Lecture 25: Firewalls Introduce several types of firewalls

Slides:



Advertisements
Similar presentations
DMZ (De-Militarized Zone)
Advertisements

Network Security Essentials Chapter 11
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
IUT– Network Security Course 1 Network Security Firewalls.
1 Firewalls. 2 References 1.Mark Stamp, Information Security: Principles and Practice, Wiley Interscience, Robert Zalenski, Firewall Technologies,
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Fall 2008CS 334: Computer Security1 Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for.
Security Firewall Firewall design principle. Firewall Characteristics.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Firewalls and Intrusion Detection Systems
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 7 Network Perimeter Security.
5/4/01EMTM 5531 EMTM 553: E-commerce Systems Lecture 7b: Firewalls Insup Lee Department of Computer and Information Science University of Pennsylvania.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Circuit & Application Level Gateways CS-431 Dick Steflik.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
A Brief Taxonomy of Firewalls
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
FIREWALL Mạng máy tính nâng cao-V1.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Chapter 6: Packet Filtering
Chapter 13 – Network Security
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
8: Network Management1 Firewalls. 8: Network Management2 Firewalls Two firewall types: m packet filter m application gateways To prevent denial of service.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
TCP/IP Protocols Contains Five Layers
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Karlstad University Firewall Ge Zhang. Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…
Security fundamentals Topic 10 Securing the network perimeter.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Security fundamentals
Introduction to Networking
Firewalls.
* Essential Network Security Book Slides.
Firewalls Routers, Switches, Hubs VPNs
Chapter 8 Network Perimeter Security
Firewalls Jiang Long Spring 2002.
Firewalls.
Firewalls Chapter 8.
Introduction to Network Security
Presentation transcript:

Lecture 25: Firewalls Introduce several types of firewalls Discuss their advantages and disadvantages Compare their performances Demonstrate their applications C. Ding -- COMP581 -- L25

What is a Firewall? A firewall is a system of hardware and software components designed to restrict access between or among networks, most often between the Internet and a private Internet. The firewall is part of an overall security policy that creates a perimeter defense designed to protect the information resources of the organization. C. Ding -- COMP581 -- L25

In other words… “A data sentry at the gateway to your network, combining the power of multiple firewall technologies to deliver powerful perimeter security” C. Ding -- COMP581 -- L25

What a Firewall does Implement security policies at a single point Monitor security-related events (audit, log) Provide strong authentication Allow virtual private networks C. Ding -- COMP581 -- L25

What a Firewall does not do Protect against attacks that bypass the firewall Dial-out from internal host to an ISP Protect against internal threats disgruntled employee Insider cooperates with an external attacker Protect against the transfer of virus-infected programs or files C. Ding -- COMP581 -- L25

Firewall - Typical layout A firewall denies or permits access based on policies and rules Protected Private Network Internet C. Ding -- COMP581 -- L25

Protected Private Network Watching for attack Monitor Log Notify Protected Private Network Internet Attack C. Ding -- COMP581 -- L25

Firewall technologies Common firewall technologies: They may be classified into four categories: Packet Filtering Firewalls Circuit Level Firewalls Application Gateway Firewalls (or proxy servers) Stateful Inspection Firewalls (dynamic packet filtering firewalls) These technologies operate at different levels of detail, providing varying degrees of network access protection. These technologies are not mutually exclusive as some firewall products may implement several of these technologies simultaneously. C. Ding -- COMP581 -- L25

The Internet protocol stack Application Transport TCP, UDP . . . Network IP Data Link Physical Leased Line, ISDN, xDSL . . . LAN Interface Card Drivers, MAC Address PPP, Frame Relay . . . WAN LAN C. Ding -- COMP581 -- L25

Packet Filtering Firewalls C. Ding -- COMP581 -- L25

Packet Filtering firewalls The original firewall Works at the network level of the OSI model Applies packet filters based on access rules Source address Destination address Application or protocol Source port number Destination port number C. Ding -- COMP581 -- L25

Packet Filtering firewalls C. Ding -- COMP581 -- L25

Packet Filtering firewalls Packet Filtering is usually an integrated function of a router. Packet filtering relies on Network Layer and Transport Layer information contained in the headers of data packets to police traffic. This information includes source IP address and port number, destination IP address and port number, and protocol used (e.g., TCP, UDP, ICMP). This information is used as the criteria in network access rules. These rules are organized into several “filter sets” and each set handles traffic coming to the firewall over a specific interface. C. Ding -- COMP581 -- L25

Packet Filtering Policy Example My host Other host action name port comments block * microsoft.com Block everything from MS allow My-gateway 25 Allow incoming mail C. Ding -- COMP581 -- L25

Packet Filtering Policy Example Rule 1 2 3 4 5 6 7 8 Direction Out In In & Out Source Address * 10.56* 10.122* 201.32.4.76 Destination 10.56.199* Protocol TCP # Source Port 23 (Telnet) # Destin. 25 (Mail) 513 (rlogin) 20 (FTP) Action Drop Pass Slide 16 C. Ding -- COMP581 -- L25

Web Access Through a Packet Filter Firewall ACK: = positive acknowledgement message for the sender from the receiver. Typically just one bit. C. Ding -- COMP581 -- L25

Packet Filtering Firewalls Firewall/Router Output Filter Access Rules Input Filter Access Rules Internal Network Router Network Network Data Link Data Link Internet Physical Physical C. Ding -- COMP581 -- L25

Packet Filtering Firewalls: pros and cons Advantages: Simple, low cost, transparent to user Disadvantages: Hard to configure filtering rules Hard to test filtering rules Don’t hide network topology (due to transparency) May not be able to provide enough control over traffic C. Ding -- COMP581 -- L25

Circuit Level Firewalls (Circuit Level Gateways) C. Ding -- COMP581 -- L25

Circuit Level Firewalls Circuit level gateways work at the session layer of the OSI model, or the TCP layer of TCP/IP Monitor TCP handshaking between packets to determine whether a requested session is legitimate. C. Ding -- COMP581 -- L25

Circuit Level Firewalls C. Ding -- COMP581 -- L25

Application Gateway Firewalls (Proxy Firewalls) C. Ding -- COMP581 -- L25

Application Gateway firewalls Similar to circuit-level gateways except that they are application specific. Every connection between two networks is made via an application program called a proxy Proxies are application or protocol specific Only protocols that have specific proxies configured are allowed through the firewall; all other traffic is rejected. Gateway that is configured to be a web proxy will not allow any ftp, gopher, telnet or other traffic through C. Ding -- COMP581 -- L25

Application Gateway Firewalls Data Link Network Internet Physical Internal Router Transport Application Application Proxies C. Ding -- COMP581 -- L25

Application Gateway Firewalls C. Ding -- COMP581 -- L25

Application Gateway Strengths Very secure if used in conjunction with an intelligent packet filtering firewall Well designed proxies provide excellent security C. Ding -- COMP581 -- L25

Application Gateway weaknesses Very CPU intensive Requires high performance host computer Host operating system liable to attack Many proxies are transparent to application Not transparent to users Expensive C. Ding -- COMP581 -- L25

Stateful Inspection Firewalls C. Ding -- COMP581 -- L25

Stateful Inspection Firewalls Third generation firewall technology, often referred to as dynamic packet filtering Understands data in packets from the network layer (IP headers) up to the Application Layer Tracks the state of communication sessions C. Ding -- COMP581 -- L25

Stateful Inspection Firewalls Firewall/Router Router Network - Access Rules Transport - Access Rules Application - State Table Inspection Module Data Link Network Internal Physical Internet C. Ding -- COMP581 -- L25

Protected Private Network Dynamic Filtering Stateful Inspection firewalls dynamically open and close ports (application specific connection points) based on access policies. Protected Private Network Firewall checks policies to validate sending computer and allows traffic to pass to Public network Internet User initiates web session Return traffic for validated web session is permitted and the state of the flow is monitored Other traffic from public network is blocked C. Ding -- COMP581 -- L25

Stateful Inspection Strengths Monitors the state of all data flows Dynamically adapts filters based on defined policies and rules Easily adapted to new Internet applications Transparent to users Low CPU overheads C. Ding -- COMP581 -- L25

Stateful Inspection Weaknesses Need to provide new client program Might have problems with the availability of source code for various platforms C. Ding -- COMP581 -- L25

Stateful Inspection Firewalls These are among the most secure firewalls available today “fooling them can be a lot of work” Jon McCown, network security analyst for the - U.S. National Computer Security Agency (NCSA) C. Ding -- COMP581 -- L25

General Performance C. Ding -- COMP581 -- L25

Other Issues about Firewalls C. Ding -- COMP581 -- L25

RADIUS Support Remote Authentication Dial-In User Services A single, central security database for all system users Centralised management of access lists C. Ding -- COMP581 -- L25

Remote access security Dial-in user authenticated Telephony Services Head office Firewall policy assigned to dial-in user before completing connection to network Remote Dial-in user C. Ding -- COMP581 -- L25

Stateful Inspection Implementation Firewall checks policy rules to validate sender Return traffic for validated web session is permitted and the state of the flow is monitored Protected private network Internet User initiates web session Firewall opens required port and allows traffic to pass to public network C. Ding -- COMP581 -- L25

Network Address Translation Firewall substitutes private address to public address and forwards to the Internet Protected private network Internet Firewall translates return flow from Public to Private address User communicates with Internet using a private IP address C. Ding -- COMP581 -- L25

Application Level Gateway Example Gateway completes connection FTP Server If connection is valid the state table is updated and connection to FTP Server established FTP connection initiated from public network Access rules verified C. Ding -- COMP581 -- L25

Session Logging The firewall can be configured to log an extensive range of events Including: All denied packets All allowed packets Selected allowed and denied packet types Etc. C. Ding -- COMP581 -- L25

Notification SNMP/SMTP Email sent to specified address Firewall detects attack (Port Scan) Protected private network Internet SNMP Trap message to management platform SNMP: simple network management protocol C. Ding -- COMP581 -- L25

Notification and Reconfiguration Web Server DMZ Firewall detects attack (SYN Flood) Protected private network Internet Email sent to System Manager Firewall automatically reconfigured to deny all External access to WEB Server C. Ding -- COMP581 -- L25

Secure management Secure encrypted and authenticated remote management Secure Shell “SSH” RSA encryption keys 512 - 2048 bits DES and Triple DES encryption for SSH sessions Can limit access to specific user addresses C. Ding -- COMP581 -- L25

Network configuration examples C. Ding -- COMP581 -- L25

Protected private network Allow all access from private network to the Internet Deny all access from the Internet to the private network Protected private network Internet C. Ding -- COMP581 -- L25

Semi-Militarised Zone Protected private network All unauthorised traffic is blocked Private network for corporate servers and users Internet WEB Server SMZ Firewall policy limits incoming access to WEB and mail server from public network All other incoming traffic blocked SMZ Mail Server Semi Militarised Zone C. Ding -- COMP581 -- L25

Private LAN stays secure Protected private network Internet WEB Server Login:hacker Password:please OK Then! SMZ Mail Server Semi-Militarised Zone C. Ding -- COMP581 -- L25

Protected private network Demilitarised Zone Protected private network Open access between private LAN and DMZ Static filters between private LAN and DMZ used to control access Allow SMTP, From here to there only Internet WEB Server DMZ Mail Server Demilitarised Zone C. Ding -- COMP581 -- L25

Concluding Remarks All that a firewall can do it’s to control network activities between OSI levels 2 and 7. They cannot keep out data carried inside applications, such as viruses within email messages: there are just too many way of encoding data to be able to filter out this kind of threat. Although Firewalls provide a high level of security in today's Private Networks to the outside world we still need the assistance of other related Security components in order to guarantee proper network security. C. Ding -- COMP581 -- L25