POOJA Programmer, CSE Department

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 9 – Firewalls and.
Firewalls Uyanga Tserengombo
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
1 Topic 2 – Lesson 4 Packet Filtering Part I. 2 Basic Questions What is packet filtering? What is packet filtering? What elements are inside an IP header?
Firewalls.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
Security Firewall Firewall design principle. Firewall Characteristics.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
Firewalls and Intrusion Detection Systems
Chapter 10 Firewalls. Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Firewalls. What is a Firewall? A choke point of control and monitoring A choke point of control and monitoring Interconnects networks with differing trust.
Cryptography and Network Security Chapter 20 Fourth Edition by William Stallings.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Chapter 9: Kinds of Firewalls Kate Solinger Tamara Teslovich.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Firewalls.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Chapter 6: Packet Filtering
Chapter 11 Firewalls.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
Firewalls. What is a Firewall? A choke point of control and monitoring A choke point of control and monitoring Interconnects networks with differing trust.
Chapter 20 – Firewalls The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz.
Firewalls. What is a Firewall? A choke point of control and monitoring A choke point of control and monitoring Interconnects networks with differing trust.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Access Control List (ACL)
Karlstad University Firewall Ge Zhang. Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…
Security fundamentals Topic 10 Securing the network perimeter.
1 An Introduction to Internet Firewalls Dr. Rocky K. C. Chang 12 April 2007.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Cryptography and Network Security
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
S ECURITY APPLIANCES Module 2 Unit 2. S ECURE NETWORK TOPOLOGIES A topology is a description of how a computer network is physically or logically organized.
Security fundamentals
Firewalls.
Why do we need Firewalls?
Firewall.
Firewalls.
Computer Data Security & Privacy
Prepared By : Pina Chhatrala
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
PROJECT PRESENTATION ON INTERNET FIREWALLS PRESENTED BY THE GUARDS
* Essential Network Security Book Slides.
Firewalls (March 2, 2016) © Abdou Illia – Spring 2016.
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewalls. What is a Firewall? A choke point of control and monitoring A choke point of control and monitoring Interconnects networks with differing trust.
Subject Name: NETWORK SECURITY Subject Code: 10EC832
Firewalls Jiang Long Spring 2002.
دیواره ی آتش.
Chapter 20: Firewalls Fourth Edition by William Stallings
Firewalls.
Firewalls Chapter 8.
Firewalls.
Firewalls.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Firewalls.
CSCD 434 Spring 2019 Lecture 16 Firewalls.
Presentation transcript:

POOJA Programmer, CSE Department Firewalls POOJA Programmer, CSE Department

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services only authorized traffic is allowed Auditing and controlling access can implement alarms for abnormal behavior Itself immune to penetration Provides perimeter defence

Classification of Firewall Characterized by protocol level it controls in Packet filtering Circuit gateways Application gateways Combination of above is dynamic packet filter

Firewalls – Packet Filters

Firewalls – Packet Filters Simplest of components Uses transport-layer information only IP Source Address, Destination Address Protocol/Next Header (TCP, UDP, ICMP, etc) TCP or UDP source & destination ports TCP Flags (SYN, ACK, FIN, RST, PSH, etc) ICMP message type Examples DNS uses port 53 No incoming port 53 packets except known trusted servers

Usage of Packet Filters Filtering with incoming or outgoing interfaces E.g., Ingress filtering of spoofed IP addresses Egress filtering Permits or denies certain services Requires intimate knowledge of TCP and UDP port utilization on a number of operating systems

How to Configure a Packet Filter Start with a security policy Specify allowable packets in terms of logical expressions on packet fields Rewrite expressions in syntax supported by your vendor General rules - least privilege All that is not expressly permitted is prohibited If you do not need it, eliminate it

Every ruleset is followed by an implicit rule reading like this. Example 1: Suppose we want to allow inbound mail (SMTP, port 25) but only to our gateway machine. Also suppose that mail from some particular site SPIGOT is to be blocked.

Solution 1: Example 2: Now suppose that we want to implement the policy “any inside host can send mail to the outside”.

Solution 2: This solution allows calls to come from any port on an inside machine, and will direct them to port 25 on the outside. Simple enough… So why is it wrong?

What can be a better solution ? Our defined restriction is based solely on the outside host’s port number, which we have no way of controlling. Now an enemy can access any internal machines and port by originating his call from port 25 on the outside machine. What can be a better solution ?

The ACK signifies that the packet is part of an ongoing conversation Packets without the ACK are connection establishment messages, which we are only permitting from internal hosts

Security & Performance of Packet Filters IP address spoofing Fake source address to be trusted Add filters on router to block Tiny fragment attacks Split TCP header info over several tiny packets Either discard or reassemble before check Degradation depends on number of rules applied at any point Order rules so that most common traffic is dealt with first Correctness is more important than speed

Port Numbering TCP connection Permanent assignment Variable use Server port is number less than 1024 Client port is number between 1024 and 16383 Permanent assignment Ports <1024 assigned permanently 20,21 for FTP 23 for Telnet 25 for server SMTP 80 for HTTP Variable use Ports >1024 must be available for client to make any connection This presents a limitation for stateless packet filtering If client wants to use port 2048, firewall must allow incoming traffic on this port Better: stateful filtering knows outgoing requests

Firewalls – Stateful Packet Filters Traditional packet filters do not examine higher layer context ie matching return packets with outgoing flow Stateful packet filters address this need They examine each IP packet in context Keep track of client-server sessions Check each packet validly belongs to one Hence are better able to detect bogus packets out of context A traditional packet filter makes filtering decisions on an individual packet basis and does not take into consideration any higher layer context. A stateful inspection packet filter tightens up the rules for TCP traffic by creating a directory of outbound TCP connections, and will allow incoming traffic to high-numbered ports only for those packets that fit the profile of one of the entries in this directory. Hence they are better able to detect bogus packets sent out of context.

Stateful Filtering

Firewall Outlines Packet filtering Application gateways Circuit gateways Combination of above is dynamic packet filter

Firewall Gateways Firewall runs set of proxy programs Proxies filter incoming, outgoing packets All incoming traffic directed to firewall All outgoing traffic appears to come from firewall Policy embedded in proxy programs Two kinds of proxies Application-level gateways/proxies Tailored to http, ftp, smtp, etc. Circuit-level gateways/proxies Working on TCP level Gateway is like a NAT box, ie, a home router.

Firewalls - Application Level Gateway (or Proxy)

Application-Level Filtering Has full access to protocol user requests service from proxy proxy validates request as legal then actions request and returns result to user Need separate proxies for each service E.g., SMTP (E-Mail) NNTP (Net news) DNS (Domain Name System) NTP (Network Time Protocol) custom services generally not supported

App-level Firewall Architecture FTP proxy Telnet proxy SMTP proxy Telnet daemon FTP daemon SMTP daemon Network Connection Daemon spawns proxy when communication detected …

Enforce policy for specific protocols E.g., Virus scanning for SMTP Need to understand MIME, encoding, Zip archives

Firewall Outlines Packet filtering Application gateways Circuit gateways Combination of above is dynamic packet filter

Firewalls - Circuit Level Gateway

Figure 9.7: A typical SOCKS connection through interface A, and rogue connection through the external interface, B.

Bastion Host Highly secure host system Potentially exposed to "hostile" elements Hence is secured to withstand this Disable all non-required services; keep it simple Trusted to enforce trusted separation between network connections Runs circuit / application level gateways Install/modify services you want Or provides externally accessible services

Screened Host Architecture

Screened Subnet Using Two Routers