Académique Documents
Professionnel Documents
Culture Documents
SCIENCE,INDORE
Seminar On Firewall
CONTENTS
Keywords
What is firewall ?
Installation Steps for Windows XP
Main purpose of using firewalls
How a firewall works ?
Firewall types
Popular hardware & software firewalls
What is proxy ?
Main purpose of using proxies
How a proxy works ?
Proxy types
Popular hardware & software proxies
Conclusion
KEYWORDS
DSL # Digital Subscriber Line . A family of standards for transmitting
data over twisted pair telephone lines at multi mega bit per second
speeds.
FTP # File Transfer Protocol . The standard protocol of the internet -
architecture for transferring files between hosts.
HTTP # Hyper Text Transfer Protocol . An application level protocol based
on a request /reply paradigm and used in WWW.
ISDN # Integrated Service Digital Network . A digital communication
service offered by telephone carriers .
SMTP # Simple Mail Transfer Protocol . The electronic mail protocol of the
internet .
URL # Uniform Resource Locator. A text string used to identify the
location of internet resources.
What is firewall ?
Firewall
LAN INTERNET
nstallation Steps for Windows XP:
Steps to Install Firewall In Windows Xp are
as follows:-
Step-1:-Lets get started by clicking the
start button and navigate to settings and
then click on the control panel option.
Step-2:-
Now you will see a window similar to
INTERNET
LAN
How a firewall works ?
Sniffing Mode
1) An attacker tries to compromise a service on the protected
network.
2) The Firewall identifies the attempt.
Reset
Harden
Alert
LAN INTERNET
Main purpose of using
proxies
Improve Performance
– Act as Cache server
– Bandwidth control
Filter Requests
– Prevent access to some web sites!!!
– Prevent access to some protocols
– Time division
Surfing Anonymously
– Browsing the WWW without any identification!!!
Improve Performance
Caching
– Reduce latency Caching can greatly speed up Internet access. If one or more
Internet sites are frequently requested, they are kept in the
– Reduce Network Traffic proxy's cache, so that when a user requests them, they are
delivered directly from the proxy's cache instead of from the
original Internet site.
INTERNET
512 Kbps
1 Mbps
128 Kbps
64 Kbps
Filter Requests
Prevent access to some web sites!!!
– Categories web sites
Adult/Sexually Explicit
Advertisements & Pop-Ups
Chat
Gambling
Games
Hacking
Peer-to-Peer
……
– Check by content type
.Exe / .Com
.Mid / .MP3 / .Wav
.Avi / .Mpeg / .Rm
What do you need for
proxy installation?
Proxy Software
Ms ISA Server , Squid , WinRoute , …
Server
At least 2 network cards
DIRECT INTERNET connection (Public IP Address)
Switch/Hub (elective)
Private IP Address
10.0.0.1/8 – 172.16.0.1/16 – 192.168.0.1/24
How a proxy works ?
IP : 172.16.0.1
Proxy Server
INTERNET
IP : 217.219.66.2
Gw : 217.219.66.1
LAN IP : 172.16.0.2
Gw : 172.16.0.1
Source IP
172.16.0.2
www.yahoo.com Change Source IP Address
Source IP
Dest IP
209.191.93.52 217.219.66.2
www.yahoo.com
Dest IP
209.191.93.52
IP : 172.16.0.1
Proxy Server
INTERNET
IP : 217.219.66.2
Gw : 217.219.66.1
LAN IP : 172.16.0.2
Gw : 172.16.0.1
IP : 172.16.0.1
Proxy Server
INTERNET
Source IP
IP : 217.219.66.2
209.191.93.52
Gw : 217.219.66.1
Dest IP
217.219.66.2
Source IP
209.191.93.52
Dest IP Source IP
172.16.0.2 Change Dest. IP Address
209.191.93.52
Dest IP
217.219.66.2
IP : 172.16.0.1
Proxy Server
INTERNET
IP : 217.219.66.2
Gw : 217.219.66.1
LAN
IP : 172.16.0.2
Gw : 172.16.0.1
Source IP
209.191.93.52
Dest IP
172.16.0.2
IP : 172.16.0.1
Proxy Server
INTERNET
IP : 217.219.66.2
Gw : 217.219.66.1
Proxy types
Web proxies
Caching proxies
Transparent proxies
Open proxies
Proxy setting in IE
Popular hardware & software
proxies
Software Proxy Hardware Proxy
Ms. ISA Server Cisco PIX
Squid Blue Coat
WWWOFFLE Cyberoam
Ziproxy Alacer
SafeSquid
tinyproxy
Privoxy
WinGate
Conclusion
The level of security you establish will determine how many
of these threats can be stopped by your firewall . The
highest level of security would be simply block everything
. Obviously that defeats the purpose of having an internet
connection . But a common rule of thumb is to block
everything,then begin to select what types of traffic you
will allow . One of the best things about a firewall from a
security standpoint is that it stops anyone on the outside
from logging onto a computer in your private network .
While this is a big deal for businesses.
In general , it is impossible for existing
firewalls to know who is accessing the work and, therefore
,who has the ability to connect to other machines on the
network . Ultimately , security mechanisms like IPSEC are
probably required to support such a level of security . Still
,putting a firewall in place provides some “ peace of mind
“.
References :
www.cisco.com
www.isaserver.org
www.wikipedia.com
www.cert.org
www.google.com
www.zonelabs.com
www.symantec.com
Thank You