1 00:00:01,410 --> 00:00:08,040 Another technique of cicada filtering is McAdoo's filtering and water filtering in which you discard 2 00:00:08,050 --> 00:00:11,640 and allow packets based on the Mac address and reports. 3 00:00:11,880 --> 00:00:15,180 That is the incoming ports on which the data is getting received. 4 00:00:16,320 --> 00:00:23,340 Now, most of the time, it's wise to configure the access control list so that they'll allow or deny 5 00:00:23,370 --> 00:00:27,820 access based on the IP address of the source or destination device. 6 00:00:28,230 --> 00:00:34,650 Generally, we allow or deny IP packets based on the IP address from where they have received. 7 00:00:35,280 --> 00:00:41,310 Now, if a network is running on protocol other than the transmission control protocol or the Internet 8 00:00:41,310 --> 00:00:48,360 protocol, that is TCP IP, we can filter the traffic based on media access control. 9 00:00:48,360 --> 00:00:51,800 That is the MAC address or the hardware address. 10 00:00:52,530 --> 00:00:55,530 We have seen the hardware address in our networking sections. 11 00:00:55,530 --> 00:01:02,880 If we haven't seen the MAC or IP address or if we are confused about the Mac, please refer to the computer 12 00:01:02,880 --> 00:01:07,650 networking codes in which I have discussed everything about these addresses. 13 00:01:08,930 --> 00:01:16,050 Now we can still use a Mac address based access control list if we are running on the TCP IP. 14 00:01:16,410 --> 00:01:23,850 But I would like to tell you that it's a lot easier to deal with the IP address than the Mac address. 15 00:01:24,480 --> 00:01:31,470 Another point, remember, is that even though most firewalls and routers will allow you to create both 16 00:01:31,740 --> 00:01:39,450 IP based and Mac based access control list, doing so can create an exceptionally ugly situation where 17 00:01:39,450 --> 00:01:42,240 access is denied, then it really shouldn't be. 18 00:01:42,780 --> 00:01:49,470 So when it comes to Mac filtering or IP filtering, just make sure that you stick to only one of these 19 00:01:49,710 --> 00:01:54,210 because it is a lot easier to deal with IP address filtering. 20 00:01:54,960 --> 00:02:03,840 Now the next thing is both filtering access controls can also be used to filter based on the port numbers 21 00:02:03,840 --> 00:02:05,610 as well as the IP address. 22 00:02:06,240 --> 00:02:12,340 In fact, the most firewalls by default allow only open ports that we specify. 23 00:02:12,930 --> 00:02:20,760 This is another version of the implicit deny that is anything not allowed specifically is denied when 24 00:02:20,760 --> 00:02:22,110 managing a firewall. 25 00:02:22,140 --> 00:02:28,550 It is important to know the port numbers of all the traffic that needs to be allowed through it. 26 00:02:28,550 --> 00:02:33,540 If you do not know the port numbers on which you want to allow the traffic, there is no use of having 27 00:02:33,540 --> 00:02:35,410 a port filtering technique, right? 28 00:02:35,640 --> 00:02:38,920 You can't just randomly allow and disallow the port numbers. 29 00:02:39,600 --> 00:02:46,470 Now this means that for some of your applications you will need to read and learn the port numbers being 30 00:02:46,470 --> 00:02:46,920 used. 31 00:02:47,730 --> 00:02:55,440 This also explains why it's a big deal to know the port numbers of security protocols like SSL and IP 32 00:02:55,440 --> 00:02:55,820 sic. 33 00:02:56,550 --> 00:03:03,750 Successful management of firewall involves being aware of it and allowing only the ports to keep things 34 00:03:03,750 --> 00:03:04,110 running. 35 00:03:04,140 --> 00:03:09,700 For example, if you want to place a firewall on your network and if you do not know which ports does 36 00:03:09,780 --> 00:03:16,920 the traffic is actually sending and if you randomly on or off make of the port, there is no point in 37 00:03:16,920 --> 00:03:17,810 port filtering. 38 00:03:17,820 --> 00:03:23,880 OK, so make sure before you apply port filtering in your networks, you first must be acquainted with 39 00:03:23,880 --> 00:03:27,810 all the port numbers on which the protocols are using. 40 00:03:28,930 --> 00:03:30,410 That does it for this lecture. 41 00:03:31,120 --> 00:03:37,270 We have studied about the impact, filtering and filtering, which are another two techniques of security 42 00:03:37,270 --> 00:03:37,810 filtering.