Bài giảng An toàn bảo mật mạng: Chương 3 - ThS. Trần Đắc Tốt

171 7 0
Bài giảng An toàn bảo mật mạng: Chương 3 - ThS. Trần Đắc Tốt

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Bài giảng An toàn bảo mật mạng do ThS. Trần Đắc Tốt biên soạn, trong chương 3 của bài giảng sẽ giới thiệu về Công nghệ Firewall. Để biết rõ hơn về công nghệ này, mời các bạn cùng tham khảo bài giảng.

TRƯỜNG ĐẠI HỌC CƠNG NGHIỆP THỰC PHẨM TP.HCM AN TỒN BẢO MẬT MẠNG (Network Security) Giảng viên: Ths Trần Đắc Tốt – Khoa CNTT Email: tottd@cntp.edu.vn Website: www.oktot.com Facebook: https://www.facebook.com/oktotcom/ NỢI DUNG MƠN HỌC Chương 1: Tổng quan an tồn bảo mật thơng tin mạng máy tính Chương 2: Tấn cơng mạng máy tính Chương 3: Cơng nghệ Firewall Chương 4: Hệ thống phát phòng chống xâm nhập (IDS&IPS) Chương 5: An ninh mạng WLAN (IEEE 802.11) Chương 6: Chuẩn an tồn thơng tin Firewall Technologies 12/1/2016 Outline  Firewall overview  Traffic control and the OSI reference model  Firewall categories  Firewall design 12/1/2016 Firewall Overview    Firewall technologies have undergone substantial changes since their entry into the marketplace in the early 1990s These first firewalls were simple packet-filtering devices Since those days, firewalls have become much more sophisticated in their filtering features, adding such capabilities as stateful filtering, VPNs, IDS, multicast routing, connection authentication, DHCP services, and many others 12/1/2016 (cont.)   One of the driving forces of these enhancements, besides vendor competition, was the explosion of Internet usage in the mid- to late 1990s The need to protect a company's assets, firewalls have become a common technology for not only enterprise companies, but also small businesses and personal computers that have Internet access 12/1/2016 Definition of a Firewall  People use many descriptions when defining a firewall   Its first use had to not with network security, but with controlling actual fires Of course, when we talk about network security, the term firewall means something different, but the original essence is carried over:  12/1/2016 It is used to protect your network from malicious people and to stop their illicit actions at defined boundary points (cont.)   Basically, a firewall is a device or systems that control the flow of traffic between different areas of your network Notice something important about this definition:  The definition can include one or more devices   12/1/2016 a small office/home office an enterprise network (cont.)   Many people assume that firewalls are used to protect assets from external threats (from the Internet, TCP/IP) However, most malicious network threats and attacks occur, interestingly enough, within the interior of your network (have more than one protocol running)  A comprehensive firewall solution must be capable of dealing not only with both internal and external threats, but also with multiple protocols 12/1/2016 Firewall Protection  Firewall systems can perform many functions and offer many solutions  However, one of its primary purposes is to control access to resources  You can use many methods to perform this task 12/1/2016 10 (cont.)  This company has assigned the following rules:  High- to low-level access: permit  Low- to high-level access: deny  Same-level access: deny 12/1/2016 157 (cont.)  Given these rules, the following traffic is allowed automatically to travel through the firewall:  Internal devices to the DMZ, the remote company, and the Internet  DMZ devices to the remote company and the Internet 12/1/2016 158 DMZ Types  You can have a single DMZ, multiple DMZs, DMZs that separate the public network from your internal network, and DMZs that separate traffic between internal networks 12/1/2016 159 Single DMZ  Single DMZs come in two types:  Single segment  Service-leg segment 12/1/2016 160 Single DMZ with a Single Segment 12/1/2016 161 Single DMZ with a Service-Leg Segment 12/1/2016 162 Two advantages over the single-segment DMZ  The firewall sometimes can be connected directly to the Internet, removing the extra cost of the perimeter router  All security-level polices can be defined on one device (in a single-segment DMZ, you must define your policies on two devices) 12/1/2016 163 Multiple DMZs  Firewall system can be used to separate multiple areas of your network, including multiple DMZs 12/1/2016 164 Multiple DMZ Example 12/1/2016 165 Internal DMZ  Another type of DMZ is an internal one  An internal DMZ enables you to provide separation between different parts of your internal network 12/1/2016 166 Internal DMZ Example 12/1/2016 167 Components  A good firewall system typically contains the following components:  Perimeter router  Firewall  VPN  IDS 12/1/2016 168 Firewall Component  The functions of the firewall can include the following:     12/1/2016 Stateful filtering User authentication of connection with CTPs Connection filtering with CGFs Address translation 169 Simple Firewall System Design 12/1/2016 170 Enhanced Firewall System Design 12/1/2016 171 ... HỌC Chương 1: Tổng quan an tồn bảo mật thơng tin mạng máy tính Chương 2: Tấn cơng mạng máy tính Chương 3: Cơng nghệ Firewall Chương 4: Hệ thống phát phòng chống xâm nhập (IDS&IPS) Chương 5: An. .. Packet-Filtering Table Rule Source address Any 200.1.1.2 IP Ip Action protocol protocol inf TCP Port 80 Allow Any 200.1.1 .3 UDP Port 53 Allow Any 200.1.1.4 TCP Port 25 Allow Any Any other address Any... providing WAN and MAN access, you can use packet filtering to provide an additional layer of security 12/1/2016 34 Limitations of Packet-Filtering Firewalls  Despite their advantages, packet-filtering

Ngày đăng: 08/05/2021, 14:19

Tài liệu cùng người dùng

Tài liệu liên quan