© ITT Educational Services, Inc. All rights reserved.Page 1 IS3220 Information Technology Infrastructure Security Class Agenda 1  Learning Objectives.

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Lecture 14 Firewalls modified from slides of Lawrie Brown.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Firewall Configuration Strategies
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 7 Network Perimeter Security.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
1 Pertemuan 05 Firewall Matakuliah: H0451/Praktikum Jaringan Komputer Tahun: 2006 Versi: 1/0.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
A Guide to major network components
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
NW Security and Firewalls Network Security
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Common Devices Used In Computer Networks
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
Windows 7 Firewall.
Firewalls, etc.. Network Security2 Outline Intro Various firewall technologies: –Static Packet Filtering (or nonstateful packet filter) –Dynamic Packet.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
7.4 Firewalls Network Security / G.Steffen1. In This Section What is a Firewall? Types of Firewall Comparison of Firewalls Types What Firewall Can-and.
Security fundamentals Topic 10 Securing the network perimeter.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 6 Firewall Design Strategies.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 4 Network Security Tools and Techniques.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 7 VPN Fundamentals.
IS3220 Information Technology Infrastructure Security
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Security fundamentals
CONNECTING TO THE INTERNET
Click to edit Master subtitle style
Introduction to Networking
IS4550 Security Policies and Implementation
* Essential Network Security Book Slides.
IS4680 Security Auditing for Compliance
Firewalls Chapter 8.
Introduction to Network Security
Presentation transcript:

© ITT Educational Services, Inc. All rights reserved.Page 1 IS3220 Information Technology Infrastructure Security Class Agenda 1  Learning Objectives  Discussion of Project  Lesson Presentation and Discussions.  Discussion on Assignments.  Discussion on Lab Activities.  Break Times. 10 Minutes break in every 1 Hour.  Note: Submit all Assignment and labs due today.

© ITT Educational Services, Inc. All rights reserved.Page 2 IS3220 Information Technology Infrastructure Security Class Agenda 2  Theory: 6:00pm -8:00pm  Lab: 8:15pm to 11:00pm

© ITT Educational Services, Inc. All rights reserved.Page 3 IS3220 Information Technology Infrastructure Security Class Agenda 1  Learning Objectives  Discussion of Project  Lesson Presentation and Discussions.  Discussion on Assignments.  Discussion on Lab Activities.  Break Times. 10 Minutes break in every 1 Hour.  Note: Submit all Assignment and labs due today.

© ITT Educational Services, Inc. All rights reserved.Page 4 IS3220 Information Technology Infrastructure Security Class Agenda 2  Theory: 6:00pm -8:00pm  Lab: 8:15pm to 11:00pm

© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 5 Firewall Fundamentals

© ITT Educational Services, Inc. All rights reserved.Page 6 IS3220 Information Technology Infrastructure Security Learning Objective and Key Concepts Learning Objectives  Describe the fundamental functions performed by firewalls Key Concepts  IP stateful firewalls  Types, features, and functions of firewalls  Software-based and hardware-based firewall solutions  Filtering and port control strategies and functions  Homed firewalls and placement

© ITT Educational Services, Inc. All rights reserved.Page 7 IS3220 Information Technology Infrastructure Security EXPLORE: CONCEPTS

© ITT Educational Services, Inc. All rights reserved.Page 8 IS3220 Information Technology Infrastructure Security What Is a Firewall?  A network traffic control device or service  Enforces network security policy  Protects the network against external attacks  Establishes control over network traffic  Prevents connections from unauthorized sources to protected network systems, services, and resources  Firewall can be a software on a server, software on a workstation or may be a specialized hardware appliance.

© ITT Educational Services, Inc. All rights reserved.Page 9 IS3220 Information Technology Infrastructure Security Firewall Typically used to filter packets Sometimes called a packet filter Designed to prevent malicious packets from entering the network A firewall can be software-based or hardware-based  Hardware firewalls usually are located outside the network security perimeter As the first line of defense Security+ Guide to Network Security Fundamentals9

© ITT Educational Services, Inc. All rights reserved.Page 10 IS3220 Information Technology Infrastructure Security Security+ Guide to Network Security Fundamentals, Third Edition 10 Firewall (continued)

© ITT Educational Services, Inc. All rights reserved.Page 11 IS3220 Information Technology Infrastructure Security Types of Firewalls  Packet Filtering  Multi-Homed  Screening  Stateless  Stateful  Application Proxy

© ITT Educational Services, Inc. All rights reserved.Page 12 IS3220 Information Technology Infrastructure Security Type of Firewalls.  Packet Filtering-Make access decision based on protocol header values  First generation of firewalls. Built into majority of firewalls  Stateful firewalls. Like a nosy neighbor, it keep track of connection and inspect communications by using state table.  Stateful Firewall can be a victim of DoS attack  Proxy Firewall act like a middleman and stands between trusted and untrusted network.

© ITT Educational Services, Inc. All rights reserved.Page 13 IS3220 Information Technology Infrastructure Security Firewall Architecture.  Firewall Architecture specifies where firewall are placed on the network  Multi-Homed :Devices are devices with many NIC that are used to connect different networks.  The devices most of the time used to hose a Firewall Software.  Common example is the DMZ  Screened Host: Firewall that communicate directly with perimeter router and internal firewall.  Screened subnet: External firewall which screen the traffic entering the DMZ

© ITT Educational Services, Inc. All rights reserved.Page 14 IS3220 Information Technology Infrastructure Security Descriptions of Firewalls  May be for personal or commercial use  Software or hardware based  May use dynamic or static packet filtering

© ITT Educational Services, Inc. All rights reserved.Page 15 IS3220 Information Technology Infrastructure Security Stateless Inspection  Maintain no “state tables” for active connections  Frames are treated individually rather than collectively  Filtering decisions are based on static addresses and port numbers

© ITT Educational Services, Inc. All rights reserved.Page 16 IS3220 Information Technology Infrastructure Security Stateful Inspection  Maintain records of active connections  Pass (allow) and block (deny) decisions based on packets belonging to legitimate connection streams  Looks for packets that do not belong to authorized sessions  Advanced stateful firewalls track session endpoints  Retain additional state details, such as acknowledgement numbers and sequence numbers  Connectionless traffic is not “stateful” and therefore firewall state management does not apply

© ITT Educational Services, Inc. All rights reserved.Page 17 IS3220 Information Technology Infrastructure Security Advantages of Stateful Filtering  Keeping “state” observes network connections between points  Provide efficient packet inspection  Lack of “stateful record keeping” could result in breaking of legitimate connections

© ITT Educational Services, Inc. All rights reserved.Page 18 IS3220 Information Technology Infrastructure Security EXPLORE: PROCESS

© ITT Educational Services, Inc. All rights reserved.Page 19 IS3220 Information Technology Infrastructure Security Firewall Filtering Types and Strategies  Ingress/egress filtering  Packet filtering examines network protocol headers and parameters  Content filtering focuses on network protocol payloads

© ITT Educational Services, Inc. All rights reserved.Page 20 IS3220 Information Technology Infrastructure Security Firewall Filtering Types and Strategies  Stateful multi-layer inspection  Stateful and stateless inspection  Proxy servers respond to connection requests between clients and servers  Network Address Translation (NAT)

© ITT Educational Services, Inc. All rights reserved.Page 21 IS3220 Information Technology Infrastructure Security EXPLORE: ROLES

© ITT Educational Services, Inc. All rights reserved.Page 22 IS3220 Information Technology Infrastructure Security Static and Dynamic Packet Filters  Static filtering is constant and unchanging  Dynamic filtering adapts to live traffic Learns which ports are needed for a session Blocks all others

© ITT Educational Services, Inc. All rights reserved.Page 23 IS3220 Information Technology Infrastructure Security Application Gateway Overview  An application proxy, or application gateway, is like a packet filter but focuses more deeply on application protocol behaviors  Acts as middleman between client and server  Firewall and proxy combination achieves defense-in-depth strategy

© ITT Educational Services, Inc. All rights reserved.Page 24 IS3220 Information Technology Infrastructure Security Application Gateway Defense-in-Depth  Firewall and proxy combination achieves defense-in-depth strategy Application proxies filter on content in the application layer payload Network firewalls filter on lower-level protocol properties

© ITT Educational Services, Inc. All rights reserved.Page 25 IS3220 Information Technology Infrastructure Security Network Circuit Proxy  A circuit proxy or circuit-level firewall filters on connection-oriented startup Observes initial setup of a circuit, session, or state Once connected, a circuit is no longer filtered traffic

© ITT Educational Services, Inc. All rights reserved.Page 26 IS3220 Information Technology Infrastructure Security Circuit Proxy Filtering Rules  Circuit proxy filtering rules are similar to static packet filtering Static values determine what circuits and connections are allowed Filters can be set to default deny or default allow Generally faster than application-layer firewalls due to fewer packet evaluations Useful for connection-oriented protocols that perform TCP/IP handshakes

© ITT Educational Services, Inc. All rights reserved.Page 27 IS3220 Information Technology Infrastructure Security Network Address Translation (NAT)  NAT translates internal addresses to external addresses  NAT creates one-to-many mappings to extend IP address class availability and share a common Internet connection among several “hidden” hosts  NAT allows you to bypass individual IP assignments from an ISP  NAT conceals internal machines from the external world

© ITT Educational Services, Inc. All rights reserved.Page 28 IS3220 Information Technology Infrastructure Security EXPLORE: RATIONALE

© ITT Educational Services, Inc. All rights reserved.Page 29 IS3220 Information Technology Infrastructure Security Software Firewalls  Software firewalls are installed on host computers  Built-in Windows Firewall or Linux packet filter  Competes for shared resources on the host computer  Static placement filters only connections made from/to the host  Protect only one system on the network, unless forwarding IP traffic

© ITT Educational Services, Inc. All rights reserved.Page 30 IS3220 Information Technology Infrastructure Security Hardware Firewalls  Hardware firewalls are installed on dedicated devices  Firewall appliances and dedicated routers with firewall services  Strategic placement throughout the network filters end-to-end connections  Stand-alone unit can protect multiple systems on the network  Optimized for network performance

© ITT Educational Services, Inc. All rights reserved.Page 31 IS3220 Information Technology Infrastructure Security Combination  Achieve defense-in-depth by combining hardware and software firewalls  Layered protection at the network and host levels by separate firewalls  Especially practical for mobile employees that telecommute to work

© ITT Educational Services, Inc. All rights reserved.Page 32 IS3220 Information Technology Infrastructure Security Host-Based Firewalls  Host-based firewalls protect only the local computer  Filters traffic passing through the local system only  Can filter traffic for other systems, such as Windows Internet Connection Sharing  Host-based “personal” software firewalls  Not optimized for firewall filtering

© ITT Educational Services, Inc. All rights reserved.Page 33 IS3220 Information Technology Infrastructure Security Network-Based Firewalls  Network-based firewalls span an entire network.  Filters all traffic passing in and out of the network or network segment  Can filter between other networks and systems  Commercial or corporate firewalls  Optimized for network-wide firewall filtering  Incorporate enterprise-grade network services VPN Enterprise-class encryption protocols Enterprise-class security services

© ITT Educational Services, Inc. All rights reserved.Page 34 IS3220 Information Technology Infrastructure Security Single-Homed Firewalls  Single-homed firewalls have only one network interface  No physical isolation between internal and external networks  Ideal separation between host and network  Cannot provide sentry services between network segments

© ITT Educational Services, Inc. All rights reserved.Page 35 IS3220 Information Technology Infrastructure Security Multi-Homed Firewalls  Multi-homed means more than one network interface  Dual- or triple-homed  Filter local traffic on an internal network interface  Filter remote traffic on an external network interface  Filter traffic between internal and external interfaces  Create electronic isolations among segments, subnets, and networks  Ideal network separation with sentry services between networks

© ITT Educational Services, Inc. All rights reserved.Page 36 IS3220 Information Technology Infrastructure Security Reading Assignment  Chapter 5: Firewall Fundamentals

© ITT Educational Services, Inc. All rights reserved.Page 37 IS3220 Information Technology Infrastructure Security Unit 5 Assignments  Discussion 5.1 Ingress and Egress Filtering  Lab 5.2 Penetration Testing pfSense Firewall  Assignment 5.3 Select the Proper Type of Firewall