Guide to Network Defense and Countermeasures Second Edition

Slides:



Advertisements
Similar presentations
DMZ (De-Militarized Zone)
Advertisements

Guide to Network Defense and Countermeasures Second Edition
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Security Firewall Firewall design principle. Firewall Characteristics.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Chapter 11 Firewalls.
Firewall Configuration Strategies
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Firewall Planning and Design Chapter 1. Learning Objectives Understand the misconceptions about firewalls Realize that a firewall is dependent on an effective.
Guide to Network Defense and Countermeasures Third Edition
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewalls CS591 Topics in Internet Security November Steve Miskovitz, Steve Peckham, Kan Hayashi.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Firewall Slides by John Rouda
Guide to Network Defense and Countermeasures Third Edition
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
Guide to Firewalls and VPNs, 3rd Edition
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Chapter 6: Packet Filtering
Chapter 13 – Network Security
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
Chapter 11 Firewalls.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
Windows 7 Firewall.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Guide to Firewalls and VPNs, 3 rd Edition Chapter Five Packet Filtering.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
Security fundamentals Topic 10 Securing the network perimeter.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
CompTIA Security+ Study Guide (SY0-401)
CONNECTING TO THE INTERNET
Why do we need Firewalls?
Firewalls.
CompTIA Security+ Study Guide (SY0-401)
* Essential Network Security Book Slides.
Firewalls Chapter 8.
AbbottLink™ - IP Address Overview
Implementing Firewalls
Presentation transcript:

Guide to Network Defense and Countermeasures Second Edition Chapter 9 Choosing and Designing Firewalls

Objectives Explain what firewalls can and cannot do Describe common approaches to packet filtering Establish a set of rules and restrictions for a firewall Design common firewall configurations Compare hardware and software firewalls Guide to Network Defense and Countermeasures, Second Edition

An Overview of Firewalls Hardware or software Can configure to block unauthorized network access Firewalls cannot protect against malicious insiders Who send proprietary information out of the organization Firewalls cannot protect connections that do not go through it Guide to Network Defense and Countermeasures, Second Edition

What Firewalls Are Network firewall Combination of multiple software and hardware components Earliest firewalls were packet filters Some firewalls are designed for consumers Norton Personal Firewall ZoneAlarm Sygate Personal Firewall Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

What Firewalls Are (continued) Rules for blocking traffic are done case-by-case Actions include: Allow the traffic Block the traffic Customize access Check Point Next Generation (NG) firewall Designed to protect and monitor large-scale networks Firewall appliances Self-contained hardware devices Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

What Firewalls Are Not Firewalls are not a standalone solution Cannot protect from internal threats Need strong security policy and employee education Firewalls must be combined with Antivirus software IDS Open Platform for Security (OPSEC) Protocol used by Check Point NG to integrate with other security products Guide to Network Defense and Countermeasures, Second Edition

Approaches to Packet Filtering Stateless packet filtering Stateful packet filtering Packet filtering depends on position of components Guide to Network Defense and Countermeasures, Second Edition

Stateless Packet Filtering Decides whether to allow or block packets based on information in the protocol headers Filtering based on common IP header features IP address Ports and sockets ACK bits Intruders can get around these defenses Advantage: Inexpensive Disadvantage: Cumbersome to maintain Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Stateful Packet Filtering (continued) Keeps a record of connections a host computer has made with other computers Maintain a file called a state table containing record of all current connections Allows incoming packets to pass through only from external hosts already connected Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Stateful Packet Filtering (continued) Windows Firewall One of the most user-friendly packet filters Improved version of Internet Connection Firewall Can limit the amount of traffic with more precision You can even specify exceptions Advanced tab allows more complex settings Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Packet Filtering Depends on Position Type of filtering a device can do depends on Position of the device in the firewall perimeter Other hardware or software Packet filter placement Between the Internet and a host Between a proxy server and the Internet At either end of a DMZ Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Creating Rules and Establishing Restrictions Rule base Tells firewalls what to do when a certain kind of traffic attempts to pass Points to consider Based on organization’s security policy Include a firewall policy Simple and short as possible. Restrict access to ports and subnets on the internal network from the Internet Control Internet services Guide to Network Defense and Countermeasures, Second Edition

Base the Rule Base on Your Security Policy When configuring rules pay attention to Logging and auditing Tracking Filtering Network Address Translation (NAT) Quality of Service (QoS) Desktop security policy Rule base is a practical implementation of the organization’s policy Guide to Network Defense and Countermeasures, Second Edition

Base the Rule Base on Your Security Policy (continued) Common policies that need to be reflected in the rule base Employees have access to Internet with restrictions Public can access company’s Web and e-mail server Only authenticated traffic can access the internal LAN Employees are not allowed to use instant-messaging Traffic from the company’s ISP should be allowed Block external traffic by instant-messaging software Only network administrator should be able to access internal network directly from the Internet Guide to Network Defense and Countermeasures, Second Edition

Create a Firewall Policy That Covers Application Traffic Addition to security policy Describes how firewall handles application traffic Risk analysis provides a list of applications And associated threats and vulnerabilities General steps to create a firewall policy Identify network applications Determine methods for securing application traffic You must balance security and cost Consider all firewalls in your network Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Create a Firewall Policy That Covers Application Traffic (continued) Firewalls enable you to control access to your computer or network By controlling access to particular applications Options for defining rules Allow traffic Block traffic Ask or prompt Guide to Network Defense and Countermeasures, Second Edition

Keep the Rule Base Simple Keep list of rules as short as possible About 30 and 50 rules Shorter the rule base, faster the firewall will perform Firewalls process rules in a particular order Usually rules are numbered starting at 1 and displayed in a grid Most important rules should be at the top of the list Make the last rule a cleanup rule A catch-all type of rule Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Restrict Subnets, Ports, and Protocols Filtering by IP addresses You can identify traffic by IP address range Most firewalls start blocking all traffic You need to identify “trusted” networks Firewall should allow traffic from trusted sources Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Control Internet Services Web services Employees always want to surf the Internet DNS Resolves fully qualified domain names (FQDNs) to their corresponding IP addresses DNS uses UDP port 53 for name resolution DNS uses TCP port 53 for zone transfers E-mail POP3 and IMAP4 SMTP LDAP and HTTP Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Control Internet Services (continued) FTP Types of FTP transactions Active FTP Passive FTP Filtering by ports Filters traffic based on TCP or UDP port numbers Can filter a wide variety of information Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Control Internet Services (continued) Filtering by ports You can filter out everything but TCP port 80 for Web TCP port 25 for e-mail TCP port 21 for FTP Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Control Internet Services (continued) ICMP message type ICMP functions as a housekeeping protocol Helps networks cope with communication problems Attackers can use ICMP packets to crash a computer Filtering by service Firewalls can filter by the name of a service You do not have to specify a port number Firewalls can also filter by the six TCP control flags Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Control Internet Services (continued) Filtering by service Firewalls can also filter by the IP options Security Loose resource and record routing Strict source and record routing Internet timestamp Guide to Network Defense and Countermeasures, Second Edition

Control Internet Services (continued) Filtering by service Rules should follow a few general practices Firewall with a “Deny All” security policy should start from a clean slate Nobody can connect to the firewall except the administrator Block direct access from the Internet to any computer behind the firewall Permit access to public services in the DMZ Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Designing Firewall Configurations Firewalls can be deployed in several ways As part of a screening router Dual-homed host Screen host Screened subnet DMZ Multiple DMZs Multiple firewalls Reverse firewall Guide to Network Defense and Countermeasures, Second Edition

Screening Router Screening router Determines whether to allow or deny packets based on their source and destination IP addresses Or other information in their headers Does not stop many attacks Especially those that use spoofed or manipulated IP address information Should be combined with a firewall or proxy server For additional protection Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Dual-Homed Host Dual-homed host Computer that has been configured with more than one network interface Only firewall software can forward packets from one interface to another Provides limited security Host serves as a single point of entry to the organization Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Screened Host Screened host Similar to a dual-homed host Can add router between the host and the Internet To carry out IP packet filtering Combines a dual-homed host and a screening router Can function as a gateway or proxy server Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Screened Subnet DMZ DMZ Subnet of publicly accessible servers placed outside the internal LAN Called a “service network” or “perimeter network” Firewall that protects the DMZ is connected to the Internet and the LAN Called a three-pronged firewall Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Multiple DMZ/Firewall Configurations Server farm Group of servers connected in their own subnet Work together to receive requests with the help of load-balancing software Load-balancing software Prioritizes and schedules requests and distributes them to servers Clusters of servers in DMZs help protecting the network from becoming overloaded Each server farm/DMZ can be protected with its own firewall or packet filter Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Multiple Firewall Configurations Protecting a DMZ with two or more firewalls One firewall controls traffic between DMZ and Internet Second firewall controls traffic between protected LAN and DMZ Can also serve as a failover firewall Advantage Can control where traffic goes in the three networks you are dealing with Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Multiple Firewall Configurations (continued) Protecting branch offices with multiple firewalls Multiple firewalls can implement a single security policy Central office has a centralized firewall Directs traffic for branch offices and their firewalls Deploys security policy through this firewall using a security workstation Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Reverse Firewall Reverse firewall Monitors connections headed out of a network Instead of trying to block what’s coming in Helps monitor connection attempts out of a network Originated from internal users Filters out unauthorized attempts Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Comparing Software and Hardware Firewalls Software-based firewalls Hardware-based firewalls Hybrid firewalls Guide to Network Defense and Countermeasures, Second Edition

Software-Based Firewalls Free firewall programs They are not perfect Logging capabilities are not as robust as some commercial products Configuration can be difficult Popular free firewall programs Netfilter ZoneAlarm Sygate Personal Firewall Guide to Network Defense and Countermeasures, Second Edition

Software-Based Firewalls (continued) Commercial firewall programs: Personal firewalls Located between the Ethernet adapter driver and the TCP/IP stack Inspect traffic going between the driver and the stack Popular choices Norton Personal Firewall ZoneAlarm Pro BlackICE PC Protection Sygate Personal Firewall Pro Considered “lightweight” in terms of protection Guide to Network Defense and Countermeasures, Second Edition

Software-Based Firewalls (continued) Commercial firewall programs: Enterprise firewalls Include centralized management option Capable of installing multiple instances from a centralized location Some examples include PGP Desktop 9.0 Check Point NG Proventia security products Novell’s BorderManager Guide to Network Defense and Countermeasures, Second Edition

Hardware Firewalls Advantages Disadvantages Do not depend on conventional OSs Generally more scalable than software firewalls Disadvantages They do depend on nonconventional OSs Tend to be more expensive than software products Guide to Network Defense and Countermeasures, Second Edition

Hybrid Firewalls Hybrid firewall Combines aspects of hardware and software firewalls Benefits from the strengths of both solutions Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Summary Firewall Firewalls are not a standalone solution Hardware or software that blocks unauthorized network access Firewalls are not a standalone solution Combine them with antivirus software and IDSs Firewalls are effective only if configured correctly You can use several different firewall configurations to protect a network Guide to Network Defense and Countermeasures, Second Edition