CSCE 201 Network Security Firewalls Fall 2015. CSCE 201 - Farkas2 Traffic Control – Firewall Brick wall placed between apartments to prevent the spread.

Slides:



Advertisements
Similar presentations
Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 9 “Firewalls and Intrusion Prevention.
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 9 – Firewalls and.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Firewalls Uyanga Tserengombo
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Firewalls : usage Data encryption Access control : usage restriction on some protocols/ports/services Authentication : only authorized users and hosts.
Lecture 14 Firewalls modified from slides of Lawrie Brown.
Security Firewall Firewall design principle. Firewall Characteristics.
Chapter 11 Firewalls.
Firewall Configuration Strategies
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Security Awareness: Applying Practical Security in Your World
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewalls CS591 Topics in Internet Security November Steve Miskovitz, Steve Peckham, Kan Hayashi.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Chapter 20 Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
NW Security and Firewalls Network Security
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Chapter 6: Packet Filtering
1 Pertemuan 13 IDS dan Firewall Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 13 – Network Security
Chapter 11 Firewalls.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University R355.
Firewalls, etc.. Network Security2 Outline Intro Various firewall technologies: –Static Packet Filtering (or nonstateful packet filter) –Dynamic Packet.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Defense Techniques Sepehr Sadra Tehran Co. Ltd. Ali Shayan November 2008.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Network Security Technologies CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
CSCE 522 Firewalls.
CSCE 201 Windows XP Firewalls Fall Reading Windows XP help and Support: search on “Firewall” Tony Bradley, CISSP-ISSAP, Windows XP SP2 Firewall,
1.1 1 Purpose of firewall : –Control access to or from a protected network; –Implements network access policy connections pass through firewall and are.
Karlstad University Firewall Ge Zhang. Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
1 An Introduction to Internet Firewalls Dr. Rocky K. C. Chang 12 April 2007.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Computer Security Firewalls and Intrusion Prevention Systems.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Prepared By : Pina Chhatrala
Firewalls.
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
* Essential Network Security Book Slides.
Firewalls.
Presentation transcript:

CSCE 201 Network Security Firewalls Fall 2015

CSCE Farkas2 Traffic Control – Firewall Brick wall placed between apartments to prevent the spread of fire from one apartment to the next Single, narrow checkpoint placed between two or more networks where security and audit can be imposed on traffic which passes through it

CSCE Farkas3 Firewall security wall between private (protected) network and outside word Private Network External Network Firewall

CSCE Farkas4 Firewall Objectives Keep intruders, malicious code and unwanted traffic or information out Keep proprietary and sensitive information in Private Network External Network Proprietary data External attacks

CSCE Farkas5 Without firewalls, nodes: – Are exposed to insecure services – Are exposed to probes and attacks from outside – Can be defenseless against new attacks – Network security totally relies on host security and all hosts must communicate to achieve high level of security – almost impossible

CSCE Farkas6 Network Address Translation (NAT) Organization uses private IP addresses on its network  increase address space Send packet to Internet: convert private IP address to globally assigned IP address Receive packer from Internet: globally assigned IP addresses converted to private IP addresses Firewalls may Establish connections on behalf of the client Support NAT

CSCE Farkas7 Common firewall features Routing information about the private network can't be observed from outside traceroute and ping -o can't `see' internal hosts Users wishing to log on to an internal host must first log onto a firewall machine (or else start `behind' the firewall).

CSCE Farkas8 Trade-Off between accessibility and Security Accessibility Security Service Access Policy

CSCE Farkas9 Firewall Advantages Protection for vulnerable services Controlled access to site systems Concentrated security Enhanced Privacy Logging and statistics on network use, misuse Policy enforcement

CSCE Farkas10 Controlled Access A site could prevent outside access to its hosts except for special cases (e.g., mail server). Do not give access to a host that does not require access. Some hosts can be reached from outside, some can not. Some hosts can reach outside, some can not.

CSCE Farkas11 Concentrated Security Firewall less expensive than securing all hosts – All or most modified software and additional security software on firewall only (no need to distribute on many hosts) Other network security (e.g., Kerberos) involves modification at each host system.

CSCE Farkas12 Enhanced Privacy Even innocuous information may contain clues that can be used by attackers – E.g., finger: information about the last login time, when was read, etc. Infer: how often the system is used, active users, whether system can be attacked without drawing attention

CSCE Farkas13 Logging and Statistics on Network Use, Misuse If all access to and from the Internet passes through the firewall, the firewall can theoretically log accesses and provide statistics about system usage Alarm can be added to indicate suspicious activity, probes and attacks – double duty as IDS on smaller networks

CSCE Farkas14 Policy enforcement Means for implementing and enforcing a network access policy Access control for users and services Can’t replace a good education/awareness program, however: – Knowledgeable users could tunnel traffic to bypass policy enforcement on a firewall

CSCE Farkas15 Firewall Disadvantages Restricted access to desirable services Large potential for back doors No protection from insider attacks No protection against data-driven attacks Cannot protect against newly discovered attacks – policy/situation dependent Large learning curve

CSCE Farkas16 Firewall Components Firewall Administrator Firewall policy Packet filters – transparent – does not change traffic, only passes it Proxies – Active – Intercepts traffic and acts as an intermediary

CSCE Farkas17 Firewall Administrator Knowledge of underpinnings of network protocols (ex. TCP/IP, ICMP) Knowledge of workings of applications that run over the lower level protocols Knowledge of interaction between firewall implementation and traffic Vendor specific knowledge

CSCE Farkas18 Firewall Policy High-level policy: service access policy Low-level policy: firewall design policy Firewall policy should be flexible!

CSCE Farkas19 Service Access Policy Part of the Network Security Policy Defines: – TCP/IP protocols – Services that are allowed or denied – Service usage – Exception handling

CSCE Farkas20 Service Access Policy Goal: Keep outsiders out Must be realistic and reflect required security level Full security v.s. full accessibility

CSCE Farkas21 Firewall Design Policy Refinement of service access policy for specific firewall configuration Defines: – How the firewall achieves the service access policy – Unique to a firewall configuration – Difficult!

CSCE Farkas22 Firewall Design Policy Approaches: Open system: Permit any service unless explicitly denied (maximal accessibility) Closed system: Deny any service unless explicitly permitted (maximal security)

CSCE Farkas23 Simple Packet Filters Applies a set of rules to each incoming IP packet to decide whether it should be forwarded or discarded. Header information is used for filtering ( e.g, Protocol number, source and destination IP, source and destination port numbers, etc.) Stateless: each IP packet is examined isolated from what has happened in the past. Often implemented by a router (screening router).

CSCE Farkas24 Simple Packet Filter Placing a simple router (or similar hardware) between internal network and “outside” Allow/prohibit packets from certain services Private Network Packet Filter Packet Filter Outside Packet-level rules

CSCE Farkas25 Simple Packet Filters Advantages: – Does not change the traffic flow or characteristics –passes it through or doesn’t – Simple – Cheap – Flexible: filtering is based on current rules

CSCE Farkas26 Simple Packet Filters Disadvantages: – Direct communication between multiple hosts and internal network – Unsophisticated (protects against simple attacks) – Calibrating rule set may be tricky – Limited auditing – Single point of failure

CSCE Farkas27 Stateful Packet Filters Called Stateful Inspection or Dynamic Packet Filtering Checkpoint patented this technology in 1997 Maintains a history of previously seen packets to make better decisions about current and future packets

CSCE Farkas28 Proxy Firewalls Bastion Host View Private Network Outside Private Network Outside Proxy Server Reality

CSCE Farkas29 Proxy Firewalls Application Gateways – Works at the application layer  must understand and implement application protocol – Called Application-level gateway or proxy server Circuit-Level Gateway – Works at the transport layer – E.g., SOCKS

CSCE Farkas30 Application Gateways Interconnects one network to another for a specific application Understands and implements application protocol Good for higher-level restrictions Client Server Application Gateway

CSCE Farkas31 Application Gateways Advantages: by permitting application traffic directly to internal hosts – Information hiding: names of internal systems are not known to outside systems – Can limit capabilities within an application – Robust authentication and logging: application traffic can be pre- authenticated before reaching host and can be logged – Cost effective: third-party software and hardware for authentication and logging only on gateway – Less-complex filtering rules for packet filtering routers: need to check only destination – Most secure

CSCE Farkas32 Application Gateways Disadvantages: – Keeping up with new applications – Need to know all aspects of protocols – May need to modify application client/protocols

CSCE Farkas33 Firewall Evaluation Level of protection on the private network ? – Prevented attacks – Missed attacks – Amount of damage to the network How well the firewall is protected? – Possibility of compromise – Detection of the compromise – Effect of compromise on the protected network Ease of use Efficiency, scalability, redundancy Expense