Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.

Slides:



Advertisements
Similar presentations
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
1 Topic 2 – Lesson 4 Packet Filtering Part I. 2 Basic Questions What is packet filtering? What is packet filtering? What elements are inside an IP header?
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
Fall 2008CS 334: Computer Security1 Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for.
Security Firewall Firewall design principle. Firewall Characteristics.
Firewalls and Intrusion Detection Systems
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 7 Network Perimeter Security.
5/4/01EMTM 5531 EMTM 553: E-commerce Systems Lecture 7b: Firewalls Insup Lee Department of Computer and Information Science University of Pennsylvania.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Chapter 10 Firewalls. Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
A Brief Taxonomy of Firewalls
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Chapter 20 Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Chapter 6: Packet Filtering
Chapter 13 – Network Security
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
Access Control List ACL. Access Control List ACL.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
Internet Security and Firewall Design Chapter 32.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
CSCE 201 Network Security Firewalls Fall CSCE Farkas2 Traffic Control – Firewall Brick wall placed between apartments to prevent the spread.
1 An Introduction to Internet Firewalls Dr. Rocky K. C. Chang 12 April 2007.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
Cryptography and Network Security
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Computer Data Security & Privacy
Prepared By : Pina Chhatrala
Firewalls.
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
* Essential Network Security Book Slides.
Firewalls Routers, Switches, Hubs VPNs
POOJA Programmer, CSE Department
Firewalls By conventional definition, a firewall is a partition made
Firewalls Jiang Long Spring 2002.
دیواره ی آتش.
Firewalls.
FIREWALL.
Presentation transcript:

Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders attempting to: Obtain information, modify information, disrupt communications Solution: firewall –Forms a barrier that protects one network from dangers on another History: –Fireproof walls that are often used in buildings to form a barrier across which fire cannot spread –Helps to contain a fire and limit the amount of damage it can do

Firewalls A firewall can: –Partition machines into those inside the organization and those outside the organization –Enforce an access control policy about what types of traffic are allowed in and out

The Many Tasks of a Firewall Restrict access from the outside –Protect internal machines from external attackers Restrict access to the outside –Enforce a security policy on internal users Provide a focus point and information to network administrators Provide other security services –Authentication, VPN, etc.

Different Types of Firewalls A firewall can be a piece of hardware or software Firewalls can operate at different levels (and do different things) LayerNameTechnology 7ApplicationApplication Gateway 6PresentationEncryption 5SessionSOCKS 4TransportPacket Filter 3NetworkNAT 2PhysicalN/A 1Data LinkN/A

Packet Filtering Screening routers perform packet filtering: –Examine some fields in the packet header: Source and destination IP address Protocol Source and destination port numbers –Allow a packet to pass if it meets the screening criteria –Filtering rules are stateless to increase speed

A Screening Router

Filtering Rules Administrator can specify rules regarding which packets should not pass through the firewall Can block: –Outgoing packets to certain addresses - restrict which outside sites local users can access –Incoming packets from certain addresses - restrict access to specific external sites –Incoming and outgoing requests to specific services –Etc.

Sample Filter Rules Row 1: Block incoming packets from any source to any destination for the finger service (TCP port 79) should be blocked Row 2: Block incoming packets bound for the TFTP service (UDP port 69) Row 3: Block outgoing packets bound for any machine on network

Screening Routers Advantages: –Relatively cheap –Help improve security by blocking packets from/to dangerous sites and services Disadvantages: –Still vulnerable to attacks on enabled services –Potential services are large (and growing) requiring frequent maintenance –Decisions must be made statelessly

SOCKS SOCKS is an IETF-approved proxy protocol for network applications

SOCKS (cont) SOCKS server – application program that acts as a middleman between the client and server SOCKS client – session-layer protocol that passes client requests to the SOCKS server

SOCKS (cont) Advantages: –Provides authentication and access control –Application-independent proxy Disadvantages: –Can not enforce application-dependent protection

Proxy Gateway A proxy gateway is more powerful than a screening router and can therefore do more/better checking: –Examine data (not just header) portion of packets –Remember the past behavior of a connection –Consider context – is this a response from the outside to a request that originated on the inside? –Etc.

Proxy Gateways Two barriers: –Outer barrier: blocks all incoming/outgoing traffic not to/from the proxy gateway –Inner barrier: blocks all incoming/outgoing traffic not from/to the proxy gateway Global Internet Organization’s internet Outer Barrier Proxy Gateway Inner Barrier

Proxy Gateways (cont) Each barrier is implemented by a screening router: –R2 blocks all traffic not destine for the proxy gateway –R1 blocks all traffic not from the proxy gateway Proxy Gateway R1 Global Internet R2 Organization’s internet Stub network

Proxy Gateways (cont) The proxy gateway typically runs a set of application gateway programs Act as middlemen between hosts inside and outside the firewall –Internal hosts communicate with the application gateway program running on the proxy gateway –Application gateway program relays request to the external host –The external host’s reply is sent to the application gateway program –Application gateway program performs some checking and then passes the reply on to the internal host

Proxy Gateway - Example An FTP server behind a proxy gateway firewall –An external client issues commands to establish a connection and transfer files Proxy gateway acts as a middleman between the client and server –The proxy can check incoming commands: Pass only valid FTP commands on to the server Protects the server from malformed or dangerous input –If the external client attempts to upload a file to the server: The proxy could pass the file through virus-scanning software

Proxy Gateways Advantages: –Can provide better protection than a screening router Disadvantages: –Additional cost –Proxy gateway could be a: Bottleneck Single point of failure Tempting target for attackers

Dynamic Firewall Techniques Screening routers and proxy gateways enforce static security policies Dynamic filters allow administrators to set up triggers: –Temporarily add, delete, or modify certain rules in response to particular events Provides additional flexibility: –Permit or deny traffic in special circumstances Provides additional security: –More stringent rules triggered when suspicious traffic is observed

Summary Access Control – need to protect local machines/networks from outsiders attempting to: –Obtain information –Modify information –Disrupt communications Solution: firewalls (screening routers, proxy gateways, etc.) –Forms a barrier that protects one network from dangers on another