+ All Categories
Home > Documents > Introduction to Firewall Technologies

Introduction to Firewall Technologies

Date post: 21-Jan-2016
Category:
Upload: aira
View: 36 times
Download: 0 times
Share this document with a friend
Description:
Introduction to Firewall Technologies. Objectives. Understand basic concepts of network security Master mandatory firewall technologies. Upon completion of this course, you will be able to:. Contents. Network Security Firewall Technologies. Network Security Overview. - PowerPoint PPT Presentation
Popular Tags:
16
Introduction to Firewall Technologies
Transcript
Page 1: Introduction to  Firewall Technologies

Introduction to Firewall Technologies

Page 2: Introduction to  Firewall Technologies

ObjectivesUpon completion of this course, you will be able to:

Understand basic concepts

of network security

Master mandatory firewall

technologies

Page 3: Introduction to  Firewall Technologies

3Com Confidential.3Com Confidential.

33

Contents

Network Security

Firewall Technologies

Page 4: Introduction to  Firewall Technologies

Network Security Overview

• Network security is a practical issue on the Internet

• Network security is a comprehensive technology

• Network security has two meanings:

– Guarantee security of the internal LAN (away from illegal invasion)

– Protect security of data exchange with the external network

• Perfection and update of the network security technology

Page 5: Introduction to  Firewall Technologies

Coverage of Network Security

• Coverage of network security

– Prevent physical lines of the network from being easily attacked

– Effectively identify legal and illegal users

– Implement effective access control

– Guarantee concealment of the internal network

– Offer an effective anti-forgery means to focus on major data

– Provide security management for network equipment and network topology

– Provide virus protection

– Improve security protection consciousness

• Category of network security devices

Page 6: Introduction to  Firewall Technologies

3Com Confidential.3Com Confidential.

66

Contents

Network Security

Firewall Technologies

Page 7: Introduction to  Firewall Technologies

Mandatory Firewall Technologies

• As for different kinds of potential security hazards on the network, the firewall must have the following security features:

– Network isolation & access control

– Attack defending

– Network Address Translation (NAT)

– Application Specific Packet Filter (ASPF)

– ID authentication

– Content filter

– Security management

Page 8: Introduction to  Firewall Technologies

Network Isolation & Access Control

Firewall

Switch

Trusted Zone

Untrusted Zone

DMZTrusted Zone -> DMZ, accessing POP3 and SMTP servicesDMZ -> Trusted Zone, accessing no services

Untrusted Zone -> DMZ, accessing POP3 and SMTP servicesDMZ -> Untrusted Zone, accessing all services

Trusted Zone and Untrusted Zone cannot access each other

Email Server

Page 9: Introduction to  Firewall Technologies

Attack Defending

FirewallTrusted

Zone Untrusted Zone

DoS attack

Hacker

Normal user

Prevent

Page 10: Introduction to  Firewall Technologies

Network Address Translation (NAT)

Firewall

Web Server

10.1.1.0/24

10.1.1.1

210.190.100.23

10.1.1.100 → 210.190.100.23

10.1.1.100 ← 210.190.100.23

Page 11: Introduction to  Firewall Technologies

Application Specific Packet Filter (ASPF)

Dynamically create and delete filter rules

Dynamically create and delete filter rules

Monitor packets in the communication processMonitor packets in the

communication process

Page 12: Introduction to  Firewall Technologies

ID Authentication

Firewall

Access the Internet

User name and password?

Input the user name and password

Authentication success

Normal Internet access

Page 13: Introduction to  Firewall Technologies

Content Filter

Normal website

Harmful website

• Internet

Harmful contents

Healthy contents

Filter harmful websites

Remove malicious webpage contents

Page 14: Introduction to  Firewall Technologies

Security Management

Internet

Log buffer

Monitoring terminal

Console

Log host

SecPath

Page 15: Introduction to  Firewall Technologies

Summary

Basic concepts of network security

Mandatory firewall technologies

Page 16: Introduction to  Firewall Technologies

Thank you


Recommended