Automated Firewalls with Mason William Stearns SANS Instructor, proctor, and network administrator

Slides:



Advertisements
Similar presentations
BSD Packet Filter (PF) David Liana
Advertisements

Chapter 9: Access Control Lists
Ipchains and Iptables Linux operating system natively supports packet-filtering rules: Kernel versions 2.2 and earlier support the ipchains command. Kernel.
© 2003 Avik Sengupta. All Rights Reserved. 1 Secure Firewalls using OpenBSD Avik Sengupta CTO Itellix Software Solutions Pvt Ltd.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Security Firewall Firewall design principle. Firewall Characteristics.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Transparent Caching The art of caching network traffic without requiring user / browser side configuration.
Securing Network using Linux. Lesson Outline Setting up a secure system TCP Wrapper configuration Firewalls in Linux Authentication Systems –NIS –Kerberos.
Ipchains A packet-filtering Firewalls supported by Linux distributions.
Security Issues on Distributed Systems 7 August, 1999 S 1 Prepared by : Lorrien K. Y. Lau Student I.D. : August 1999 The Chinese University.
Poor Man’s Firewall A firewall that can be setup and implemented with a minimum amount of time and money.
System Administration Network Tools. ping Test connectivity / latency (RTT) ICMP echo request/reply Variants ◦ARP ping  Send ARP instead  May also ping.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
NetFilter – IPtables Firewall –Series of rules to govern what Kind of access to allow on your system –Packet filtering –Drop or Accept packets NAT –Network.
07/11/ L10/1/63 COM342 Networks and Data Communications Ian McCrumRoom 5B18 Tel: voice.
Packet Filtering and Firewall
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Presented by Xiaoyu Qin Virtualized Access Control & Firewall Virtualization.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
Access Control List ACL. Access Control List ACL.
Windows 7 Firewall.
Defense Techniques Sepehr Sadra Tehran Co. Ltd. Ali Shayan November 2008.
Access Control Lists (ACLs)
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Access Control List (ACL)
NETWORK SECURITY USING IPTABLES. TOPICS OF DISCUSSION NETWORK TRAFFIC IN PRESENT SCENARIO !! WHY WE NEED SECURITY ? T TYPE OF ATTACKS & WAYS TO TACKLE.
Firewalling With Netfilter/Iptables. What Is Netfilter/Iptables? Improved successor to ipchains available in linux kernel 2.4/2.6. Netfilter is a set.
Firewall Tutorial Hyukjae Jang Nc lab, CS dept, Kaist.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 2 – 6 IP Access Lists 1.
An overview.
1 Firewalls. ECE Internetwork Security 2 Overview Background General Firewall setup Iptables Introduction Iptables commands “Limit” Function Explanation.
Unit - III. Providing a Caching Proxy Server (1) A caching proxy server is software that stores (caches) frequently requested internet objects such as.
Security fundamentals Topic 10 Securing the network perimeter.
Firewalls Group 11Group 12 Bryan Chapman Richard Dillard Rohan Bansal Huang Chen Peijie Shen.
Chapter 4: Implementing Firewall Technologies
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
Module 10: Windows Firewall and Caching Fundamentals.
Firewall Matthew Prestifilippo, Bill Kazmierski, Pat Sparrow.
Linux Firewall For the Office and Home Nov 17, 2001 Matthew Tam, CISSP.
Introduction to Linux Firewall
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
LINUX® Netfilter The Linux Firewall Engine. Overview LINUX® Netfilter is a firewall engine built into the Linux kernel Sometimes called “iptables” for.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Routing with Linux 'cause you really love the command line
防火牆 Firewall All rights reserved. No part of this publication and file may be reproduced, stored in a retrieval system, or transmitted in any form or.
Firewalls. A Firewall is: a) Device that interconnects two networks b) Network device that regulates the access to an internal network c) Program that.
Central Management of 300 Firewalls and Access-Lists Fabian Mauchle TNC 2012 Reykjavík, 21-May-2012.
Lab 12 – Cisco Firewall.
Security fundamentals
Instructor Materials Chapter 7: Access Control Lists
FIREWALL configuration in linux
Firewalls.
Killtest Palo Alto Networks PCNSE7 Exam
Introduction to Networking
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
Chapter 4: Access Control Lists (ACLs)
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
* Essential Network Security Book Slides.
Setting Up Firewall using Netfilter and Iptables
OPS235: Configuring a Network Using Virtual Machines – Part 2
Firewalls By conventional definition, a firewall is a partition made
دیواره ی آتش.
Chapter 4: outline 4.1 Overview of Network layer data plane
Presentation transcript:

Automated Firewalls with Mason William Stearns SANS Instructor, proctor, and network administrator

Getting underway Room monitors Evaluation forms Questions at any point Goals Basics of Linux firewalling Learning process Live demo

Firewalls One small piece of your network security Only affects traffic going in, out, or through your firewall Can be circumvented TCP/IP tunneling in ssh, , DNS, http Using allowed ports for blocked traffic types Additional exit points from network Firewall system needs to be locked down tightly!

Firewall types Packet filtering Stateful Stateless Proxy Better yet, both!

Firewall types, proxies.

Choice of firewall platform Stability Network card support Security and Updates Network performance Ability to audit and strip down Cost Ease of setup

Linux Packet Filtering Separation of Jobs Kernel Command line tools

Linux Packet Filtering types Ipfw (Linux 1.2 kernels) Ipfwadm (Linux 2.0 kernels) Ipchains (Linux 2.2 kernels) Iptables (Linux 2.4 kernels)

ipfw First Linux packet filtering support Linux 1.2 kernels Stateless Very limited Only filtered on one port Never integrated into distributions Not supported by Mason Ported from one of the BSD's by Alan Cox

ipfwadm Linux 2.0 kernels Stateless Filters on source and destination addresses and ports Only TCP, UDP, and ICMP Masquerading (many-to-one NAT) Jos Vos

ipchains Linux 2.2 kernels Stateless Support for ICMP subtypes, protocols other than TCP, UDP and ICMP, and inverse options. Rusty Russell

iptables Linux 2.4, 2.5, and upcoming 2.6 kernels Stateful IPV6 support Backwards compatibility modules for ipfwadm and ipchains Extensible tests and actions Fully modular design

Setting up firewalls Triple threat; limited background in: Security policies TCP/IP (normal and attack patterns) Connecting the two with packet filtering and other security tools. Risk in getting it wrong. Default allow - easy to get going Default deny - orders of magnitude harder

Approaches for creating firewalls Prewritten list of rules Menu interface with small set of choices Menu interface with extensive options Automatic construction of rules based on current network setup. Letting the firewall build itself 

Prewritten list of rules +Good if your network matches the assumptions 1.May need a lot of editing if not 2.They tend to be too permissive

Menu interface with small set of choices +Good for simple networks 1.Poor for complex networks or non-standard networks 2.Poor for non-standard protocols

Menu interface with extensive options +Flexible, good for complex networks 1.Requires a lot of expertise from the administrator

Letting the firewall build itself +Flexible +Doesn't require in-depth knowledge of firewall construction +Handles simple and complex networks 1.May take some time to cover all traffic types.

The world's most efficient and literal bouncer New bouncer Needs to be taught who can go in or out of the bar Told to note individual's age, whether they're part of the owner's family, which direction they want to go and whether they're carrying firearms, and then ask bar owner.

Initial bouncer rules => Write down characteristics, ask owner => block (default policy)

Bouncer rules, part II Carrying firearms => block and call police => Write down characteristics, ask owner => block (default policy)

Bouncer rules, part III Carrying firearms => block and call police Leaving bar => allow to pass => Write down characteristics, ask owner => block (default policy)

Bouncer rules, part IV Carrying firearms => block and call police Leaving bar => allow to pass Entering bar, over 21 => allow to pass => Write down characteristics, ask owner => block (default policy)

Bouncer rules, part V Carrying firearms => block and call police Leaving bar => allow to pass Entering bar, over 21 => allow to pass Part of owner's family => allow to pass => Write down characteristics, ask owner => block (default policy)

Bouncer rules, part VI Carrying firearms => block and call police Leaving bar => allow to pass Entering bar, over 21 => allow to pass Part of owner's family => allow to pass Entering bar, under 21 => block => Write down characteristics, ask owner => block (default policy)

Bouncer rules, part VII Carrying firearms => block and call police Leaving bar => allow to pass Entering bar, over 21 => allow to pass Part of owner's family => allow to pass Entering bar, under 21 => block => block (default policy)

Mason and iterative creation Start off with empty firewall Log all unmatched packets Watch logs for new packets Add rule that would have matched that traffic Keep adding rules until all traffic types encountered

Iptables log format Apr 30 21:04:10 sparrow kernel: IN= OUT=lo SRC= DST= LEN=73 TOS=0x00 PREC=0x00 TTL=64 ID=11339 DF PROTO=UDP SPT=33272 DPT=53 LEN=53

Iptables rule format /sbin/iptables -A OUTPUT -o lo -p udp -s localhost/32 - -sport 1024: d localhost/32 - -dport domain -j ACCEPT #domain/udp (O)

Live demonstration We'll switch over to a Linux laptop for the demo and rejoin here afterwards.

Customization Existing firewall rules Allows administrator to make modifications

Starting firewall at boot ntsysv, tksysv, or linuxconf Manually link /etc/rc.d/init.d/firewall

Troubleshooting Turn off the firewall, see if the problem persists. Restart the firewall, try test, then run: iptables -L -n -x -v | grep -v '^ *0 *0 ' | less -S to see which rules have matched any packets.

Opening packet rules Iptables' stateful nature; use for ESTABLISHED,RELATED. Let Mason build the rules for NEW packets.

Potential projects Cisco IOS FreeBSD, OpenBSD and NetBSD - ipfilter Other routers and firewalls.

Thanks! Linux developers, esp. Rusty Russell Chris Brenton (SANS, Altenet) Steven Northcutt (SANS) ISTS Mason contributors - see the Credits section in the HOWTO.

Where to get it Part of some Linux Distributions Debian Krud Redhat Powertools up to Many other sources

References Questions?