bring down your server Types of ATTACK: - 1. Foot printing :- The way to know the OS and IP of server 2. Scanning :- Scanning system for bugs and loopholes 3. DOS Attacks : - Denial Of Service 4. Exploits : - Writing scripts to bring down server 5. Trojans : - Sending viruses to steal the DATA 6. Port Scan : - Scanning ports for getting into applications ETC………
  4. 5. Types of Attacks 1. Foot Printing The Art of gathering the complete security profiles of an Organization or a Target Computer By using a combination of Tools and Techniques, The Hacker can take up the system and determine its Ip address and Domain names
  5. 6. Types of Attacks 2. Scanning Scanning the System for Bugs and Loopholes in O/S Hacker uses scanning technique to determine which Ports Are open, what services are running and what is the O/S E.G: RETINA, Shadow Security scanner, ANSIL etc
  6. 7. Types of Attacks 3. DOS Attack Denial of Service attack which is an attempt to get the Services or the server down by overflowing the buffer E.G: Win spoof 97, My Spoof
  7. 8. Types of Attacks 4. Exploits Exploits are usually Bugs in Applications or O/S which can be Exploited by using a piece of Code often referred as Scripts E.G: CGI scripts, Perl scripts etc
  8. 9. Types of Attacks 5. Trojan Horses Trojan Horses is program that pretends to be a useful tool But actually installs malicious or damaging software Trojan Horses can be used to take over the Remote System. Sending viruses to steal the Data E.G. Netbus , Bo2k
  9. 10. Types of Attacks 6. Port Scanner Scanning the port to get into the Application E.G: Port Scanner, etc
  10. 11. What is a Firewall : - A firewall protects networked computers from intentional hostile intrusions Software Firewall : - Hardware Firewall : - ISA Server Checkpoint Smooth wall Cisco Pix Watch Guard Multicom Ethernet II…..
  11. 12. Types of FIREWALL Packet Filtering e.g.. ROUTERS Controls data transfer based on Source & Destination IP Address TCP/UDP Port of Source & Destination IP Address Packets are allowed or dropped through the device depending on the Access Control List
  12. 13. Application Gateway eg. PROXY SERVER Packets are allowed based on type of application and IP address Filter Application specific commands such as: HTTP:GET and POST etc Application level Gateways can also be used to: To Log User Activity and Logins
  13. 14. Statefull Multilayer Inspection This is a full fledged firewall which combines the aspects of other two types of firewalls and is capable of intrusion detection server publishing etc…. eg. ISA SERVER
  14. 15. Flavors of ISA Server Enterprise and Array policies Local only Policy based Support No limit 4 cpu’s only Scalability Multiple server with Centralized Management Standalone only Server Deployment Enterprise Edition Standard Edition
  15. 16. ISA Server requirements : - <ul><li>Member server or Domain Controller </li></ul><ul><li>Service pack 1 or above </li></ul><ul><li>Two interface (public and private) </li></ul><ul><li>Routing and Remote Access </li></ul><ul><li>Pentium III 300MHz or above </li></ul><ul><li>256 Mb Ram </li></ul><ul><li>20 Mb of Hard Disk space on NTFS 5.0 </li></ul>
  16. 17. Array considerations Arrays allow a group of ISA Server computers to be treated and managed as a single, logical entity. They provide scalability, fault tolerance, and load balancing All array members must be in the same Windows 2000 domain and in the same site
  17. 18. Enterprise Vs Standalone Policies No . Only a local array policy can be applied. Yes . A single policy can be applied to all arrays in the enterprise. Enterprise policy No need for 2000 Domain Can be installed in Windows NT 4.0 domains. Configuration information is stored in the registry. Must be installed only in Windows 2000 domains with Active Directory installed. Active Directory requirement Limited to only one member. Can have one or more member servers. Scalability and fault tolerance Stand-alone server Array  
  18. 19. Enterprise Tiered Policy ISA Server Enterprise Edition supports two levels of policy: array level and enterprise level Array
  19. 20. ISA SERVER MODES 1. Firewall mode
  20. 21. <ul><li>ISA SERVER MODES </li></ul><ul><li>Firewall mode </li></ul><ul><li>Cache mode </li></ul>
  21. 22. <ul><li>ISA SERVER MODES </li></ul><ul><li>Firewall mode </li></ul><ul><li>Cache mode </li></ul><ul><li>Integrated mode </li></ul>
  22. 23. <ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul>
  23. 24. <ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing </li></ul>
  24. 25. <ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing </li></ul><ul><li>Web Caching Server </li></ul>
  25. 26. <ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing </li></ul><ul><li>Web Caching Server </li></ul><ul><li>Secure NAT </li></ul>
  26. 27. <ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing </li></ul><ul><li>Web Caching Server </li></ul><ul><li>Secure NAT </li></ul><ul><li>Integrated VPN </li></ul>
  27. 28. <ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing </li></ul><ul><li>Web Caching Server </li></ul><ul><li>Secure NAT </li></ul><ul><li>Integrated VPN </li></ul><ul><li>Tiered-Policy Management </li></ul>
  28. 29. <ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing </li></ul><ul><li>Web Caching Server </li></ul><ul><li>Secure NAT </li></ul><ul><li>Integrated VPN </li></ul><ul><li>Tiered-Policy Management </li></ul><ul><li>QOS(Quality Of Service) </li></ul>
  29. 30. <ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing </li></ul><ul><li>Web Caching Server </li></ul><ul><li>Secure NAT </li></ul><ul><li>Integrated VPN </li></ul><ul><li>Tiered-Policy Management </li></ul><ul><li>QOS(Quality Of Service) </li></ul><ul><li>Multiprocessor Support </li></ul>
  30. 31. <ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing </li></ul><ul><li>Web Caching Server </li></ul><ul><li>Secure NAT </li></ul><ul><li>Integrated VPN </li></ul><ul><li>Tiered-Policy Management </li></ul><ul><li>QOS(Quality Of Service) </li></ul><ul><li>Multiprocessor Support </li></ul><ul><li>Client Side Auto Discovery </li></ul>
  31. 32. <ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing </li></ul><ul><li>Web Caching Server </li></ul><ul><li>Secure NAT </li></ul><ul><li>Integrated VPN </li></ul><ul><li>Tiered-Policy Management </li></ul><ul><li>QOS(Quality Of Service) </li></ul><ul><li>Multiprocessor Support </li></ul><ul><li>Client Side Auto Discovery </li></ul><ul><li>Web Filters </li></ul>
  32. 33. <ul><li>Key features </li></ul><ul><li>Internet Firewall (Intrusion detection) </li></ul><ul><li>Secure Server Publishing </li></ul><ul><li>Web Caching Server </li></ul><ul><li>Secure NAT </li></ul><ul><li>Integrated VPN </li></ul><ul><li>Tiered-Policy Management </li></ul><ul><li>QOS(Quality Of Service) </li></ul><ul><li>Multiprocessor Support </li></ul><ul><li>Client Side Auto Discovery </li></ul><ul><li>Web Filters </li></ul><ul><li>Alerts </li></ul>
  33. 34. <ul><li>Types of Client </li></ul><ul><li>SECURE NAT Clients </li></ul><ul><li>WEB Clients </li></ul><ul><li>FIREWALL Clients </li></ul>
  34. 35. <ul><li>Access is Controlled based on :- </li></ul><ul><li>Client address sets </li></ul><ul><li>Destination sets </li></ul><ul><li>Protocols </li></ul><ul><li>Bandwidth priorities </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×