UNIVERSITY OF BOLTON SCHOOL OF CREATIVE TECHNOLOGIES COMPUTER AND NETWORK SECURITY SEMESTER TWO EXAMINATIONS 2016/2017 NETWORK SECURITY

Size: px
Start display at page:

Download "UNIVERSITY OF BOLTON SCHOOL OF CREATIVE TECHNOLOGIES COMPUTER AND NETWORK SECURITY SEMESTER TWO EXAMINATIONS 2016/2017 NETWORK SECURITY"

Transcription

1 [CRT03] UNIVERSITY OF BOLTON SCHOOL OF CREATIVE TECHNOLOGIES COMPUTER AND NETWORK SECURITY SEMESTER TWO EXAMINATIONS 2016/2017 NETWORK SECURITY MODULE NO: CPU6004 Date: Tuesday 16 th May 2017 Time: 14:00-16:00 INSTRUCTIONS TO CANDIDATES: There are SIX questions on this paper. Answer FOUR questions. All questions carry equal marks.

2 Page 2 of 11 Question 1 1. modprobe ip_conntrack iptables -P INPUT ACCEPT iptables -P FORWARD DROP iptables -P OUTPUT ACCEPT iptables -A FORWARD -i p2p1 -o p8p1 -s /24 -p tcp --dport 80 -j ACCEPT iptables -A FORWARD -i p8p1 -o p2p1 -d /24 -p tcp --sport 80 -j ACCEPT iptables -A FORWARD -i eth1 -o p8p1 -s /24 -j ACCEPT iptables -A FORWARD -i p8p1 -o eth1 -p tcp --dport 80 -j ACCEPT iptables -t nat -A PREROUTING -i p8p1 -p tcp --dport 80 -j DNAT --to-destination :80 iptables -t nat -A POSTROUTING -o p8p1 -s /24 -j SNAT --to-source echo 1 > /proc/sys/net/ipv4/ip_forward Illustration 1: Network Topology Diagram - Larger version on Appendix A 1 Using the iptables rules and topology diagram above, provide a detailed analysis of each of the rules shown in the context of the traversal of a packet through the firewall discussing the appropriate tables and chains in each of the rules. (25 marks) Question 2

3 Page 3 of 11 2a/ You have a web server located within your DMZ and you are getting reports that it is not responding to request for pages. You undertake some network investigation and observe that you are currently under attack. Using Wireshark you have captured a number of packets to aid you with the analysis of the attack as shown in Illustration 2 below (larger version in Appendix B). Illustration 2: Packet Capture of suspected attack - Larger version in Appendix B i) Identify the attack being undertaken (2 marks) ii) Discuss the nature of the attack and how it is constructed iii) Provide details of how this kind of attack can be mitigated. (8 marks) (8 marks) 2b/ Outline the concept of stateful filtering (stateful packet inspection) and explain why configuring stateful filtering can reduce the number of ports open to attack. (7 marks)

4 Page 4 of 11 Question 3 3a/ Saltzer and Schroeder s Principles discussed several principles that relate to information security. Most of these principles are still applied in today s computing infrastructure. Discuss what is meant by the term Fail-Safe Defaults and provide an example in relation to computer security. (9 Marks) 3b/ Outline the concept of defence-in-depth in the context of network security then explain what approach to security could be used in this context. Give examples of the types of security appliances or security software you would employ to protect a network and indicate with the aid of a diagram where these would be located. (16 marks)

5 Page 5 of 11 Question 4 4a/ Illustration 3: Network Topology Diagram - larger version in Appendix A In the above diagram the DMZ network has address /24 and the Internal network has the address /24. The address of the firewall s external interface is The Web server in the DMZ ( ) is accessible to clients on the Internet. A network analyzer is monitoring all the interfaces on the firewall FW. State why NAT is necessary in this situation and identify the type of NAT which would be used. In your answer booklet complete the table below to show source and destination IP addresses and port numbers of the incoming and outgoing packets associated with a connection from a host with IP address on the Internet to the Web server in the DMZ as seen by the network analyzer. (You should choose representative values for the client source port numbers.) (19 marks) Question 4a continues over the page.

6 Page 6 of 11 Question 4a continued. For Incoming Packets entering the firewall Destination IP Address Destination Port No. Source IP Address Source Port No. For Incoming Packets leaving the firewall Destination IP Address Destination Port No. Source IP Address Source Port No. For Outgoing Packets entering the firewall Source IP Address Source Port No. Destination IP Address Destination Port No. For Outgoing Packets leaving the firewall Source IP Address Source Port No. Destination IP Address Destination Port No. 4b/ What is masquerading, under what circumstances would you use it and, suggest any advantages and disadvantages of the technique? (6 marks)

7 Page 7 of 11 Question 5 5a/ Unstructured attacks come from inexperienced individuals typically using automated attack tools downloaded from the Internet, referred to as 'Script Kiddies' in the security profession. Contrast the unstructured attack with that of a structured attack using a case study to aid your discussions. (19 marks) 5b/ When undertaking authorised penetration testing using a Black box model staff do not know about the test nor is the tester given details about network. One of the first steps that the penetration tester must undertake is information gathering. Identify at least three elements of the information gathering phase and the kind of data that might be gathered by each one. (6 marks)

8 Page 8 of 11 Question 6 6a/ In terms of computer security provide an overview of what a baseline is. (4 marks) 6b/ Within SELinux there are 3 modes of operation. Discuss briefly each of these modes of operation. (6 marks) 6c/ A system administrator has moved over a recently created index.html file from the home directory of a web developer to document root directory of the companies web server using the following command mv /home/devops/content* /var/www/html The web server is correctly configured, however access to the index.html file is forbidden as shown in Illustration 4. Illustration 4: Browser Error returned from attempting to access developers web page. After checking the system logs the systems administrator has identified that this error relates to the mandatory access control provided by SELinux. Investigating further, the systems administrator identifies the issue based upon the output from the ls Z /var/www/html command as shown in Illustration 5. Illustration 5: Output from the ls -Z command Question 6c continues over the page.

9 Page 9 of 11 Question 6c continued. Using the information provided above: i) Identify the cause of the problem and how it could have been prevented. (5 marks) ii) Develop and document the solution to the problem discuss each of the actions that you have chosen. (10 marks) END OF QUESTIONS APPENDIX A & B CAN BE FOUND OVER THE PAGE.

10 Page 10 of 11 Appendix A - Illustration 1

11 Page 11 of 11 Appendix B - Illustration 2

UNIVERSITY OF BOLTON SCHOOL OF CREATIVE TECHNOLOGIES COMPUTER NETWORKS AND SECURITY SEMESTER TWO EXAMINATIONS 2017/2018 NETWORK SECURITY

UNIVERSITY OF BOLTON SCHOOL OF CREATIVE TECHNOLOGIES COMPUTER NETWORKS AND SECURITY SEMESTER TWO EXAMINATIONS 2017/2018 NETWORK SECURITY [CRT11] UNIVERSITY OF BOLTON SCHOOL OF CREATIVE TECHNOLOGIES COMPUTER NETWORKS AND SECURITY SEMESTER TWO EXAMINATIONS 2017/2018 NETWORK SECURITY MODULE NO: CPU6004 Date: Tuesday 22 nd May 2018 Time: 14:00

More information

Università Ca Foscari Venezia

Università Ca Foscari Venezia Firewalls Security 1 2018-19 Università Ca Foscari Venezia www.dais.unive.it/~focardi secgroup.dais.unive.it Networks are complex (image from https://netcube.ru) 2 Example: traversal control Three subnetworks:

More information

Introduction to Firewalls using IPTables

Introduction to Firewalls using IPTables Introduction to Firewalls using IPTables The goal of this lab is to implement a firewall solution using IPTables, and to write and to customize new rules to achieve security. You will need to turn in your

More information

Assignment 3 Firewalls

Assignment 3 Firewalls LEIC/MEIC - IST Alameda LEIC/MEIC IST Taguspark Network and Computer Security 2013/2014 Assignment 3 Firewalls Goal: Configure a firewall using iptables and fwbuilder. 1 Introduction This lab assignment

More information

Firewalls. Firewall types. Packet filter. Proxy server. linux, iptables-based Windows XP s built-in router device built-ins single TCP conversation

Firewalls. Firewall types. Packet filter. Proxy server. linux, iptables-based Windows XP s built-in router device built-ins single TCP conversation Firewalls Firewall types Packet filter linux, iptables-based Windows XP s built-in router device built-ins single TCP conversation Proxy server specialized server program on internal machine client talks

More information

Network Address Translation

Network Address Translation Claudio Cicconetti International Master on Communication Networks Engineering 2006/2007 Network Address Translation (NAT) basically provides a mapping between internal (i.e.,

More information

Certification. Securing Networks

Certification. Securing Networks Certification Securing Networks UNIT 9 Securing Networks 1 Objectives Explain packet filtering architecture Explain primary filtering command syntax Explain Network Address Translation Provide examples

More information

The Research and Application of Firewall based on Netfilter

The Research and Application of Firewall based on Netfilter Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 1231 1235 2012 International Conference on Solid State Devices and Materials Science The Research and Application of Firewall based

More information

11 aid sheets., A non-programmable calculator.

11 aid sheets., A non-programmable calculator. UNIVERSITY OF TORONTO MISSISSAUGA DECEMBER 2008 FINAL EXAMINATION CSC 347H5F Introduction to Information Security Arnold Rosenbloom Duration 3 hours Aids: Two double sided 8 1 2 11 aid sheets., A non-programmable

More information

Network security Exercise 9 How to build a wall of fire Linux Netfilter

Network security Exercise 9 How to build a wall of fire Linux Netfilter Network security Exercise 9 How to build a wall of fire Linux Netfilter Tobias Limmer Computer Networks and Communication Systems Dept. of Computer Sciences, University of Erlangen-Nuremberg, Germany 2.2.

More information

Firewalls. October 13, 2017

Firewalls. October 13, 2017 Firewalls October 13, 2017 Administrative submittal instructions answer the lab assignment s questions in written report form, as a text, pdf, or Word document file (no obscure formats please) email to

More information

TP5 Sécurité IPTABLE. * :sunrpc, localhost :domain,* :ssh, localhost :smtp, localhost:953,*: Tous sont des protocoles TCP

TP5 Sécurité IPTABLE. * :sunrpc, localhost :domain,* :ssh, localhost :smtp, localhost:953,*: Tous sont des protocoles TCP TP5 Sécurité IPTABLE Routage classique Q1) Sur la machiine FIREWALL, les services actifs sont : Netstat -a * :sunrpc, localhost :domain,* :ssh, localhost :smtp, localhost:953,*:53856. Tous sont des protocoles

More information

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING PATHWAYS SEMESTER TWO EXAMINATION 2017/2018 NETWORK MANAGEMENT MODULE NO: CPU6009

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING PATHWAYS SEMESTER TWO EXAMINATION 2017/2018 NETWORK MANAGEMENT MODULE NO: CPU6009 UNIVERSITY OF BOLTON [CRT10] CREATIVE TECHNOLOGIES COMPUTING PATHWAYS SEMESTER TWO EXAMINATION 2017/2018 NETWORK MANAGEMENT MODULE NO: CPU6009 Date: Thursday 24 th May 2018 Time: 14:00 16:00 INSTRUCTIONS

More information

A Technique for improving the scheduling of network communicating processes in MOSIX

A Technique for improving the scheduling of network communicating processes in MOSIX A Technique for improving the scheduling of network communicating processes in MOSIX Rengakrishnan Subramanian Masters Report, Final Defense Guidance by Prof. Dan Andresen Agenda MOSIX Network communicating

More information

CIS 192 Linux Lab Exercise

CIS 192 Linux Lab Exercise CIS 192 Linux Lab Exercise Lab 5: Firewalls and Network Address Translation (NAT) Spring 2009 Lab 5: Firewalls and Network Address Translation (NAT) The purpose of this lab is to exercise the use of iptables

More information

Netfilter. Fedora Core 5 setting up firewall for NIS and NFS labs. June 2006

Netfilter. Fedora Core 5 setting up firewall for NIS and NFS labs. June 2006 Netfilter Fedora Core 5 setting up firewall for NIS and NFS labs June 2006 Netfilter Features Address Translation S NAT, D NAT IP Accounting and Mangling IP Packet filtering (Firewall) Stateful packet

More information

Written by Muhammad Kamran Azeem Wednesday, 02 July :48 - Last Updated Saturday, 25 December :45

Written by Muhammad Kamran Azeem Wednesday, 02 July :48 - Last Updated Saturday, 25 December :45 Assalam-u-alaikum, I have been receiving many mails for few years now to provide with a firewall script. Lately I received one such mail and I decided to publish, what I replied him with. The names and

More information

Firewalls. IT443 Network Security Administration Slides courtesy of Bo Sheng

Firewalls. IT443 Network Security Administration Slides courtesy of Bo Sheng Firewalls IT443 Network Security Administration Slides courtesy of Bo Sheng 1 Internet Security Mechanisms Prevent: Firewall, IPsec, SSL Detect: Intrusion Detection Survive/ Response: Recovery, Forensics

More information

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING WITH WEBSITE DEVELOPMENT SEMESTER ONE EXAMINATIONS 2018/2019 UNIX MODULE NO: CPU5003

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING WITH WEBSITE DEVELOPMENT SEMESTER ONE EXAMINATIONS 2018/2019 UNIX MODULE NO: CPU5003 [CRT08] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING WITH WEBSITE DEVELOPMENT SEMESTER ONE EXAMINATIONS 2018/2019 UNIX MODULE NO: CPU5003 Date: Wednesday 16 th January 2019 Time: 10:00 12:00 INSTRUCTIONS

More information

Dual-stack Firewalling with husk

Dual-stack Firewalling with husk Dual-stack Firewalling with husk Phil Smith linux.conf.au Perth 2014 1 Phil Smith SysAdmin from Melbourne Personal Care Manufacturer Implemented complete Dual-stack Previous role in managed security 4WD'ing

More information

sottotitolo A.A. 2016/17 Federico Reghenzani, Alessandro Barenghi

sottotitolo A.A. 2016/17 Federico Reghenzani, Alessandro Barenghi Titolo presentazione Piattaforme Software per la Rete sottotitolo Firewall and NAT Milano, XX mese 20XX A.A. 2016/17, Alessandro Barenghi Outline 1) Packet Filtering 2) Firewall management 3) NAT review

More information

Definition of firewall

Definition of firewall Internet Firewalls Definitions: firewall, policy, router, gateway, proxy NAT: Network Address Translation Source NAT, Destination NAT, Port forwarding NAT firewall compromise via UPnP/IGD Packet filtering

More information

Loadbalancer.org Virtual Appliance quick start guide v6.3

Loadbalancer.org Virtual Appliance quick start guide v6.3 Loadbalancer.org Virtual Appliance quick start guide v6.3 What are your objectives?...2 What is the difference between a one-arm and a two-arm configuration?...2 What are the different load balancing methods

More information

Worksheet 8. Linux as a router, packet filtering, traffic shaping

Worksheet 8. Linux as a router, packet filtering, traffic shaping Worksheet 8 Linux as a router, packet filtering, traffic shaping Linux as a router Capable of acting as a router, firewall, traffic shaper (so are most other modern operating systems) Tools: netfilter/iptables

More information

IPtables and Netfilter

IPtables and Netfilter in tables rely on IPtables and Netfilter Comp Sci 3600 Security Outline in tables rely on 1 2 in tables rely on 3 Linux firewall: IPtables in tables rely on Iptables is the userspace module, the bit that

More information

3. Both machines are connected physically using a ethernet cable.

3. Both machines are connected physically using a ethernet cable. Name: Aniruddh Rao K Roll Num: 133079005 Collaborator: Gaurang Naik The setup used to implement part 1 and part 2 of PA3 1. A machine C with a physical interface eth0 : IP address 10.129.5.195. Machines

More information

Firewall Management With FireWall Synthesizer

Firewall Management With FireWall Synthesizer Firewall Management With FireWall Synthesizer Chiara Bodei 1, Pierpaolo Degano 1, Riccardo Focardi 2, Letterio Galletta 1, Mauro Tempesta 2, and Lorenzo Veronese 2 1 Dipartimento di Informatica, Università

More information

ECE 435 Network Engineering Lecture 23

ECE 435 Network Engineering Lecture 23 ECE 435 Network Engineering Lecture 23 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 30 November 2017 HW#11 will be posted Announcements Don t forget projects next week Presentation

More information

Firewalls N E T W O R K ( A N D D ATA ) S E C U R I T Y / P E D R O B R A N D Ã O M A N U E L E D U A R D O C O R R E I A

Firewalls N E T W O R K ( A N D D ATA ) S E C U R I T Y / P E D R O B R A N D Ã O M A N U E L E D U A R D O C O R R E I A Firewalls N E T W O R K ( A N D D ATA ) S E C U R I T Y 2 01 6 / 2 017 P E D R O B R A N D Ã O M A N U E L E D U A R D O C O R R E I A Slides are based on slides by Dr Lawrie Brown (UNSW@ADFA) for Computer

More information

This material is based on work supported by the National Science Foundation under Grant No

This material is based on work supported by the National Science Foundation under Grant No Source: http://en.wikipedia.org/wiki/file:firewall.png This material is based on work supported by the National Science Foundation under Grant No. 0802551 Any opinions, findings, and conclusions or recommendations

More information

Firewalls. Content. Location of firewalls Design of firewalls. Definitions. Forwarding. Gateways, routers, firewalls.

Firewalls. Content. Location of firewalls Design of firewalls. Definitions. Forwarding. Gateways, routers, firewalls. Firewalls INFO 404 - Lecture 10 31/03/2009 nfoukia@infoscience.otago.ac.nz Credit: Cameron Kerr : ckerr@cs.otago.ac.nz Definitions Content Gateways, routers, firewalls Location of firewalls Design of firewalls

More information

Stateless Firewall Implementation

Stateless Firewall Implementation Stateless Firewall Implementation Network Security Lab, 2016 Group 16 B.Gamaliel K.Noellar O.Vincent H.Tewelde Outline : I. Enviroment Setup II. Today s Task III. Conclusion 2 Lab Objectives : After this

More information

Distributed Systems Security

Distributed Systems Security Distributed Systems Security Lab Assignments Module I IT Security Group (SeTI) Guillermo Suarez de Tangil (guillermo.suarez.tangil@uc3m.es) Remembering Server should offer: Web application (Fakebook) Remote

More information

UNIVERSITY OF BOLTON SCHOOL OF CREATIVE TECHNOLOGIES COMPUTING PATHWAYS SEMESTER TWO EXAMINATION 2016/2017 NETWORK MANAGEMENT MODULE NO: CPU6009

UNIVERSITY OF BOLTON SCHOOL OF CREATIVE TECHNOLOGIES COMPUTING PATHWAYS SEMESTER TWO EXAMINATION 2016/2017 NETWORK MANAGEMENT MODULE NO: CPU6009 UNIVERSITY OF BOLTON [CRT06] SCHOOL OF CREATIVE TECHNOLOGIES COMPUTING PATHWAYS SEMESTER TWO EXAMINATION 2016/2017 NETWORK MANAGEMENT MODULE NO: CPU6009 Date: Thursday 18 th May 2017 Time: 14:00 16:00

More information

THE INTERNET PROTOCOL INTERFACES

THE INTERNET PROTOCOL INTERFACES THE INTERNET PROTOCOL The Internet Protocol Stefan D. Bruda Winter 2018 A (connectionless) network protocol Designed for use in interconnected systems of packet-switched computer communication networks

More information

The Internet Protocol

The Internet Protocol The Internet Protocol Stefan D. Bruda Winter 2018 THE INTERNET PROTOCOL A (connectionless) network layer protocol Designed for use in interconnected systems of packet-switched computer communication networks

More information

Communication protocols and services

Communication protocols and services This chapter describes various protocols and that may be enabled on Modberry. SSH Connection SSH service is started up on boot and already preinstalled and configured. You may access your device through

More information

Load Balancing Web Proxies / Filters / Gateways. Deployment Guide v Copyright Loadbalancer.org

Load Balancing Web Proxies / Filters / Gateways. Deployment Guide v Copyright Loadbalancer.org Load Balancing Web Proxies / Filters / Gateways Deployment Guide v1.6.5 Copyright Loadbalancer.org Table of Contents 1. About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org

More information

NDN iptables match extension

NDN iptables match extension NDN iptables match extension L. Bracciale, A. Detti, P. Loreti, G. Rossi, N. Blefari Melazzi May 3, 2017 This module implements a match extension for netfilter 1 to match only certain NDN packets according

More information

Computer Security Spring Firewalls. Aggelos Kiayias University of Connecticut

Computer Security Spring Firewalls. Aggelos Kiayias University of Connecticut Computer Security Spring 2008 Firewalls Aggelos Kiayias University of Connecticut Idea: Monitor inbound/ outbound traffic at a communication point Firewall firewall Internet LAN A firewall can run on any

More information

PVS Deployment in the Cloud. Last Updated: June 17, 2016

PVS Deployment in the Cloud. Last Updated: June 17, 2016 PVS Deployment in the Cloud Last Updated: June 17, 2016 Contents Amazon Web Services Introduction 3 Software Requirements 4 Set up a NAT Gateway 5 Install PVS on the NAT Gateway 11 Example Deployment 12

More information

COSC 301 Network Management

COSC 301 Network Management COSC 301 Network Management Lecture 21: Firewalls & NAT Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 21: Firewalls & NAT 1 Today s Focus How to protect an intranet? -- Firewall --

More information

Network and Filesystem Security

Network and Filesystem Security Network and Filesystem Security Powell Molleti powell@in.ibm.com 1 Agenda Netfilter and TCP Wrappers for Network Security including SNORT for NIDS and tools for checking network vulnerabilities Filesystem

More information

Load Balancing Bloxx Web Filter. Deployment Guide v Copyright Loadbalancer.org

Load Balancing Bloxx Web Filter. Deployment Guide v Copyright Loadbalancer.org Load Balancing Bloxx Web Filter Deployment Guide v1.3.5 Copyright Loadbalancer.org Table of Contents 1. About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org Software Versions

More information

Linux System Administration, level 2

Linux System Administration, level 2 Linux System Administration, level 2 IP Tables: the Linux firewall 2004 Ken Barber Some Rights Reserved This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike License. To

More information

Some of the slides borrowed from the book Computer Security: A Hands on Approach by Wenliang Du. Firewalls. Chester Rebeiro IIT Madras

Some of the slides borrowed from the book Computer Security: A Hands on Approach by Wenliang Du. Firewalls. Chester Rebeiro IIT Madras Some of the slides borrowed from the book Computer Security: A Hands on Approach by Wenliang Du Firewalls Chester Rebeiro IIT Madras Firewall Block unauthorized traffic flowing from one network to another

More information

1.3 Analyzing the performance of various configurations and protocols

1.3 Analyzing the performance of various configurations and protocols 1.3 Analyzing the performance of various configurations and protocols Original TCP versus the above modified one: To compare the performance between the operation of TCP with congestion control and the

More information

ECE 435 Network Engineering Lecture 23

ECE 435 Network Engineering Lecture 23 ECE 435 Network Engineering Lecture 23 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 4 December 2018 Announcements HW#9 graded Don t forget projects next week Presentation schedule

More information

Firewalls, VPNs, and SSL Tunnels

Firewalls, VPNs, and SSL Tunnels Chapter 20 Firewalls, VPNs, and SSL Tunnels IN THIS CHAPTER Using a packet-filtering firewall Using Squid as a firewall Using FreeS/Wan A FIREWALL IS A device that implements your security policy by shielding

More information

CTX118175 - How to Configure XenDesktop behind Network Address Translation -... 페이지 1 / 11 Knowledge Center Communities Sup Alerts Sign in How to Configure XenDesktop behind Network Address Translation

More information

Quick Note 05. Configuring Port Forwarding to access an IP camera user interface on a TransPort LR54. 7 November 2017

Quick Note 05. Configuring Port Forwarding to access an IP camera user interface on a TransPort LR54. 7 November 2017 Quick Note 05 Configuring Port Forwarding to access an IP camera user interface on a TransPort LR54 7 November 2017 Contents 1 Introduction... 3 1.1 Outline... 3 1.2 Assumptions... 3 1.3 Corrections...

More information

Network Security Fundamentals

Network Security Fundamentals Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 6 Firewalls & VPNs Topics Firewall Fundamentals Case

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University Name.............................. ID............... Section...... Seat No...... Sirindhorn International Institute of Technology Thammasat University Course Title: IT Security Instructor: Steven Gordon

More information

Horizon DaaS Platform 6.1 Service Provider Installation - vcloud

Horizon DaaS Platform 6.1 Service Provider Installation - vcloud Horizon DaaS Platform 6.1 Service Provider Installation - vcloud This guide provides information on how to install and configure the DaaS platform Service Provider appliances using vcloud discovery of

More information

Security and network design

Security and network design Security and network design Remco Hobo January 18, 2005 Nessus scan of own system Nessus is a program which can scan a computer for vunerabilities. It uses a unix server to scan from. The client, which

More information

Loadbalancer.org. Loadbalancer.org appliance quick setup guide. v6.4

Loadbalancer.org. Loadbalancer.org appliance quick setup guide. v6.4 Loadbalancer.org Loadbalancer.org appliance quick setup guide v6.4 1 Confidentiality Statement All information contained in this proposal is provided in confidence for the sole purpose of adjudication

More information

This guide provides a quick reference for setting up SIP load balancing using Loadbalancer.org appliances.

This guide provides a quick reference for setting up SIP load balancing using Loadbalancer.org appliances. Load Balancing SIP Quick Reference Guide V1.4.4 About this Guide This guide provides a quick reference for setting up SIP load balancing using Loadbalancer.org appliances. SIP Ports Port Description Protocol

More information

THE INTERNET PROTOCOL/1

THE INTERNET PROTOCOL/1 THE INTERNET PROTOCOL a (connectionless) network layer protocol designed for use in interconnected systems of packet-switched computer communication networks (store-and-forward paradigm) provides for transmitting

More information

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING PATHWAYS SEMESTER ONE EXAMINATION 2015/2016 ROUTING FUNDAMENTALS MODULE NO: CPU5010

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING PATHWAYS SEMESTER ONE EXAMINATION 2015/2016 ROUTING FUNDAMENTALS MODULE NO: CPU5010 UNIVERSITY OF BOLTON [CRT13] CREATIVE TECHNOLOGIES COMPUTING PATHWAYS SEMESTER ONE EXAMINATION 2015/2016 ROUTING FUNDAMENTALS MODULE NO: CPU5010 Date: 12 th January 2016 Time: 10:00-12:00 INSTRUCTIONS

More information

Packet Filtering and NAT

Packet Filtering and NAT Packet Filtering and NAT Alessandro Barenghi Dipartimento di Elettronica e Informazione Politecnico di Milano barenghi - at - elet.polimi.it May 14, 2014 Lesson contents Overview Netfilter/Iptables Structure

More information

Virtuozzo DevOps. Installation Guide

Virtuozzo DevOps. Installation Guide Virtuozzo DevOps Installation Guide May 03, 2017 Parallels International GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 http://www.virtuozzo.com Copyright

More information

NAT and Tunnels. Alessandro Barenghi. May 25, Dipartimento di Elettronica e Informazione Politecnico di Milano barenghi - at - elet.polimi.

NAT and Tunnels. Alessandro Barenghi. May 25, Dipartimento di Elettronica e Informazione Politecnico di Milano barenghi - at - elet.polimi. NAT and Tunnels Alessandro Barenghi Dipartimento di Elettronica e Informazione Politecnico di Milano barenghi - at - elet.polimi.it May 25, 2011 Recap By now, you should be familiar with... System administration

More information

Linux. Sirindhorn International Institute of Technology Thammasat University. Linux. Firewalls with iptables. Concepts. Examples

Linux. Sirindhorn International Institute of Technology Thammasat University. Linux. Firewalls with iptables. Concepts. Examples Linux Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 14 October 2013 Common/Reports/-introduction.tex, r715 1/14 Contents 2/14 Linux, netfilter and netfilter:

More information

Grandstream Networks, Inc. GWN Firewall Features Advanced NAT Configuration Guide

Grandstream Networks, Inc. GWN Firewall Features Advanced NAT Configuration Guide Grandstream Networks, Inc. GWN7000 - Firewall Features Advanced NAT Configuration Guide Table of Content INTRODUCTION... 3 INPUT/OUPUT POLICIES... 4 Overview... 4 Configuration... 4 SNAT (SOURCE NAT)...

More information

CSC 474/574 Information Systems Security

CSC 474/574 Information Systems Security CSC 474/574 Information Systems Security Topic 7.4 Firewalls CSC 474/574 Dr. Peng Ning 1 Outline What are firewalls? Types Filtering Packet filtering Session filtering Proxy Circuit Level Application Level

More information

CS Computer and Network Security: Firewalls

CS Computer and Network Security: Firewalls CS 5410 - Computer and Network Security: Firewalls Professor Patrick Traynor Fall 2017 Reminders Monday: Change of Plans Recording lecture - turn in your rules. Friday: Project Abstract The hardest paragraph

More information

Configure. Version: Copyright ImageStream Internet Solutions, Inc., All rights Reserved.

Configure. Version: Copyright ImageStream Internet Solutions, Inc., All rights Reserved. Configure Version: 2342 Copyright 2007-2010 ImageStream Internet Solutions, Inc., All rights Reserved. Table of Contents Squid/Configure...1 ImageStream's Default Squid Configuration...1 Transparent Proxy

More information

Appliance Quick Start Guide. v7.5

Appliance Quick Start Guide. v7.5 Appliance Quick Start Guide v7.5 rev. 1.0.8 Copyright 2002 2014 Loadbalancer.org, Inc. Table of Contents Loadbalancer.org Terminology... 4 What is a Virtual IP Address?... 4 What is a Floating IP Address?...

More information

The Addressing of Data Link Layer

The Addressing of Data Link Layer The Addressing of Data Link Layer Outline Unicast Addressing Broadcast Addressing Multicast Addressing Promiscuous Mode Summary Appendix 2 mac_addressing.xtpl 3 Unicast Addressing 4 Fill

More information

Laboratory 2 Dynamic routing using RIP. Iptables. Part1. Dynamic Routing

Laboratory 2 Dynamic routing using RIP. Iptables. Part1. Dynamic Routing Introduction Laboratory 2 Dynamic routing using RIP. Iptables. Part1. Dynamic Routing Static routing has the advantage that it is simple, requires no computing power in router for determining routes (this

More information

RHCSA BOOT CAMP. Network Security

RHCSA BOOT CAMP. Network Security RHCSA BOOT CAMP Network Security TCP WRAPPERS TCP Wrappers was originally written to provide host based access control for services which did not already include it. It was one of the first firewalls of

More information

Firewalls. Firewall. means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense

Firewalls. Firewall. means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense FIREWALLS 3 Firewalls Firewall means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense administered network public Internet firewall

More information

Masquerading Made Simple HOWTO

Masquerading Made Simple HOWTO Masquerading Made Simple HOWTO John Tapsell tapselj0@cs.man.ac.uk Thomas Spellman thomas@resonance.org Matthias Grimm DeadBull@gmx.net Revision History Revision 0.05 2001 09 07 Revised by: jpt Revision

More information

A 10 years journey in Linux firewalling Pass the Salt, summer 2018 Lille, France Pablo Neira Ayuso

A 10 years journey in Linux firewalling Pass the Salt, summer 2018 Lille, France Pablo Neira Ayuso A 10 years journey in Linux firewalling Pass the Salt, summer 2018 Lille, France Pablo Neira Ayuso What is Netfilter? Not just iptables Image from Wikipedia (J. Engelhardt, 2018)

More information

iptables and ip6tables An introduction to LINUX firewall

iptables and ip6tables An introduction to LINUX firewall 7 19-22 November, 2017 Dhaka, Bangladesh iptables and ip6tables An introduction to LINUX firewall Imtiaz Rahman SBAC Bank Ltd AGENDA iptables and ip6tables Structure Policy (DROP/ACCEPT) Syntax Hands on

More information

Firewall Configuration and Assessment

Firewall Configuration and Assessment FW Firewall Configuration and Assessment Goals of this lab: Get hands-on experience implementing a network security policy Get hands-on experience testing a firewall REVISION: 1.5 [2017-02-0303] 2007-2011

More information

Dropping Packets in Ubuntu Linux using tc and iptables

Dropping Packets in Ubuntu Linux using tc and iptables Dropping Packets in Ubuntu Linux using tc and... 1 Dropping Packets in Ubuntu Linux using tc and iptables By Steven Gordon on Tue, 18/01/2011-8:13pm There are two simple ways to randomly drop packets on

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

BA.(Hons) Communication. Cohort: BC/05/PT Year 2. Examinations for / Semester 2

BA.(Hons) Communication. Cohort: BC/05/PT Year 2. Examinations for / Semester 2 BA.(Hons) Communication Cohort: BC/05/PT Year 2 Examinations for 2005-2006 / Semester 2 MODULE: IT and Communication MODULE CODE: COMM 1401 Duration: 2 Hours Reading Time: 10 Minutes Instructions to Candidates:

More information

python-iptables Documentation

python-iptables Documentation python-iptables Documentation Release 0.4.0-dev Vilmos Nebehaj Oct 05, 2017 Contents 1 Introduction 3 1.1 About python-iptables.......................................... 3 1.2 Installing via pip.............................................

More information

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing.

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. R (2) N (5) Oral (3) Total (10) Dated Sign Experiment No: 1 Problem Definition: Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. 1.1 Prerequisite:

More information

Kernel Korner A NATural Progression

Kernel Korner A NATural Progression http://0elivery.acm.org.innopac.lib.ryerson.ca/10.1145/520000/513495... Kernel Korner A NATural Progression David continues his series on the Netfilter framework with a look at NAT and how to avoid common

More information

Why Build My Own Router?

Why Build My Own Router? Why Build My Own Router? With most ISPs, you only get a single uplink jack, but you probably have more than just the one computer. Most people solve this by purchasing a all-in-one router from one of the

More information

Chapter 9. Firewalls

Chapter 9. Firewalls Chapter 9 Firewalls The Need For Firewalls Internet connectivity is essential Effective means of protecting LANs Inserted between the premises network and the Internet to establish a controlled link however

More information

Nat & Publish -

Nat & Publish - ...... (Forward) LAN...(Inbound) (outbound)... Nat & Publish...Nat... Publish... Proxy... ... Statefull Packet Filter Nat & Publish /. Firewall Nat : (Forward) LAN (Inbound) (outbound) Proxy Publish Nat.

More information

Network Security. Routing and Firewalls. Radboud University, The Netherlands. Spring 2018

Network Security. Routing and Firewalls. Radboud University, The Netherlands. Spring 2018 Network Security Routing and Firewalls Radboud University, The Netherlands Spring 2018 The coming weeks... Monday, May 21: Whit Monday, no lecture Monday, May 28: Security in Times of Surveillance https://www.win.tue.nl/eipsi/surveillance.html

More information

Appliance Quick Start Guide v6.11

Appliance Quick Start Guide v6.11 Appliance Quick Start Guide v6.11 Copyright 2002-2011 Loadbalancer.org, Inc. 1 2 Table of Contents Loadbalancer.org terminology... 4 What is a virtual IP address?... 4 What is a floating IP address?...

More information

COMPUTER NETWORK SECURITY

COMPUTER NETWORK SECURITY COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (9 th Week) 9. Firewalls and Intrusion Prevention Systems 9.Outline The Need for Firewalls Firewall Characterictics and Access Policy Type of Firewalls

More information

Lecture 18: Packet Filtering Firewalls (Linux) Lecture Notes on Computer and Network Security. by Avi Kak

Lecture 18: Packet Filtering Firewalls (Linux) Lecture Notes on Computer and Network Security. by Avi Kak Lecture 18: Packet Filtering Firewalls (Linux) Lecture Notes on Computer and Network Security by Avi Kak (kak@purdue.edu) March 20, 2017 11:49pm c 2017 Avinash Kak, Purdue University Goals: Packet-filtering

More information

A Practical Guide to Red Hat Linux

A Practical Guide to Red Hat Linux A Practical Guide to Red Hat Linux THIRD EDITION Mark G. Sobell Chapter 11, pp 459-489 SELinux Traditional security of Linux (Discretionary Access Control DAC) controlled user access to files and how they

More information

10 A Security Primer. Copyright 2011 by The McGraw-Hill Companies CERTIFICATION OBJECTIVES. Q&A Self Test

10 A Security Primer. Copyright 2011 by The McGraw-Hill Companies CERTIFICATION OBJECTIVES. Q&A Self Test 10 A Security Primer CERTIFICATION OBJECTIVES 10.01 The Layers of Linux Security 10.02 Firewalls and Network Address Translation 10.03 The Extended Internet Super-Server 10.04 TCP Wrappers 10.05 Pluggable

More information

A Unified Firewall Model for Web Security

A Unified Firewall Model for Web Security A Unified Firewall Model for Web Security Grzegorz J. Nalepa 1 Institute of Automatics, AGH University of Science and Technology, Al. Mickiewicza 30, 30-059 Kraków, Poland, gjn@agh.edu.pl Summary. The

More information

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Computer Security And Privacy Chapter 9 Firewalls and Intrusion Prevention Systems ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been

More information

How to Restrict a Login Shell Using Linux Namespaces

How to Restrict a Login Shell Using Linux Namespaces How to Restrict a Login Shell Using Linux Namespaces Firejail is a SUID sandbox program that reduces the risk of security breaches by restricting the running environment of untrusted applications using

More information

Network Address Translation (NAT) Contents. Firewalls. NATs and Firewalls. NATs. What is NAT. Port Ranges. NAT Example

Network Address Translation (NAT) Contents. Firewalls. NATs and Firewalls. NATs. What is NAT. Port Ranges. NAT Example Contents Network Address Translation (NAT) 13.10.2008 Prof. Sasu Tarkoma Overview Background Basic Network Address Translation Solutions STUN TURN ICE Summary What is NAT Expand IP address space by deploying

More information

IPv6 NAT. Open Source Days 9th-10th March 2013 Copenhagen, Denmark. Patrick McHardy

IPv6 NAT. Open Source Days 9th-10th March 2013 Copenhagen, Denmark. Patrick McHardy IPv6 NAT Open Source Days 9th-10th March 2013 Copenhagen, Denmark Patrick McHardy Netfilter and IPv6 NAT historically http://lists.netfilter.org/pipermail/netfilter/2005-march/059463.html

More information

Suricata IDPS and Nftables: The Mixed Mode

Suricata IDPS and Nftables: The Mixed Mode Suricata IDPS and Nftables: The Mixed Mode Giuseppe Longo Stamus Networks Jul 5, 2016 Giuseppe Longo (Stamus Networks) Suricata IDPS and Nftables: The Mixed Mode Jul 5, 2016 1 / 60 1 Netfilter Nftables

More information

Use this section to help you quickly locate a command.

Use this section to help you quickly locate a command. iii iv v Use this section to help you quickly locate a command. vi Use this list to help you locate examples you d like to try or look at. vii viii This document describes the various deployment, installation,

More information

Introduction TELE 301. Routers. Firewalls. Gateways. Sample Large Network

Introduction TELE 301. Routers. Firewalls. Gateways. Sample Large Network Introduction TELE 301 Lecture 21: s David Eyers (dme@cs.otago.ac.nz) Telecommunications Programme University of Otago Discernment of Routers, s, Gateways Placement of such devices Elementary firewalls

More information

https://support.industry.siemens.com/cs/ww/en/view/

https://support.industry.siemens.com/cs/ww/en/view/ NAT Variants with the SCALANCE S615 SCALANCE S615 https://support.industry.siemens.com/cs/ww/en/view/109744660 Siemens Industry Online Support Siemens AG Valuable Information All rights reserved Warranty

More information