Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls.

Slides:



Advertisements
Similar presentations
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.2: IPsec.
Advertisements

Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 3.1 Overview of Authentication.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.6 Kerberos.
Network Security Essentials Chapter 11
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Firewalls Uyanga Tserengombo
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Chapter 10 Firewalls. Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent.
1 Pertemuan 05 Firewall Matakuliah: H0451/Praktikum Jaringan Komputer Tahun: 2006 Versi: 1/0.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Firewalls: General Principles & Configuration (in Linux)
1 Enabling Secure Internet Access with ISA Server.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
A Brief Taxonomy of Firewalls
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Chapter 6: Packet Filtering
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Filtering in Firewall By Fantastic 5. Agenda What is Firewall? Types Of Firewall Pros and Cons Of Different Firewalls What Firewall can do? What Firewall.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Crossing firewalls Liane Tarouco Leandro Bertholdo RNP POP/RS.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
1 Firewalls. 2 What is a firewall? Device that provides secure connectivity between networks (internal/external; varying levels of trust) Used to implement.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Firewall – Survey Purpose of a Firewall – To allow ‘proper’ traffic and discard all other traffic Characteristic of a firewall – All traffic must go through.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Firewalls and proxies Unit objectives
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Security fundamentals Topic 10 Securing the network perimeter.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Firewalls Lesson Introduction Part of network defense-in-depth
Firewalls Check incoming and outgoing TCP/IP messages Try to roughly identify abnormal traffic Regulate Inbound and Outbound connections - Make your machine.
Firewall Technology and InterCell Communication Peter T. Dinsmore Trusted Information Systems Network Associates Inc 3060 Washington Rd (Rt. 97) Glenwood,
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Cryptography and Network Security
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Security fundamentals
Top 5 Open Source Firewall Software for Linux User
Computer Data Security & Privacy
Prepared By : Pina Chhatrala
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
PROJECT PRESENTATION ON INTERNET FIREWALLS PRESENTED BY THE GUARDS
Firewalls.
6.6 Firewalls Packet Filter (=filtering router)
* Essential Network Security Book Slides.
Firewalls (March 2, 2016) © Abdou Illia – Spring 2016.
Firewalls Purpose of a Firewall Characteristic of a firewall
POOJA Programmer, CSE Department
Firewalls Jiang Long Spring 2002.
Firewall.
Presentation transcript:

Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls

Computer Science CSC 474Dr. Peng Ning2 Outline What are firewalls? Types –Filtering Packet filtering Session filtering –Proxy Circuit Level Application Level Brief introduction to Linux firewall

Computer Science CSC 474Dr. Peng Ning3 What is a firewall? Device that provides secure connectivity between networks (internal/external; varying levels of trust) Used to implement and enforce a security policy for communication between networks Trusted Networks Untrusted Networks & Servers Firewall Router Internet Intranet DMZ Public Accessible Servers & Networks Trusted Users Untrusted Users

Computer Science CSC 474Dr. Peng Ning4 Firewalls Can … Restrict incoming and outgoing traffic by IP address, ports, etc. Block invalid packets Its also convenient … –Give insight into traffic mix via logging –Network Address Translation –Encryption

Computer Science CSC 474Dr. Peng Ning5 Firewalls Cannot Protect… Traffic that does not cross it –routing around –Internal traffic When misconfigured

Computer Science CSC 474Dr. Peng Ning6 Internet DMZ Net Web Server Pool Corporate Network ALERT!! Security Requirement Control access to network information and resources Protect the network from attacks Access Control

Computer Science CSC 474Dr. Peng Ning7 Filtering Typically route packets Packets checked then passed May have different policies for inbound and outbound packets Some firewalls need to understand the application protocols May perform –Fragmentation/reassembly –Sequence number checking

Computer Science CSC 474Dr. Peng Ning8 Filtering (Contd) Packet filtering –Access Control Lists Session filtering –Dynamic Packet Filtering –Stateful Inspection –Smart Packet Filtering –Context Based Access Control

Computer Science CSC 474Dr. Peng Ning9 Packet Filtering Decisions made on a per-packet basis No state information saved If dynamic protocols are in use, entire ranges of ports must be allowed for the protocol to work. Example configuration –Deny access to ports <= 1024, and allow access to all the others.

Computer Science CSC 474Dr. Peng Ning10 Applications Presentations Sessions Transport DataLink Physical DataLink Physical Router Applications Presentations Sessions Transport DataLink Physical Packet Filtering (Contd) Network Network

Computer Science CSC 474Dr. Peng Ning11 Session Filtering Packet decision made in the context of a connection If packet is a new connection, check against security policy If packet is part of an existing connection, match it up in the state table & update table Example configuration

Computer Science CSC 474Dr. Peng Ning12 Applications Presentations Sessions Transport DataLink Physical DataLink Physical Applications Presentations Sessions Transport DataLink Physical Network Presentations Sessions Transport Applications Dynamic State Tables l Screens ALL attempts, Protects All applications l Extracts & maintains state information l Makes an intelligent security / traffic decision Session Filtering (Contd)

Computer Science CSC 474Dr. Peng Ning13 Proxy Firewalls Relay for connections Client Proxy Server Two flavors –Application level –Circuit level

Computer Science CSC 474Dr. Peng Ning14 Application Gateways Understands specific applications –Limited proxies available –Proxy impersonates both sides of connection Resource intensive –process per connection HTTP proxies may cache web pages

Computer Science CSC 474Dr. Peng Ning15 Application Gateways More appropriate to TCP Must write a new proxy application to support new protocols –Not trivial!

Computer Science CSC 474Dr. Peng Ning16 Application Gateways Clients configured for proxy communication Transparent Proxies

Computer Science CSC 474Dr. Peng Ning17 Applications Presentations Sessions Transport DataLink Physical Network DataLink Physical Applications Presentations Sessions Transport DataLink Physical Application Gateway Applications Presentations Sessions Transport Network Network TelnetTelnetHTTPHTTPFTPFTP Application Layer GW/proxy

Computer Science CSC 474Dr. Peng Ning18 Circuit-Level Gateways Support more services than Application-level Gateway –less control over data Hard to handle protocols like FTP –Passive FTP is usually okay Clients must be aware they are using a circut- level proxy

Computer Science CSC 474Dr. Peng Ning19 SOCKS Circuit level Gateway Support TCP SOCKS v5 supports UDP, earlier versions did not See

Computer Science CSC 474Dr. Peng Ning20 Comparison SecurityPerformanceServiceSupport Packet Filter31No dynamic w/o holes Session Filter22Dependent on vendor for dynamic support Circuit GW23 App. GW14Typically < 20 Lower is better for security & performance

Computer Science CSC 474Dr. Peng Ning21 Comparison (Contd) Modify Client Applications? Packet FilterNo Session FilterNo Circuit GWTypical, SOCKS-ify client applications App. GWUnless transparent, client application must be proxy-aware & configured

Computer Science CSC 474Dr. Peng Ning22 Comparison (Contd) ICMPFragmentation Packet FilterYesNo Session FilterYesMaybe Circuit GW (SOCKS v5) Yes App. GWNoYes

Computer Science CSC 474Dr. Peng Ning23 Linux Firewall: iptables History –ipfw –ipfwadm –ipchains –iptables Based on the netfilter framework

Computer Science CSC 474Dr. Peng Ning24 The Netfilter Framework A framework for packet mangling Protocol stacknetfilter … Kernel modules hooks Kernel User space

Computer Science CSC 474Dr. Peng Ning25 The Netfilter Framework (Contd) Current protocols –IPv4, IPv6, and DECnet. Five hooks for IPv4 –[1]: Pre-routing hook; [2]: Local-in hook; –[3]: Forward hook; [4]: Local-out hook; –[5]: Post-routing hook A packet traversing the netfilter system: [1] [2] [ROUTE] [3] [4] [5]

Computer Science CSC 474Dr. Peng Ning26 Packet Filtering A packet traversing the netfilter system: [1] [2] [ROUTE] [3] [4] [5] Packet filtering only uses these three hooks

Computer Science CSC 474Dr. Peng Ning27 IP Tables A packet selection system –Direct descendent of ipchains Used for –Packet filtering –Network Address Translation (NAT) Masquerading, port forwarding, transparent proxying –Packet mangling Actual changing of packet information

Computer Science CSC 474Dr. Peng Ning28 User Space Tool: iptables iptables –Command to configure and communicate with the kernel modules iptables for packet filtering –Three chains INPUT OUTPUT FORWARD

Computer Science CSC 474Dr. Peng Ning29 Iptables for Packet Filtering You need three things to configure a firewall rule –Which chain? –What packet pattern? –What action to apply? Example –Drop all packets from –iptables -A INPUT -s j DROP –Use man iptables on Linux to get more information.