January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.

Slides:



Advertisements
Similar presentations
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls.
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Firewalls Uyanga Tserengombo
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
1 Topic 2 – Lesson 4 Packet Filtering Part I. 2 Basic Questions What is packet filtering? What is packet filtering? What elements are inside an IP header?
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
Fall 2008CS 334: Computer Security1 Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for.
Security Firewall Firewall design principle. Firewall Characteristics.
—On War, Carl Von Clausewitz
Chapter 11 Firewalls.
Lecture 25: Firewalls Introduce several types of firewalls
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
Firewalls and Intrusion Detection Systems
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Chapter 2 Networking Overview. Figure 2.1 Generic protocol layers move data between systems.
Defining Network Protocols Application Protocols –Application Layer –Presentation Layer –Session Layer Transport Protocols –Transport Layer Network Protocols.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 12 Transmission Control Protocol (TCP) Basics.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
Intranet, Extranet, Firewall. Intranet and Extranet.
Chapter 6: Packet Filtering
1 Pertemuan 13 IDS dan Firewall Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 11 Firewalls.
8: Network Management1 Firewalls. 8: Network Management2 Firewalls Two firewall types: m packet filter m application gateways To prevent denial of service.
1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University R355.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Access Control List (ACL)
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
TCP/IP Protocols Contains Five Layers
Firewall – Survey Purpose of a Firewall – To allow ‘proper’ traffic and discard all other traffic Characteristic of a firewall – All traffic must go through.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration Access Lists.
Karlstad University Firewall Ge Zhang. Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…
Security fundamentals Topic 10 Securing the network perimeter.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Firewall Matthew Prestifilippo, Bill Kazmierski, Pat Sparrow.
1 An Introduction to Internet Firewalls Dr. Rocky K. C. Chang 12 April 2007.
CCNA4 Perrine / Brierley Page 12/20/2016 Chapter 05 Access Control Non e0e1 s server.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
防火牆 Firewall All rights reserved. No part of this publication and file may be reproduced, stored in a retrieval system, or transmitted in any form or.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Security fundamentals
Executive Director and Endowed Chair
Firewall.
Firewalls.
Computer Data Security & Privacy
Prepared By : Pina Chhatrala
TCP/IP Internetworking
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
TCP/IP Internetworking
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
* Essential Network Security Book Slides.
Firewalls Purpose of a Firewall Characteristic of a firewall
POOJA Programmer, CSE Department
Firewalls By conventional definition, a firewall is a partition made
دیواره ی آتش.
Firewalls.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

January 2009Prof. Reuven Aviv: Firewalls1 Firewalls

January 2007Prof. Reuven Aviv: Firewalls2 Outline What and where are firewalls Goals of a firewall Types of Firewalls –Packet Filter –Application Level (Proxy Server) Gateway

January 2007Prof. Reuven Aviv: Firewalls3 What and where are Firewalls? Trusted Networks Untrusted Networks & Servers Firewall Router Internet Intranet DMZ Public Accessible Servers & Networks Trusted Users Untrusted Users Goals??

January 2009Prof. Reuven Aviv: Firewalls4 Firewall Goals The firewall is inserted between the premises network and the Internet Goals: –Protect the premises network from Internet- based attacks –Establish access control gate Name types of traffic that passes or blocked by the firewall

January 2009Prof. Reuven Aviv: Firewalls5 Access Control gate Internet DMZ Net Web Server Pool ALERT!! How do we protect the firewall itself?

January 2009Prof. Reuven Aviv: Firewalls6 Access Control Functions Service control: types of traffic to permit/ deny in which direction User control: which user to which service –E.g denied websites Application behavior control –Only Filtered can come in

January 2009Prof. Reuven Aviv: Firewalls7 Types of Firewalls Two common types of Firewalls that we consider in this course –Packet-filtering –Application-level gateways

January 2007Prof. Reuven Aviv: Firewalls8 Packet Filtering Firewalls Apply Rules to incoming/outgoing IP packet and then forwards or discards the packet Rules based on fields in the IP or TCP header –IP address, port numbers, flags Two default policies (discard or forward)

January 2009Prof. Reuven Aviv: Firewalls9 Packet Filter at the TCP/IP Level Applications Transport DataLink Physical DataLink Physical Router/Firewall Applications Transport DataLink Physical Network Network Give examples of rules

January Data Link Layer Header VersionType of ServiceTotal Length IdentifierFlagsFragment Offset Time To LiveProtocolHeader Checksum Source Address Destination Address Options + Padding Source PortDestination Port Sequence Number Acknowledgement Number Offset/ReservedU A P R S FWindow ChecksumUrgent Pointer Options + Padding Data Data Link Layer Trailer IP Datagram IP Header TCP Header TCP/IP packet

January 2007Prof. Reuven Aviv: Firewalls11 Basic Filtering Rules ActionInternalPortExternalPortcomment block* * * AllowOur Mail Server add 25* Block**** Allow***80 Not trusted external host Mail Transport allowed Default: Deny everything Allow http connection to external web servers

January 2007Prof. Reuven Aviv: Firewalls12 Filtering Rules: direction, flags ActionsrcPortDestPortFlag comment AllowInternal*External25 Allow*25**ACK AllowInternal*External* AllowExternal*Internal*ACK Allow***>1024 Outgoing SMTP SMTP ACK from outside Allow All outgoing connections Ack outgoing connections Traffic to non standard Servers (Dangerous)

January 2007Prof. Reuven Aviv: Firewalls13 Session Filtering Applications Transport DataLink Physical DataLink Physical Applications Transport DataLink Physical Network Transport Applications Dynamic State Tables l Screens ALL attempts, Protects All applications l Extracts & maintains ‘state’ information l Makes an intelligent security / traffic decision

January 2007Prof. Reuven Aviv: Firewalls14 Controlling Telnet traffic via firewall  Client opens TCP connection: tells server its port number. The ACK bit is not set  Server sends acknowledgement “PORT 1234”   “ACK” Telnet Client Telnet Server Internal External

January 2007Prof. Reuven Aviv: Firewalls15 access-list 100 permit tcp host gt 1023 any eq 23 ! Allows packets to (External) Telnet servers access-list 101 permit tcp any eq 23 host established ! Allows packets (back) from (External) Telnet Server. It verifies that the ACK bit is set interface Ethernet 0 access-list 100 out ! Apply 1’st rule to outgoing traffic access-list 101 in ! Apply 2’nd rule to incoming traffic ! Rule: Allow telnet from to any External Server (port 23), and reverse Ack

January 2007Prof. Reuven Aviv: Firewalls16 access-list [ ] [ ] Router Rule Format

January 2009 Prof. Reuven Aviv: Firewalls17 FTP “active Mode” Scenario “PORT 5151”   “OK”  DATA CHANNEL  TCP ACK External FTP ClientInternal FTP Server 20 Data 21 Command  Client opens command channel; tells server second port number.  Server acks.  Server opens data channel to client’s 2’nd port.  Client Acknowledges.

January 2007Prof. Reuven Aviv: Firewalls18 Example FTP – Packet Filter access-list 100 permit tcp any gt 1023 host eq 21 access-list 100 permit tcp any gt 1023 host eq 20 ! Allows packets from any (External) client to the (Internal) FTP control and data ports access-list 101 permit tcp host eq 21 any gt 1023 access-list 101 permit tcp host eq 20 any gt 1023 ! Allows the (Internal) FTP server to send packets back to any (External) IP address with TCP ports > 1023 interface Ethernet 0 access-list 100 in ! Apply the first rule to incoming traffic access-list 101 out ! Apply the second rule to outgoing traffic!

January 2007Prof. Reuven Aviv: Firewalls19 “PASV”   “OK 3267”  TCP ACK  DATA CHANNEL FTP Client Internal FTP Server 20 Data 21 Command  Client opens command channel ; requests passive mode.  Server tells client port number.  Client opens data channel to server’s 2nd port.  Server Acknowledges. FTP “Passive Mode” Scenario 3267

January 2007Prof. Reuven Aviv: Firewalls20 Packet Filtering Firewalls Advantages: Simplicity Transparency to users High speed Disadvantages: Difficulty of setting up packet filter rules Lack of Authentication

January 2007Prof. Reuven Aviv: Firewalls21 Packet Filtering Firewall: Attacks IP address spoofing Fragmentation Attacks

January 2007Prof. Reuven Aviv: Firewalls22 Anti Spoofing Policy: Do not allow outgoing traffic with false sender address Internet Service Provider E1 E2E3 E4 Allowed outgoing traffic: E1: only from /24 E2: only from /24 E3: only from /24 ISP: Allow outgoing data only with legal addresses

January Data Link Layer Header VersionType of ServiceTotal Length IdentifierFlagsFragment Offset Time To LiveProtocolHeader Checksum Source Address Destination Address Options + Padding Source PortDestination Port Sequence Number Acknowledgement Number Offset/ReservedU A P R S FWindow ChecksumUrgent Pointer Options + Padding Data Data Link Layer Trailer IP Datagram IP Header TCP Header Fragmentation

Prof. Reuven Aviv: Firewalls24   External Telnet Client Internal Telnet Server Firewall allows OUT: with SYN IN: data with ACK  All following packets will have the ACK bit set  FRAG1 (with ACK) FRAG2 (with ACK) SYN packet (no ACK) ACK Basic Fragmentation Attack Allow only if ACK bit set Allow only if SYN bit set ,  Client Send 2 fragments with ACK. Server re- assembles: Fragments overlap - full datagram SYN bit set!

January 2007Prof. Reuven Aviv: Firewalls25 General Fragmentation Attack Instead of fragmenting TCP header – Fragment data portion of packet or ICMP –attack applications in Clients Clients – not all do bounds checking –Oversized reassembled packets on client maybe too large, cause buffer overflow Remedy: Application Level Firewall

January 2007Prof. Reuven Aviv: Firewalls26 Application Level (Proxy) Gateway

January 2007Prof. Reuven Aviv: Firewalls27 Application Level (Proxy) Gateway Acts as a relay of application-level traffic via a single TCP connection Knows the Application Protocol –Rules are tailored to expected and un expected behavior of application traffic Can stop / deny according to its rules Advantages / Disadvantages?

January 2007Prof. Reuven Aviv: Firewalls28 Application Level Gateway Advantages: –Higher security than packet filters –Only need to scrutinize a few allowable applications –Easy to log and audit all incoming traffic Disadvantages: –Additional processing overhead on each connection (gateway as splice point)

January 2007Prof. Reuven Aviv: Firewalls29 Comparison Table Modify Client Applications? Packet FilterNo Application Level Gateway client application must be proxy- aware & configured to connect to the proxy server