Controlling access with packet filters and firewalls.

Slides:



Advertisements
Similar presentations
Cisco 2 - Routers Perrine. J Page 14/30/2015 Chapter 10 TCP/IP Protocol Suite The function of the TCP/IP protocol stack is to transfer information from.
Advertisements

IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Fall 2008CS 334: Computer Security1 Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Firewalls and Intrusion Detection Systems
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
1 Some TCP/IP Basics....NFSDNSTELNETSMTPFTP UDPTCP IP and ICMP Ethernet, serial line,..etc. Application Layer Transport Layer Network Layer Low-level &
Circuit & Application Level Gateways CS-431 Dick Steflik.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Guide to Computer Network Security
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
TCP/IP Addressing Design. Objectives Choose an appropriate IP addressing scheme based on business and technical requirements Identify IP addressing problems.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Workshop 1: Introduction to TCP/IP
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
NW Security and Firewalls Network Security
Intranet, Extranet, Firewall. Intranet and Extranet.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Chapter 9.
Chapter 6: Packet Filtering
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 4 Routing Fundamentals and Subnets/ TCP/IP Transport and Application Layers.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
Mr C Johnston ICT Teacher
SYSTEM ADMINISTRATION Chapter 7 TCP/IP. Overview (OSI Model Review) The OSI Model is a layered framework that provides structure for data communications.
1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture.
Chapter 9 & 10 TCP/IP. TCP/IP Model Application Transport Internet Internet Access.
1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University R355.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
TCP/IP Protocols Contains Five Layers
Firewall – Survey Purpose of a Firewall – To allow ‘proper’ traffic and discard all other traffic Characteristic of a firewall – All traffic must go through.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Karlstad University Firewall Ge Zhang. Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
Security fundamentals Topic 10 Securing the network perimeter.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
1 An Introduction to Internet Firewalls Dr. Rocky K. C. Chang 12 April 2007.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Lecture # 02 Network Models Course Instructor: Engr. Sana Ziafat.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Security fundamentals
CompTIA Security+ Study Guide (SY0-401)
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
CompTIA Security+ Study Guide (SY0-401)
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Guide to Computer Network Security
Firewalls (March 2, 2016) © Abdou Illia – Spring 2016.
Firewalls Purpose of a Firewall Characteristic of a firewall
Protocol Application TCP/IP Layer Model
Implementing Firewalls
Presentation transcript:

Controlling access with packet filters and firewalls

Security vulnarabilities of the TCP/IP protocols IP packets are transmitted in the clear and without authentication facilities Can routers trust routing updates received from others? TCP and UDP segments are transmitted in clear and without authentication facilities Auxiliary protocols have similar problems (ICMP, DNS, ARP, BOOTP, TFTP) Application protocols are without protection or use weak password protection (TELNET, FTP) Specific protection applied as “add ons” (NFS, SNMP, X11)

Methods of access control Physical protection of entities (devices, cables) Packet Filter Network Relay Firewalls –visible –invisible Security mechanisms of individual computers or applications („personal firewall“, „personal internet security“, security, telebanking)

Physical security Protection against physical access to power distribution or network cables Protection of internal or external access points (distributors, patch panels) Protection of active devices (routers, bridges) against physical access (lock them up) Problems: How to support mobile users How to protect a wireless infrastructure How to allow secure access to external resources

Access control using packet filters Operates primarily on IP layer, however also peeking into transport layer information Filtering based on –IP address of the source –IP address of the receiver –Port number of receiver –Sometimes port number of the source –Type of transport protocol used (TCP/UDP) Uses set of filter rules Pure packet filters do not have information on connection states

Filter rules RuleSourceDestinationAction A / /24Permit B / /16Deny C / /0Deny PF

Access control using network relay Monitoring and controlling host Router External connections Internal connections Invisible private subnet Configuration and logging database

Access control by visible firewall Users use the Internet exclusively from the firewall All users need to have a user account on the firewall The firewall terminates DNS, , http User authentication must be secure (with cryptographic means)  Reduced user friendliness

Access control by invisible firewall Termination of all store-and-forward services (DNS, ) with servers on the firewall Selective forwarding of connections (stateful) Authentication of external and internal peers Logging and intrusion detection Network Address Translation Proxy functions InternetFirewall 1 Firewall 2 Protected internal network DNSDNS (DMZ – „de-militarized zone“) public servers DNSDNS Variant 1

Access control by invisible firewall (Variant 2) Uses only one physical firewall unit Internet Protected internal network DNSDNS (DMZ – „de-militarized zone“) public servers DNSDNS Ruleset 1 Ruleset 2 Firewall

User or application is “proxy aware” Internet Explorer Netscape Navigator

Proxy-based firewall services

Some applications are not “proxy aware” talk, ping, … Specific implementation of such applications Offering replacement applications Such appliations may also not be accessible to normal users at all

Literature B. Chapman, E. Zwicky, “Building Internet Firewalls”, O’Reilly & Associates, 1995 W. Cheswick, S. Bellovin, „Firewalls and Internet Security“, Addison-Wesley, 1994