| |
| |
Introduction | |
| |
| |
| |
Introduction to Firewalls3 | |
| |
| |
| |
Introduction to Firewalls What Is a Firewall? What Can Firewalls Do? | |
| |
| |
Firewalls Manage and Control Network Traffic | |
| |
| |
Firewalls Authenticate Access | |
| |
| |
Firewalls Act as an Intermediary | |
| |
| |
Firewalls Protect Resources | |
| |
| |
Firewalls Record and Report on Events What Are the Threats? | |
| |
| |
Targeted Versus Untargeted Attacks | |
| |
| |
Viruses, Worms, and Trojans | |
| |
| |
Malicious Content and Malware | |
| |
| |
Denial of Service | |
| |
| |
Zombies | |
| |
| |
Compromise of Personal Information and Spyware | |
| |
| |
Social Engineering | |
| |
| |
New Attack Vectors | |
| |
| |
Insecure/Poorly Designed Applications What Are the Motives? Security Policies | |
| |
| |
Examples of Security Policies | |
| |
| |
Firewalls and Trust Determining If You Need a Firewall Summary | |
| |
| |
| |
Firewall Basics Firewall Taxonomy | |
| |
| |
Personal Firewalls | |
| |
| |
Network Firewalls Firewall Products | |
| |
| |
Software Firewalls | |
| |
| |
Appliance Firewalls | |
| |
| |
Integrated Firewalls Firewall Technologies | |
| |
| |
Personal Firewalls | |
| |
| |
Packet Filters | |
| |
| |
NAT Firewalls | |
| |
| |
Circuit-Level Firewalls | |
| |
| |
Proxy Firewalls | |
| |
| |
Stateful Firewalls | |
| |
| |
Transparent Firewalls | |
| |
| |
Virtual Firewalls Open and Closed Source Firewalls Summary | |
| |
| |
| |
TCP/IP for Firewalls Protocols, Services, and Applications | |
| |
| |
The OSI Model | |
| |
| |
The Department of Defense (DoD) Model | |
| |
| |
How Firewalls Use Protocols, Applications, and Services Internet Protocol (IP) | |
| |
| |
IP Packet Structure | |
| |
| |
The IP Packet Header | |
| |
| |
Bad IP Packets Transmission Control Protocol (TCP) | |
| |
| |
TCP Segment Structure | |
| |
| |
TCP Segment Header | |
| |
| |
Bad TCP User Datagram Protocol (UDP) | |
| |
| |
UDP Message Structure | |
| |
| |
UDP Datagram Header | |
| |
| |
Bad UDP Internet Control Message Protocol (ICMP) | |
| |
| |
ICMP Message Structure | |
| |
| |
Bad ICMP Addressing in IP Networks | |
| |
| |
Physical Addresses | |
| |
| |
Logical Addresses | |
| |
| |
IP Addressing | |
| |
| |
Subnets | |
| |
| |
IPv6 Network Address Translation (NAT) NAT Implementations | |
| |
| |
NAT and IPsec: The Issues and the Solutions Broadcast and Multicast IP Services IP Routing | |
| |
| |
Types of Routing | |
| |
| |
How the IP Routing Process Works | |
| |
| |
Different Classes of Routing Protocols | |
| |
| |
Common Routing Protocols Applications Using IP | |
| |
| |
Common Applications Using IP | |
| |
| |
Less-Common Applications Using IP | |
| |
| |
Protocols Used to Implement Security Summary | |
| |
| |
| |
How Firewalls Work | |
| |
| |
| |
Personal Firewalls: Windows Firewall and Trend Micros PC-cillin Windows Firewall and Windows XP | |
| |
| |
How Windows Firewall Works | |
| |
| |
Configuring Windows Firewall | |
| |
| |
Windows Firewall Features | |
| |
| |
Windows Firewall Checklist Trend Micros PC-cillin Firewall Feature | |
| |
| |
PC-cillin Requirements | |
| |
| |
How the Trend Micro Firewall Works | |
| |
| |
Configuring the Trend Micro Firewall | |
| |
| |
Trend Micro Firewall Features | |
| |
| |
Trend Micro Firewall Checklist Summary | |
| |
| |
| |
Broadband Routers and Firewalls How Broadband Routers and Firewalls Work Linksys Broadband Routers/Firewalls | |
| |
| |
Security and Filtering Features | |
| |
| |
Routing Features | |
| |
| |
Management and Administration Features | |
| |
| |
Miscellaneous Features Linksys Requirements How the Linksys Router/Firewall Works | |