CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.

Slides:



Advertisements
Similar presentations
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Advertisements

IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
Ipchains and Iptables Linux operating system natively supports packet-filtering rules: Kernel versions 2.2 and earlier support the ipchains command. Kernel.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Fall 2008CS 334: Computer Security1 Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for.
Security Firewall Firewall design principle. Firewall Characteristics.
Firewalling Techniques Prabhaker Mateti. ACK Not linux specific Not linux specific Some figures are from 3com Some figures are from 3com.
Firewall Configuration Strategies
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 7 Network Perimeter Security.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Security Issues on Distributed Systems 7 August, 1999 S 1 Prepared by : Lorrien K. Y. Lau Student I.D. : August 1999 The Chinese University.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Firewalls: General Principles & Configuration (in Linux)
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
A Brief Taxonomy of Firewalls
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Chapter 20 Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
NW Security and Firewalls Network Security
Intranet, Extranet, Firewall. Intranet and Extranet.
NetFilter – IPtables Firewall –Series of rules to govern what Kind of access to allow on your system –Packet filtering –Drop or Accept packets NAT –Network.
Chapter 6: Packet Filtering
October 15, 2002Serguei A. Mokhov, 1 Intro to Internet-services from Security Standpoint SOEN321-Information-Systems Security Revision.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Defense Techniques Sepehr Sadra Tehran Co. Ltd. Ali Shayan November 2008.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Firewalling With Netfilter/Iptables. What Is Netfilter/Iptables? Improved successor to ipchains available in linux kernel 2.4/2.6. Netfilter is a set.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Firewall Tutorial Hyukjae Jang Nc lab, CS dept, Kaist.
Packet Filtering COMP 423. Packets packets datagram To understand how firewalls work, you must first understand packets. Packets are discrete blocks of.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Operating Systems Proj.. Background A firewall is an information technology (IT) security device which is configured to permit, deny or proxy data connections.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
1 Firewalls. ECE Internetwork Security 2 Overview Background General Firewall setup Iptables Introduction Iptables commands “Limit” Function Explanation.
Security fundamentals Topic 10 Securing the network perimeter.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Firewall C. Edward Chow CS691 – Chapter 26.3 of Matt Bishop Linux Iptables Tutorial by Oskar Andreasson.
A Network Security -Firewall Bruce Turin.
1 An Introduction to Internet Firewalls Dr. Rocky K. C. Chang 12 April 2007.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Firewalls. A Firewall is: a) Device that interconnects two networks b) Network device that regulates the access to an internal network c) Program that.
Security fundamentals
FIREWALL configuration in linux
Chapter3 Security Strategies.
Computer Data Security & Privacy
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
* Essential Network Security Book Slides.
Firewalls Purpose of a Firewall Characteristic of a firewall
Setting Up Firewall using Netfilter and Iptables
Firewalls By conventional definition, a firewall is a partition made
Firewalls Jiang Long Spring 2002.
AbbottLink™ - IP Address Overview
Presentation transcript:

CSCI 530 Lab Firewalls

Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering Proxy Servers Firewall Architecture example netfilter & IPTables

Firewall Hardware and/or software device which prevents communication based on a particular policy Basic task is to control traffic between “zones of trust” Example: Filtering traffic between the internet and local intranet

Firewall Capabilities Separate your network into logical sections Enforce Security policy Many services are intermittently insecure A firewall limits the amount of exposure of particular services Logs Internet activity Limits your network exposure

Firewall limitations Most cannot automatically adapt to new threats Cannot stop a malicious user - IDS Cannot limit traffic that does not pass through it Cannot stop viruses from permeating the network

What are you limiting? File Transfer Remote Terminal Access and Command Execution HTTP Other information services Information about people, Finger whois Real time conferencing Domain Name Service Network management services Time Service Network File System

Network Security Strategies Least Privilege Most fundamental principal User or service is given privileges just for performing specific tasks Defense In depth Don’t just depend on one security mechanism Choke point Forces the attacker to use a narrow channel So now one can monitor activities closely

Security Strategies Weakest link or “low hanging fruit” “ a chain is as strong as its weakest link” Attacker is going to go after the weakest link So if you cannot eliminate it, be cautious about it. Fail Safe Stance If a system fails, it should deny access to the attacker Default Deny Stance That which is not expressly permitted is prohibited Default Permit Stance That which is not expressly prohibited is Permitted Universal Participation Every system is involved in defense Diversity of defense Use different types of mechanisms

Definitions Host A computer system attached to the network Dual-Homed Host A host with two network interfaces Bastion Host A host which is the portal to a network. It is normally extremely secure. This is normally also a dual-homed host. Packet The fundamental unit of data, used for communication on the internet

Firewall – Packet Filtering Set of rules that either allow or disallow traffic to flow through the firewall Can filter based on any information in the Packet Header IP Source Address IP destination address Protocol Source Port Destination Port Message type Interface the packets arrive on and leave

Proxy Servers Specialized application or server programs that run on a firewall host Normally a bastion host These programs sit in between the internal users and servers outside serving for internet applications like telnet, ftp, http… So instead of talking directly to the external server the requests pass through the proxy Also called as application level gateways

Proxy servers How do they work Proxy server ‘Ps’ Proxy client ‘Pc’ Pc talks to the Ps which intern talks to the real server for it, Before that it checks the security policy and decides whether to go ahead with the connection or not.

Firewall Dual Homed Host Firewall Architectures Dual-Homed Bastion Host INTERNET

Firewall Architectures Dual-Homed Bastion Host Dual homed Host Firewall Built around dual homed bastion host Host are capable of routing packets between networks The host sits between the networks, filtering the traffic between the two It only provides services by proxy

Netfilter The software of the packet filtering framework inside the Linux 2.4.x and 2.6.x kernel series. Enables packet filtering, network address [and port] translation (NA[P]T). It is the re-designed and heavily improved successor of ipchains and ipfwadmipchainsipfwadm set of hooks inside the Linux kernel allows kernel modules to register callback functions with the network stack A registered callback function is then called back for every packet that traverses the respective hook within the network stack.

IPtables an interface to the kernel for firewall rules inserts and deletes rules from the kernel's packet filtering table IPtables and netfilter make the backbone of packet-filtering based linux firewalls

Packet Filtering - IPtables A packet is checked against the rule chains and its fate is decided by the chain Three sets of rule Chains INPUT FORWARD OUTPUT A packet comes in, kernel checks for the destination (routing) If it is for this host, it is passed to INPUT chain If forwarding enabled, the packet is forwarded to the destination if it is ACCEPTED by the FORWARD chain If packet is generated in the same box and is being issued out, the OUTPUT chain is referred. Rules are matched in a chain in a chronological order looking for a match, If no match is found till the end, decision is taken according to your security policy

IPTables Example iptables -A INPUT -s p icmp -j DROP -A append the rule to the input chain -s source ip -p protocol -j action to be taken