SlideShare a Scribd company logo
VLAN & VPNs
Physical and Hardware Security
By
MSc. Kaki A.(azadkaki@live.co.uk)
@MahabadNetworkAdmin
Network+
N10-006 from CompTIA IT Certification
VLAN & VPNs
Using Hardware and Software
Security Devices
The DMZ is used to create a
security zone that allows
public traffic but the traffic is
isolated from the company
private network
VLAN & VPNs
Defining Firewalls
Firewalls are usually a combination of hardware and software. The hardware
part is usually a router, but it can also be a computer or a dedicated piece of
hardware called a black box that has two Network Interface Cards (NICs) in it.
The software part is configured to control how the firewall actually works to
protect your network by scrutinizing each incoming and outgoing packet and
rejecting any suspicious ones.
VLAN & VPNs
Defining Firewalls
Network-Based Firewalls
Host-Based Firewalls
A network-based firewall is what companies use to protect their
private network from public networks. The defining characteristic
of this type of firewall is that it’s designed to protect an entire
network of computers instead of just one system, and it’s usually
a combination of hardware and software.
VLAN & VPNs
Defining Firewalls
Network-Based Firewalls
Host-Based Firewalls
a host-based firewall is implemented on a single machine so it
only protects that one machine This type of firewall is usually a
software implementation, because you don’t need any additional
hardware in your personal computer to run it.
VLAN & VPNs
Firewall Technologies
Access Control Lists(ACL)
Standard ACLs
Extended ACLs
Inbound ACLs
Outbound ACLs
VLAN & VPNs
Firewall Technologies
Demilitarized Zone (DMZ)
VLAN & VPNs
Firewall Technologies
Protocol Switching Protocol switching protects data on the inside of a firewall
 Use a protocol other than TCP/IP on the internal network inside the firewall. IP-based
attacks aimed at your development server just can’t work if you use Internetwork Packet
Exchange (IPX) on the internal-network side of a router, which gives you an automatic
firewall.
 Use TCP/IP on both the internal network and the Internet, and use a different protocol
like IPX in a dead zone between them. Basically, you’ll have things set up to switch from
IP to IPX in that dead zone and switch back to IP again once inside your network.
VLAN & VPNs
Firewall Technologies
Protocol Switching
VLAN & VPNs
Firewall Technologies
Dynamic Packet Filtering
Packet filtering
refers to the
ability of a router
or a firewall to
discard packets
that don’t meet
The right criteria.
VLAN & VPNs
Firewall Technologies
Proxy Services
VLAN & VPNs
Firewall Technologies
Proxy Services Types
 IP proxy
 Web (HTTP) proxy
 FTP proxy
 SMTP proxy
VLAN & VPNs
Firewalls at the Application
Layer vs. the Network Layer
Stateful vs. Stateless Network-Layer Firewalls
Application-layer Firewalls
VLAN & VPNs
Scanning Services and Other Firewall Features
Most firewalls are capable of performing scanning services, which means that they scan
different types of incoming traffic in an effort to detect problems
Content Filtering
Zones
content filtering means blocking data based on the content
of the data rather than the source of the data
Signature Identification
VLAN & VPNs
Scanning Services and Other Firewall Features
Most firewalls are capable of performing scanning services, which means that they scan
different types of incoming traffic in an effort to detect problems
Content Filtering
Signature Identification
Zones
Firewalls can also stop attacks and problems through a process
called signature identification. Viruses that are known will have a
signature, which is a particular pattern of data, within them.
Firewalls (and antivirus programs) can use signatures to identify a
virus and remove it. The same holds true for other software bugs
such as worms and spyware.
VLAN & VPNs
Scanning Services and Other Firewall Features
Most firewalls are capable of performing scanning services, which means that they scan
different types of incoming traffic in an effort to detect problems
Content Filtering
Signature Identification
Zones
A zone is an individual area of the network that has been
configured with a specific trust level. Firewalls are ideal
devices to regulate the flow of traffic between zones
VLAN & VPNs
Intrusion-Detection and –Prevention Systems
Misuse-Detection IDS (MD-IDS)
It works by looking for fingerprints. That’s right—I said fingerprints,
which in this case means strange or abusive use of the network.
IDS sends up an alarm only if it recognizes the fingerprints typical of
attackers
VLAN & VPNs
Intrusion-Detection and –Prevention Systems
Anomaly-Detection IDS (AD-IDS)
An AD-IDS basically watches for anything out of the ordinary; if it
discovers fingerprints where there shouldn’t be any, it will send out
an alert. And a really cool feature is that it’s known as a smart system
because it learns on the go by keeping track of and building a history
of network activity for norms to compare unusual activity to
VLAN & VPNs
Intrusion-Detection and –Prevention Systems
VLAN & VPNs
Intrusion-Detection and –Prevention Systems
Network-Based IDS
VLAN & VPNs
Intrusion-Detection and –Prevention Systems
Network-Based IDS
 Logging
 Notification
 Shunning
 Changing network configuration
 Terminating sessions
 Deceiving the attacker
VLAN & VPNs
Intrusion-Detection and –Prevention Systems
 Changing
network
configuration
VLAN & VPNs
Intrusion-Detection and –Prevention Systems
 Deceiving
the attacker
VLAN & VPNs
Understanding Problems Affecting Device Security
 Physical Security-Physical Barriers-Security Zones
VLAN & VPNs
Access-Control Principles
 Utilize implicit denies
 Follow the least-privilege model
 Separate out administrative duties
 Rotate administrator jobs
VLAN & VPNs
Access-Control Models
 Mandatory Access Control
 Discretionary Access Control
 Role-Based Access Control
 Rule-Based Access Control
VLAN & VPNs
Secure and Unsecure Application Protocols
 Telnet
 HTTP
 FTP
 SNMP (v1 and v2)
 Unsecure Protocols
VLAN & VPNs
Secure and Unsecure Application Protocols
 SSH
 HTTPS
 SFTP
 SNMPv3
 Secure Protocols

More Related Content

What's hot

Dmz
Dmz Dmz
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
Nutan Kumar Panda
 
Firewall
FirewallFirewall
Firewall
Shivank Shah
 
What Technology Lies Behind VPN
What Technology Lies Behind VPNWhat Technology Lies Behind VPN
What Technology Lies Behind VPN
Sovello Hildebrand
 
Firewall
FirewallFirewall
Types of firewall
Types of firewallTypes of firewall
Types of firewall
Pina Parmar
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
Coder Tech
 
Firewall and its configuration
Firewall and its configurationFirewall and its configuration
Firewall and its configuration
Muhammad Baqar Kazmi
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
Harshika Rana
 
What is firewall
What is firewallWhat is firewall
What is firewall
Harshana Jayarathna
 
Firewall
Firewall Firewall
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
Soban Ahmad
 
Firewall
FirewallFirewall
Firewall
Apo
 
Firewalls
FirewallsFirewalls
Firewalls
junaid15bsse
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
lalithambiga kamaraj
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
Akash R
 
Firewalls
FirewallsFirewalls
Firewalls
Sonali Parab
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
Yovan Chandel
 
Firewall
FirewallFirewall
Firewall
Saurabh Chauhan
 
VPN presentation - moeshesh
VPN presentation - moesheshVPN presentation - moeshesh
VPN presentation - moeshesh
Mohamed Shishtawy
 

What's hot (20)

Dmz
Dmz Dmz
Dmz
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Firewall
FirewallFirewall
Firewall
 
What Technology Lies Behind VPN
What Technology Lies Behind VPNWhat Technology Lies Behind VPN
What Technology Lies Behind VPN
 
Firewall
FirewallFirewall
Firewall
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Firewall and its configuration
Firewall and its configurationFirewall and its configuration
Firewall and its configuration
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
Firewall
Firewall Firewall
Firewall
 
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
Firewall
FirewallFirewall
Firewall
 
VPN presentation - moeshesh
VPN presentation - moesheshVPN presentation - moeshesh
VPN presentation - moeshesh
 

Similar to physical and hardware security(http://4knet.ir)

Firewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptxFirewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptx
ShrayamManandhar
 
Network security
Network securityNetwork security
Network security
Sidiq Dwi Laksana
 
What are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdfWhat are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdf
IT AMC Support Dubai - Techno Edge Systems LLC
 
Firewall
FirewallFirewall
Note8
Note8Note8
Day4
Day4Day4
Day4
Jai4uk
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
TAMBEMAHENDRA1
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
SakshiSolapure1
 
Firewalls
FirewallsFirewalls
Firewalls
Vibhor Raut
 
Firewall security in computer security
Firewall security in computer security Firewall security in computer security
Firewall security in computer security
PawansureshNishad
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
Mohammed Maajidh
 
Firewall
FirewallFirewall
Firewall
ArchanaMani2
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
Puneet Bawa
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
Information Technology
 
Vpn rsvp
Vpn rsvpVpn rsvp
Describe firewalls
Describe firewallsDescribe firewalls
Describe firewalls
Влад Панасенко
 
English for engineering
English for engineeringEnglish for engineering
English for engineering
Qoimah Adielah
 
Firewalls in network
Firewalls in networkFirewalls in network
Firewalls in network
sheikhparvez4
 
The Complete Questionnaires About Firewall
The Complete Questionnaires About FirewallThe Complete Questionnaires About Firewall
The Complete Questionnaires About Firewall
Vishal Kumar
 
What is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptxWhat is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptx
AneenaBinoy2
 

Similar to physical and hardware security(http://4knet.ir) (20)

Firewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptxFirewall ,Its types and Working.pptx
Firewall ,Its types and Working.pptx
 
Network security
Network securityNetwork security
Network security
 
What are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdfWhat are the Different Types of Firewall and its Architectures.pdf
What are the Different Types of Firewall and its Architectures.pdf
 
Firewall
FirewallFirewall
Firewall
 
Note8
Note8Note8
Note8
 
Day4
Day4Day4
Day4
 
Introduction to Cyber security module - III
Introduction to Cyber security module - IIIIntroduction to Cyber security module - III
Introduction to Cyber security module - III
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall security in computer security
Firewall security in computer security Firewall security in computer security
Firewall security in computer security
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Firewall
FirewallFirewall
Firewall
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
Vpn rsvp
Vpn rsvpVpn rsvp
Vpn rsvp
 
Describe firewalls
Describe firewallsDescribe firewalls
Describe firewalls
 
English for engineering
English for engineeringEnglish for engineering
English for engineering
 
Firewalls in network
Firewalls in networkFirewalls in network
Firewalls in network
 
The Complete Questionnaires About Firewall
The Complete Questionnaires About FirewallThe Complete Questionnaires About Firewall
The Complete Questionnaires About Firewall
 
What is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptxWhat is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptx
 

More from Azad Kaki

Exam 70 412-confgure network services(4knet.ir)
Exam 70 412-confgure network services(4knet.ir)Exam 70 412-confgure network services(4knet.ir)
Exam 70 412-confgure network services(4knet.ir)
Azad Kaki
 
Exam 70 412-confgure fle and storage solutions(4knet.ir)
Exam 70 412-confgure fle and storage solutions(4knet.ir)Exam 70 412-confgure fle and storage solutions(4knet.ir)
Exam 70 412-confgure fle and storage solutions(4knet.ir)
Azad Kaki
 
Exam 70 412-implement business continuity and disaster recovery(4knet.ir)
Exam 70 412-implement business continuity and disaster recovery(4knet.ir)Exam 70 412-implement business continuity and disaster recovery(4knet.ir)
Exam 70 412-implement business continuity and disaster recovery(4knet.ir)
Azad Kaki
 
authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)
Azad Kaki
 
wireless local area networks (http://4knet.ir)
wireless local area networks (http://4knet.ir)wireless local area networks (http://4knet.ir)
wireless local area networks (http://4knet.ir)
Azad Kaki
 
Configure the active directory infrastructure
Configure the active directory infrastructureConfigure the active directory infrastructure
Configure the active directory infrastructure
Azad Kaki
 
Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)
Azad Kaki
 

More from Azad Kaki (7)

Exam 70 412-confgure network services(4knet.ir)
Exam 70 412-confgure network services(4knet.ir)Exam 70 412-confgure network services(4knet.ir)
Exam 70 412-confgure network services(4knet.ir)
 
Exam 70 412-confgure fle and storage solutions(4knet.ir)
Exam 70 412-confgure fle and storage solutions(4knet.ir)Exam 70 412-confgure fle and storage solutions(4knet.ir)
Exam 70 412-confgure fle and storage solutions(4knet.ir)
 
Exam 70 412-implement business continuity and disaster recovery(4knet.ir)
Exam 70 412-implement business continuity and disaster recovery(4knet.ir)Exam 70 412-implement business continuity and disaster recovery(4knet.ir)
Exam 70 412-implement business continuity and disaster recovery(4knet.ir)
 
authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)authentication and access control(http://4knet.ir)
authentication and access control(http://4knet.ir)
 
wireless local area networks (http://4knet.ir)
wireless local area networks (http://4knet.ir)wireless local area networks (http://4knet.ir)
wireless local area networks (http://4knet.ir)
 
Configure the active directory infrastructure
Configure the active directory infrastructureConfigure the active directory infrastructure
Configure the active directory infrastructure
 
Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)
 

Recently uploaded

Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 

Recently uploaded (20)

Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 

physical and hardware security(http://4knet.ir)

  • 1. VLAN & VPNs Physical and Hardware Security By MSc. Kaki A.(azadkaki@live.co.uk) @MahabadNetworkAdmin Network+ N10-006 from CompTIA IT Certification
  • 2. VLAN & VPNs Using Hardware and Software Security Devices The DMZ is used to create a security zone that allows public traffic but the traffic is isolated from the company private network
  • 3. VLAN & VPNs Defining Firewalls Firewalls are usually a combination of hardware and software. The hardware part is usually a router, but it can also be a computer or a dedicated piece of hardware called a black box that has two Network Interface Cards (NICs) in it. The software part is configured to control how the firewall actually works to protect your network by scrutinizing each incoming and outgoing packet and rejecting any suspicious ones.
  • 4. VLAN & VPNs Defining Firewalls Network-Based Firewalls Host-Based Firewalls A network-based firewall is what companies use to protect their private network from public networks. The defining characteristic of this type of firewall is that it’s designed to protect an entire network of computers instead of just one system, and it’s usually a combination of hardware and software.
  • 5. VLAN & VPNs Defining Firewalls Network-Based Firewalls Host-Based Firewalls a host-based firewall is implemented on a single machine so it only protects that one machine This type of firewall is usually a software implementation, because you don’t need any additional hardware in your personal computer to run it.
  • 6. VLAN & VPNs Firewall Technologies Access Control Lists(ACL) Standard ACLs Extended ACLs Inbound ACLs Outbound ACLs
  • 7. VLAN & VPNs Firewall Technologies Demilitarized Zone (DMZ)
  • 8. VLAN & VPNs Firewall Technologies Protocol Switching Protocol switching protects data on the inside of a firewall  Use a protocol other than TCP/IP on the internal network inside the firewall. IP-based attacks aimed at your development server just can’t work if you use Internetwork Packet Exchange (IPX) on the internal-network side of a router, which gives you an automatic firewall.  Use TCP/IP on both the internal network and the Internet, and use a different protocol like IPX in a dead zone between them. Basically, you’ll have things set up to switch from IP to IPX in that dead zone and switch back to IP again once inside your network.
  • 9. VLAN & VPNs Firewall Technologies Protocol Switching
  • 10. VLAN & VPNs Firewall Technologies Dynamic Packet Filtering Packet filtering refers to the ability of a router or a firewall to discard packets that don’t meet The right criteria.
  • 11. VLAN & VPNs Firewall Technologies Proxy Services
  • 12. VLAN & VPNs Firewall Technologies Proxy Services Types  IP proxy  Web (HTTP) proxy  FTP proxy  SMTP proxy
  • 13. VLAN & VPNs Firewalls at the Application Layer vs. the Network Layer Stateful vs. Stateless Network-Layer Firewalls Application-layer Firewalls
  • 14. VLAN & VPNs Scanning Services and Other Firewall Features Most firewalls are capable of performing scanning services, which means that they scan different types of incoming traffic in an effort to detect problems Content Filtering Zones content filtering means blocking data based on the content of the data rather than the source of the data Signature Identification
  • 15. VLAN & VPNs Scanning Services and Other Firewall Features Most firewalls are capable of performing scanning services, which means that they scan different types of incoming traffic in an effort to detect problems Content Filtering Signature Identification Zones Firewalls can also stop attacks and problems through a process called signature identification. Viruses that are known will have a signature, which is a particular pattern of data, within them. Firewalls (and antivirus programs) can use signatures to identify a virus and remove it. The same holds true for other software bugs such as worms and spyware.
  • 16. VLAN & VPNs Scanning Services and Other Firewall Features Most firewalls are capable of performing scanning services, which means that they scan different types of incoming traffic in an effort to detect problems Content Filtering Signature Identification Zones A zone is an individual area of the network that has been configured with a specific trust level. Firewalls are ideal devices to regulate the flow of traffic between zones
  • 17. VLAN & VPNs Intrusion-Detection and –Prevention Systems Misuse-Detection IDS (MD-IDS) It works by looking for fingerprints. That’s right—I said fingerprints, which in this case means strange or abusive use of the network. IDS sends up an alarm only if it recognizes the fingerprints typical of attackers
  • 18. VLAN & VPNs Intrusion-Detection and –Prevention Systems Anomaly-Detection IDS (AD-IDS) An AD-IDS basically watches for anything out of the ordinary; if it discovers fingerprints where there shouldn’t be any, it will send out an alert. And a really cool feature is that it’s known as a smart system because it learns on the go by keeping track of and building a history of network activity for norms to compare unusual activity to
  • 19. VLAN & VPNs Intrusion-Detection and –Prevention Systems
  • 20. VLAN & VPNs Intrusion-Detection and –Prevention Systems Network-Based IDS
  • 21. VLAN & VPNs Intrusion-Detection and –Prevention Systems Network-Based IDS  Logging  Notification  Shunning  Changing network configuration  Terminating sessions  Deceiving the attacker
  • 22. VLAN & VPNs Intrusion-Detection and –Prevention Systems  Changing network configuration
  • 23. VLAN & VPNs Intrusion-Detection and –Prevention Systems  Deceiving the attacker
  • 24. VLAN & VPNs Understanding Problems Affecting Device Security  Physical Security-Physical Barriers-Security Zones
  • 25. VLAN & VPNs Access-Control Principles  Utilize implicit denies  Follow the least-privilege model  Separate out administrative duties  Rotate administrator jobs
  • 26. VLAN & VPNs Access-Control Models  Mandatory Access Control  Discretionary Access Control  Role-Based Access Control  Rule-Based Access Control
  • 27. VLAN & VPNs Secure and Unsecure Application Protocols  Telnet  HTTP  FTP  SNMP (v1 and v2)  Unsecure Protocols
  • 28. VLAN & VPNs Secure and Unsecure Application Protocols  SSH  HTTPS  SFTP  SNMPv3  Secure Protocols