FIREWALLS Chapter 11.

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 9 “Firewalls and Intrusion Prevention.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 9: Firewalls and Intrusion Prevention.
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 9 – Firewalls and.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Firewalls Uyanga Tserengombo
IUT– Network Security Course 1 Network Security Firewalls.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
FIREWALLS – Chapter 20 network-based threats access to outside world Functionality, Design Security – trusted system.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
Fall 2008CS 334: Computer Security1 Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for.
Kittiphan Techakittiroj (21/05/58 10:00 น. 21/05/58 10:00 น. 21/05/58 10:00 น.) Firewall Kittiphan Techakittiroj
Lecture 14 Firewalls modified from slides of Lawrie Brown.
Security Firewall Firewall design principle. Firewall Characteristics.
Firewalling Techniques Prabhaker Mateti. ACK Not linux specific Not linux specific Some figures are from 3com Some figures are from 3com.
—On War, Carl Von Clausewitz
Chapter 11 Firewalls.
Firewall Configuration Strategies
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
5/4/01EMTM 5531 EMTM 553: E-commerce Systems Lecture 7b: Firewalls Insup Lee Department of Computer and Information Science University of Pennsylvania.
Chapter 10 Firewalls. Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent.
Electronic Commerce 2. Definition Ecommerce is the process of buying and selling products and services via distributed electronic media, usually the World.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Spring 2004 CMPE 151: Network Administration Lecture 6.
EE579T/6GD #1 Summer 2003 © , Richard A. Stanley EE579T Network Security 6: Firewalls and Trusted Networks Prof. Richard A. Stanley.
Firewalls CS591 Topics in Internet Security November Steve Miskovitz, Steve Peckham, Kan Hayashi.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Firewalls: General Principles & Configuration (in Linux)
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Chapter 20 Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
NW Security and Firewalls Network Security
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Fall 2004CS 395: Computer Security1 Chapter 20: Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
1 Pertemuan 13 IDS dan Firewall Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
The Security Aspect of Social Engineering Justin Steele.
Chapter 11 Firewalls.
8: Network Management1 Firewalls. 8: Network Management2 Firewalls Two firewall types: m packet filter m application gateways To prevent denial of service.
1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University R355.
Firewalls, etc.. Network Security2 Outline Intro Various firewall technologies: –Static Packet Filtering (or nonstateful packet filter) –Dynamic Packet.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Firewalls, etc. (Some of the slides in this file were adapted from Oppliger’s online slides at
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
Firewall – Survey Purpose of a Firewall – To allow ‘proper’ traffic and discard all other traffic Characteristic of a firewall – All traffic must go through.
1.1 1 Purpose of firewall : –Control access to or from a protected network; –Implements network access policy connections pass through firewall and are.
Karlstad University Firewall Ge Zhang. Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…
Security fundamentals Topic 10 Securing the network perimeter.
CSCE 201 Network Security Firewalls Fall CSCE Farkas2 Traffic Control – Firewall Brick wall placed between apartments to prevent the spread.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Cryptography and Network Security
Computer Security Firewalls and Intrusion Prevention Systems.
Fall 2006CS 395: Computer Security1 Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for.
Security fundamentals
Why do we need Firewalls?
Firewall.
Computer Data Security & Privacy
Prepared By : Pina Chhatrala
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
* Essential Network Security Book Slides.
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
Firewalls Purpose of a Firewall Characteristic of a firewall
Presentation transcript:

FIREWALLS Chapter 11

Firewall Design Principles Firewall Characteristics All traffic from inside to outside and vice-versa must pass through the firewall. Achieved by physically blocking all access to local networks except via the firewall. Only authorized traffic, as defined by the local security policy, will be allowed to pass. The firewall itself is immune to infiltration.

Firewall Access Techniques Service Control Determines the types of internet services that can be accessed, inbound or outbound. The firewall may filter traffic on the basis of IP address and TCP port number; may provide proxy software that receives and interprets each service request before passing it on; or may host the server software itself, such as a Web or mail service.

Firewall Access Techniques (Cont.) Direction Control Determines the direction in which particular service requests may be initiated and allowed to flow through the firewall. User Control Controls access to a service according to which user is attempting to access it. Typically applied to users inside the firewall perimeter (local users).

Firewall Access Techniques (Cont.) Behavior Control Controls how particular services are used. For example, the firewall may filter e-mail to eliminate spam, or it may enable external access to only a portion of the information on a local web server.

Capabilities of a Firewall Defining a single choke point The use of a single choke point simplifies security management because security capabilities and resources are consolidated on a single system or set of systems. Simplification A firewall provides a location for monitoring all security-related events. Audits and alarms may be implemented on the system.

Capabilities of a Firewall (Cont.) Convenient Platform A firewall is a convenient platform for many non-security related events such as a network address translator, which maps local addresses to Internet addresses, and a network management function that audits or logs Internet Usage.

Capabilities of a Firewall (Cont.) IPSec A firewall can serve as a platform for IPSec. Using the tunnel mode capability, the firewall can be used to implement virtual private networks.

Firewall Limitations Bypassing Attacks The firewall cannot protect against attacks which bypass the firewall. Internal systems may have dial-out capability to connect to an ISP. An internal LAN may support a modem pool that provides dial-in capability for traveling employees and telecommuters.

Firewall Limitations (Cont.) Internal Threats The firewall does not protect against internal threats, such as a disgruntled employee or an employee who unwittingly cooperates with an external attacker.

Firewall Limitations (Cont.) Virus-Infected Programs or Files Because of the variety of operating systems and applications supported inside the perimeter, it would be impractical if not impossible to scan all incoming files, e-mail, and messages for viruses.

Types of Firewalls Packet-Filtering Router A packet-filtering router applies a set of rules to each incoming IP packet and then forwards or discards the packet. The router is typically configured to filter packets going in both directions (from and to the internal network). Filtering rules are based on information contained in a network packet.

Types of Firewalls (Cont.) Packet-Filtering Router

Types of Firewalls (Cont.) Packet-Filtering Router Advantages One advantage to this type of firewall is its simplicity. Another is that these firewalls are typically transparent to users and are very fast.

Types of Firewalls (Cont.) Packet-Filtering Router Disadvantages Because they do not examine upper-layer data, they cannot prevent attacks that employ application-specific vulnerabilities. Logging functionality present in packet filter firewalls is limited. Do not support advanced user authentication schemes.

Types of Firewalls (Cont.) Packet-Filtering Router Disadvantages Generally vulnerable to attacks and exploits that take advantage of problems within the TCP/IP specification and protocol stack. Susceptible to security breaches caused by improper configurations due to the small number of variables used in access control decisions.

Types of Firewalls (Cont.) Packet-Filtering Router Attacks IP Address Spoofing Source Routing Attacks Tiny Fragment Attacks

Types of Firewalls (Cont.) Packet-Filtering Examples

Types of Firewalls (Cont.) Stateful Inspection Firewalls A stateful inspection packet filter tightens up the rules of TCP traffic by creating a directory of outbound TCP connections. Now, with an entry for each currently established connection, the packet filter will now allow incoming traffic to high-numbered ports only for those packets that fit the profile of one of the entries in this directory.

Types of Firewalls (Cont.) Stateful Inspection Firewalls

Types of Firewalls (Cont.) Application-Level Gateway Also called a proxy server, acts as a relay of application-level traffic. Usually more secure than packet filters. Also easy to log and audit all incoming traffic at the application level. The disadvantage is the additional processing overhead on each connection.

Types of Firewalls (Cont.) Application-Level Gateway

Types of Firewalls (Cont.) Circuit-Level Gateway Does not permit an end-to-end TCP connection; rather, the gateway sets up two TCP connections, one between itself, and the user on the inner host and one between itself and the user on the outside host. The gateway typically relays TCP segments between the two parties without examination. The security lies in the fact that it determines which connections will be allowed.

Types of Firewalls (Cont.) Circuit-Level Gateway

Types of Firewalls (Cont.) Bastion Host A system identified by the firewall administrator as a critical strong point in the network’s security. Serves as a platform for application-level and circuit-level gateways.

Firewall Configurations Screened Host Firewall System Single-Homed Bastion Host

Firewall Configurations Screened Host Firewall System (Single) Firewall consists of two systems A packet-filtering router Configured so that for traffic from the internet, only IP packets destined for the bastion host are allowed in and for traffic from the internal network, only IP packets from the bastion host are allowed. A bastion host Performs authentication and proxy functions.

Firewall Configurations Screened Host Firewall System (Dual-Homed Bastion Host)

Firewall Configurations Screened Host Firewall System (Double) Prevents attacks in which the packet-filtering router have been completely compromised.

Firewall Configurations Screened Subnet Firewall

Firewall Configurations Screened Subnet Firewall Most secure of these 3 configurations. Two packet-filtering routers, one between the bastion host and the Internet and one between the bastion host and the internal network. This configuration creates an isolated sub-network.