Network and CyberSecurity Professional
(Farzand Ali)
::::Different types of Engines used by the Smoothwall system::::
1. Two web filter engines:
1.Guardian3 2.Web proxy
2.Anti-malware – VIPRE
3.Anti-spam – MailShell
4.IPS – SNORT
:::::IP address format on smoothwall::::::
single IP: 192.168.1.1
range: 192.168.1.1-192.168.1.9
subnet: 192.168.1.0/24 (CIDR) or 192.168.1.0/255.255.255.0
::::Updates::::::
(latest update to date is update 68 on smoothwall systems)
1.System » Maintenance » Updates
(summaries of new features, security features and bug fixes)
(each update will also have a reference bug number that has been addresses in the update)
(press download button to retrieve them and then install button to install them)
(after installing update, a reboot will be required)
2. System » Maintenance » Scheduler->Dowload updates management->Download updates(enable)
(update check is done on weekly basis and new alert trigger can be setup, when new updates are available)
(after installing update, a reboot will be required)
Q: What are the main feature differences between the Windows Kerberos and NT LAN Manager (NTLM) authentication protocols? Why is the Kerberos protocol generally considered a better authentication option than the NTLM protocol?
A: NTLM is a challenge/response-based authentication protocol that is the default authentication protocol of Windows NT 4.0 and earlier Windows versions. For backward compatibility reasons, Microsoft still supports NTLM in Windows Vista, Windows Server 2003 and Windows 2003 R2, Windows 2000, and Windows XP.
Starting with Win2K, Microsoft implements Kerberos as the default authentication protocol for the Windows OS. This means that besides an NTLM authentication provider, every Windows OS since Win2K also includes a client Kerberos authentication provider.
Table 1, below, compares Kerberos to NTLM, the default authentication protocol of NT 4.0 and earlier Windows versions. The next paragraphs expand on some of the major feature differences (as listed in Table 1) between the Kerberos and the NTLM authentication protocols and explain why generally Kerberos is considered a better authentication option than NTLM.
Table 1: Kerberos-NTLM Feature Comparison
| NTLM | Kerberos | |
| Underlying Cryptographic Technology | Symmetric Cryptography | – Basic Kerberos: Symmetric Cryptography – Kerberos PKINIT (this is the Kerberos subprotocol that supports smart card logon): Symmetric and Asymmetric Cryptography |
| Trusted Third Party | DC | – Basic Kerberos: DC with Kerberos Key Distribution Center (KDC) service – Kerberos PKINIT: DC with KDC service and Windows Enterprise Certification Authority (CA). |
| Microsoft Supported Platforms | Windows 95, Windows 98, Windows ME, NT 4.0, Win2K, XP, Windows 2003/R2, Vista | Win2K, XP, Windows 2003/R2, Vista |
| Features | Slower authentication because of pass-through authentication | Faster authentication because of unique ticketing system |
| No mutual authentication | Optional mutual authentication | |
| No support for delegation of authentication | Support for delegation of authentication | |
| No native protocol support for smart card logon | Native protocol support for smart card logon | |
| Proprietary Microsoft authentication protocol | Open standard |
Kerberos
Capturing Kerberos packets using wireshark
web proxy service can be configured to operate in either transparent or non-transparent mode – but what are the differences, and how should you choose between them?
In transparent mode, there are no special configuration steps needed to setup client browsers, thus allowing the proxy service to be activated and in-use almost immediately. Once activated, all traffic destined for the Internet arriving on port 80 is automatically redirected through the proxy. With the latest Guardian products you can even use NTLM with Active Directory in conjunction with transparent proxying allowing for single sign on and minimal network configuration.
Both transparent and non-transparent proxying can be used together at the same time. Enabling transparent does not stop non-transparent from working. In situations where transparent is the norm but a specific application requires non-transparent you can simply configure the proxy settings in that application. Both modes have pros and cons. This article explains how to decide on the most appropriate mode for your network.
When to avoid transparent proxying
Transparent mode should be avoided in the following situations:
Why use non-transparent proxying?
The main reason to use non-transparent (or manual proxying) is so that the web browser and other client applications know that a proxy is being used, and so can act accordingly. Initial configuration of a non-transparent proxy might be trickier, but ultimately provides a much more powerful and flexible proxying service.
Another advantage of non-transparent proxying is that spyware and worms that use the web for transmission may not be able to function because they don’t know the proxy settings. This can reduce the spread of malicious software and prevent bandwidth from being wasted by infected systems.
Configuring proxy settings in non-transparent mode
When using non-transparent proxying, appropriate proxy settings must be configured on client machines and browsers. This can be achieved in a number of different ways:
When to use transparent proxying
Although a non-transparent connection may sound more complicated, it may be beneficial (or even necessary) depending on routing or if you use certain authentication methods or non-standard ports. The following proxies can be configured to be non-transparent: