Firewall Configuration Strategies

Slides:



Advertisements
Similar presentations
DMZ (De-Militarized Zone)
Advertisements

Network Security Essentials Chapter 11
Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 9 “Firewalls and Intrusion Prevention.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Guide to Network Defense and Countermeasures Second Edition
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 7 Working with Proxy Servers & Application-Level Firewalls By Whitman, Mattord,
Working with Proxy Servers and Application-Level Firewalls Chapter 5.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Guide to Network Defense and Countermeasures Second Edition
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Chapter 8: Firewall Configuration and Administration
Guide to Network Defense and Countermeasures Third Edition
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Firewall Configuration and Administration. 2 Learning Objectives Set up firewall rules that reflect an organization’s overall security approach Identify.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Chapter 7: Working with Proxy Servers & Application-Level Firewalls
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Firewall Slides by John Rouda
Design Elements for Perimeter Security UNIT-10. Firewall and Router  The firewall and the router are two of the most common perimeter security components.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Guide to Firewalls and VPNs, 3rd Edition
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
NW Security and Firewalls Network Security
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Chapter 6: Packet Filtering
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 8 Firewall Configuration and Administration By Whitman, Mattord, & Austin© 2008.
Karlstad University Firewall Ge Zhang. Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…
Module 11: Designing Security for Network Perimeters.
Security fundamentals Topic 10 Securing the network perimeter.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Security fundamentals
CompTIA Security+ Study Guide (SY0-401)
Why do we need Firewalls?
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Firewalls Routers, Switches, Hubs VPNs
AbbottLink™ - IP Address Overview
Introduction to Network Security
Presentation transcript:

Firewall Configuration Strategies Chapter 3

Learning Objectives Set up firewall rules that reflect an organization’s overall security approach Understand the goals that underlie a firewall’s configuration Identify and implement different firewall configuration strategies Employ methods of adding functionality to your firewall

Establishing Rules and Restrictions for Your Firewall Rules give firewalls specific criteria for making decisions about whether to allow packets through or drop them All firewalls have a rules file—the most important configuration file on the firewall

The Role of the Rules File Establishes the order the firewall should follow Tells the firewall which packets should be blocked and which should be allowed Requirements Need for scalability Importance of enabling productivity of end users while maintaining adequate security

Restrictive Firewalls Block all access by default; permit only specific types of traffic to pass through

Strategies for Implementing a Security Policy Follow the concept of least privilege Spell out services that employees cannot use Use and maintain passwords Choose an approach Open Optimistic Cautious Strict Paranoid

Connectivity-Based Firewalls Have fewer rules; primary orientation is to let all traffic pass through, then block specific types of traffic

Overview to Firewall Configuration Strategies Criteria Scalable Take communication needs of individual employees into account Deal with IP address needs of the organization

Scalability Provide for the firewall’s growth by recommending a periodic review and upgrading software and hardware as needed

Productivity The stronger and more elaborate the firewall, the slower the data transmissions Important features of firewall: processing and memory resources available to the bastion host

Productivity

Dealing with IP Address Issues If service network needs to be privately rather than publicly accessible, which DNS will its component systems use? If you mix public and private addresses, how will Web server and DNS servers communicate? Let the proxy server do the IP forwarding (it’s the security device)

Firewall Configuration Strategies

Firewall Configuration Strategies Settle on general approaches; establish rules for them Deploy firewalls, routers, VPN tunnels, and other tools in a way that will implement rules Use security components to defend against common attacks

Using Security Components to Defend Against Attacks

Screening Router Filters traffic passing between one network and another Simple, minimally secure Two interfaces—external and internal—each with its own unique IP address Performs IP forwarding, based on an access control list (ACL)

Screening Router

Stateful Packet Filtering

Dual-Homed Host A workstation with an internal interface and an external interface to the Internet Disadvantage Host serves as a single point of entry to the organization

Screened Host Similar to dual-homed host, but the host is dedicated to performing security functions Sits exposed on the perimeter of the network rather than behind the firewall Requires two network connections Also called a dual-homed gateway or bastion host

Screened Host

Two Routers, One Firewall Router positioned on the outside Performs initial, static packet filtering Router positioned just inside the network Routes traffic to appropriate computers in the LAN being protected Can do stateful packet filtering

Two Routers, One Firewall

DMZ Screened Subnet Screened subnet Three-pronged firewall Network exposed to external network, but partially protected by a firewall Three-pronged firewall Three network interfaces connect it to: External network DMZ Protected LAN Service network Screened subnet that contains an organization’s publicly accessible server

DMZ Screened Subnet

Three-Pronged Firewall with Only One Firewall Advantages Simplification Lower cost Disadvantages Complexity Vulnerability Performance

Common Service Network Systems Those that contain Web and mail servers Those that contain DNS servers Those that contain tunneling servers

Multiple-Firewall DMZs Achieve the most effective Defense in Depth Help achieve load distribution Added security offsets slowdown in performance Two or more firewalls can be used to protect Internal network One DMZ Two DMZs Branch offices that need to connect to main office’s internal network

Two Firewalls, One DMZ Two firewalls used to set up three separate networks (tri-homed firewall) Internal protected network (behind DMZ) External private network or service network (within DMZ) External network (outside DMZ) Advantage Enables control of traffic in the three networks

Two Firewalls, One DMZ

Two Firewalls, Two DMZs Setting up separate DMZs for different parts of the organization helps balance the traffic load between them

Two Firewalls, Two DMZs

Multiple Firewalls to Protect Branch Offices

Load Distribution Through Layering of Firewalls

Reverse Firewalls Inspect and monitor traffic going out of a network rather than trying to block what’s coming in Help block Distributed Denial of Service (DDoS) attacks

Specialty Firewalls Protect specific types of network communications (eg, e-mail, instant-messaging) Examples Mail Marshal and WebMarshal by Marshal Software OpenReach includes a small-scale packet-filtering firewall for its VPN VOISS Proxy Firewall (VF-1) by VocalData Speedware Corporation sells its own firewall software

Approaches That Add Functionality to a Firewall Network Address Translation (NAT) Encryption Application proxies VPNs Intrusion detection systems (IDSs)

NAT Converts publicly accessible IP addresses to private ones and vice versa; shields IP addresses of computers on the protected network from those on the outside

NAT

Encryption Takes a request, turns it into gibberish using a private key; exchanges the public key with the recipient firewall or router Recipient decrypts the message and presents it to the end user in understandable form

Encryption

Application Proxies Act on behalf of a host; receive requests, rebuild them from scratch, and forward them to the intended location as though the request originated with it (the proxy) Can be set up with either a dual-homed host or a screened host system

Application Proxies Dual-homed setup Screened subnet system Host that contains the firewall or proxy server software has two interfaces, one to the Internet and one to the internal network being protected Screened subnet system Host that holds proxy server software has a single network interface Packet filters on either side of the host filter out all traffic except that destined for proxy server software

Application Proxies on a Dual-Homed Host

VPNs Connect internal hosts with specific clients in other organizations Connections are encrypted and limited only to machines with specific IP addresses VPN gateway can: Go on a DMZ Bypass the firewall and connect directly to the internal LAN

VPN Gateway Bypassing the Firewall

Intrusion Detection Systems Can be installed in external and/or internal routers at the perimeter of the network Built into many popular firewall packages

IDS Integrated into Perimeter Routers

IDS Positioned Between Firewall and Internet

Chapter Summary How to design perimeter security for a network that integrates firewalls with a variety of other software and hardware components Rules and restrictions that influence configuration of a security perimeter Security configurations that either perform firewall functions or that use firewalls to create protected areas