Firewalls CS-455 Dick Steflik. Firewalls Sits between two networks –Used to protect one from the other –Places a bottleneck between the networks All communications.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Personal Info 1 Prepared by: Mr. NHEAN Sophan  Presenter: Mr. NHEAN Sophan  Position: Desktop Support  Company: Khalibre Co,. Ltd 
Defining Network Infrastructure and Security
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
By Vikas Debnath KV IT-Solutions Pvt. Ltd.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
SCSC 455 Computer Security Virtual Private Network (VPN)
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
Circuit & Application Level Gateways CS-431 Dick Steflik.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Proxy Servers CS-480b Dick Steflik Proxy Servers Part of an overall Firewall strategy Sits between the local network and the external network Originally.
Guide to Computer Network Security
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Firewalls: General Principles & Configuration (in Linux)
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Firewall Slides by John Rouda
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Network Address Translation (NAT) CS-480b Dick Steflik.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
FIREWALLS For more notes and topics visit:
Chapter 6: Packet Filtering
Chapter 13 – Network Security
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
Firewall and its working By Mithila Palamakula. Firewall  Sits between two networks  Used to protect one from the other  Places a bottleneck between.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
TCP/IP Protocols Contains Five Layers
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Firewall Security.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Security fundamentals Topic 10 Securing the network perimeter.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Defining Network Infrastructure and Network Security Lesson 8.
Security fundamentals
CONNECTING TO THE INTERNET
Introduction to Networking
Firewalls.
6.6 Firewalls Packet Filter (=filtering router)
Guide to Computer Network Security
* Essential Network Security Book Slides.
AbbottLink™ - IP Address Overview
Introduction to Network Security
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Firewalls CS-455 Dick Steflik

Firewalls Sits between two networks –Used to protect one from the other –Places a bottleneck between the networks All communications must pass through the bottleneck – this gives us a single point of control

Protection Methods Packet Filtering –Rejects TCP/IP packets from unauthorized hosts and/or connection attempts bt unauthorized hosts Network Address Translation (NAT) –Translates the addresses of internal hosts so as to hide them from the outside world –Also known as IP masquerading Proxy Services –Makes high level application level connections to external hosts on behalf of internal hosts to completely break the network connection between internal and external hosts

Other common Firewall Services Encrypted Authentication –Allows users on the external network to authenticate to the Firewall to gain access to the private network Virtual Private Networking –Establishes a secure connection between two private networks over a public network This allows the use of the Internet as a connection medium rather than the use of an expensive leased line

Additional services sometimes provided Virus Scanning –Searches incoming data streams for virus signatures so theey may be blocked –Done by subscription to stay current McAfee / Norton Content Filtering –Allows the blocking of internal users from certain types of content. Usually an add-on to a proxy server Usually a separate subscription service as it is too hard and time consuming to keep current

Packet Filters Compare network and transport protocols to a database of rules and then forward only the packets that meet the criteria of the rules Implemented in routers and sometimes in the TCP/IP stacks of workstation machines –in a router a filter prevents suspicious packets from reaching your network –in a TCP/IP stack it prevents that specific machine from responding to suspicious traffic should only be used in addition to a filtered router not instead of a filtered router

Limitations of Packet Filters IP addresses of hosts on the protected side of the filter can be readily determined by observing the packet traffic on the unprotected side of the filter filters cannot check all of the fragments of higher level protocols (like TCP) as the TCP header information is only available in the first fragment. –Modern firewalls reconstruct fragments then checks them filters are not sophisticated enough to check the validity of the application level protocols imbedded in the TCP packets

Network Address Translation Single host makes requests on behalf of all internal users –hides the internal users behind the NAT’s IP address –internal users can have any IP address should use the reserved ranges of n.m or 10.n.m.p to avoid possible conflicts with duplicate external addresses Only works at the TCP/IP level –doesn’t do anything for addresses in the payloads of the packets

Proxies Hides internal users from the external network by hiding them behind the IP of the proxy Prevents low level network protocols from going through the firewall eliminating some of the problems with NAT Restricts traffic to only the application level protocols being proxied proxy is a combination of a client and a server; internal users send requests to the server portion of the proxy which then sends the internal users requests out through its client ( keeps track of which users requested what, do redirect returned data back to appropriate user)

Proxies Address seen by the external network is the address of the proxy Everything possible is done to hide the identy if the internal user – addresses in the http headers are not propigated through the proxy10 Doesn’t have to be actual part of the Firewall, any server sitting between the two networks and be used

Content filtering Since an enterprise owns the computing and network facilities used by employees, it is perfectly within it’s rights to attempt to limit internet access to sites that could be somehow related to business –Since the proxy server is a natural bottle neck for observing all of the external requests being made from the internal network it is the natural place to check content –This is usually done by subscription to a vendor that specializes in categorizing websites into content types based on observation –Usually an agent is installed into the proxy server that compares URL requests to a database of URLs to reject –All access are then logged and reported, most companies then review the reported access violations and usually a committee reviews and decides whether or not any personnel action should be taken (letter of reprimand, dismissal, ect) –Sites that are usually filtered are those containing information about or pertaining to: Gambling Pornography

Virtual Private Networks (VPN) Used to connect two private networks via the internet –Provides an encrypted tunnel between the two private networks –Usually cheaper than a private leased line but should be studied on an individual basis –Once established and as long as the encryption remains secure the VPN is impervious to exploitation –For large organizations using VPNs to connect geographically diverse sites, always attempt to use the same ISP to get best performance. Try to avoid having to go through small Mom-n-Pop ISPs as they will tend to be real bottlenecks

VPNs (more) Many firewall products include VPN capabilities But, most Operating Systems provide VPN capabilities –Windows NT provides a point-to-point tunneling protocol via the Remote Access server –Windows 2000 provides L2TP and IPSec –Most Linux distributions support encrypted tunnels one way or another Point-to-Point Protocol (PPP) over Secure Sockets Layer (SSL) Encrypted Authentication –Many enterprises provide their employees VPN access from the Internet for work-at-home programs or for employees on-the-road Usually done with a VPN client on portable workstations that allows encryption to the firewall –Good VPN clients disable connections to the internet while the VPN is running –Problems include: A port must be exposed for the authentication Possible connection redirection Stolen laptops Work-at-home risks

Effective Border Security For an absolute minimum level of Internet security a Firewall must provide all three basic functions –Packet filtering –Network Address translation –High-level application proxying Use the Firewall machine just for the firewall –Won’t have to worry about problems with vulnerabilities of the application software If possible use one machine per application level server –Just because a machine has a lot of capacity don’t just pile things on it. Isolate applications, a side benefit of this is if a server goes down you don’t lose everything –If possible make the Firewall as anonymous as possible Hide the product name and version details, esp, from the Internet

Problems Firewalls can’t fix Many hacks –Remember in CS-328 how easy it is to spoof Vulnerabilities in application protocols you allow –Ex. Incoming HTTP requests to an IIS server Modems –Don’t allow users on the internal network to use a modem in their machine to connect to and external ISP (AOL) to connect to the Internet, this exposes everything that user is connected to the external network –Many users don’t like the restrictions that firewalls place on them and will try to subvert those restrictions

Border Security Options Filtered packed services Single firewall with internal public servers Single firewall with external public servers Dual firewalls or DMZ firewalls Enterprise firewalls Disconnection

Filtered Packed Services Most ISP will provide packet filtering services for their customers –Issues: Remember that all of the other customers are also on the same side of the packet filter, some of these customers may also be hackers Does the ISP have your best interests in mind or theirs Who is responsible for reliability Configuration issues, usually at ISPs mercy –Benefits: No up-front capital expenditures

Single firewall, internal public servers Internal Private Network External Private NetworkExternal Public Network FirewallRouter Mail Server Web Server Customer Hacker Server Client

Single firewall, internal public servers Leaves the servers between the internal private network and the external network exposed –Servers in this area should provide limited functionality No services/software they don’t actually need –These servers are at extreme risk Vulnerable to service specific hacks – HTTP, FTP, Mail, … Vulnerable to low level protocol (IP, ICMP, TCP) hacks and DoS attacks

DMZ Internal Private Network DMZExternal Public Network RouterFirewall FTP Server Web Server Customer Hacker Server Client

Bastion Host Many firewalls make use of what is known as a “bastion” host –bastions are a host that is stripped down to have only the bare fundamentals necessary no unnecessary services no unnecessary applications no unnecessary devices A combination of the “bastion” and its firewall are the only things exposed to the internet

Free Firewall Software Packages IP Chains & IP Tables –comes with most linux distributions SELinux (Security Enabled Linux – NSA) –comes with some Linux distributions Fedora, RedHat IPCop – specialized linux distribution

Home & Personal Routers Provide –configurable packet filtering –NAT/DHCP Linksys – single board RISC based linux computer D-Link

Enterprise Firewalls Check Point FireWall-1 Cisco PIX (product family) MS Internet Security & Acceleration Server GAI Gauntlet