CyberGuard SG570 Instalační příručka Strana 1

Procházejte online nebo si stáhněte Instalační příručka pro Brány / ovladače CyberGuard SG570. CyberGuard SG570 Installation guide Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk

Shrnutí obsahu

Strany 1 - Firewall Tutorial

Medical Practice Network SecurityFirewall Tutorial1st edition June 2005www.gpcg.org

Strany 2

10Private IP address The Internet uses special Internet addressing schemes to distinguish private local networks from computers participating in the

Strany 3 - Acknowledgements

11STEP 3: Deciding which firewall product you need The choice of firewall depends on your needs, based on: • the risks to your practice information.

Strany 4 - Why do you need them?

12Figure 2: protecting your private network, and protecting your web server with two separate firewalls in two independent networks using a single I

Strany 5 - Security breaches cost you

134. Web server as separate (perimeter) network Once you want to provide web services to the outside world, such as online appointment bookings, you

Strany 6 - Find out what your ISP offers

14STEP 4: Understanding firewall technologies Simple versus sophisticated Once you have decided on the general network layout and where to place the

Strany 7

15STEP 5: Understanding different types of firewallsPacket filters Data transferred via TCP/IP protocol is usually sent in the form of ‘packets’. Ea

Strany 8

16Disadvantages of stateful packet filters • Vulnerable to attacks with malformed packets (since it does not know about packet content).• Vulnerable

Strany 9 - Basic networking principles

17Advantages of proxy type firewalls • Protection against malformed packets.• Protection against more protocol based attacks than stateful inspectin

Strany 10

18STEP 6: Understanding network addressing The first question before you set up your firewall will always be: what address range are you using in yo

Strany 11 - Different firewall scenarios

19Imagine 8-bit (0 – 255) as 8 little switches. Each switch that is ‘on’ has to be matched by the corresponding switch in your address. The number 2

Strany 12

2Medical Practice Network Security - Firewall TutorialINTRODUCTION 4About this tutorial 4What are firewalls? 4Why do you need them? 4What other comp

Strany 13

20STEP 7: Understanding ports and firewall configuration What are ports? Ports are special addresses within a network address that are required to a

Strany 14 - How NAT works

21Public ports‘Public ports’ are 49152 - 65535. These are up for grabs so never rely on these ports delivering the same service. However, this is al

Strany 15 - Stateful packet filters

22STEP 8: Suggested firewall products Your choice of firewall depends on both your needs and IT skills, and with some solutions it also depends on y

Strany 16 - Application proxies

23The list above is not exhaustive – it represents products reviewed up to now. After you make your choice and install your firewall, refer to this

Strany 17

244 Billion products 5 D-Link products6 Draytek products7 Dynalink products 8 INEXQ products9 Linksys products10 Netcomm products11 Netgear products

Strany 18 - Subnet masks

25STEP 9: Principles of firewall configuration This section explains the steps necessary for configuring any firewall. Product-specific information

Strany 19 - DHCP servers

26STEP 10: DIY security audit How to find out if your firewall really works The proof of the pudding is in the eating. The proof of your firewall is

Strany 20 - What are ports?

27Local Area Security Linux This is a valuable tool chest of network auditing and forensics applications that can be run from CD without needing to

Strany 21

28SentinixBefore you download, read the step-by-step installation guide to make sure you will be able to do it. Alternatively, you might want to try

Strany 22

29SAINTSAINT is one of the top ten SANS certified security auditing tools. It is not to be confused with the free network monitoring tool: NetSaint.

Strany 23

3AcknowledgementsThe General Practice Computing Group would like to thank the following people for contributing to Medical Practice Network Security

Strany 24

30STEP 11: How to audit your firewall – step by step Prepare your test scenario You need two computers plus your pre-configured firewall. We will ca

Strany 25

31• Download PHLAK – this is a 400+ Mb large ISO CD image. Use your CD burning software to create a bootable CD from this ISO image. It will not wor

Strany 26 - Security audit software

324 If you start the Nessus program for the first time, it will ask you whether you accept the server certificate. Say yes, because it is the one yo

Strany 27

335 If login is successful you will presented with the certificate for visual verification. In the scenario here it is safe again to simply click OK

Strany 28

34A warning will probably pop up telling you that dangerous features have been disabled (those which might crash a victim during scanning). Accept t

Strany 29

357 In the plugin section, simply enable ‘all but dangerous plugins’ for now. For the first scan, you can leave all other configuration options at t

Strany 30 - Prepare your test scenario

369 Now, all that is left to do is to click on the ‘Start the scan’ button at the bottom of the Nessus dialog box. It may take anything from several

Strany 31 - Run the test

37STEP 12: Firewall checklist – after installation After installation and configuration of your firewall, but before you connect your private networ

Strany 32

38FURTHER INFORMATION Virtual Private Network Sometimes it may be useful to extend your private network outside your practice building – for example

Strany 33

39Figure 7: Connecting two practices via VPN Another common scenario is connecting to the practice from home or while travelling, using a notebook a

Strany 34

4INTRODUCTION About this tutorialThe information in this tutorial has been put together by the General Practice Computing Group (GPCG) with addition

Strany 35

40Failover/load balancingFailover The failover principle is to have multiple Internet service providers, and let your gateway device handle the conn

Strany 36

41Unfortunately, there is no rule regarding which technology is the most reliant at present in Australia. It depends on a variety of technological a

Strany 37 -  can you browse the web?

42GLOSSARYAccess – The ability to use computer information in some manner. Specific access can be granted to each individual user.Application servi

Strany 38

43Network gateway - An inter-networking system that joins two networks together. A network gateway can be implemented completely in software, comple

Strany 39

General Practice Computing Group C/- Royal Australian College of General Practitioners1 Palmerston CrescentSouth Melbourne, Vic 3205Tel: (03) 8699 041

Strany 40 - Failover/load balancing

5Security breaches cost you According to the 2004 Australian Computer Crime and Security Survey by the Australian Computer Emergency Response Team (

Strany 41 - Load balancing

6Other security measuresEven with a firewall in place, you still need to take other security measures to protect your internal computer systems, inc

Strany 42 - GLOSSARY

7Many ISPs offer fully managed multi-tier firewall services. However, while you may rely on your ISP to provide a network firewall service you may c

Strany 43

8STEP 1: Understanding firewalls in principle • A firewall is a means of shielding your private computer system from an untrusted network, like the

Strany 44

9STEP 2: Understanding how the Internet worksUnderstanding how and why to install a firewall, a basic networking knowledge is required. Here is a si

Komentáře k této Příručce

Žádné komentáře