Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.

Slides:



Advertisements
Similar presentations
Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 9 “Firewalls and Intrusion Prevention.
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Security Firewall Firewall design principle. Firewall Characteristics.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
Firewalls and Intrusion Detection Systems
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Electronic Commerce 2. Definition Ecommerce is the process of buying and selling products and services via distributed electronic media, usually the World.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
FIREWALL Mạng máy tính nâng cao-V1.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Chapter 6: Packet Filtering
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
TCP/IP Protocols Contains Five Layers
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Firewall Tutorial Hyukjae Jang Nc lab, CS dept, Kaist.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Karlstad University Firewall Ge Zhang. Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Security fundamentals Topic 10 Securing the network perimeter.
Implementing Firewall Technologies
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
1 Firewalls - Introduction l What is a firewall? –Firewalls are frequently thought of as a very complex system that is some sort of magical, mystical..
Firewall Matthew Prestifilippo, Bill Kazmierski, Pat Sparrow.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
© 2001, Cisco Systems, Inc. CSPFA 2.0—5-1 Chapter 5 Cisco PIX Firewall Translations.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Security fundamentals
CompTIA Security+ Study Guide (SY0-401)
Computer Data Security & Privacy
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Networking
Introduction to Networking
CompTIA Security+ Study Guide (SY0-401)
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
* Essential Network Security Book Slides.
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewalls By conventional definition, a firewall is a partition made
دیواره ی آتش.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Firewalls CS432

Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls Application gateway firewalls Application gateway firewalls Address Translation firewalls Address Translation firewalls Host based firewalls Host based firewalls Hybrid firewalls Hybrid firewalls

definition  A firewall is a device or systems that control the flow of traffic between different areas of your network  One of the main functions of firewalls is to control access to resources.  This may be achieved by installing a firewall on every workstation, or in a centralized manner (one firewall for the whole network).

Types of Firewalls  Packet filtering firewalls  Stateful firewalls  Application gateway firewalls  Address translation firewalls  Host-based firewalls  Hybrid firewalls

Packet Filtering Firewalls (PFF’s)  The simplest type of firewall.  Typically a router that can filter on some packet content.  Mainly layer 3 (network) and sometimes layer 4 (transport) packets are examined.

Filtering Rules  Packet filtering rules must be defined on the firewall.  These rules indicate which traffic should be allowed and which traffic should be denied.  A decision should also be taken regarding the notification strategy when packets are dropped: inform the sender or not.

Filtering information  Source and destination layer 3 addresses.  Layer 3 protocol information (type of protocol).  Layer 4 protocol information (port numbers and flags).  Interface of sent or received traffic.

A Simple Example

A Typical Rule Table Rule Source address Dest address IP protocol Protocol information action 1any TCP Port 80 allow 2any UDP Port 53 allow 3any TCP Port 25 allow 4any Any other address anyanydeny

Understanding the Rules  Understanding the rule set is crucial to the operation of firewalls.  For example, if you omit rule 4 in table 1 above, there will be two possibilities: allow all not matching traffic, or deny all not matching traffic.  If the first option is taken, you will be creating a big hole for your network

An Example of Firewall Rules

Advantages of packet filtering firewalls  They can process packets at high speed.  They can easily match on most fields in layer 3 and layer 4, giving flexibility in implementing security policies.

Disadvantages  They can be complex to configure.  They cannot prevent application layer attacks.  They are susceptible to some TCP/IP attacks (SYN floods, and IP spoofing and cannot be detected).  They do not support authentication.  They have limited logging capabilities.

Stateful Firewalls  Stateful firewalls keep track of connection states at all stages: initiation, data transfer, or termination.

A Typical Scenario Where PFF’s Fail  Assume that there is an inbound rule saying that any external traffic to is denied.  This implies that connection requests coming from outside will be dropped.  However, assume that tries to access a web server on an external machine, , say.

A Typical Scenario …  The firewall will allow the initiation of the connection.  However, when the reply comes back from it will be dropped.  Two solutions are possible in PFFs: Open ports higher than 1023 for inbound traffic Open ports higher than 1023 for inbound traffic Examine TCP segment flag bits Examine TCP segment flag bits

Problems with the above solutions  Opening ports will cause a lot of problems.  Examining TCP codes is not a good solution for this problem, because they may not be fully supported by all implementations, May be modified by hackers, and UDP traffic uses no flags.

A Stateful Solutin  A stateful firewall solves the above problem by tracking the states of connections.  This is done through dynamic rules that are added when a connection is established and deleted after the connection is torn down.  The rules are either added to the main rule table or to new state table.

A Stateful Solution  For example when machine initiates a connection to external machine , the firewall adds a new rule to the rule table or the state table indicating that this is a request for a connection.  It notes the source and destination ports: sourcedestinationprotocolportsaction TCP Source Dest 80 allow

Sateful solution  When sends a reply to the connection request, the firewall notes from its table that this reply is part of an existing connection and allows the connection.  The traffic along this connection will be allowed as long as the connection is open.  When the connection is torn down, all rules relating to the connection will be removed

Advantages  Aware of the state of the connection.  No need to open a large set of ports.  Prevents a wider set of DoS attacks (state table).  More robust logging (connection states).

limitations  They may be difficult to configure.  Cannot prevent application layer attacks.  Do not support authentication.  Not all protocols contain state information.  Multiple connections with dynamic ports may cause problems.  Additional overhead in maintaining state information.

Application Gateway Firewalls (AGFs)  Sometimes called proxy firewalls.  They filter information at layers 3,4,5 and 7.  Most filtering and processing is done in software which provides more flexibility.  Sometimes they support only limited applications, for example , FTP, Telnet.

AGF’s and Authentication  One of the major advantages of AGF’s is their abilities to authenticate users.  A user requesting a connection to the network is first authenticated by the AGF.  The authentication database usually stores authorization information, e.g. which servers can the user connect to:  Ahmed allow

Authentication Methods  User/password.  Certificates.  Biometrics  Token cards.

Types of AGF’s  Two types of AGF’s: Connection gateway firewalls. Connection gateway firewalls. Cut through proxy firewalls Cut through proxy firewalls

Connection Gateway Firewalls (CGF’s)  All traffic to the web sever passes through the CGF.  First the CGF authenticates the user. If successful, CGF establishes connection to server.  CGF examines all packets sent to server and may control the type of traffic to be allowed or dropped.

Cut Through Proxies (CTP)  Only authenticate user.  Perform filtering based on layer 3 and 4 information.

Address Translation Firewalls.  It is well known that we are running out of IP addresses (address depletion).  A long term solution is to deploy IPv6.  A short term solution is to use Network Address Translation (NAT).

Private Addresses  Tow RFC’s describe how NAT may be used.  RFC 1918 specifies private addresses (reserved addresses that can be used only inside the organization networks, with no global meaning).  Around 17 million addresses are available for local use

Private addresses  – class A  – class B  – class C

NAT  RFC1631 defines how network address translation may be performed.  Two schemes: Simple NAT. Simple NAT. Overloaded NAT or PAT (Port Address Translation). Overloaded NAT or PAT (Port Address Translation).

NAT firewalls  A NAT firewall is a device configured to perform network address translation.

Host based firewalls  Software packet filtering firewalls.  Simplified versions that concentrate only on protecting a single machine.  Some may provide host-based authentication.

Hybrid Firewalls  In real life firewall solutions are usually complex and hybrid.  They involve packet filtering, state tracking, authentication, address translation …etc. Many solutions include even an IDS.  This dictated by competition.  A good example is CISCO PIX firewall.

Designing A Firewall Solution  Develop a security policy.  Create a simple design solution.  Use devices as intended.  Implement a layered defense.  Consider solutions to internal threats.

The policy  Define acceptable and unacceptable behavior.  Restrictions to resources.  Adhere to company plans and policies.  Resources that require access from internal and external users.  Vulnerabilities associated with these resources.  Methods that can be used to protect resources.  Cost-benefit analysis for possible solutions.

Demilitarized zones (DMZ’S)  A demilitarized zone is a segment or segments that have a higher security level than that of external segments, but a lower security level than that of internal segments.  Grant external users access to web servers, DNS servers …etc without risking internal security.  They act as a buffer between internal and external networks.

Demilitarized zones (DMZ’S)  Higher security levels can send traffic to lower security levels but not vice versa.  Same security levels cannot send traffic to each other.

An Example Solution Internet router packet filter Internal network Bastion host, here: a proxy firewall internal packet filter Mail serverWeb server DMZ De-Militarized Zone ? many different topologies can be considered

Bastion Server  A special type of proxy servers.  A single point of contact to the network.  Well fortified.  Logging capabilities.