TECH2400 Week 05 Workshop
TECH2400 Week 05 Workshop
Cyber Security
Workshop 5
Network Security Fundamentals
COMMONWEALTH OF AUSTRALIA
Copyright Regulations 1969
WARNING
The material in this communication may be subject to copyright under the Act.
Any further reproduction or communication of this material by you may be the
subject of copyright protection under the Act.
Default Rules:
- Firewalls can be configured to either allow all traffic by
default and block suspicious traffic or deny all by
default and allow only specific traffic
- Default deny is more secure
Firewall Rules: Interface
Specifies the interface on which the rule applies:
Firewall protection:
Firewalls can block access to unused or unprotected
ports to limit exposure to potential threats.
Types of Attacks and Threats
2) Denial of Service (DoS) / Distributed Denial of Service
(DDoS)
Firewall protection:
Firewalls can limit the rate of traffic to help mitigate these
attacks.
Types of Attacks and Threats
3) Spoofing
Firewall protection:
Firewalls can inspect packets for inconsistencies in the
source address, rejecting packets that appear to be
spoofed. Techniques like anti-spoofing filters can block
spoofed traffic.
Types of Attacks and Threats
4) Man-in-the-Middle (MitM) Attack
Firewall protection:
Firewalls can inspect and filter traffic to detect suspicious
behavior. Additionally, firewalls can enforce SSL/TLS
filtering to ensure encrypted traffic cannot be easily
intercepted or altered by attackers.
VPN Basics
Virtual Private Networks create a secure tunnel over the internet
between remote users or networks, ensuring that sensitive data is
encrypted and protected from external threats.
VPN Types:
- PPTP: An older, less secure VPN protocol (rarely used today).
- L2TP: More secure than PPTP, often combined with IPSec for
better encryption.
- OpenVPN: An open-source VPN solution that supports strong
encryption and is highly configurable.
- IPsec: A robust suite of protocols used to encrypt network traffic
and secure communications.
Monitoring Firewall Logs
Firewalls logs record details about allowed and denied
connections, source and destination IP addresses,
ports, protocols, and timestamps.
Key Features:
- Rule Management: Easily create, edit, and prioritize
firewall rules.
- Traffic Monitoring: Real-time monitoring of incoming and
outgoing network traffic.
- Logging & Reporting: Generate logs for auditing,
troubleshooting, and forensic analysis.
- Security Enhancements: Configure advanced security
features like VPNs, intrusion prevention systems (IPS),
and NAT.
What is pfSense?
pfSense is an open-source firewall and router software
distribution based on FreeBSD, providing a wide range of
features for secure network management.
Why pfSense?
- Open Source: Free to use and continuously updated by a
global community.
- Powerful & Flexible: Supports advanced features like
VPN, multi-WAN, and intrusion detection.
- Easy-to-Use Interface: Intuitive web-based interface for
easy configuration.
- Highly Customisable: Supports a variety of plugins and
add-ons for additional functionality.
pfSense Installation
Step 1: Install VirtualBox
- Go to
https://www.oracle.com/au/virtualization/technologies/vm/d
ownloads/virtualbox-downloads.html
- Download the platform package for your operating system
- Run the installer and follow the on-screen instructions
Note: pfSense is its own operating system and is typically installed directly
onto a physical computer, server, or storage device. However, using a
virtual environment, such as VirtualBox, is useful for testing, learning, and
experimentation without requiring dedicated hardware.
pfSense Installation
Select YES
pfSense Installation
Click NEXT
pfSense Installation
1) Accept
2) Click NEXT
pfSense Installation
Click NEXT
pfSense Installation
Click YES
pfSense Installation
Click YES
pfSense Installation
Click NEXT
pfSense Installation
Click INSTALL
pfSense Installation
Click FINISH
pfSense Installation
Step 2: Download pfSense ISO
- Go to https://shop.netgate.com/products/netgate-installer
- Select AMD64 ISO IPM/Virtual Machines
- Click Add to Cart
- Create a Netgate account
- Tick T&Cs agreement
- Click Complete Order
- Click Download Now
1)
pfSense Installation
Step 5: Configure network for pfSense
- Go to the Network tab
- Enable Adapter 1 (WAN Interface)
o Select Attached to: NAT
o Click OK
2)
1)
Note: This will allow
PfSense to access the
internet through your 3)
host machine's network.
pfSense Installation
Step 5: Configure network for pfSense
- Set up Adapter 2 (LAN Interface)
o Check Enable Network Adapter
o Set Attached to: Internal Network
o Click OK
2)
1)
Note: Once pfSense has booted up, it will automatically assign network
interfaces. By default, the LAN interface will be set to 192.168.1.1.
Action: Block
pfSense Activity 2
Activity 2: Restrict SSH Access to the IT Team
Refer to Firewall Rules Activity: Scenario 2 for the rules
Destination Port:
- SSH (22)
Description:
- Block SSH for others
pfSense Activity 2
Activity 2: Restrict SSH Access to the IT Team
Refer to Firewall Rules Activity: Scenario 2 for the rules
- Click Save
- Click Save
pfSense Activity 2
Activity 2: Restrict SSH Access to the IT Team
Refer to Firewall Rules Activity: Scenario 2 for the rules
Name: Blocked_Sites
Type: Host(s)
Hostnames:
- www.facebook.com
- www.instagram.com
Description:
- Social Media Block
Click Save
pfSense Activity 3
Activity 3: Block Facebook & Instagram
Action: Reject
pfSense Activity 3
Activity 3: Block Facebook & Instagram (continued)
Destination:
- Address or Alias
- Blocked Sites
Description:
- Social Media Block
Click Save
pfSense Activity 3
Activity 3: Block Facebook & Instagram (continued)
1) Install pfBlockerNG
o Go to System > Package Manager > Available Packages
pfSense Activity 4
1) Install pfBlockerNG
o Find pfBlockerNG
pfSense Activity 4
1) Install pfBlockerNG
o Click Install and wait for installation to complete
pfSense Activity 4
1) Enable pfBlockerNG
o Go to Firewall > pfBlockerNG
pfSense Activity 4
1) Enable pfBlockerNG
o Click Next
pfSense Activity 4
1) Enable pfBlockerNG
o Click Next
pfSense Activity 4
1) Enable pfBlockerNG
o Click Next
pfSense Activity 4
1) Enable pfBlockerNG
o Click Next
pfSense Activity 4
Enable DNSBL for Content Filtering
- Go to pfBlockerNG > DNSBL
pfSense Activity 4
Enable DNSBL for Content Filtering
- Go to pfBlockerNG > Feeds
pfSense Activity 4
Enable DNSBL for Content Filtering
- Find a feed to add
- Click (+) to add selected feed
pfSense Activity 4
Enable DNSBL for Content Filtering
- Action: Unbound (to activate)
pfSense Activity 4
Enable DNSBL for Content Filtering
- Click Save DNSBL Settings