1 Firewalls Types of Firewalls Inspection Methods Static Packet Inspection Stateful Packet Inspection NAT Application Firewalls Firewall Architecture Configuring, Testing, and Maintenance
2 Figure 5-12: Network Address Translation (NAT) Server Host Client NAT Firewall 1 3 Internet 2 4 Sniffer From , Port From , Port To , Port To , Port IP Addr Port Internal IP Addr Port External Translation Table
3 Firewalls Types of Firewalls Inspection Methods Static Packet Inspection Stateful Packet Inspection NAT Application Firewalls Firewall Architecture Configuring, Testing, and Maintenance
4 Figure 5-13: Application Firewall Operation BrowserHTTP ProxyWebserver Application 1. HTTP Request From Filtering 3. Examined HTTP Request From HTTP Response to Examined HTTP Response To Filtering on Post Out, Hostname, URL, MIME, etc. In Application Firewall FTP Proxy SMTP ( ) Proxy Client PC Webserver Outbound Filtering on Put Inbound and Outbound Filtering on Obsolete Commands, Content
5 Figure 5-14: Header Destruction With Application Firewalls App MSG (HTTP) Orig. TCP Hdr Orig. IP Hdr App MSG (HTTP) New TCP Hdr New IP Hdr App MSG (HTTP) Attacker Webserver Application Firewall Header Removed Arriving PacketNew Packet Application Firewall Strips Original Headers from Arriving Packets Creates New Packet with New Headers This Stops All Header-Based Packet Attacks X
6 Figure 5-15: Protocol Spoofing Internal Client PC Attacker Trojan Horse 1. Trojan Transmits on Port 80 to Get Through Simple Packet Filter Firewall 2. Protocol is Not HTTP Firewall Stops The Transmission X Application Firewall
7 Figure 5-16: Circuit Firewall Webserver Circuit Firewall (SOCKS v5) External Client Authentication 2. Transmission 5. Passed Reply: No Filtering 3. Passed Transmission: No Filtering 4. Reply
8 Firewalls Types of Firewalls Inspection Methods Firewall Architecture Single site in large organization Home firewall SOHO firewall router Distributed firewall architecture Configuring, Testing, and Maintenance
9 Figure 5-17: Single-Site Firewall Architecture for a Larger Firm with a Single Site Internet 1. Screening Router Last Rule=Permit All 2. Main Firewall Last Rule=Deny All x Subnet 3. Internal Firewall 4. Client Host Firewall Marketing Client on x Subnet Accounting Server on x Subnet 5. Server Host Firewall 6. DMZ Public Webserver SMTP Relay Proxy HTTP Proxy Server External DNS Server
10 Figure 5-18: Home Firewall Internet Service Provider Home PC Broadband Modem PC Firewall Always-On Connection UTP Cord Coaxial Cable
11 Figure 5-19: SOHO Firewall Router Broadband Modem (DSL or Cable) SOHO Router --- Router DHCP Sever, NAT Firewall, and Limited Application Firewall Ethernet Switch Internet Service Provider User PC UTP Many Access Routers Combine the Router and Ethernet Switch in a Single Box
12 Figure 5-20: Distributed Firewall Architecture Internet Home PC Firewall Management Console Site ASite B