SlideShare une entreprise Scribd logo
1  sur  63
Télécharger pour lire hors ligne
Ethical Hacking and
CountermeasuresCountermeasures
Version 6
Mod le LXModule LX
Firewall Technologies
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.internetnews.com/
Module Objective
Thi d l ill f ili i i h
• Firewalls
This module will familiarize you with:
• Hardware Firewalls
• Software Firewalls
• Mac OS X Firewall
• LINUX Firewall
• Windows Firewall
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
Mac OS X FirewallFirewalls
Hardware Firewalls LINUX FirewallHardware Firewalls
Software Firewalls Windows Firewall
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Firewalls: Introduction
A firewall is a program or hardware device that
protects the resources of a pri ate net ork fromprotects the resources of a private network from
users of other networks
It is responsible for the traffic to be allowed to
pass, block, or refuse
Firewall also works with the proxy server
It helps in the protection of the private network
from the users of the different network
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
from the users of the different network
Hardware FirewallsHardware Firewalls
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Hardware Firewall
H d Fi ll l d i th i t f th t kHardware Firewalls are placed in the perimeter of the network
It employs a technique of packet filtering
It reads the header of a packet to find out the source and
destination address
The information is then compared with the set of predefined
and/or user created rules that determine hether the packet is
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
and/or user created rules that determine whether the packet is
forwarded or dropped
Netgear Firewall
I t t h i b db d t d
Features:
• Internet sharing broadband router and
4-port switch
• 2x the speed and 4x times the coverage
of a Wireless-G routerof a Wireless-G router
• Configurable for private networks and
public hotspots
• Double Firewall protection fromDouble Firewall protection from
external hackers attacks
• Touchless WiFi Security makes it easy
to secure your network
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
y
Netgear Firewall: Screenshot
WNR 3300 Firewall
Wireless Firewall Router
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
WNR 3500 FirewallWNR 824 Firewall
Personal Firewall Hardware:
LinksysLinksys
Linksys scans the data travelling in the peer to
peer network
It is also known as Ethernet cable/DSL firewallIt is also known as Ethernet cable/DSL firewall
router
The integrated SPI firewall blocks the incoming orThe integrated SPI firewall blocks the incoming or
outgoing traffic
It works on:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Filtering traffic from external /internal sources
Personal Firewall Hardware:
Cisco’s PIXCisco s PIX
Cisco supports Simple Network ManagementCisco supports Simple Network Management
Protocol (SNMP) traps
Cisco firewall series filters the java applets which is a
threat to the corporate resources
Strong firewall security and proxy authentication
functions with NAT and PAT features
CISCO PIX Firewall
M st l bl f t f Cis fi ll is D l NAT
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Most valuable feature of Cisco firewall is a Dual NAT
Cisco PIX 501 Firewall
The Cisco PIX 501 is a compact, ready-to-use security
appliance that delivers enterprise-class security for small
offices and enterprise teleworker environments
It includes an integrated 4-port Fast Ethernet (10/100)It includes an integrated 4 port Fast Ethernet (10/100)
switch and a Fast Ethernet (10/100) interface
Cisco PIX 501 Series
It delivers upto 60 Mbps of firewall throughput, 3 Mbps of
Triple Data Encryption Standard (3DES) VPN throughput,
and 4.5 Mbps of Advanced Encryption Standard-128
(AES) VPN throughput
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
(AES) VPN throughput
Cisco PIX 506E Firewall
The Cisco PIX 506E is a ob st p pose b ilt sec itThe Cisco PIX 506E is a robust, purpose-built security
appliance that delivers enterprise-class security for
remote and branch office environments
It provides two autosensing Fast Ethernet (10/100)It provides two autosensing Fast Ethernet (10/100)
interfaces
Cisco PIX 506E Series
It delivers upto 100 Mbps of firewall throughput, 16
Mbps of Triple Data Encryption Standard (3DES) VPN
throughput, and 30 Mbps of Advanced Encryption
S d d 8 (AES) VPN h h i ff i
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Standard-128 (AES) VPN throughput in a cost-effective,
high-performance solution
Cisco PIX 515E Firewall
The Cisco PIX 515E is a modular, purpose-built5 5 , p p b
security appliance that delivers enterprise-class
security for small to medium-sized business
networks
It supports upto six 10/100 Fast Ethernet
i t f s ki it ll t h i finterfaces, making it an excellent choice for
businesses requiring a cost-effective firewall
Cisco PIX 515E Series
It delivers upto 188 Mbps of firewall throughput
with the capability to handle more than 130,000
simultaneous sessions
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
simultaneous sessions
CISCO PIX 525 Firewall
The Cisco PIX 525 is a reliable, purpose-built
security appliance for medium to large
enterprise networksenterprise networks
It supports upto eight 10/100 Fast Ethernetpp p g /
interfaces or three Gigabit Ethernet interfaces
Cisco PIX 525 Series
It delivers more than 330 Mbps of firewall
throughput with the capability to handle more
than 280,000 simultaneous sessions
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
CISCO PIX 535 Firewall
The Cisco PIX 535 is a high-performance, purpose-535 g p , p p
built security appliance that delivers enterprise-
class security for enterprise and service provider
networks
It supports upto ten 10/100 Fast Ethernetpp p 0/ 00
interfaces or nine Gigabit Ethernet interfaces
Cisco PIX 535 Series
It delivers upto 1.7 Gbps of firewall throughput with
the capability to handle more than 500,000
i lt i
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
simultaneous sessions
Check Point Firewall
Check point firewall enables organizations to protect the entireCheck point firewall enables organizations to protect the entire
network infrastructure
• Firewall-1
• Firewall-1 GX
Different types of
Firewall:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Check Point Firewall (cont’d)
Features of Firewall-1:
• Comprehensive network and application firewall
Features of Firewall 1:
• Using INSPECT, the most adaptive and intelligent
inspection technology, FireWall-1 integrates both
network and application-layer firewall protection
Features of Firewall-1 GX:
• Protection for GPRS networks
• Secure connectivity between carriers
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Auditing and tracking of GPRS traffic
Nortel Switched Firewall
The key component of Nortel's Layered Defense strategy is Nortel Switched
FirewallFirewall
Supports secure access to organizational resources including SIP, VoIP, and
other delay sensitive applicationsy pp
Protects IT data centers, service provider networks, and hosting
infrastructures
Uses accelerator technology and Check Point Firewall-1 software, in a
compact rack-mount package
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
S ft Fi llSoftware Firewalls
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Software Firewall
S ft fi ll i i il t filtSoftware firewall is similar to a filter
It sits between the normal application and the
networking components of the operating system
Software firewall implants itself in the key area of the
application/network path
It analyzes what is going against the rule set
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
It analyzes what is going against the rule set
Windows Firewalls
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Norton Personal Firewall
Norton Personal Firewall automatically blocks intruders
d thi d it hid t f h k
Features:
and thieves, and it hides your computer from hackers
• Automatically detects and blocks viruses, spyware, and
worms
• Advanced phishing protection identifies and blocks• Advanced phishing protection identifies and blocks
fraudulent websites
• Rootkit Protection finds and removes hidden threats in the
operating systemoperating system
• Smart firewall blocks the hackers and stops spyware from
transmitting unauthorized information
• Intrusion Prevention automatically shields newly
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Intrusion Prevention automatically shields newly
discovered security vulnerabilities
Norton Personal Firewall:
ScreenshotScreenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Figure: Norton Personal Firewall
McAfee Personal Firewall
Automatically blocks, cleans, and removes viruses so that you can surf
the Web and download files safely
Features:
y
Blocks Spyware: Blocks spyware before it is
installed in computer and removes existing
spyware
Stops Hackers: Protects and conceals computerStops Hackers: Protects and conceals computer
from hackers
Improves PC Performance: Cleans clutter off
Backs Up & Restores Files: Automated backup and
one click restore
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Secures your Identity: Protects your online
identity
McAfee Personal Firewall:
ScreenshotScreenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Figure: Personal McAfee Firewall
Symantec Enterprise Firewall
Symantec Enterprise Firewall gives protection to the assets and
data transmission by providing secure connection with thedata transmission by providing secure connection with the
Internet
Features:
It supports the Advanced Encryption Standard (AES)It supports the Advanced Encryption Standard (AES)
It supports integrated load balancing that allows
scalability to more than 1.5 Gbps
It supports URL filtering technology
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
It supports inbound and outbound Network Address
Translation (NAT) for both VPN and non-VPN traffic
Kerio WinRoute Firewall
Kerio WinRoute Firewall is a corporate gateway firewall for small and
di i d b imedium-sized businesses
This firewall sets new standards in versatility, security, and user access
control
It defends against external attacks and viruses and can restrict access to
websites based on their content
Features:
• Anti-virus Gateway Protection
• Content Filtering
• User Specific Access Management
• Fast Internet Sharing
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Fast Internet Sharing
• Internet Monitoring
Kerio WinRoute Firewall:
Screenshot 1Screenshot 1
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Kerio WinRoute Firewall:
Screenshot 2Screenshot 2
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Sunbelt Personal Firewall
The Personal Firewall controls how computers share information
th h th I t t l l t kthrough the Internet or a local network
It protects computers from external or internal attacks by other
computerscomputers
Mostly used in laptops since they are easier to compromise because of
the increasing popularity of built-in wireless accessthe increasing popularity of built in wireless access
Features:
• Controls all the traffic on the network
• Creates a separate log for firewall modules
• Automatically update the newer version of the
f
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
software
Sunbelt Personal Firewall:
ScreenshotScreenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Xeon Firewall
Xeon Personal Firewall scans all your ports to detect possible hacker
tt t t d ill id tif th h k d hi /hattempts on your system, and will identify the hacker and his/her
location
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Xeon Firewall: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
InJoy Firewall
The InJoy Firewall is a firewall security solution for organizations of
ll iall sizes
Features:
• Deep Packet Inspection
• Unique MULTI-PLATFORM support
IPS VPN t• IPSec VPN support
• Stateful Inspection
• Dynamic Firewall Rules
• Access Control Packet Filtering• Access Control Packet Filtering
• Traffic Accounting
• Traffic Shaping Bandwidth Management
• SafeMail (secure e-mail)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Web Filtering
InJoy Firewall: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
PC Tools Firewall Plus
PC Tools Firewall Plus is a free personal firewall for Windows thatPC Tools Firewall Plus is a free personal firewall for Windows that
protects your computer by preventing unauthorized users from
gaining access to your computer through the Internet or a network
Features:
• Protects PC when users are working, surfing,
and playing
• Intelligent automatic protection without all
the questionsthe questions
• Advanced rules to protect your PC against
common attacks
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
PC Tools Firewall Plus:
ScreenshotScreenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Comodo Personal Firewall
Comodo Personal Firewall protects the system from Hackers,p y ,
Spyware, Trojans, and Identity theft
• Clean PC Mode
Features:
Clean PC Mode
• Advanced Network Firewall Engine
• Host Intrusion Prevention System
• Powerful and intuitive Security Rules Interfacey
• Automatic 'Firewall Training' mode
• Windows Security Center Integration
• Self Protection against Critical Process
T i ti
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Termination
Comodo Personal Firewall:
ScreenshotScreenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
ZoneAlarm
ZoneAlarm is designed to protect your DSL- or cable-
d PC f h kconnected PC from hackers
The firewall controls the door to your computer andy p
allows traffic that you understand and initiate
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
ZoneAlarm: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Linux Firewalls
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
KMyFirewall
KMyFirewall attempts to make it easier to setup
IPTables based firewalls on Linux systems
The firewall has the ability to save entire rulesets Fi llThe firewall has the ability to save entire rulesets Firewall
You only have to configure your ruleset one time,
and then you can use it on several computers giving
each of them a similar configuration
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
KMyFirewall: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Firestarter
Firestarter is an Open Source visual firewall programFirestarter is an Open Source visual firewall program
The software serves both Linux desktop users and systemThe software serves both Linux desktop users and system
administrators
• Real time firewall event monitor shows
Features:
• Real-time firewall event monitor shows
intrusion attempts as they happen
• Allows you to define both inbound and
outbound access policy
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Option to whitelist or blacklist traffic
Firestarter: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Guarddog
Guarddog is a firewall configuration utility for Linux systemsg g y y
Features:
• Supports router configurations
Features:
• Firewall scripts can be imported/exported to
be used on machines other than the current
one
• Hosts/networks can be divided into zones• Hosts/networks can be divided into zones
• It reduces the chances of configuration
mistakes being made which are a prime
source of security holes
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Guarddog: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Firewall Builder
Firewall Builder is multi platform firewall configuration andFirewall Builder is multi-platform firewall configuration and
management tool
Firewall Builder currently supports iptables, ipfilter, and OpenBSD
PF as well as Cisco PIX and Cisco IOS extended access lists
Firewall Builder can generate configuration file for any supported
target firewall platform from the same policy created in its GUItarget firewall platform from the same policy created in its GUI
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Firewall Builder: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
M OS X Fi llMac OS X Firewalls
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Flying Buttress
Advanced firewall configuration, logging, and IP sharing options are
f d i Fl i B ttfound in Flying Buttress
F
• Includes qualifiers on host or network
dd
Features:
addresses
• Operates on protocols other than TCP or
UDP protocols
• NAT port forwarding or other custom NATNAT port forwarding or other custom NAT
configuration
• Ability to switch between different firewall
configuration sets quickly and easily
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Flying Buttress: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
DoorStop X Firewall
Protects your Mac from outside attack, including specific Leopard
protectionprotection
Features:
• All TCP services are protected by default
Abilit t t t ti i b i
Features:
• Ability to tune protection on a service-by-service
and address-by-address basis
• Protects services by name or port number
• Four protection modes: deny all, allow all, allowFour protection modes: deny all, allow all, allow
by address, and deny by address
• Setup assistant to help you best secure your Mac's
services
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
DoorStop X Firewall: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Intego NetBarrier X5
Intego NetBarrier X5 is the Internet security
l ti f M i t h t i Msolution for Macintosh computers running Mac
OS X
It offers thorough protection against intrusions
coming across the Internet or a local network
NetBarrier X5 has four lines of defense to protect
your Mac and data from intrusions and attacks
• Personal firewall
• Antivandal
P i t ti
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Privacy protection
• Monitoring
Intego NetBarrier X5:
ScreenshotScreenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Little Snitch
Little Snitch provides flexible configuration options, allowing you to
grant specific permissions to your trusted applications or to prevent
others from establishing particular Internet connections
Little Snitch introduces a new network monitor, showing detailed
information of all incoming and outgoing network trafficinformation of all incoming and outgoing network traffic
Little Snitch allows you to intercept unwanted connection attempts,
and lets you decide how to proceed
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Little Snitch: Screenshot
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Summary
Firewall is a program which is placed at the network’s gateway serverp g p g y
Linksys scans the data travelling in the peer to peer network
Cisco firewall series allows filtering the java applets which is a threat
to the corporate resources
Intego NetBarrier X5 is the Internet security solution for Macintosh
computers running Mac OS X
Guarddog is a firewall configuration utility for Linux systems
Fi ll B ild i l i l f fi ll fi i d
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Firewall Builder is a multi-platform firewall configuration and
management tool
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited

Contenu connexe

Tendances

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Wardriving & Kismet Introduction
Wardriving & Kismet IntroductionWardriving & Kismet Introduction
Wardriving & Kismet Introduction
Lance Howell
 

Tendances (20)

Meletis Belsis - Voip security
Meletis Belsis - Voip securityMeletis Belsis - Voip security
Meletis Belsis - Voip security
 
Ce hv6 module 41 hacking usb devices
Ce hv6 module 41 hacking usb devicesCe hv6 module 41 hacking usb devices
Ce hv6 module 41 hacking usb devices
 
FortiGate Firewall HOW-TO - DMZ
FortiGate Firewall HOW-TO - DMZFortiGate Firewall HOW-TO - DMZ
FortiGate Firewall HOW-TO - DMZ
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
Hacker tool talk: kismet
Hacker tool talk: kismetHacker tool talk: kismet
Hacker tool talk: kismet
 
Fortinet Ürün Ailesi
Fortinet Ürün AilesiFortinet Ürün Ailesi
Fortinet Ürün Ailesi
 
Ceh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilitiesCeh v5 module 12 web application vulnerabilities
Ceh v5 module 12 web application vulnerabilities
 
Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!Please, Come and Hack my SCADA System!
Please, Come and Hack my SCADA System!
 
Snort Intrusion Detection / Prevention System on PFSense Firewall
Snort Intrusion Detection / Prevention System  on PFSense FirewallSnort Intrusion Detection / Prevention System  on PFSense Firewall
Snort Intrusion Detection / Prevention System on PFSense Firewall
 
WIFI Hacking
WIFI HackingWIFI Hacking
WIFI Hacking
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warez
 
Firewall architectures
Firewall architecturesFirewall architectures
Firewall architectures
 
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
 
Wifi hacking
Wifi hackingWifi hacking
Wifi hacking
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Wardriving & Kismet Introduction
Wardriving & Kismet IntroductionWardriving & Kismet Introduction
Wardriving & Kismet Introduction
 
Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefits
 
Firewall
FirewallFirewall
Firewall
 
Ce hv6 module 52 hacking rss and atom
Ce hv6 module 52 hacking rss and atomCe hv6 module 52 hacking rss and atom
Ce hv6 module 52 hacking rss and atom
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 

En vedette

Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutionsSwitching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Mike McLain
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
hihoney
 

En vedette (12)

Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutionsSwitching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
 
CCNA - Switching Concepts made easy
CCNA - Switching Concepts made easyCCNA - Switching Concepts made easy
CCNA - Switching Concepts made easy
 
Ceh v5 module 10 session hijacking
Ceh v5 module 10 session hijackingCeh v5 module 10 session hijacking
Ceh v5 module 10 session hijacking
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
iPad Killer? - Tablet Market Overview
iPad Killer? - Tablet Market OverviewiPad Killer? - Tablet Market Overview
iPad Killer? - Tablet Market Overview
 
0407 ceh certificate
0407   ceh certificate0407   ceh certificate
0407 ceh certificate
 
Spanning tree
Spanning treeSpanning tree
Spanning tree
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hacking
 
CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)
 
Ce hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesCe hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologies
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 

Similaire à Ce hv6 module 60 firewall technologies

Firewall
FirewallFirewall
Firewall
Apo
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
Souvik Santra
 
FireWall
FireWallFireWall
FireWall
rubal_9
 
Describe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfDescribe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdf
jibinsh
 

Similaire à Ce hv6 module 60 firewall technologies (20)

Firewall
FirewallFirewall
Firewall
 
Ce hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computersCe hv6 module 46 securing laptop computers
Ce hv6 module 46 securing laptop computers
 
FortiGate-60C
FortiGate-60CFortiGate-60C
FortiGate-60C
 
Firewall ppt.pptx
Firewall ppt.pptxFirewall ppt.pptx
Firewall ppt.pptx
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
 
Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
Firewalls
FirewallsFirewalls
Firewalls
 
FortiGate-200B
FortiGate-200BFortiGate-200B
FortiGate-200B
 
Fortinet FortiGate 100D
Fortinet FortiGate 100DFortinet FortiGate 100D
Fortinet FortiGate 100D
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
FireWall
FireWallFireWall
FireWall
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Fortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-seriesFortigate fortiwifi-80f-series
Fortigate fortiwifi-80f-series
 
Describe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdfDescribe what you would do to protect a network from attack, mention .pdf
Describe what you would do to protect a network from attack, mention .pdf
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 

Plus de Vi Tính Hoàng Nam

Plus de Vi Tính Hoàng Nam (20)

CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)
 
Catalogue 2015
Catalogue 2015Catalogue 2015
Catalogue 2015
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
 
CATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁTCATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁT
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
 
Các loại cáp mạng
Các loại cáp mạngCác loại cáp mạng
Các loại cáp mạng
 
Catalogue 10-2014-new
Catalogue 10-2014-newCatalogue 10-2014-new
Catalogue 10-2014-new
 
Qtx 6404
Qtx 6404Qtx 6404
Qtx 6404
 
Camera QTX-1210
Camera QTX-1210Camera QTX-1210
Camera QTX-1210
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 Series
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báo
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008E
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênh
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênh
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênh
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênh
 
I phone v1.2_e
I phone v1.2_eI phone v1.2_e
I phone v1.2_e
 

Ce hv6 module 60 firewall technologies

  • 1. Ethical Hacking and CountermeasuresCountermeasures Version 6 Mod le LXModule LX Firewall Technologies
  • 2. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.internetnews.com/
  • 3. Module Objective Thi d l ill f ili i i h • Firewalls This module will familiarize you with: • Hardware Firewalls • Software Firewalls • Mac OS X Firewall • LINUX Firewall • Windows Firewall EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 4. Module Flow Mac OS X FirewallFirewalls Hardware Firewalls LINUX FirewallHardware Firewalls Software Firewalls Windows Firewall EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 5. Firewalls: Introduction A firewall is a program or hardware device that protects the resources of a pri ate net ork fromprotects the resources of a private network from users of other networks It is responsible for the traffic to be allowed to pass, block, or refuse Firewall also works with the proxy server It helps in the protection of the private network from the users of the different network EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited from the users of the different network
  • 6. Hardware FirewallsHardware Firewalls EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 7. Hardware Firewall H d Fi ll l d i th i t f th t kHardware Firewalls are placed in the perimeter of the network It employs a technique of packet filtering It reads the header of a packet to find out the source and destination address The information is then compared with the set of predefined and/or user created rules that determine hether the packet is EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited and/or user created rules that determine whether the packet is forwarded or dropped
  • 8. Netgear Firewall I t t h i b db d t d Features: • Internet sharing broadband router and 4-port switch • 2x the speed and 4x times the coverage of a Wireless-G routerof a Wireless-G router • Configurable for private networks and public hotspots • Double Firewall protection fromDouble Firewall protection from external hackers attacks • Touchless WiFi Security makes it easy to secure your network EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited y
  • 9. Netgear Firewall: Screenshot WNR 3300 Firewall Wireless Firewall Router EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited WNR 3500 FirewallWNR 824 Firewall
  • 10. Personal Firewall Hardware: LinksysLinksys Linksys scans the data travelling in the peer to peer network It is also known as Ethernet cable/DSL firewallIt is also known as Ethernet cable/DSL firewall router The integrated SPI firewall blocks the incoming orThe integrated SPI firewall blocks the incoming or outgoing traffic It works on: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Filtering traffic from external /internal sources
  • 11. Personal Firewall Hardware: Cisco’s PIXCisco s PIX Cisco supports Simple Network ManagementCisco supports Simple Network Management Protocol (SNMP) traps Cisco firewall series filters the java applets which is a threat to the corporate resources Strong firewall security and proxy authentication functions with NAT and PAT features CISCO PIX Firewall M st l bl f t f Cis fi ll is D l NAT EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Most valuable feature of Cisco firewall is a Dual NAT
  • 12. Cisco PIX 501 Firewall The Cisco PIX 501 is a compact, ready-to-use security appliance that delivers enterprise-class security for small offices and enterprise teleworker environments It includes an integrated 4-port Fast Ethernet (10/100)It includes an integrated 4 port Fast Ethernet (10/100) switch and a Fast Ethernet (10/100) interface Cisco PIX 501 Series It delivers upto 60 Mbps of firewall throughput, 3 Mbps of Triple Data Encryption Standard (3DES) VPN throughput, and 4.5 Mbps of Advanced Encryption Standard-128 (AES) VPN throughput EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited (AES) VPN throughput
  • 13. Cisco PIX 506E Firewall The Cisco PIX 506E is a ob st p pose b ilt sec itThe Cisco PIX 506E is a robust, purpose-built security appliance that delivers enterprise-class security for remote and branch office environments It provides two autosensing Fast Ethernet (10/100)It provides two autosensing Fast Ethernet (10/100) interfaces Cisco PIX 506E Series It delivers upto 100 Mbps of firewall throughput, 16 Mbps of Triple Data Encryption Standard (3DES) VPN throughput, and 30 Mbps of Advanced Encryption S d d 8 (AES) VPN h h i ff i EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Standard-128 (AES) VPN throughput in a cost-effective, high-performance solution
  • 14. Cisco PIX 515E Firewall The Cisco PIX 515E is a modular, purpose-built5 5 , p p b security appliance that delivers enterprise-class security for small to medium-sized business networks It supports upto six 10/100 Fast Ethernet i t f s ki it ll t h i finterfaces, making it an excellent choice for businesses requiring a cost-effective firewall Cisco PIX 515E Series It delivers upto 188 Mbps of firewall throughput with the capability to handle more than 130,000 simultaneous sessions EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited simultaneous sessions
  • 15. CISCO PIX 525 Firewall The Cisco PIX 525 is a reliable, purpose-built security appliance for medium to large enterprise networksenterprise networks It supports upto eight 10/100 Fast Ethernetpp p g / interfaces or three Gigabit Ethernet interfaces Cisco PIX 525 Series It delivers more than 330 Mbps of firewall throughput with the capability to handle more than 280,000 simultaneous sessions EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 16. CISCO PIX 535 Firewall The Cisco PIX 535 is a high-performance, purpose-535 g p , p p built security appliance that delivers enterprise- class security for enterprise and service provider networks It supports upto ten 10/100 Fast Ethernetpp p 0/ 00 interfaces or nine Gigabit Ethernet interfaces Cisco PIX 535 Series It delivers upto 1.7 Gbps of firewall throughput with the capability to handle more than 500,000 i lt i EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited simultaneous sessions
  • 17. Check Point Firewall Check point firewall enables organizations to protect the entireCheck point firewall enables organizations to protect the entire network infrastructure • Firewall-1 • Firewall-1 GX Different types of Firewall: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 18. Check Point Firewall (cont’d) Features of Firewall-1: • Comprehensive network and application firewall Features of Firewall 1: • Using INSPECT, the most adaptive and intelligent inspection technology, FireWall-1 integrates both network and application-layer firewall protection Features of Firewall-1 GX: • Protection for GPRS networks • Secure connectivity between carriers EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Auditing and tracking of GPRS traffic
  • 19. Nortel Switched Firewall The key component of Nortel's Layered Defense strategy is Nortel Switched FirewallFirewall Supports secure access to organizational resources including SIP, VoIP, and other delay sensitive applicationsy pp Protects IT data centers, service provider networks, and hosting infrastructures Uses accelerator technology and Check Point Firewall-1 software, in a compact rack-mount package EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 20. S ft Fi llSoftware Firewalls EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 21. Software Firewall S ft fi ll i i il t filtSoftware firewall is similar to a filter It sits between the normal application and the networking components of the operating system Software firewall implants itself in the key area of the application/network path It analyzes what is going against the rule set EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited It analyzes what is going against the rule set
  • 22. Windows Firewalls EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 23. Norton Personal Firewall Norton Personal Firewall automatically blocks intruders d thi d it hid t f h k Features: and thieves, and it hides your computer from hackers • Automatically detects and blocks viruses, spyware, and worms • Advanced phishing protection identifies and blocks• Advanced phishing protection identifies and blocks fraudulent websites • Rootkit Protection finds and removes hidden threats in the operating systemoperating system • Smart firewall blocks the hackers and stops spyware from transmitting unauthorized information • Intrusion Prevention automatically shields newly EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Intrusion Prevention automatically shields newly discovered security vulnerabilities
  • 24. Norton Personal Firewall: ScreenshotScreenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Figure: Norton Personal Firewall
  • 25. McAfee Personal Firewall Automatically blocks, cleans, and removes viruses so that you can surf the Web and download files safely Features: y Blocks Spyware: Blocks spyware before it is installed in computer and removes existing spyware Stops Hackers: Protects and conceals computerStops Hackers: Protects and conceals computer from hackers Improves PC Performance: Cleans clutter off Backs Up & Restores Files: Automated backup and one click restore EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Secures your Identity: Protects your online identity
  • 26. McAfee Personal Firewall: ScreenshotScreenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Figure: Personal McAfee Firewall
  • 27. Symantec Enterprise Firewall Symantec Enterprise Firewall gives protection to the assets and data transmission by providing secure connection with thedata transmission by providing secure connection with the Internet Features: It supports the Advanced Encryption Standard (AES)It supports the Advanced Encryption Standard (AES) It supports integrated load balancing that allows scalability to more than 1.5 Gbps It supports URL filtering technology EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited It supports inbound and outbound Network Address Translation (NAT) for both VPN and non-VPN traffic
  • 28. Kerio WinRoute Firewall Kerio WinRoute Firewall is a corporate gateway firewall for small and di i d b imedium-sized businesses This firewall sets new standards in versatility, security, and user access control It defends against external attacks and viruses and can restrict access to websites based on their content Features: • Anti-virus Gateway Protection • Content Filtering • User Specific Access Management • Fast Internet Sharing EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Fast Internet Sharing • Internet Monitoring
  • 29. Kerio WinRoute Firewall: Screenshot 1Screenshot 1 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 30. Kerio WinRoute Firewall: Screenshot 2Screenshot 2 EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 31. Sunbelt Personal Firewall The Personal Firewall controls how computers share information th h th I t t l l t kthrough the Internet or a local network It protects computers from external or internal attacks by other computerscomputers Mostly used in laptops since they are easier to compromise because of the increasing popularity of built-in wireless accessthe increasing popularity of built in wireless access Features: • Controls all the traffic on the network • Creates a separate log for firewall modules • Automatically update the newer version of the f EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited software
  • 32. Sunbelt Personal Firewall: ScreenshotScreenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 33. Xeon Firewall Xeon Personal Firewall scans all your ports to detect possible hacker tt t t d ill id tif th h k d hi /hattempts on your system, and will identify the hacker and his/her location EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 34. Xeon Firewall: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 35. InJoy Firewall The InJoy Firewall is a firewall security solution for organizations of ll iall sizes Features: • Deep Packet Inspection • Unique MULTI-PLATFORM support IPS VPN t• IPSec VPN support • Stateful Inspection • Dynamic Firewall Rules • Access Control Packet Filtering• Access Control Packet Filtering • Traffic Accounting • Traffic Shaping Bandwidth Management • SafeMail (secure e-mail) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Web Filtering
  • 36. InJoy Firewall: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 37. PC Tools Firewall Plus PC Tools Firewall Plus is a free personal firewall for Windows thatPC Tools Firewall Plus is a free personal firewall for Windows that protects your computer by preventing unauthorized users from gaining access to your computer through the Internet or a network Features: • Protects PC when users are working, surfing, and playing • Intelligent automatic protection without all the questionsthe questions • Advanced rules to protect your PC against common attacks EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 38. PC Tools Firewall Plus: ScreenshotScreenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 39. Comodo Personal Firewall Comodo Personal Firewall protects the system from Hackers,p y , Spyware, Trojans, and Identity theft • Clean PC Mode Features: Clean PC Mode • Advanced Network Firewall Engine • Host Intrusion Prevention System • Powerful and intuitive Security Rules Interfacey • Automatic 'Firewall Training' mode • Windows Security Center Integration • Self Protection against Critical Process T i ti EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Termination
  • 40. Comodo Personal Firewall: ScreenshotScreenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 41. ZoneAlarm ZoneAlarm is designed to protect your DSL- or cable- d PC f h kconnected PC from hackers The firewall controls the door to your computer andy p allows traffic that you understand and initiate EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 42. ZoneAlarm: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 43. Linux Firewalls EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 44. KMyFirewall KMyFirewall attempts to make it easier to setup IPTables based firewalls on Linux systems The firewall has the ability to save entire rulesets Fi llThe firewall has the ability to save entire rulesets Firewall You only have to configure your ruleset one time, and then you can use it on several computers giving each of them a similar configuration EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 45. KMyFirewall: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 46. Firestarter Firestarter is an Open Source visual firewall programFirestarter is an Open Source visual firewall program The software serves both Linux desktop users and systemThe software serves both Linux desktop users and system administrators • Real time firewall event monitor shows Features: • Real-time firewall event monitor shows intrusion attempts as they happen • Allows you to define both inbound and outbound access policy EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Option to whitelist or blacklist traffic
  • 47. Firestarter: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 48. Guarddog Guarddog is a firewall configuration utility for Linux systemsg g y y Features: • Supports router configurations Features: • Firewall scripts can be imported/exported to be used on machines other than the current one • Hosts/networks can be divided into zones• Hosts/networks can be divided into zones • It reduces the chances of configuration mistakes being made which are a prime source of security holes EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 49. Guarddog: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 50. Firewall Builder Firewall Builder is multi platform firewall configuration andFirewall Builder is multi-platform firewall configuration and management tool Firewall Builder currently supports iptables, ipfilter, and OpenBSD PF as well as Cisco PIX and Cisco IOS extended access lists Firewall Builder can generate configuration file for any supported target firewall platform from the same policy created in its GUItarget firewall platform from the same policy created in its GUI EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 51. Firewall Builder: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 52. M OS X Fi llMac OS X Firewalls EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 53. Flying Buttress Advanced firewall configuration, logging, and IP sharing options are f d i Fl i B ttfound in Flying Buttress F • Includes qualifiers on host or network dd Features: addresses • Operates on protocols other than TCP or UDP protocols • NAT port forwarding or other custom NATNAT port forwarding or other custom NAT configuration • Ability to switch between different firewall configuration sets quickly and easily EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 54. Flying Buttress: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 55. DoorStop X Firewall Protects your Mac from outside attack, including specific Leopard protectionprotection Features: • All TCP services are protected by default Abilit t t t ti i b i Features: • Ability to tune protection on a service-by-service and address-by-address basis • Protects services by name or port number • Four protection modes: deny all, allow all, allowFour protection modes: deny all, allow all, allow by address, and deny by address • Setup assistant to help you best secure your Mac's services EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 56. DoorStop X Firewall: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 57. Intego NetBarrier X5 Intego NetBarrier X5 is the Internet security l ti f M i t h t i Msolution for Macintosh computers running Mac OS X It offers thorough protection against intrusions coming across the Internet or a local network NetBarrier X5 has four lines of defense to protect your Mac and data from intrusions and attacks • Personal firewall • Antivandal P i t ti EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Privacy protection • Monitoring
  • 58. Intego NetBarrier X5: ScreenshotScreenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 59. Little Snitch Little Snitch provides flexible configuration options, allowing you to grant specific permissions to your trusted applications or to prevent others from establishing particular Internet connections Little Snitch introduces a new network monitor, showing detailed information of all incoming and outgoing network trafficinformation of all incoming and outgoing network traffic Little Snitch allows you to intercept unwanted connection attempts, and lets you decide how to proceed EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 60. Little Snitch: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 61. Summary Firewall is a program which is placed at the network’s gateway serverp g p g y Linksys scans the data travelling in the peer to peer network Cisco firewall series allows filtering the java applets which is a threat to the corporate resources Intego NetBarrier X5 is the Internet security solution for Macintosh computers running Mac OS X Guarddog is a firewall configuration utility for Linux systems Fi ll B ild i l i l f fi ll fi i d EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Firewall Builder is a multi-platform firewall configuration and management tool
  • 62. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 63. EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited