Agenda Understanding the security Threats TCP/IP model What is the firewall Types of firewall Deployment modes of firewall
Passive Attacks Eavesdropping : Listen to packets from other parties = Sniffing Traffic Analysis : Learn about network from observing traffic patterns Footprinting : Test to determine software installed on system = Network Mapping B Packet A C Bob Jennie Carl
Some Active Attacks Denial of Service: Message did not make it; or service could not run Masquerading or Spoofing : The actual sender is not the claimed sender Message Modification : The message was modified in transmission Packet Replay : A past packet is transmitted again in order to gain access or otherwise cause damage
Exploit/Maintain Access Backdoor Trojan Horse Spyware/Adware Bots User-Level Rootkit Kernel-Level Rootkit Replaces system executables: e.g. Login, ls, du Replaces OS kernel: e.g. process or file control to hide Control system: system commands, log keystrokes, pswd Useful utility actually creates a backdoor. Slave forwards/performs commands; spreads, list email addrs , DOS attacks Spyware: Collect info: keystroke logger, collect credit card #s, AdWare : insert ads, filter search results
Distributed Denial of Service Zombies Victim Attacker Handler Can barrage a victim server with requests, causing the network to fail to respond to anyone Russia Bulgaria United States Zombies
Filters/ACL Route Filter : Verifies sources and destination of IP addresses Packet Filter : Scans headers of packets and discards if ruleset failed (e.g., Firewall or router) Content Filter : Scans contents of packets and discards if ruleset failed (e.g., Intrusion Prevention System or firewall) The good, the bad & the ugly… Filter The bad & the ugly The Good
Protecting the Network
Maintaining network security IDS/IPS Network IDS=NIDS Examines packets for attacks Can find worms, viruses, org-defined attacks Warns administrator of attack IPS=Packets are routed through IPS Host IDS=HIDS Examines actions or resources for attacks Recognize unusual or inappropriate behavior E.g., Detect modification or deletion of special files Router Firewall IDS
Maintaining network security IDS
What is a firewall?
What is software firewall & hardware firewall?
Router External DNS IDS Web Server E-Commerce VPN Server IDS Protected Internal Network Zone IDS Database/File Servers Internet Firewall Separate Zones Demilitarized Zone With Proxy Interface Screened Host The router serves as a screen for the Firewall, preventing Denial of Service attacks to the Firewall. Screening Device Firewall
Types of firewall
Personal firewall
What is network firewall ?
Packet Filter Firewall Web Request Ping Request FTP request Email Connect Request Web Response Telnet Request Email Response SSH Connect Request DNS Request Email Response Web Response Illegal Source IP Address Illegal Dest IP Address Microsoft NetBIOS Name Service
Configuring interfaces CLI Config system interface Edit port1 Set mode static Set ip 192.168.1.1/24 Set alias LAN Set Allow access ssh https telnet fgfm ping End
Configuring pppoe interfaces Config system interface Set mode pppoe Set username admin Set password systel Set alias wan Set role wan End
Configuring dhcp server Config system dhcp server Config ip -range Edit 1 Set start ip 192.168.1.2 Set end ip 192.168.1.100 Next End Set default- gatway 192.168.1.1 Set netmask 255.255.255.0 set interface port 1 -------------------------- assign it to the LAN interface Show ---------------------------------------------- to verifie
Configuring static routes Config router static Edit 1 Set dst 0.0.0.0 0.0.0.0 Set device port 2 --------------------- assign the rout to the wan interface Set dynamic-gateway enable End
IPsec Day-07 | How to Configure IPSec VPN between Fortigate Firewall | Fortigate firewall for Beginners (youtube.com)
Policy to route internal network to wan or internet Edit 1 Set name “internet access” Set srcintf port 1 -------------------port 1 is configured as lan interface Set dstintf port 2 -------------------port 2 is wan interface Set srcaddr all Set distaddr all Set schedual always Set service all Set action accept Set nat enable End
Fortigate Lab
IPsec connection How to configure VPN connection between 2 firewalles