By: Keith Reiter COSC 356
Today’s Agenda Introduction Types of firewalls Firewall Access Rules Firewall Logging Who needs a firewall Summary
Introduction What is a firewall? Filters Malicious packets Gateway between two networks usually a trusted network and untrusted networks Software and hardware based
Software Window’s firewall Norton McAfee Bit Defender
Norton
Norton Continued
Top Free Software Firewalls Zone Alarm Free Firewall PC Tools Firewall Plus Online Armor Free
Pros and Cons of Software Firewalls Cheaper Takes less room More Vulnerable to malicious attacks / lower performance Dependent upon the host operating system
Hardware based firewalls Hardware device placed somewhere in the traffic flow of a network Receives and analyzes packets traveling into and out of a network Checks access rules
Pros and Cons of hardware based firewalls Operating system independent Less vulnerable to malicious attacks / better performance Can be the single point of failure Higher administrative overhead More expensive to implement and maintain
Important Firewall Access Rules The network administrator should be able to communicate directly with the firewall. The firewall should not be able to communicate directly with any other device. No other device should be able to communicate directly with the firewall. Other network traffic should be routed directly to the appropriate servers. All outbound communications should be allowed - unless corporate policy says otherwise. The last rule should deny entry to any packet that does not match any other rule.
Firewall Logging Activate logging on the firewall and review the summary of recent events Generate reports from the raw data Analyze the report and identify any potential issues Modify the firewall's access rules to deal with potential issues After any changes have been made, review the log files again to ensure that the changes achieved the desired results
Who needs a firewall? Anyone that connects to a network At home on your personal computer Businesses
At home Usually software based Need to protect personal information such as banking information
Businesses Hardware based would be better Employee information Business information and products
Tom Rowan “As more business exposes their corporate data – and that of their customers – to the internet, the firewall technology that protects them has had to evolve.”
Ali Pabari You need to deploy a firewall at more than just the perimeter. You need different layers of firewalls “The implementation of these layers of security technology will make it highly unlikely that unauthorized individuals will gain access to vital systems.”
Vince Tuesday Wrote “Good Firewalls Make Good Neighbors” “The simplest way to keep malicious code from spreading between our networks is to deploy firewalls and configure them so they limit traffic to what’s needed and block everything else.”
Matthew French Military needs a secure firewall “By deploying firewall technology embedded on personal computer network cards, participants in the war fighting exercise enforced security policies across disparate severs”
Summary Types of firewalls Firewall Access Rules Firewall Logging Who needs a firewall
Short video
QUESTIONS?
References Ali Pabari, Uday D. “Business Defense.” Certification magazine 6.4 (2004): Computers & Applied Sciences complete. Web. 9 Apr French, Matthew. “Navy Test Plug-In Security.” Federal Computer Week (2003):56. Computers & Applied Sciences Complete. Web. 11 Apr Rowan, Tom. “Application Firewalls: Filling The Void.” Network Security (2007): 4-7. Computers & Applied Science Complete. Web. 7 Apr Tuesday, Vince. “Good Firewalls Make Good Neighbors.” Computerworld 37.50(2003):34. Computer & Applied Sciences Complete. Web. 10 Apr. 2012