Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Firewall intro

735 views

Published on

Published in: Business, Technology
  • Be the first to comment

Firewall intro

  1. 1. An Introduction to Firewalls
  2. 2. Agenda <ul><li>Firewall Basics for the Beginning User </li></ul><ul><li>NUIT Firewall Offering </li></ul><ul><li>Case Study – Desktop Firewall Software Implementation for the Office of Alumni Relations and Development </li></ul><ul><li>Questions and Answers </li></ul>
  3. 3. What is a Firewall? <ul><li>A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer </li></ul>
  4. 4. Hardware vs. Software Firewalls <ul><li>Hardware Firewalls </li></ul><ul><ul><li>Protect an entire network </li></ul></ul><ul><ul><li>Implemented on the router level </li></ul></ul><ul><ul><li>Usually more expensive, harder to configure </li></ul></ul><ul><li>Software Firewalls </li></ul><ul><ul><li>Protect a single computer </li></ul></ul><ul><ul><li>Usually less expensive, easier to configure </li></ul></ul>
  5. 5. How does a software firewall work? <ul><li>Inspects each individual “packet” of data as it arrives at either side of the firewall </li></ul><ul><li>Inbound to or outbound from your computer </li></ul><ul><li>Determines whether it should be allowed to pass through or if it should be blocked </li></ul>
  6. 6. Firewall Rules <ul><li>Allow – traffic that flows automatically because it has been deemed as “safe” (Ex. Meeting Maker, Eudora, etc.) </li></ul><ul><li>Block – traffic that is blocked because it has been deemed dangerous to your computer </li></ul><ul><li>Ask – asks the user whether or not the traffic is allowed to pass through </li></ul>
  7. 7. What a personal firewall can do <ul><li>Stop hackers from accessing your computer </li></ul><ul><li>Protects your personal information </li></ul><ul><li>Blocks “pop up” ads and certain cookies </li></ul><ul><li>Determines which programs can access the Internet </li></ul>
  8. 8. What a personal firewall cannot do <ul><li>Cannot prevent e-mail viruses </li></ul><ul><ul><li>Only an antivirus product with updated definitions can prevent e-mail viruses </li></ul></ul><ul><li>After setting it initially, you can forget about it </li></ul><ul><ul><li>The firewall will require periodic updates to the rulesets and the software itself </li></ul></ul>
  9. 9. Considerations when using personal firewall software <ul><li>If you did not initialize an action and your firewall picks up something, you should most likely deny it and investigate it </li></ul><ul><li>It’s a learning process (Ex. Spooler Subsystem App) </li></ul><ul><li>If you notice you cannot do something you did prior to the installation, there is a good chance it might be because of your firewall </li></ul>
  10. 10. Examples of personal firewall software <ul><li>ZoneAlarm <www.zonelabs.com> </li></ul><ul><li>BlackICE Defender <http://blackice.iss.net> </li></ul><ul><li>Tiny Personal Firewall <www.tinysoftware.com> </li></ul><ul><li>Norton Personal Firewall <www.symantec.com> </li></ul><ul><li>***Please be sure to read the license agreement carefully to verify that the firewall can be legally used at home and/or the office. </li></ul>
  11. 11. Windows XP Firewall <ul><li>Currently *not* enabled by default </li></ul><ul><li>Enable under Start -> Settings -> Control Panel </li></ul><ul><li>Select Local Area Connection </li></ul><ul><li>Select the Properties button </li></ul><ul><li>Click the “Advanced” tab </li></ul>
  12. 12. Windows XP firewall
  13. 13. Updates to Windows XP Firewall <ul><li>*Will* be enabled in default installations of Windows XP Service Pack 2 </li></ul><ul><li>Ports will be closed except when they are in use </li></ul><ul><li>Improved user interface for easier configuration </li></ul><ul><li>Improved application compatibility when firewall is enabled </li></ul>
  14. 14. Mac OS X firewall <ul><li>*Not* enabled by default </li></ul><ul><li>Enable under System Preferences </li></ul><ul><li>Select Sharing </li></ul><ul><li>Click “Firewall” tab </li></ul><ul><li>Click “Start” button </li></ul>
  15. 15. Mac OS X firewall
  16. 16. NUIT Firewall Service
  17. 17. Why Netscreen? <ul><li>Comparison of the Big 3 </li></ul><ul><ul><li>Hardware vs. Software </li></ul></ul><ul><ul><li>Transparent Mode vs. Routing Mode </li></ul></ul><ul><ul><li>Distributed Management </li></ul></ul><ul><ul><li>Pricing Models </li></ul></ul>
  18. 18. The Process <ul><li>A Department requests a FW Consultation </li></ul><ul><li>TNS Organizes a Meeting </li></ul><ul><li>The Department Provides the List of Machines they want to Protect </li></ul><ul><li>TNS Measures Bandwidth Requirements </li></ul><ul><li>TNS Prepares a FW Proposal </li></ul><ul><li>The Department Makes their Decision </li></ul>
  19. 19. The Process continued... <ul><li>TNS Installs the FW in a Passive State </li></ul><ul><li>TNS Logs All Traffic from the Target Hosts </li></ul><ul><li>TNS Develops a Rule Set </li></ul><ul><li>The Department Oks the Rule Set </li></ul><ul><li>TNS Activates the Rule Set </li></ul><ul><li>Everyone's Happy =) </li></ul>
  20. 20. Final Notes <ul><li>Rule Management </li></ul><ul><li>Default Allow vs. Default Deny </li></ul><ul><li>Firewalls do NOT Solve the Entire Problem </li></ul>
  21. 21. Additional Information <ul><li>Visit the following websites: </li></ul><ul><li>http://www.it.northwestern.edu/reference/firewall/firewall_strategies_wp.html </li></ul><ul><li>http://www.juniper.net/netscreen_com.html </li></ul><ul><li>Or simply email: </li></ul><ul><ul><li>[email_address] </li></ul></ul><ul><ul><li>[email_address] </li></ul></ul>

×