Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table...

29
Information Security 493

Transcript of Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table...

Page 1: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Information Security 493

Page 2: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or

database type object that is stored in a router or a networked computer.

A routing table utilizes the same idea as one would when using a map in package delivery. Whenever a node needs to send data to another node on a network, it needs to know where to send it.

Page 3: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Routing table & firewallsWhenever a device cannot directly connect to

the destination node, it needs to find another way to send the package. Whenever a node does not know how to send the package it sends an IP packet to a gateway in the LAN.

Page 4: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Routing table & firewallsThe routing table consists of at least three

information fields:-

The network id: i.e. the destination network id.

Metric (cost): i.e. the cost or metric of the path through which the packet is to be sent.

next hop(gateway): The next hop, or gateway, is the address of the next station to which the packet is to be sent on the way to its final destination

Page 5: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Lab 4.1: Examine the Windows Routing Table

Routing tables identify the network destination, netmask, gateway, and interface to use as well as the metric associated with it. For this lab, you’ll look for the presence of a routing table on a Windows-based host (XP or 2000/2003):

1. Open a command prompt by choosing Start Run and enter CMD at the Run prompt.

2. Enter the command route print.

3. If any routing tables exist, active routes are displayed. Carefully look at the display and notice how data is routed between this network and others.

Page 6: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Conti…4. In some versions of Windows, the display

breaks out the active routes and persistent routes. Persistent routes survive a reboot and are always configured. You can make a route persistent by creating it with the –p parameter.

5. Enter the command route. Read the help message displayed, and examine the different parameters available for setting and removing routes.

Page 7: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
Page 8: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

FirewallsA firewall is a part of a computer system or

network that is designed to block unauthorized access while permitting authorized communications.

A firewall's basic task is to regulate some of the flow of traffic between computer networks of different trust levels. Typical examples are the Internet which is a zone with no trust and an internal network which is a zone of higher trust.

Page 9: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Conti…A zone with an intermediate trust level,

situated between the Internet and a trusted internal network, is often referred to as a "perimeter network" or Demilitarized zone (DMZ).

In this lab you will be learning how to turn the firewall on and off on both systems Windows. You will also learn how to view the routing tables of the system and learn how to change entrees in routing table.

Page 10: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Lab 4.2: Turn on the Firewall in Windows XP To turn on the firewall, follow these steps:

1. Right-click the network connection icon in the notification area at the right of the Taskbar.

2. Choose ‘Open network connections’.

3. On the left side of the dialog box, click Change Windows firewall settings.

4. The dialog box that appears is shown in Figure 4.1.

5. Click the On button to enable the firewall, then choose the Exceptions tab and configure any exceptions that you want to allow.

6. Click OK to exit this dialog box and OK to exit the earlier dialog boxes.

Page 11: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
Page 12: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

2nd Method: To turn on the firewall, follow these steps:

1. Choose Start Control Panel Security Center. The dialog box shown in Figure 4.2 appears.

Instead of choosing Security Center in Control Panel, you could choose

Windows Firewall and immediately access the Firewall Configuration dialog box. The advantage of choosing Security Center is that you see the other options that are also available.

2. Toggle the setting for the firewall from Off to On.

3. Exit the Security Center.

4. Exit Control Panel.

Note that from this location, you can toggle the status of the firewall. If the firewall is already turned on, you can follow these same steps to turn it off should you need to.

Page 13: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
Page 14: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Network Security Lab !

Page 15: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Lab 4.3: Work with Performance Monitor and Windows.

Performance Monitor’s objects and counters are specific; you can use Performance Monitor as a general troubleshooting tool as well as a security-troubleshooting tool. For instance, you can see where resources are being utilized and where the activity is coming from. In this lab, you’ll use the Performance Monitor tool to become more familiar with its functionality:

Page 16: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Conti…1. Select Start Run PERFMON.

2. Click the Add Counters button, and choose to add the Processor Performance object.

3. Add the %Processor Time counter, and then click Close.

4. Choose Start Search For Files and Folders and click the Search Now button with- out specifying any particular files to look for. Quickly change to Performance Monitor and watch the impact of this search on the processor. This action is time consuming and therefore will help you notice the changes that take place in Performance Monitor.

Page 17: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Conti…5. Run the same operation again, but this time change

your view within Performance

Monitor to histogram (click the two buttons to the left of the plus sign [+]).

6. Run the same operation again, and change your view within Performance Monitor to report (click the button directly to the left of the plus sign [+]).

7. Exit Performance Monitor.

Page 18: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Make File Extensions Visible in Windows XPBy default, the extensions for known file types do

not appear in many Windows-based operating systems, such as Windows XP. Knowing what the extension is, however, can help you readily identify what type of file it is—executable, document, and so on. To make file extensions visible, follow these steps:

1.

Page 19: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Conti…1. Click Start Control Panel Folder Options.

2. Choose the View tab.

3. Choose the Show Hidden Files and Folders radio button.

4. Deselect the Hide Extensions for Known File Types check box.

5. Click OK and exit from Control Panel. You’ll now be able to see the extensions on file names

Page 20: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Change to WPA Security in Windows XP To change the wireless connection to Wi-Fi

Protected Access (WPA) from any other security setting, follow these steps:

1. Right-click the wireless connection icon in the notification area at the right of the Taskbar.

2. Choose View Available Wireless Networks. 3. On the left side of the dialog box, click

Change Order of Preferred Networks.

Page 21: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Conti…4. Select the Wireless Networks tab and click

on the network you want to change beneath the Preferred Networks section. When it is highlighted, click Properties.

5. On the Association tab, choose either WPA or WPA-PSK (the latter incorporates Pre Shared Key and is recommended if you don’t have a central authentication server) for Network Authentication.

Page 22: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Lab 9.3: View Internet Explorer Security Settings

A great many security threats come through the Internet, and the browser is the interface most commonly used to reach the Internet, making the security settings for the browser critically important. To view the security settings for Internet Explorer, follow these steps:

Page 23: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Conti…1.Within Internet Explorer, click Tools Internet

Options.

2. Choose the Security tab.

3. Chose the Internet icon, and then click the Custom level button.

4. Choose to enable or disable any settings, then click OK to exit.

5. Click OK to exit the Internet Options dialog box.

Page 24: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
Page 25: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Configure the Phishing Filter + Pop-up filterThe checking component of the phishing

filter in Internet Explorer can be turned on or off, or the entire filter can be disabled. To turn on automatic website checking, follow these steps:

1.

Page 26: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Conti…1.Within Internet Explorer, click Tools

Internet Options and choose the advanced tab.

2. Scroll down beneath Settings to Phishing Filter.

3. Click Turn On Automatic Website Checking. And Click Apply.

Page 27: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Conti…4. A message appears telling you that website

addresses will be sent to Microsoft and checked against a database of reported phishing websites. Click OK.

5. Click on the Privacy tap.

6. Check the box that says “turn on Pop-up blocker”, and click OK.

7. Exit the Internet Options.

Page 28: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
Page 29: Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.

Thanks !