SlideShare a Scribd company logo
1 of 28
VLAN & VPNs
Physical and Hardware Security
By
MSc. Kaki A.(azadkaki@live.co.uk)
@MahabadNetworkAdmin
Network+
N10-006 from CompTIA IT Certification
VLAN & VPNs
Using Hardware and Software
Security Devices
The DMZ is used to create a
security zone that allows
public traffic but the traffic is
isolated from the company
private network
VLAN & VPNs
Defining Firewalls
Firewalls are usually a combination of hardware and software. The hardware
part is usually a router, but it can also be a computer or a dedicated piece of
hardware called a black box that has two Network Interface Cards (NICs) in it.
The software part is configured to control how the firewall actually works to
protect your network by scrutinizing each incoming and outgoing packet and
rejecting any suspicious ones.
VLAN & VPNs
Defining Firewalls
Network-Based Firewalls
Host-Based Firewalls
A network-based firewall is what companies use to protect their
private network from public networks. The defining characteristic
of this type of firewall is that it’s designed to protect an entire
network of computers instead of just one system, and it’s usually
a combination of hardware and software.
VLAN & VPNs
Defining Firewalls
Network-Based Firewalls
Host-Based Firewalls
a host-based firewall is implemented on a single machine so it
only protects that one machine This type of firewall is usually a
software implementation, because you don’t need any additional
hardware in your personal computer to run it.
VLAN & VPNs
Firewall Technologies
Access Control Lists(ACL)
Standard ACLs
Extended ACLs
Inbound ACLs
Outbound ACLs
VLAN & VPNs
Firewall Technologies
Demilitarized Zone (DMZ)
VLAN & VPNs
Firewall Technologies
Protocol Switching Protocol switching protects data on the inside of a firewall
 Use a protocol other than TCP/IP on the internal network inside the firewall. IP-based
attacks aimed at your development server just can’t work if you use Internetwork Packet
Exchange (IPX) on the internal-network side of a router, which gives you an automatic
firewall.
 Use TCP/IP on both the internal network and the Internet, and use a different protocol
like IPX in a dead zone between them. Basically, you’ll have things set up to switch from
IP to IPX in that dead zone and switch back to IP again once inside your network.
VLAN & VPNs
Firewall Technologies
Protocol Switching
VLAN & VPNs
Firewall Technologies
Dynamic Packet Filtering
Packet filtering
refers to the
ability of a router
or a firewall to
discard packets
that don’t meet
The right criteria.
VLAN & VPNs
Firewall Technologies
Proxy Services
VLAN & VPNs
Firewall Technologies
Proxy Services Types
 IP proxy
 Web (HTTP) proxy
 FTP proxy
 SMTP proxy
VLAN & VPNs
Firewalls at the Application
Layer vs. the Network Layer
Stateful vs. Stateless Network-Layer Firewalls
Application-layer Firewalls
VLAN & VPNs
Scanning Services and Other Firewall Features
Most firewalls are capable of performing scanning services, which means that they scan
different types of incoming traffic in an effort to detect problems
Content Filtering
Zones
content filtering means blocking data based on the content
of the data rather than the source of the data
Signature Identification
VLAN & VPNs
Scanning Services and Other Firewall Features
Most firewalls are capable of performing scanning services, which means that they scan
different types of incoming traffic in an effort to detect problems
Content Filtering
Signature Identification
Zones
Firewalls can also stop attacks and problems through a process
called signature identification. Viruses that are known will have a
signature, which is a particular pattern of data, within them.
Firewalls (and antivirus programs) can use signatures to identify a
virus and remove it. The same holds true for other software bugs
such as worms and spyware.
VLAN & VPNs
Scanning Services and Other Firewall Features
Most firewalls are capable of performing scanning services, which means that they scan
different types of incoming traffic in an effort to detect problems
Content Filtering
Signature Identification
Zones
A zone is an individual area of the network that has been
configured with a specific trust level. Firewalls are ideal
devices to regulate the flow of traffic between zones
VLAN & VPNs
Intrusion-Detection and –Prevention Systems
Misuse-Detection IDS (MD-IDS)
It works by looking for fingerprints. That’s right—I said fingerprints,
which in this case means strange or abusive use of the network.
IDS sends up an alarm only if it recognizes the fingerprints typical of
attackers
VLAN & VPNs
Intrusion-Detection and –Prevention Systems
Anomaly-Detection IDS (AD-IDS)
An AD-IDS basically watches for anything out of the ordinary; if it
discovers fingerprints where there shouldn’t be any, it will send out
an alert. And a really cool feature is that it’s known as a smart system
because it learns on the go by keeping track of and building a history
of network activity for norms to compare unusual activity to
VLAN & VPNs
Intrusion-Detection and –Prevention Systems
VLAN & VPNs
Intrusion-Detection and –Prevention Systems
Network-Based IDS
VLAN & VPNs
Intrusion-Detection and –Prevention Systems
Network-Based IDS
 Logging
 Notification
 Shunning
 Changing network configuration
 Terminating sessions
 Deceiving the attacker
VLAN & VPNs
Intrusion-Detection and –Prevention Systems
 Changing
network
configuration
VLAN & VPNs
Intrusion-Detection and –Prevention Systems
 Deceiving
the attacker
VLAN & VPNs
Understanding Problems Affecting Device Security
 Physical Security-Physical Barriers-Security Zones
VLAN & VPNs
Access-Control Principles
 Utilize implicit denies
 Follow the least-privilege model
 Separate out administrative duties
 Rotate administrator jobs
VLAN & VPNs
Access-Control Models
 Mandatory Access Control
 Discretionary Access Control
 Role-Based Access Control
 Rule-Based Access Control
VLAN & VPNs
Secure and Unsecure Application Protocols
 Telnet
 HTTP
 FTP
 SNMP (v1 and v2)
 Unsecure Protocols
VLAN & VPNs
Secure and Unsecure Application Protocols
 SSH
 HTTPS
 SFTP
 SNMPv3
 Secure Protocols

More Related Content

What's hot (20)

Dmz
Dmz Dmz
Dmz
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Firewall
FirewallFirewall
Firewall
 
What Technology Lies Behind VPN
What Technology Lies Behind VPNWhat Technology Lies Behind VPN
What Technology Lies Behind VPN
 
Firewall
FirewallFirewall
Firewall
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Firewall and its configuration
Firewall and its configurationFirewall and its configuration
Firewall and its configuration
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
Firewall
Firewall Firewall
Firewall
 
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
Firewall
FirewallFirewall
Firewall
 
VPN presentation - moeshesh
VPN presentation - moesheshVPN presentation - moeshesh
VPN presentation - moeshesh
 

Similar to VLAN & VPNs Physical and Hardware Security

Similar to VLAN & VPNs Physical and Hardware Security (20)

Firewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptxFirewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptx
 
Network security
Network securityNetwork security
Network security
 
What are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdfWhat are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdf
 
Firewall
FirewallFirewall
Firewall
 
Note8
Note8Note8
Note8
 
Day4
Day4Day4
Day4
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall security in computer security
Firewall security in computer security Firewall security in computer security
Firewall security in computer security
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Firewall
FirewallFirewall
Firewall
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
Vpn rsvp
Vpn rsvpVpn rsvp
Vpn rsvp
 
Describe firewalls
Describe firewallsDescribe firewalls
Describe firewalls
 
English for engineering
English for engineeringEnglish for engineering
English for engineering
 
Firewalls in network
Firewalls in networkFirewalls in network
Firewalls in network
 
The Complete Questionnaires About Firewall
The Complete Questionnaires About FirewallThe Complete Questionnaires About Firewall
The Complete Questionnaires About Firewall
 
What is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptxWhat is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptx
 

More from Azad Kaki

Exam 70 412-confgure network services(4knet.ir)
Exam 70 412-confgure network services(4knet.ir)Exam 70 412-confgure network services(4knet.ir)
Exam 70 412-confgure network services(4knet.ir)Azad Kaki
 
Exam 70 412-confgure fle and storage solutions(4knet.ir)
Exam 70 412-confgure fle and storage solutions(4knet.ir)Exam 70 412-confgure fle and storage solutions(4knet.ir)
Exam 70 412-confgure fle and storage solutions(4knet.ir)Azad Kaki
 
Exam 70 412-implement business continuity and disaster recovery(4knet.ir)
Exam 70 412-implement business continuity and disaster recovery(4knet.ir)Exam 70 412-implement business continuity and disaster recovery(4knet.ir)
Exam 70 412-implement business continuity and disaster recovery(4knet.ir)Azad Kaki
 
authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)Azad Kaki
 
wireless local area networks (http://4knet.ir)
wireless local area networks (http://4knet.ir)wireless local area networks (http://4knet.ir)
wireless local area networks (http://4knet.ir)Azad Kaki
 
Configure the active directory infrastructure
Configure the active directory infrastructureConfigure the active directory infrastructure
Configure the active directory infrastructureAzad Kaki
 
Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)Azad Kaki
 

More from Azad Kaki (7)

Exam 70 412-confgure network services(4knet.ir)
Exam 70 412-confgure network services(4knet.ir)Exam 70 412-confgure network services(4knet.ir)
Exam 70 412-confgure network services(4knet.ir)
 
Exam 70 412-confgure fle and storage solutions(4knet.ir)
Exam 70 412-confgure fle and storage solutions(4knet.ir)Exam 70 412-confgure fle and storage solutions(4knet.ir)
Exam 70 412-confgure fle and storage solutions(4knet.ir)
 
Exam 70 412-implement business continuity and disaster recovery(4knet.ir)
Exam 70 412-implement business continuity and disaster recovery(4knet.ir)Exam 70 412-implement business continuity and disaster recovery(4knet.ir)
Exam 70 412-implement business continuity and disaster recovery(4knet.ir)
 
authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)
 
wireless local area networks (http://4knet.ir)
wireless local area networks (http://4knet.ir)wireless local area networks (http://4knet.ir)
wireless local area networks (http://4knet.ir)
 
Configure the active directory infrastructure
Configure the active directory infrastructureConfigure the active directory infrastructure
Configure the active directory infrastructure
 
Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 

Recently uploaded (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 

VLAN & VPNs Physical and Hardware Security

  • 1. VLAN & VPNs Physical and Hardware Security By MSc. Kaki A.(azadkaki@live.co.uk) @MahabadNetworkAdmin Network+ N10-006 from CompTIA IT Certification
  • 2. VLAN & VPNs Using Hardware and Software Security Devices The DMZ is used to create a security zone that allows public traffic but the traffic is isolated from the company private network
  • 3. VLAN & VPNs Defining Firewalls Firewalls are usually a combination of hardware and software. The hardware part is usually a router, but it can also be a computer or a dedicated piece of hardware called a black box that has two Network Interface Cards (NICs) in it. The software part is configured to control how the firewall actually works to protect your network by scrutinizing each incoming and outgoing packet and rejecting any suspicious ones.
  • 4. VLAN & VPNs Defining Firewalls Network-Based Firewalls Host-Based Firewalls A network-based firewall is what companies use to protect their private network from public networks. The defining characteristic of this type of firewall is that it’s designed to protect an entire network of computers instead of just one system, and it’s usually a combination of hardware and software.
  • 5. VLAN & VPNs Defining Firewalls Network-Based Firewalls Host-Based Firewalls a host-based firewall is implemented on a single machine so it only protects that one machine This type of firewall is usually a software implementation, because you don’t need any additional hardware in your personal computer to run it.
  • 6. VLAN & VPNs Firewall Technologies Access Control Lists(ACL) Standard ACLs Extended ACLs Inbound ACLs Outbound ACLs
  • 7. VLAN & VPNs Firewall Technologies Demilitarized Zone (DMZ)
  • 8. VLAN & VPNs Firewall Technologies Protocol Switching Protocol switching protects data on the inside of a firewall  Use a protocol other than TCP/IP on the internal network inside the firewall. IP-based attacks aimed at your development server just can’t work if you use Internetwork Packet Exchange (IPX) on the internal-network side of a router, which gives you an automatic firewall.  Use TCP/IP on both the internal network and the Internet, and use a different protocol like IPX in a dead zone between them. Basically, you’ll have things set up to switch from IP to IPX in that dead zone and switch back to IP again once inside your network.
  • 9. VLAN & VPNs Firewall Technologies Protocol Switching
  • 10. VLAN & VPNs Firewall Technologies Dynamic Packet Filtering Packet filtering refers to the ability of a router or a firewall to discard packets that don’t meet The right criteria.
  • 11. VLAN & VPNs Firewall Technologies Proxy Services
  • 12. VLAN & VPNs Firewall Technologies Proxy Services Types  IP proxy  Web (HTTP) proxy  FTP proxy  SMTP proxy
  • 13. VLAN & VPNs Firewalls at the Application Layer vs. the Network Layer Stateful vs. Stateless Network-Layer Firewalls Application-layer Firewalls
  • 14. VLAN & VPNs Scanning Services and Other Firewall Features Most firewalls are capable of performing scanning services, which means that they scan different types of incoming traffic in an effort to detect problems Content Filtering Zones content filtering means blocking data based on the content of the data rather than the source of the data Signature Identification
  • 15. VLAN & VPNs Scanning Services and Other Firewall Features Most firewalls are capable of performing scanning services, which means that they scan different types of incoming traffic in an effort to detect problems Content Filtering Signature Identification Zones Firewalls can also stop attacks and problems through a process called signature identification. Viruses that are known will have a signature, which is a particular pattern of data, within them. Firewalls (and antivirus programs) can use signatures to identify a virus and remove it. The same holds true for other software bugs such as worms and spyware.
  • 16. VLAN & VPNs Scanning Services and Other Firewall Features Most firewalls are capable of performing scanning services, which means that they scan different types of incoming traffic in an effort to detect problems Content Filtering Signature Identification Zones A zone is an individual area of the network that has been configured with a specific trust level. Firewalls are ideal devices to regulate the flow of traffic between zones
  • 17. VLAN & VPNs Intrusion-Detection and –Prevention Systems Misuse-Detection IDS (MD-IDS) It works by looking for fingerprints. That’s right—I said fingerprints, which in this case means strange or abusive use of the network. IDS sends up an alarm only if it recognizes the fingerprints typical of attackers
  • 18. VLAN & VPNs Intrusion-Detection and –Prevention Systems Anomaly-Detection IDS (AD-IDS) An AD-IDS basically watches for anything out of the ordinary; if it discovers fingerprints where there shouldn’t be any, it will send out an alert. And a really cool feature is that it’s known as a smart system because it learns on the go by keeping track of and building a history of network activity for norms to compare unusual activity to
  • 19. VLAN & VPNs Intrusion-Detection and –Prevention Systems
  • 20. VLAN & VPNs Intrusion-Detection and –Prevention Systems Network-Based IDS
  • 21. VLAN & VPNs Intrusion-Detection and –Prevention Systems Network-Based IDS  Logging  Notification  Shunning  Changing network configuration  Terminating sessions  Deceiving the attacker
  • 22. VLAN & VPNs Intrusion-Detection and –Prevention Systems  Changing network configuration
  • 23. VLAN & VPNs Intrusion-Detection and –Prevention Systems  Deceiving the attacker
  • 24. VLAN & VPNs Understanding Problems Affecting Device Security  Physical Security-Physical Barriers-Security Zones
  • 25. VLAN & VPNs Access-Control Principles  Utilize implicit denies  Follow the least-privilege model  Separate out administrative duties  Rotate administrator jobs
  • 26. VLAN & VPNs Access-Control Models  Mandatory Access Control  Discretionary Access Control  Role-Based Access Control  Rule-Based Access Control
  • 27. VLAN & VPNs Secure and Unsecure Application Protocols  Telnet  HTTP  FTP  SNMP (v1 and v2)  Unsecure Protocols
  • 28. VLAN & VPNs Secure and Unsecure Application Protocols  SSH  HTTPS  SFTP  SNMPv3  Secure Protocols