CyberGuard SG570 Installationsanleitung Seite 1

Stöbern Sie online oder laden Sie Installationsanleitung nach Gateways / Controller CyberGuard SG570 herunter. CyberGuard SG570 Installation guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken

Inhaltsverzeichnis

Seite 1 - Firewall Tutorial

Medical Practice Network SecurityFirewall Tutorial1st edition June 2005www.gpcg.org

Seite 2

10Private IP address The Internet uses special Internet addressing schemes to distinguish private local networks from computers participating in the

Seite 3 - Acknowledgements

11STEP 3: Deciding which firewall product you need The choice of firewall depends on your needs, based on: • the risks to your practice information.

Seite 4 - Why do you need them?

12Figure 2: protecting your private network, and protecting your web server with two separate firewalls in two independent networks using a single I

Seite 5 - Security breaches cost you

134. Web server as separate (perimeter) network Once you want to provide web services to the outside world, such as online appointment bookings, you

Seite 6 - Find out what your ISP offers

14STEP 4: Understanding firewall technologies Simple versus sophisticated Once you have decided on the general network layout and where to place the

Seite 7

15STEP 5: Understanding different types of firewallsPacket filters Data transferred via TCP/IP protocol is usually sent in the form of ‘packets’. Ea

Seite 8

16Disadvantages of stateful packet filters • Vulnerable to attacks with malformed packets (since it does not know about packet content).• Vulnerable

Seite 9 - Basic networking principles

17Advantages of proxy type firewalls • Protection against malformed packets.• Protection against more protocol based attacks than stateful inspectin

Seite 10

18STEP 6: Understanding network addressing The first question before you set up your firewall will always be: what address range are you using in yo

Seite 11 - Different firewall scenarios

19Imagine 8-bit (0 – 255) as 8 little switches. Each switch that is ‘on’ has to be matched by the corresponding switch in your address. The number 2

Seite 12

2Medical Practice Network Security - Firewall TutorialINTRODUCTION 4About this tutorial 4What are firewalls? 4Why do you need them? 4What other comp

Seite 13

20STEP 7: Understanding ports and firewall configuration What are ports? Ports are special addresses within a network address that are required to a

Seite 14 - How NAT works

21Public ports‘Public ports’ are 49152 - 65535. These are up for grabs so never rely on these ports delivering the same service. However, this is al

Seite 15 - Stateful packet filters

22STEP 8: Suggested firewall products Your choice of firewall depends on both your needs and IT skills, and with some solutions it also depends on y

Seite 16 - Application proxies

23The list above is not exhaustive – it represents products reviewed up to now. After you make your choice and install your firewall, refer to this

Seite 17

244 Billion products 5 D-Link products6 Draytek products7 Dynalink products 8 INEXQ products9 Linksys products10 Netcomm products11 Netgear products

Seite 18 - Subnet masks

25STEP 9: Principles of firewall configuration This section explains the steps necessary for configuring any firewall. Product-specific information

Seite 19 - DHCP servers

26STEP 10: DIY security audit How to find out if your firewall really works The proof of the pudding is in the eating. The proof of your firewall is

Seite 20 - What are ports?

27Local Area Security Linux This is a valuable tool chest of network auditing and forensics applications that can be run from CD without needing to

Seite 21

28SentinixBefore you download, read the step-by-step installation guide to make sure you will be able to do it. Alternatively, you might want to try

Seite 22

29SAINTSAINT is one of the top ten SANS certified security auditing tools. It is not to be confused with the free network monitoring tool: NetSaint.

Seite 23

3AcknowledgementsThe General Practice Computing Group would like to thank the following people for contributing to Medical Practice Network Security

Seite 24

30STEP 11: How to audit your firewall – step by step Prepare your test scenario You need two computers plus your pre-configured firewall. We will ca

Seite 25

31• Download PHLAK – this is a 400+ Mb large ISO CD image. Use your CD burning software to create a bootable CD from this ISO image. It will not wor

Seite 26 - Security audit software

324 If you start the Nessus program for the first time, it will ask you whether you accept the server certificate. Say yes, because it is the one yo

Seite 27

335 If login is successful you will presented with the certificate for visual verification. In the scenario here it is safe again to simply click OK

Seite 28

34A warning will probably pop up telling you that dangerous features have been disabled (those which might crash a victim during scanning). Accept t

Seite 29

357 In the plugin section, simply enable ‘all but dangerous plugins’ for now. For the first scan, you can leave all other configuration options at t

Seite 30 - Prepare your test scenario

369 Now, all that is left to do is to click on the ‘Start the scan’ button at the bottom of the Nessus dialog box. It may take anything from several

Seite 31 - Run the test

37STEP 12: Firewall checklist – after installation After installation and configuration of your firewall, but before you connect your private networ

Seite 32

38FURTHER INFORMATION Virtual Private Network Sometimes it may be useful to extend your private network outside your practice building – for example

Seite 33

39Figure 7: Connecting two practices via VPN Another common scenario is connecting to the practice from home or while travelling, using a notebook a

Seite 34

4INTRODUCTION About this tutorialThe information in this tutorial has been put together by the General Practice Computing Group (GPCG) with addition

Seite 35

40Failover/load balancingFailover The failover principle is to have multiple Internet service providers, and let your gateway device handle the conn

Seite 36

41Unfortunately, there is no rule regarding which technology is the most reliant at present in Australia. It depends on a variety of technological a

Seite 37 -  can you browse the web?

42GLOSSARYAccess – The ability to use computer information in some manner. Specific access can be granted to each individual user.Application servi

Seite 38

43Network gateway - An inter-networking system that joins two networks together. A network gateway can be implemented completely in software, comple

Seite 39

General Practice Computing Group C/- Royal Australian College of General Practitioners1 Palmerston CrescentSouth Melbourne, Vic 3205Tel: (03) 8699 041

Seite 40 - Failover/load balancing

5Security breaches cost you According to the 2004 Australian Computer Crime and Security Survey by the Australian Computer Emergency Response Team (

Seite 41 - Load balancing

6Other security measuresEven with a firewall in place, you still need to take other security measures to protect your internal computer systems, inc

Seite 42 - GLOSSARY

7Many ISPs offer fully managed multi-tier firewall services. However, while you may rely on your ISP to provide a network firewall service you may c

Seite 43

8STEP 1: Understanding firewalls in principle • A firewall is a means of shielding your private computer system from an untrusted network, like the

Seite 44

9STEP 2: Understanding how the Internet worksUnderstanding how and why to install a firewall, a basic networking knowledge is required. Here is a si

Kommentare zu diesen Handbüchern

Keine Kommentare