Implementing Firewalls

Slides:



Advertisements
Similar presentations
IUT– Network Security Course 1 Network Security Firewalls.
Advertisements

FIREWALLS Chapter 11.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Security Firewall Firewall design principle. Firewall Characteristics.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Firewall Configuration Strategies
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Guide to Network Defense and Countermeasures Third Edition
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 7 Network Perimeter Security.
5/4/01EMTM 5531 EMTM 553: E-commerce Systems Lecture 7b: Firewalls Insup Lee Department of Computer and Information Science University of Pennsylvania.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewalls CS591 Topics in Internet Security November Steve Miskovitz, Steve Peckham, Kan Hayashi.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Chapter 20 Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Chapter 6: Packet Filtering
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
TCP/IP Protocols Contains Five Layers
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Firewall – Survey Purpose of a Firewall – To allow ‘proper’ traffic and discard all other traffic Characteristic of a firewall – All traffic must go through.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Security fundamentals Topic 10 Securing the network perimeter.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Firewall – Survey  Purpose of a Firewall  To allow ‘proper’ traffic and discard all other traffic  Characteristic of a firewall  All traffic must go.
Kevin Harrison LTEC 4550 Assignment 3.  Ethernet Hub  An unsophisticated device that is used for connecting multiple Ethernet devices together.  Typically.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Defining Network Infrastructure and Network Security Lesson 8.
Security fundamentals
CompTIA Security+ Study Guide (SY0-401)
Why do we need Firewalls?
Firewall.
1.
Computer Data Security & Privacy
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
PROJECT PRESENTATION ON INTERNET FIREWALLS PRESENTED BY THE GUARDS
Firewalls.
CompTIA Security+ Study Guide (SY0-401)
6.6 Firewalls Packet Filter (=filtering router)
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Firewalls Purpose of a Firewall Characteristic of a firewall
POOJA Programmer, CSE Department
Chapter 8 Network Perimeter Security
Firewalls Jiang Long Spring 2002.
دیواره ی آتش.
Firewalls.
Firewalls Chapter 8.
Computer Networks Topic 9: Firewalls NCC Education - Title Master.
Presentation transcript:

Implementing Firewalls Based on slides accompanying the book Network Defense and Countermeasures by Chuck Easttom (2018) Chapter 3:

Objectives Understand how firewalls are deployed in different networks host-based firewalls vs router-based firewalls Other configurations

Implementing Firewalls Need to understand the firewall’s relationship to the network it is protecting Most common solutions Network host-based Dual-homed host Router-based firewall Screened host The following slides address each of these solutions.

Network Host-Based Firewalls c.f., Host-Based Firewalls https://www.howtogeek.com/122065/htg-explains-i-have-a-router-do-i-need-a-firewall/ (Windows Firewall) Software-based solution runs on top of an operating system Must harden the operating system: Ensure all patches are updated Uninstall unneeded applications or utilities Close unused ports Turn off all unused services Cheap solution Q: What are the trade-offs (vs commercial-grade firewalls)? Hardening of operating systems is covered more in Chapter 8, “Operating System Hardening.” A ‘host-based firewall’ may become a ‘network host-based firewall’ when it is placed between two segments of networks. On the other hand, a ‘host-based firewall’ may be just a host computer (that is, an end device).

In Practice: Demilitarized Zone (DMZ) Two separate firewalls One faces the outside world One faces the inside Web, email, and FTP servers are located in the area in-between them Explain how a DMZ is configured and the benefits that can be derived from this configuration. Refer to Figure 3.3.

Dual-Homed Hosts Expanded version of the Network Host-based Firewall Also runs on top of the OS of a server An older technology Automatic routing is disabled on the host The outer and the inner networks cannot see each other; both talk to the dual-homed host Disadvantage, as with Network host firewalls, is its reliance on the security of the OS See Figure 3.4 for a sample configuration of a dual-homed host firewall.

Dual-Homed Hosts NOTE: correction in the chart Q: Is the dual-homed host firewall an application-level firewall? http://netcentricnj.com/firewallsystems: Dual-homed gateway firewall “… uses proxy servers on the gateway for access and for services like Telnet, FTP, and e-mail.”

Router-Based Firewall Usually the first line of defense Uses simple packet filtering Ideal for novice administrators Can be preconfigured by vendor for specific needs of user Can be placed between segments of a network Emphasize that the benefit with the router-based solution is its ease of setup and configuration.

Screened Host A combination of firewalls Bastion host and screening router is used Similar in concept to the dual-homed host (except for the use of a screening router) Explain what a Bastion host is and the screening router. Figure 3.5 illustrates this type of setup. Explain that packet filters work at the network layer of the OSI, and these firewall solutions can block traffic on specific ports for both incoming and outgoing traffic.

screened host firewall Image source: http://www.rvs.uni-bielefeld.de/lecture/Unix-SysAdmin/Firewalls/screenedhost.html The packet-filtering router allows only traffic destined to the bastion host. A network-level firewall

screened host firewall Image source: https://docstore.mik.ua/orelly/networking_2ndEd/fire/ch06_02.htm

screened subnet firewall The single bastion host in the screened host firewall is expanded into a subnet of bastion hosts. The subnet is called perimeter network, in which public servers (HTTP, FTP, etc) are hosted. If one of the hosts in the perimeter network is compromised, the hacker can only snoop on traffic transmitted over the subnet (but not traffic between hosts in the protected network). Communication within the protected network is therefore protected from snooping. Q: Is the perimeter network a DMZ? Source: https://docstore.mik.ua/orelly/networking_2ndEd/fire/ch06_03.htm#ch06-1910.html

screened subnet firewall Source: https://docstore.mik.ua/orelly/networking_2ndEd/fire/ch06_03.htm#ch06-1910.html

In Practice: Utmost Security Multiple firewalls Stateful packet inspecting firewall Application gateway Screened firewall routers separating each network segment Dual-perimeter firewall, packet screening on all routers, individual packet filtering firewalls on every server

In Practice: Utmost Security

Selecting and Using a Firewall Configure it properly Consider a consultant for initial setup Review logs periodically for anomalies Utilize statistics for baseline performance Outline the proper use of firewalls and how they can be used to baseline your system performance and what you would use the baseline information for.

Using Proxy Servers Prevent the outside world from gathering information about your internal network Provide valuable log information Can redirect certain traffic, based on configuration Typically runs on the firewall machine Protects against spoofing Include some of your own experiences with proxy servers and how they can benefit your security solution.

Network Address Translation (NAT) Supersedes proxy servers Translates internal IP addresses to public addresses Can explicitly map ports to internal addresses for web servers Explain that some operating systems come with this feature that can be configured separately.

Summary Firewalls and proxy servers are critical for network security solutions Many solutions are available, which vary in price and features Choose the most secure solution that the budget allows

Summary Types of Firewalls Types of Implementations Packet filter Stateful packet inspection Circuit level gateway Application gateway Types of Implementations Host-based Network host-based Router-based Dual-homed, screened host, screened subnet