0% found this document useful (0 votes)
131 views

An Introduction To Firewalls

This document discusses firewalls, including what they are, how they work, and examples of firewall software. It provides an overview of hardware and software firewalls, how firewall rules function, and considerations for using personal firewall software. It also describes the firewall services and products offered by NUIT, including the process for departments to request and implement firewalls. Finally, it discusses the Windows XP and Mac OS X built-in firewall features.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
131 views

An Introduction To Firewalls

This document discusses firewalls, including what they are, how they work, and examples of firewall software. It provides an overview of hardware and software firewalls, how firewall rules function, and considerations for using personal firewall software. It also describes the firewall services and products offered by NUIT, including the process for departments to request and implement firewalls. Finally, it discusses the Windows XP and Mac OS X built-in firewall features.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 21

An Introduction to Firewalls

By:

David Moss, NUIT Technology Support Services


Vince Celindro, NUIT Telecommunications and Network Services
Robert Vance, NUIT Telecommunications and Network Services
Barbara Mims, Office of Alumni Relations and Development
Agenda
• Firewall Basics for the Beginning User
• NUIT Firewall Offering
• Case Study – Desktop Firewall Software
Implementation for the Office of Alumni
Relations and Development
• Questions and Answers
What is a Firewall?
• A firewall is hardware, software, or a
combination of both that is used to prevent
unauthorized programs or Internet users
from accessing a private network and/or a
single computer
Hardware vs. Software Firewalls
• Hardware Firewalls
– Protect an entire network
– Implemented on the router level
– Usually more expensive, harder to configure
• Software Firewalls
– Protect a single computer
– Usually less expensive, easier to configure
How does a software firewall work?
• Inspects each individual “packet” of data
as it arrives at either side of the firewall
• Inbound to or outbound from your
computer
• Determines whether it should be allowed
to pass through or if it should be blocked
Firewall Rules
• Allow – traffic that flows automatically
because it has been deemed as “safe”
(Ex. Meeting Maker, Eudora, etc.)
• Block – traffic that is blocked because it
has been deemed dangerous to your
computer
• Ask – asks the user whether or not the
traffic is allowed to pass through
What a personal firewall can do
• Stop hackers from accessing your
computer
• Protects your personal information
• Blocks “pop up” ads and certain cookies
• Determines which programs can access
the Internet
What a personal firewall cannot do
• Cannot prevent e-mail viruses
– Only an antivirus product with updated
definitions can prevent e-mail viruses
• After setting it initially, you can forget
about it
– The firewall will require periodic updates to
the rulesets and the software itself
Considerations when using
personal firewall software
• If you did not initialize an action and your
firewall picks up something, you should
most likely deny it and investigate it
• It’s a learning process (Ex. Spooler
Subsystem App)
• If you notice you cannot do something you
did prior to the installation, there is a good
chance it might be because of your firewall
Examples of personal firewall
software
• ZoneAlarm <www.zonelabs.com>
• BlackICE Defender <http://blackice.iss.net>
• Tiny Personal Firewall <www.tinysoftware.com>
• Norton Personal Firewall <www.symantec.com>

***Please be sure to read the license agreement


carefully to verify that the firewall can be legally
used at home and/or the office.
Windows XP Firewall
• Currently *not* enabled by default
• Enable under Start -> Settings -> Control
Panel
• Select Local Area Connection
• Select the Properties button
• Click the “Advanced” tab
Windows XP firewall
Updates to Windows XP Firewall
• *Will* be enabled in default installations of
Windows XP Service Pack 2
• Ports will be closed except when they are
in use
• Improved user interface for easier
configuration
• Improved application compatibility when
firewall is enabled
Mac OS X firewall
• *Not* enabled by default
• Enable under System Preferences
• Select Sharing
• Click “Firewall” tab
• Click “Start” button
Mac OS X firewall
NUIT Firewall Service
Why Netscreen?
• Comparison of the Big 3
– Hardware vs. Software
– Transparent Mode vs. Routing Mode
– Distributed Management
– Pricing Models
The Process
• A Department requests a FW Consultation
• TNS Organizes a Meeting
• The Department Provides the List of
Machines they want to Protect
• TNS Measures Bandwidth Requirements
• TNS Prepares a FW Proposal
• The Department Makes their Decision
The Process continued...
• TNS Installs the FW in a Passive State
• TNS Logs All Traffic from the Target Hosts
• TNS Develops a Rule Set
• The Department Oks the Rule Set
• TNS Activates the Rule Set
• Everyone's Happy =)
Final Notes
• Rule Management
• Default Allow vs. Default Deny
• Firewalls do NOT Solve the Entire Problem
Additional Information
• Visit the following websites:
• http://www.it.northwestern.edu/reference/firewall/firewall_strategies_wp.html
• http://www.juniper.net/netscreen_com.html

• Or simply email:
[email protected]
[email protected]

You might also like