Building Your Own Firewall
Building Your Own Firewall
Chapter 10
Learning Objectives
List and define the two categories of
firewalls
Explain why desktop firewalls are used
Explain how enterprise firewalls work
Desktop firewall
Enterprise Firewall
Desktop Firewalls
Have generally replaced hardware firewalls
for protection of a single device
Intercept and inspect all data that enters or
leaves the computer
Traffic can generally be blocked by IP
address, port address, or application
Protects against rogue access points and
worms
Desktop Firewalls
Desktop Firewalls
Help protect network by providing
additional level of security at each network
device
Recent increase in popularity
Popular desktop firewalls
Firewall Engine
Performs stateful packet inspection
Filters network activity based on TCP/IP protocol
Supports rules that link to specific applications
(Application Filter)
Ensures that an application program on the
computer is the real program and not a Trojan
horse
Checksums
Sandbox Technology
Protects resources
Device drivers
Registry database that contains all
configurations of the computer
File system
Sandbox Technology
Protects against active content programs
being used to perform:
Sandbox Objects
Sygate Firewalls
Protect corporate networks and desktop systems
from intrusion
Prevent malicious attackers from gaining control
of corporate information network
Range in design from enterprise-based security
systems to personal firewall systems
Secure Enterprise
Personal Firewall Pro
ZoneAlarm Firewalls
Bi-directional; provide protection from incoming
and outgoing traffic
Pop-up windows alert users to intrusion attempts
Four interlocking security services
Firewall
Application Control
Internet Lock
Zones
ZoneAlarm Firewall
ZoneAlarm Firewall
ZoneAlarm Firewall
Uses fingerprints to
identify components
of a program as well
as the program itself
Prevents malicious
code from gaining
control of computer
Stops potentially
malicious active
content
ZoneAlarm Firewall
Application Control
Internet Lock
Zones
Zone Security
Enterprise Firewalls
Still perform bulk of the work in protecting
a network
First line of defense in a security
management plan
Provide perimeter security
Allow security managers to log attacks that
strike the network
Linksys
Offers a wide variety of routers, hubs,
wireless access points, firewalls, and other
networking hardware
Produces solid products that provide strong
security and are easy to set up and use
Linksys Firewall/Router
Comes in a variety of configurations
Good solutions for connecting a group of
computers to a high-speed broadband
Internet connection or to a 10/100 Ethernet
backbone and also support VPN
Linksys Firewall/Router
Features an advanced stateful packet
inspection firewall
Does not block transmissions based on the
application
Supports system traffic logging and event
logging
Multilayer firewall
Web cache server
Multihomed Server
Outgoing requests
1. Packet filters
2. Web publishing
rules
3. Routing rules
4. Bandwidth rules
1. Bandwidth rules
2. Protocol rules
3. Site and content
rules
4. Routing rules
5. Packet filters
Chapter Summary
Types of firewalls currently available for
enterprise, small office home office
(SOHO), and single computer protection
Features of these firewalls that provide the
necessary protection to help keep a network
or computer secure