Applied Security Lab 2: Personal Firewall



Similar documents
CIS 4361: Applied Security Lab 4

Service Managed Gateway TM. How to Configure a Firewall

Lab - Configure a Windows 7 Firewall

Background: This Lab reinforces the concepts of firewalls by requiring the student to complete the configuration of a host-based firewall.

Lab - Configure a Windows Vista Firewall

Intro to Firewalls. Summary

In this lab you will explore the Windows XP Firewall and configure some advanced settings.

Security threats and network. Software firewall. Hardware firewall. Firewalls

FortKnox Personal Firewall

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at

Lab - Configure a Windows XP Firewall

Virtual Owl. Guide for Windows. University Information Technology Services. Training, Outreach, Learning Technologies & Video Production

Multi-Homing Dual WAN Firewall Router

How to Configure Windows Firewall on a Single Computer

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Basic Firewall Lab. Lab Objectives. Configuration

Lab Configuring Access Policies and DMZ Settings

Firewall Firewall August, 2003

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Firewall. User Manual

Lab Configuring Access Policies and DMZ Settings

SecuraLive ULTIMATE SECURITY

BioWin Network Installation

RemotelyAnywhere Getting Started Guide

ms-help://ms.technet.2005mar.1033/security/tnoffline/security/smbiz/winxp/fwgrppol...

Pre-lab and In-class Laboratory Exercise 10 (L10)

Quick Installation Guide Network Management Card

IIS, FTP Server and Windows

Lab Conducting a Network Capture with Wireshark

Firewall Design Principles Firewall Characteristics Types of Firewalls

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Sophos for Microsoft SharePoint startup guide

TREK HOSC PAYLOAD ETHERNET GATEWAY (HPEG) USER GUIDE

Biznet GIO Cloud Connecting VM via Windows Remote Desktop

Windows Server 2008 R2 Initial Configuration Tasks

1 PC to WX64 direction connection with crossover cable or hub/switch

Ans.: Spam Monitor support all popular programs such as Outlook, Outlook Express, Netscape Mail, Mozilla Mail, Eudora or Opera

GE Intelligent Platforms. Activating Licenses Online Using a Local License Server

WORKING WITH WINDOWS FIREWALL IN WINDOWS 7

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: Rev 6

CNW Re-Tooling Exercises

10 Configuring Packet Filtering and Routing Rules

Changing Your Cameleon Server IP

Troubleshooting Guide

Endpoint Security Console. Version 3.0 User Guide

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

Lab Configure Cisco IOS Firewall CBAC

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Configuring the WT-4 for ftp (Infrastructure Mode)

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

F-Secure Internet Gatekeeper Virtual Appliance

How To Create An Easybelle History Database On A Microsoft Powerbook (Windows)

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Connection and Printer Setup Guide

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]

McAfee.com Personal Firewall

AppLoader 7.7. Load Testing On Windows Azure

Using TS-ACCESS for Remote Desktop Access

The Discovery Series

Setting up Hyper-V for 2X VirtualDesktopServer Manual

Installing and Configuring vcenter Multi-Hypervisor Manager

HP ProLiant DL320 Firewall/VPN/Cache Server User Guide

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Important Notes for WinConnect Server VS Software Installation:

Pearl Echo Installation Checklist

Troubleshooting File and Printer Sharing in Microsoft Windows XP

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

ILTA HANDS ON Securing Windows 7

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

a) Network connection problems (check these for existing installations)

SSL VPN Service. Once you have installed the AnyConnect Secure Mobility Client, this document is available by clicking on the Help icon on the client.

enervista UR Setup Software Quick Connect Instructions:

Using Protection Engine for Cloud Services for URL Filtering, Malware Protection and Proxy Integration Hands-On Lab

Software Installation Requirements

Proxy Server, Network Address Translator, Firewall. Proxy Server

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

If the Domain Controller is running Windows Server 2003, it is strongly advised that the Group Policy Management tool is installed.

Web Application Firewall

Install the Production Treasury Root Certificate (Vista / Win 7)

F-SECURE MESSAGING SECURITY GATEWAY

Configuring Network Load Balancing with Cerberus FTP Server

Installation Instruction STATISTICA Enterprise Server

Lab Editing the HOSTS File in Windows

How to Tunnel Remote Desktop Through SSH on a Windows Computer

Setting Up and Configuring programs to Work with NetOp

Chapter 20. Firewalls

SE 4C03 Winter 2005 An Introduction of Firewall Architectures and Functions. Kevin Law 26 th March,

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Business Model - Create and Thrustling Group Policy in Windows Vista

Firewalls (IPTABLES)

Configuring the Windows XP SP2/Vista Firewall for UserLock

Installation Guide for Windows May 2016

nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances 2006 nappliance Networks, Inc.

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Transcription:

Applied Security Lab 2: Personal Firewall Network Security Tools and Technology: Host-based Firewall/IDS using Sysgate Name: Due Date: Wednesday (March 3, 2010) by 8:00 a.m. Instructions: The Lab 2 Write-up (template for answering lab questions -.doc) can be found on the course website under the Assignment s folder. Lab submissions must be typed using the Lab 2 Write-up template! Lab Write-up s must be uploaded to Blackboard in the Assignment s folder where the laboratory assignment description is located. ALL resources used to complete this assignment must be referenced and sited, this includes, books, articles, websites, etc.) Goals: In this lab you will learn how to: 1. Use a host-based firewall/ids to detect system-level attacks. 2. Learn about the capabilities of firewalls by working with a popular personal firewall Sygate. Background: A simple definition of firewall is a method and/or software or hardware that regulates the level of trust between two networks using hardware, software, or both in combination. Normally, one of these networks is a trusted network such as a corporate LAN, while the other is considered to be untrusted, such as the Internet. There are four primary categories that firewalls fall into: 1. Packet filtering A packet-filtering firewall examines the header of each packet and decides whether to let the packet continue or not based upon a defined set of rules such as source/destination IP address, source/destination port, protocol involved, and so on. 2. Stateful packet inspection A stateful packet firewall takes packet filtering up a notch. SPI firewalls keep a running log of the actions particular packets bring about, where they go, and so on. This allows the current status quo to be monitored for abnormalities, whether it involves a sequence of events or possibly Application-layer data that performs some forbidden action. 3. Application-level proxies A application-level proxy actually serves as a buffer of sorts between incoming data and the system it is trying to access. These firewalls run a portion of the Application-layer code that is coming in and determine whether its behavior is acceptable before letting it pass. However, this type of firewall does incorporate some additional overhead. 4. Circuit-level proxies A circuit-level proxy performs most of the functions of SPI firewalls and application-level proxies, making them the most versatile of the firewall technologies being created today.

In this Lab you will use Sygate Personal Firewall: Sygate Personal Firewall is much more than a user-friendly and advanced personal firewall; it is a bi-directional intrusion defense system. It ensures your personal computer is completely protected from malicious hackers and other intruders while preventing unauthorized access from your computer to a network. In essence, it is designed to make your protected machines invisible to the outside world. That makes it a must-have security measure for any PC that connects to a private network or the public Internet. Once you`ve been compromised, every other network you connect to is at risk; including your home, business and online bank accounts. Procedure: This lab assignment will walk through some common configuration and attack detection and blocking with the trial version of Sygate Personal Firewall. BEFORE STARTING ACTIVITY 1: 1. Start and Log into the VMware Vsphere Client. 2. Make sure BOTH virtual machines are Powered On (cchatmon-baseline AND seagate master). 3. Open the Seagate Master Console. 4. After the Operating System has loaded, Press CTL + Shift + Enter to maximize the window. Activity 1: 1. Click the executable on the desktop entitled: sygate562808.exe. 2. Click Next on the Welcome to the Seagate Personal Firewall Installation Wizard page. 3. Choose I Accept the License Agreement and click Next. 4. Click Next on the destination folder page to accept the default folder. 5. Click Next to begin Installation. 6. Click the Finish button to exit Installation. 7. Click Yes to restart the machine. 8. Once the machine has restarted, click Start -> All Programs -> Sygate Firewall -> Sygate Firewall. 9. Click the Register Later Button.

**Sygate Personal Firewall allows users to see the actual traffic moving through your network. It also allows you to see a graph which displays Attack History. An example is shown in Figure 1.** Activity 2: Figure 1: Sygate Alert Window 1. Name three applications currently running on the machine. Test the Settings of the Sygate Firewall by: 2. Clicking Start -> Run -> Type cmd into the drop down box -> Click OK to open the 3. Type -> ping 192.168.10.2 -> Press Enter 4. Did an error message display on the screen? If yes, Click on Details. What is the connection origin? What is the Protocol? What is the Local Address?

What is the ICMP Type? What is the Remote Address? 5. Click No to close the dialog box. (If the dialog box appears again click No). 6. Click Security located on the Menu Bar and Select Allow All. Test this setting by: 7. Clicking Start -> Run -> Type cmd into the drop down box -> Click OK to open the 8. Type -> ping 192.168.10.2 -> Press Enter 9. Did you receive a Reply in the Command Prompt window? From What IP Address? How Many Packets? 10. Close the Command Prompt Window and Return to the Sygate Personal Firewall. 11. Click Security located on the Menu Bar and Select Block All. 12. Select Yes to continue. Test this setting by: 13. Clicking Start -> Run -> Type cmd into the drop down box -> Click OK to open the 14. Type -> ping 192.168.10.2 -> Press Enter. What message did you receive in the Command Prompt Window?

Outside Research Questions (Answer the following questions IN YOUR OWN WORDS by conducting research using the internet, books, etc.) 1. What is a ping request/message? 2. How does a firewall work? 3. What is the main difference between host and network based firewalls? 4. What is the name of the standard firewall loaded on Windows operating systems? 5. Is it possible to run more than one personal firewall on your computer? If not, why? 6. Does a firewall remove viruses from your computer? 7. What is the command that you should type at the command prompt to find your IP address? 8. What is IP spoofing?