5 Firewalls in VoIP Selected Topics in Information Security – Bazara Barry.

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 9 “Firewalls and Intrusion Prevention.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
Firewalls Uyanga Tserengombo
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
H. 323 and firewalls: Problem Statement and Solution Framework Author: Melinda Shore, Nokia Presenter: Shannon McCracken.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Lecture 14 Firewalls modified from slides of Lawrie Brown.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Policy Based Routing using ACL & Route Map By Group 7 Nischal ( ) Pranali ( )
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 7 Network Perimeter Security.
Electronic Commerce 2. Definition Ecommerce is the process of buying and selling products and services via distributed electronic media, usually the World.
Circuit & Application Level Gateways CS-431 Dick Steflik.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
A Brief Taxonomy of Firewalls
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
IP Ports and Protocols used by H.323 Devices Liane Tarouco.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Crossing firewalls Liane Tarouco Leandro Bertholdo RNP POP/RS.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 2 – 6 IP Access Lists 1.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Firewalls and proxies Unit objectives
A Pattern Language for Firewalls Eduardo B. Fernandez, Maria M. Petrie, Naeem Seliya, Nelly Delessy, and Angela Herzberg.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Network Router Security Packeting Filtering. OSI Model 1.It is the most commonly refrenced protocol model. It provides common ground when describing any.
1 An Introduction to Internet Firewalls Dr. Rocky K. C. Chang 12 April 2007.
Firewall Technology and InterCell Communication Peter T. Dinsmore Trusted Information Systems Network Associates Inc 3060 Washington Rd (Rt. 97) Glenwood,
K. Salah1 Security Protocols in the Internet IPSec.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Computer Security Firewalls and Intrusion Prevention Systems.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Defining Network Infrastructure and Network Security Lesson 8.
Fortinet VoIP Security June 2007 Carl Windsor.
Security Methods and Practice CET4884
Click to edit Master subtitle style
Introduction to Networking
Firewalls.
* Essential Network Security Book Slides.
Routing and Switching Essentials v6.0
Firewalls Routers, Switches, Hubs VPNs
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
Firewall.
Firewalls Chapter 8.
Introduction to Network Security
Chapter 11: Network Address Translation for IPv4
Presentation transcript:

5 Firewalls in VoIP Selected Topics in Information Security – Bazara Barry

Firewalls Firewalls demarcate inside from outside, trusted from non trusted networks, and they are used to separate VoIP from data on internal networks. Two significant issues affect firewall performance with regard to VoIP: the first is that the boundary between inside and outside or trusted and non trusted networks is gradually becoming less clear; the second is that most firewalls fail to adequately process VoIP packets and sessions. Selected Topics in Information Security – Bazara Barry

Firewalls Most firewalls share common characteristics: 1.They work as a choke point. 2.They can be configured to allow or deny any protocol traffic. 3.They provide a logging function for audit purposes. 4.They provide a NAT function. 5.Their operating systems are hardened. 6.They often serve as a VPN endpoint. 7.They fail closed. Selected Topics in Information Security – Bazara Barry

Shallow packet inspection Shallow packet inspection inspects only a few header fields in order to make processing decisions. As an IP packet traverses the firewall, the headers are parsed, and the results are compared to a rule set defined by a system administrator. The rule set, commonly based upon source and/or destination IP address, source and/or destination port, or a combination of the two, defines what type of traffic is subsequently allowed or denied. Selected Topics in Information Security – Bazara Barry

Stateful inspection A stateful inspection firewall registers connection data and compiles this information in a kernel-based state table. A stateful firewall examines packet headers and, essentially, remembers something about them (generally source/destination IP address/ports).The firewall then uses this information when processing later packets. Selected Topics in Information Security – Bazara Barry

Medium-depth packet inspection Mostly performed by Application Layer Gateways (ALG) which peer more deeply into the packet than packet filtering firewalls but normally do not scan the entire payload. An ALG provides intermediary services for hosts that reside on different networks, while maintaining complete details of the TCP connection state and sequencing. Selected Topics in Information Security – Bazara Barry

Medium-depth packet inspection An application-level gateway (or proxy server), acts as a relay of application-level traffic. A user contacts the gateway to access some service, provides details of the service, remote host & authentication details, contacts the application on the remote host and relays all data between the two endpoints. Selected Topics in Information Security – Bazara Barry

Medium-depth packet inspection Selected Topics in Information Security – Bazara Barry

Deep packet inspection To address the limitations of Packet Filtering, Application Proxies, and Stateful Inspection, a technology known as Deep Packet Inspection (DPI) was developed. DPI analyzes the entire packet, and may buffer, assemble, and inspect several related packets as part of a session. DPI engines parse the entire IP packet, and make forwarding decisions by means of a rule-based logic that is based upon signature or regular expression matching. Selected Topics in Information Security – Bazara Barry

Deep packet inspection The issue with DPI is that packet data contents are virtually unstructured compared with the highly structured packet headers. Analysis of packet headers can be done economically since the locations of packet header fields are restricted by protocol standards. However, the payload contents are, for the most part, unconstrained. Selected Topics in Information Security – Bazara Barry

Deep packet inspection Particular attention must be paid to firewall and deep packet inspection configurations to make sure they don’t introduce unacceptable latency. Implementation of some security measures can degrade QoS. These complications range from interruption or prevention of call setup by firewalls to encryption- produced latency and delay variation ( jitter). Selected Topics in Information Security – Bazara Barry

VoIP aware firewalls The basic problem with firewalls in VoIP environments is twofold: Firewall administrators are reluctant to open up a range of high ports (> 1024) that will allow uncontrolled connections between external and internal hosts, and firewalls often rewrite information that is necessary for VoIP signaling traffic to succeed. Selected Topics in Information Security – Bazara Barry

SIP Firewall issues In the context of traversing firewalls and NAT, SIP’s primary problem relates to determination of the “real” IP addresses of end users or UAs, which are often located in private IP address space. When used as a VoIP application, SIP opens bidirectional UDP media channels over random high ports. Selected Topics in Information Security – Bazara Barry

Access control lists Network access control lists (ACLs) are table-like data structures that normally consist of a single line divided into three parts: a reference number that defines the ACL; a rule (usually permit or deny); and a data pattern, which may consist of source and/or destination IP addresses, source and/or destination port numbers, masks, and Boolean operators. Selected Topics in Information Security – Bazara Barry

Conclusions One promising approach is to combine an application layer gateway with a stateful packet filtering firewall. In this approach, an ALG software module running in close logical proximity to a NAT firewall device updates payload and header data made invalid by address translation. Selected Topics in Information Security – Bazara Barry

Conclusions One particular technology that looks promising with regard to making firewalls intelligent and VoIP-aware is Deep Packet Inspection (DPI). Deep Packet Inspection may enhance firewall capabilities by adding the ability to dynamically open and close ports for VoIP application traffic. Selected Topics in Information Security – Bazara Barry

References 1.T. Porter, Practical VoIP Security. Rockland, MA: Syngress, 2006, Ch 13.