configuring tcp/ip addressing and security

30
1 CONFIGURING TCP/IP ADDRESSING AND SECURITY Chapter 11

Upload: sandra4211

Post on 02-Jun-2015

293 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: CONFIGURING TCP/IP ADDRESSING AND SECURITY

11

CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11

Page 2: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 2

OVERVIEW

Understand IP addressing

Manage IP subnetting and subnet masks

Understand IP security terminology

Manage Internet security features of Windows XP

Configure and troubleshoot Windows Firewall

Page 3: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 3

UNDERSTANDING BINARY NUMBERS

Page 4: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 4

CONVERTING DECIMAL ADDRESSES TO BINARY

Page 5: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 5

CONVERTING BINARY ADDRESSES TO DECIMAL

Page 6: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 6

USING CALCULATOR TO CONVERT NUMBERS

Page 7: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 7

SUBNET MASKS

Page 8: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 8

PROBLEMS WITH CLASSFUL ADDRESSES

Wasted addresses

Shortage of address blocks

Excessive routing table entries

Page 9: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 9

SUBNETTING A LARGE NETWORK

Page 10: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 10

CLASSLESS INTERDOMAIN ROUTING (CIDR)

Page 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 11

SUPERNETS

Page 12: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 12

SECURING IP COMMUNICATIONS

Internet threats

Protective technologies

Configuring and managing Windows Firewall

Monitoring Internet communications security

Page 13: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 13

INTERNET THREATS

Viruses (the oldest threat)

Worms (the most persistent threat)

Trojan horses

Spyware

Zombies

Direct hacking

Page 14: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 14

VIRUSES

Take advantage of gullible users

Infect document, graphics, andexecutable files

Often include mass-mailing components

Can carry destructive payloads

Page 15: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 15

WORMS

Self-replicating

Network-aware

Use bugs in programs or systems to spread

Can carry viruses or other payloads

Page 16: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 16

TROJAN HORSES

Usually e-mailed or downloaded

Appear to be a useful program or game

Carry payload or back door application

Page 17: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 17

SPYWARE

Has attributes of Trojan horses or worms

Spies on its victim

Might transmit marketing data or transmit personal data to the spyware author

Page 18: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 18

ZOMBIES

Payload of worm or Trojan horse

Remotely controlled to attack network targets

Participate in large-scale assaults on public Web sites

Page 19: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 19

DIRECT HACKING

Relatively low incidence

Hardest form of attack to defeat

Page 20: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 20

PROTECTIVE TECHNOLOGIES

Security Center

Windows Firewall

Internet Connection Sharing (ICS)

Third-party utilities

Page 21: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 21

SECURITY CENTER

Page 22: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 22

FIREWALL TERMINOLOGY

Packet filtering

Stateful packet filtering

Exceptions (packet filter rules)

Allowed traffic

Rejected traffic

Logging

Page 23: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 23

ENABLING WINDOWS FIREWALL

Page 24: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 24

FIREWALL EXCEPTIONS

Page 25: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 25

ADVANCED WINDOWS FIREWALL SETTINGS

Page 26: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 26

MONITORING INTERNET SECURITY

Windows Firewall monitoring

Service logs

Event logs

Page 27: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 27

WINDOWS FIREWALL ALERTS

Page 28: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 28

WINDOWS FIREWALL LOGS

Page 29: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 29

SERVER LOGS

Page 30: CONFIGURING TCP/IP ADDRESSING AND SECURITY

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 30

SUMMARY

IP addresses are 32-bit binary addresses.

The network portion of IP addresses determines location.

CIDR allows creation of custom netblocks.

CIDR permits use of variable-length subnet masks.

Windows Firewall blocks unauthorized packets.

Windows Firewall exceptions allow specified traffic to pass through the firewall.

Alerts and logs warn of attempted attacks.