Firewalls.

Slides:



Advertisements
Similar presentations
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Advertisements

FIREWALLS Chapter 11.
CCNA – Network Fundamentals
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
Firewalls and Intrusion Detection Systems
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
1 Pertemuan 05 Firewall Matakuliah: H0451/Praktikum Jaringan Komputer Tahun: 2006 Versi: 1/0.
Design and Implementation of a Server Director Project for the LCCN Lab at the Technion.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Chapter 2 Networking Overview. Figure 2.1 Generic protocol layers move data between systems.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Firewall Slides by John Rouda
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
A Brief Taxonomy of Firewalls
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
FIREWALL Mạng máy tính nâng cao-V1.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Chapter 6: Packet Filtering
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
The Security Aspect of Social Engineering Justin Steele.
Firewalls.
Chapter 13 – Network Security
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Access Control List (ACL)
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Firewall Tutorial Hyukjae Jang Nc lab, CS dept, Kaist.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
Role Of Network IDS in Network Perimeter Defense.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
© 2002, Cisco Systems, Inc. All rights reserved..
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Defining Network Infrastructure and Network Security Lesson 8.
Firewalls.
Introduction to Networking
Firewalls.
Chapter 4: Access Control Lists (ACLs)
Network Security: IP Spoofing and Firewall
Setting Up Firewall using Netfilter and Iptables
دیواره ی آتش.
Firewalls Chapter 8.
FIREWALL.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Firewalls

Reading Computer Networking Illuminated Chapter 10.4 - Firewalls Linux Administration: A beginners Guide Linux Firewall 329-355 Concentrate on the Firewall part

Firewalls Network layer firewall Network layer firewalls: Works as a packet filter Decides what packets will pass the firewall According to rules Defined by an administrator Filtering rules can act on the basis of: source address destination address ports higher-level network protocols the packet contains time of day and more… Network layer firewalls: Tend to operate very fast Transparent to users

Network layer firewalls Generally fall into two sub-categories Non-stateful (stateless) Have packet-filtering capabilities Cannot make more complex decisions on what stage communications between hosts have reached Offer less security Somewhat resemble a router in their ability to filter packets Stateful Hold some information on the state of connections as part of their rules For example: established or not, initiation, handshaking, data or breaking down the connection only hosts inside the firewall can establish connections on a certain port

Firewalls Can be: Typically: Software implementation Extra software on the host Any computer running an operating system that supports packet filtering and routing can function as a network layer firewall Appropriate operating systems for such a configuration include Linux, Solaris, BSDs or Windows Server Hardware implementation An external device (computer) with special software Typically: Combination of Hardware devices and Software

Resume 2/4

Stateless Firewalls

Stateless Firewalls A firewall that treats each network frame (or packet) in isolation It has no way of knowing if any given packet is: Part of an existing connection Trying to establish a new connection A rogue packet Typical behavior of firewalls before the advent of stateful firewalls Modern firewalls are connection-aware (or state-aware) Allows network administrators finer-grained control of network traffic

Stateless Firewalls Problem: Classic example is the File Transfer Protocol (FTP) By design FTP opens new connections to random ports Suppose you are the firewall of Company X, protecting the company from unauthorized traffic from the Internet You notice a TCP packet coming from some host across the globe, destined for a machine of your internal network, TCP port number 4970 This port number does not correspond to any well-known service that your protected network is supposed to provide (like Web, FTP or SSH) Discard the packet Just broke a legitimate FTP connection!

Stateless Firewalls FTP (among other protocols) Needs to be able to open connections to arbitrary high ports to function properly E.g. a host's port 4970 Firewall has no way of knowing that the packet destined to the protected network is part of a legitimate FTP session Drops the packet Stateful firewalls solve this problem Maintains a table of open connections Intelligently associates new connection requests with existing, legitimate connections

Stateful Firewalls

Stateful Firewalls A firewall that keeps track of the state of network connections traveling across it such as TCP streams Performs stateful packet inspection or stateful inspection Programmed to distinguish legitimate packets for different types of connections Only packets which match a known connection state will be allowed by the firewall Others will be rejected

Stateful Firewalls Early attempts at producing firewalls operated at the application level of the seven-layer OSI model Required too much CPU power Packet filters operate at the network layer (layer-3) Function more efficiently because they only look at the header part of a packet However, pure packet filters Have no concept of state Subject to spoofing attacks and other exploits

Stateful Firewalls How It Works Holds in memory significant attributes of each connection Start to finish Attributes, collectively known as the state of the connection, may include such details as: IP addresses and ports involved in the connection Sequence numbers of the packets traversing the connection Most CPU intensive checking is performed at the time of setup of the connection All packets after that (for that session) are processed rapidly Simple and fast to determine whether it belongs to an existing, pre-screened session Once the session ends, entry in the state-table is discarded

Stateful Firewalls How It Works Depends on the three-way handshake of the TCP protocol When a client initiates a new connection, it sends a packet with the SYN bit set in the packet header. All packets with the SYN bit set are considered by the firewall as NEW connections. If the service which the client has requested is available on the server Service will reply to the SYN packet with a packet in which both the SYN and the ACK bit are set. Client will then respond with a packet in which only the ACK bit is set Connection will enter the ESTABLISHED state. Firewall built-in to Windows XP will: Pass all outgoing packets through Only allow incoming packets if they are part of an ESTABLISHED connection Ensure hackers cannot start unsolicited connections with the protected machine

Stateful Firewalls How it Works (cont) In order to prevent the state table from filling up Sessions will time out if no traffic has passed for a certain period Stale connections are removed from the state table Many applications therefore send keepalive messages periodically Keeps a firewall from dropping the connection during periods of no user-activity Some firewalls can be instructed to send these messages for applications It is worth noting that the most common Denial of Service attack on the internet these days is the SYN flood A malicious user intentionally sends large amounts of SYN packets to the server in order to overflow its state table Blocks the server from accepting other connections

Stateful Firewalls How it Works (cont) Many stateful firewalls are able to track the state of connections in connectionless protocols, like UDP Such connections usually enter the ESTABLISHED state immediately after the first packet is seen by the firewall Sessions in connectionless protocols can only end by time-out By keeping track of the connection state stateful firewalls provide added efficiency in terms of packet inspection Existing connections: firewall need only check the state table instead of checking the packet against the FW's rule set can be extensive An additional cost when the firewall’s rule set is updated Should cause the state table to be flushed The concept of deep packet inspection is unrelated to stateful firewalls

Stateful Firewalls Application-level Filters Today, firewalls are again using application level filters called proxies - or application level proxies Machines with modern CPU speeds can do deep packet inspection These proxies can read the data part of each packet Make a more intelligent decision about the connection For IRC or peer to peer file sharing protocols Traditional stateful firewalls cannot detect this An application level firewall can detect and selectively block HTTP connections according to content Modern computers typically exchange data by breaking it up to network frames “Packets" in TCP/IP Firewalls inspect each packet and decide: Should be allowed to pass the firewall and continue travelling towards its destination Should it be discarded Common ways of filtering packets are according to the source/destination address or according to the source/destination port

Stateful Firewalls Application-level Filters But in some cases this information is not enough. The administrator of the firewall might want to allow packets to pass the firewall according to the context of the connection, and not just the packet header characteristics. This deep packet inspection provides a much finer grained control Deep packet inspection costs more time to process, thus it is important to compensate for this by also providing stateful inspection Note: The finer-grained security functionality provided by application-level filters can be defeated by users who encrypt packet contents (e.g. by tunneling via SSL)

Stateful Firewalls Examples of stateful firewalls: VPN-1/FireWall-1 Cisco PIX IPFilter Netfilter kernel-level packet filter of the Linux kernel. PF, OpenBSD packet filter, also found in other BSDs Examples of application level proxy firewalls: Sidewinder G2 (Secure Computing) a hybrid of the earlier SC Sidewinder and NAI Gauntlet firewalls closer now to Gauntlet than the old Sidewinder Cyberguard (Now owned by Secure Computing) Gauntlet Symantec Enterprise Firewall

Firewalls: Block unwanted traffic Pass permitted traffic Can block specific protocols Can block by time of day All of the above 1 30 sec

Firewall Summary Firewalls Simply filter out unwanted traffic Can have complex rules Simplest ones allow only return communications from sessions established by the host computer Firewall hardware may have extra features Can mask the real IP address of computers behind it via NAT Many support DHCP

Router vs. Firewall Both: Routers: Firewalls: Examine data presented a NIC Have rules to handle the data Routers: Pass data to where it is needed Ignore otherwise Firewalls: Data is trying to pass to a destination Block data that is not wanted