Network Firewall Technologies By: David W Chadwick Implementing a Distributed Firewall By: Sotiris Ioannidis Angelos D. Keromytis Steve M. Bellovin Jonathan.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

DMZ (De-Militarized Zone)
Network Security Essentials Chapter 11
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Firewalls Uyanga Tserengombo
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Security Firewall Firewall design principle. Firewall Characteristics.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Electronic Commerce 2. Definition Ecommerce is the process of buying and selling products and services via distributed electronic media, usually the World.
Implementing a Distributed Firewall
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Data Security in Local Networks using Distributed Firewalls
Firewalls CS591 Topics in Internet Security November Steve Miskovitz, Steve Peckham, Kan Hayashi.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Chapter 6: Packet Filtering
1 Pertemuan 13 IDS dan Firewall Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University R355.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
TCP/IP Protocols Contains Five Layers
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Karlstad University Firewall Ge Zhang. Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
Security fundamentals Topic 10 Securing the network perimeter.
1 An Introduction to Internet Firewalls Dr. Rocky K. C. Chang 12 April 2007.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Security fundamentals
Firewall.
Computer Data Security & Privacy
6.6 Firewalls Packet Filter (=filtering router)
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
* Essential Network Security Book Slides.
Firewalls Jiang Long Spring 2002.
دیواره ی آتش.
Firewalls.
Introduction to Network Security
Presentation transcript:

Network Firewall Technologies By: David W Chadwick Implementing a Distributed Firewall By: Sotiris Ioannidis Angelos D. Keromytis Steve M. Bellovin Jonathan M. Smith William Newton March 8, 2004

Overview Stateful Packet Inspections Packet Filtering Router Application Level Firewalls –Common Proxy Services Content Filtering Virtual Private Networks Firewall Configurations –Dual Homed Gateway –Screen Host Gateway –Double Proxying and DMZ Distributed Firewall –KeyNote

What is a Firewall? A secure Internet gateway that is used to interconnect a private network to the Internet.

Where can you place a firewall?

Stateful Packet Inspections Module that processes in the operation system of a Windows or Unix PC firewall Inspects the packets as they arrive Headers from the different layers are inspected Information from the headers are fed into a dynamic state table Table is used to examine subsequent packets and connections.

Stateful Packet Inspections Advantages –More secure than simple packet filtering routers –Performs faster than application proxies Disadvantages –Not as secure as application gateways Application layer data is not inspected

Packet Filtering Router Router placed between the Internet and an internal network Filters IP packet based on four fields –Source IP address –Destination IP address –TCP/UDP source port –TCP/UDP destination port Filtering techniques –Block connections to/from specific hosts or networks –Block connection to/from specific ports

Packet Filtering Router Type S. Add.D. Add.S. PortD. PortAction TCP* >102325Permit TCP *>102525Permit *****Deny

Packet Filtering Problems Rule set is LARGE Special rules complicate the rule set Data inside a packet is not checked Senders of the packets are not authenticated.

Application Level Firewalls Bastion Computer –Placed between the packet filtering router and the internal network –Slimmed down proxy services Allows messages through Denies messages Modifies messages –Proxy Services not running on the Bastion are not provided within the network.

Common Proxy Services FTP –Threat – confidential information may be exported or bogus information may be deposited within an organization's file –FTP commands are selectively blocked according to the source and destination addresses.

Common Proxy Services SMTP –Threat – Mail servers run with system level permission to deliver mail to mailboxes –Isolates the internal system from incoming Internet mail Incoming mail is spooled on the Bastion host without system privileges Remote sender is disconnected. Mail is forwarded to internal system.

Common Proxy Services TELNET –Threat – remote users are allowed to login to a network with standard username and passwords –Configuration Specific systems allowed to connect to the network Specific systems from the network allowed to connect Typical setting: allow internal users to connect to the Internet only

Common Proxy Services HTTP –Filter HTTP commands POST PUT DELETE Filter URLs

Content Filtering Application data is unpacked and examined Harmful content is disposed of Executables can be removed based on a security policy Authors of Digitally Signed Code are checked against a trusted list Text files can be scanned for a list of undesirable words Java applets can be removed

Security vs. Performance

Virtual Private Networks Connects two private networks via a secure link A secure tunnel is established Provides confidentiality, integrity, authentication, anti-replay

Firewall Configurations Dual Homed Gateway Screen Host Gateway Screened Subnet Gateway Double Proxying and a DMZ

Dual Homed Gateway Gateway has two network interfaces Only applications with proxy services on the application gateway are able to operate IP forwarding is disabled IP packets must be directed to one of the proxy servers

Dual Homed Gateway

Disadvantages –Bottleneck to performance –Too secure for some sites

Screen Host Gateway More flexible and less secure then Dual Homed Gateway Packet Filtering Router separates the internet from the internal network All incoming traffic is forced through the bastion

Screen Host Gateway

Screened Subnet Gateway Creates a small network between the Internet and the internal network also known as a demilitarized zone (DMZ) Multiple hosts and gateways could be added to handle more traffic at a time Two packet filtering routers are placed on each side of the DMZ Very secure

Screened Subnet Gateway

Double Proxying and a DMZ Very secure Users from the Internet must pass through two application proxies before they can access the internal network Application Proxies check incoming data for known vulnerabilities

Double Proxying and a DMZ

Distributed Firewall Definition –A mechanism that uses a centralized policy, but pushes enforcement to the end points Topology is different than traditional firewalls End points are identified by their IPsec identity Assigns specific rights to specific machines on the network Invalid users are not able to access the network since they do not have credentials

Distributed Firewall Need for a security policy language –KeyNote Need for an authentication mechanism –IPsec Need for a distribution mechanism Usually avoids application level security mechanisms –Requires extensive modifications of all applications to make them aware of all security mechanisms –It is impossible to secure legacy applications with inadequate provisioning for security

KeyNote Provides local security policies and credentials over an un-trusted network Policy and credentials contain predicates that describe the trusted actions permitted by the holders of specific public keys Evaluator determines if proposed actions comply with the local policy Supports application-specific credentials

KeyNote

Concept –Monotonicity – given a set of credentials associated with a request, if there is any subset that would cause the request to be approved, then the complete set will cause the request to be approved. Simplifies request resolution and credential management

KeyNote Uses cryptographic keys to identify users –Multiple user computers Operation system or trusted application must secure the user identifications KeyNote is not responsible

KeyNote

Implementation of KeyNote OpenBSD platform Three components –Kernel Extensions –User level daemon process –Device driver Approx lines of C code

KeyNote System

Kernel Extensions User Space –Applications are linked to libraries with security mechanisms –Operating System independent –Hard to enforce Kernel Space –Security mechanisms are enforced transparently to the application –Filters two systems calls Connect(2) Accept(2)

Kernel Extensions Kernel Space –Policy context is created for each connection Container for relevant information for the policy daemon Sequence Number –Commit Context Adds the context to the list of contexts the policy daemon needs to handle –Application is blocked

Policy Device Serves as a communication path between the user space policy daemon and the modified system calls in the kernel Implemented as a pseudo device driver –/dev/policy –Loadable module –Supports close(2), open(2), read(2), write(2), and ioctl(2) –If device is not loaded, then no connection filtering will be processed

Policy Daemon User level process Application independent Responsible for making decisions based on the policies and credentials Receives a request from Policy Device Processes the request using the KeyNote library Writes back a reply (Deny, Approve) to the kernel via Policy Daemon The pending application is unblock and service is denied or approved.

Best Practices Create zones of allowable traffic –Don’t have one firewall protecting both a publicly accessed system (i.e. gateway) and an internal system (i.e. server) Get those patches! Disable unwanted services Set up an IDS

Future Work STRONGMAN –University of Pennsylvania –Examines the higher level security policy languages to large-scale network management Eliminate overhead between the Policy Daemon and the kernel Focus on packet policy rather than connection policy

Questions