Download presentation
Presentation is loading. Please wait.
1
Guide to Network Defense and Countermeasures Second Edition
Chapter 9 Choosing and Designing Firewalls
2
Objectives Explain what firewalls can and cannot do
Describe common approaches to packet filtering Establish a set of rules and restrictions for a firewall Design common firewall configurations Compare hardware and software firewalls Guide to Network Defense and Countermeasures, Second Edition
3
An Overview of Firewalls
Hardware or software Can configure to block unauthorized network access Firewalls cannot protect against malicious insiders Who send proprietary information out of the organization Firewalls cannot protect connections that do not go through it Guide to Network Defense and Countermeasures, Second Edition
4
What Firewalls Are Network firewall
Combination of multiple software and hardware components Earliest firewalls were packet filters Some firewalls are designed for consumers Norton Personal Firewall ZoneAlarm Sygate Personal Firewall Guide to Network Defense and Countermeasures, Second Edition
5
Guide to Network Defense and Countermeasures, Second Edition
6
What Firewalls Are (continued)
Rules for blocking traffic are done case-by-case Actions include: Allow the traffic Block the traffic Customize access Check Point Next Generation (NG) firewall Designed to protect and monitor large-scale networks Firewall appliances Self-contained hardware devices Guide to Network Defense and Countermeasures, Second Edition
7
Guide to Network Defense and Countermeasures, Second Edition
8
Guide to Network Defense and Countermeasures, Second Edition
9
What Firewalls Are Not Firewalls are not a standalone solution
Cannot protect from internal threats Need strong security policy and employee education Firewalls must be combined with Antivirus software IDS Open Platform for Security (OPSEC) Protocol used by Check Point NG to integrate with other security products Guide to Network Defense and Countermeasures, Second Edition
10
Approaches to Packet Filtering
Stateless packet filtering Stateful packet filtering Packet filtering depends on position of components Guide to Network Defense and Countermeasures, Second Edition
11
Stateless Packet Filtering
Decides whether to allow or block packets based on information in the protocol headers Filtering based on common IP header features IP address Ports and sockets ACK bits Intruders can get around these defenses Advantage: Inexpensive Disadvantage: Cumbersome to maintain Guide to Network Defense and Countermeasures, Second Edition
12
Guide to Network Defense and Countermeasures, Second Edition
13
Stateful Packet Filtering (continued)
Keeps a record of connections a host computer has made with other computers Maintain a file called a state table containing record of all current connections Allows incoming packets to pass through only from external hosts already connected Guide to Network Defense and Countermeasures, Second Edition
14
Guide to Network Defense and Countermeasures, Second Edition
15
Stateful Packet Filtering (continued)
Windows Firewall One of the most user-friendly packet filters Improved version of Internet Connection Firewall Can limit the amount of traffic with more precision You can even specify exceptions Advanced tab allows more complex settings Guide to Network Defense and Countermeasures, Second Edition
16
Guide to Network Defense and Countermeasures, Second Edition
17
Guide to Network Defense and Countermeasures, Second Edition
18
Guide to Network Defense and Countermeasures, Second Edition
19
Packet Filtering Depends on Position
Type of filtering a device can do depends on Position of the device in the firewall perimeter Other hardware or software Packet filter placement Between the Internet and a host Between a proxy server and the Internet At either end of a DMZ Guide to Network Defense and Countermeasures, Second Edition
20
Guide to Network Defense and Countermeasures, Second Edition
21
Guide to Network Defense and Countermeasures, Second Edition
22
Creating Rules and Establishing Restrictions
Rule base Tells firewalls what to do when a certain kind of traffic attempts to pass Points to consider Based on organization’s security policy Include a firewall policy Simple and short as possible. Restrict access to ports and subnets on the internal network from the Internet Control Internet services Guide to Network Defense and Countermeasures, Second Edition
23
Base the Rule Base on Your Security Policy
When configuring rules pay attention to Logging and auditing Tracking Filtering Network Address Translation (NAT) Quality of Service (QoS) Desktop security policy Rule base is a practical implementation of the organization’s policy Guide to Network Defense and Countermeasures, Second Edition
24
Base the Rule Base on Your Security Policy (continued)
Common policies that need to be reflected in the rule base Employees have access to Internet with restrictions Public can access company’s Web and server Only authenticated traffic can access the internal LAN Employees are not allowed to use instant-messaging Traffic from the company’s ISP should be allowed Block external traffic by instant-messaging software Only network administrator should be able to access internal network directly from the Internet Guide to Network Defense and Countermeasures, Second Edition
25
Create a Firewall Policy That Covers Application Traffic
Addition to security policy Describes how firewall handles application traffic Risk analysis provides a list of applications And associated threats and vulnerabilities General steps to create a firewall policy Identify network applications Determine methods for securing application traffic You must balance security and cost Consider all firewalls in your network Guide to Network Defense and Countermeasures, Second Edition
26
Guide to Network Defense and Countermeasures, Second Edition
27
Guide to Network Defense and Countermeasures, Second Edition
28
Create a Firewall Policy That Covers Application Traffic (continued)
Firewalls enable you to control access to your computer or network By controlling access to particular applications Options for defining rules Allow traffic Block traffic Ask or prompt Guide to Network Defense and Countermeasures, Second Edition
29
Keep the Rule Base Simple
Keep list of rules as short as possible About 30 and 50 rules Shorter the rule base, faster the firewall will perform Firewalls process rules in a particular order Usually rules are numbered starting at 1 and displayed in a grid Most important rules should be at the top of the list Make the last rule a cleanup rule A catch-all type of rule Guide to Network Defense and Countermeasures, Second Edition
30
Guide to Network Defense and Countermeasures, Second Edition
31
Guide to Network Defense and Countermeasures, Second Edition
32
Restrict Subnets, Ports, and Protocols
Filtering by IP addresses You can identify traffic by IP address range Most firewalls start blocking all traffic You need to identify “trusted” networks Firewall should allow traffic from trusted sources Guide to Network Defense and Countermeasures, Second Edition
33
Guide to Network Defense and Countermeasures, Second Edition
34
Control Internet Services
Web services Employees always want to surf the Internet DNS Resolves fully qualified domain names (FQDNs) to their corresponding IP addresses DNS uses UDP port 53 for name resolution DNS uses TCP port 53 for zone transfers POP3 and IMAP4 SMTP LDAP and HTTP Guide to Network Defense and Countermeasures, Second Edition
35
Guide to Network Defense and Countermeasures, Second Edition
36
Guide to Network Defense and Countermeasures, Second Edition
37
Guide to Network Defense and Countermeasures, Second Edition
38
Control Internet Services (continued)
FTP Types of FTP transactions Active FTP Passive FTP Filtering by ports Filters traffic based on TCP or UDP port numbers Can filter a wide variety of information Guide to Network Defense and Countermeasures, Second Edition
39
Guide to Network Defense and Countermeasures, Second Edition
40
Guide to Network Defense and Countermeasures, Second Edition
41
Control Internet Services (continued)
Filtering by ports You can filter out everything but TCP port 80 for Web TCP port 25 for TCP port 21 for FTP Guide to Network Defense and Countermeasures, Second Edition
42
Guide to Network Defense and Countermeasures, Second Edition
43
Guide to Network Defense and Countermeasures, Second Edition
44
Guide to Network Defense and Countermeasures, Second Edition
45
Control Internet Services (continued)
ICMP message type ICMP functions as a housekeeping protocol Helps networks cope with communication problems Attackers can use ICMP packets to crash a computer Filtering by service Firewalls can filter by the name of a service You do not have to specify a port number Firewalls can also filter by the six TCP control flags Guide to Network Defense and Countermeasures, Second Edition
46
Guide to Network Defense and Countermeasures, Second Edition
47
Guide to Network Defense and Countermeasures, Second Edition
48
Control Internet Services (continued)
Filtering by service Firewalls can also filter by the IP options Security Loose resource and record routing Strict source and record routing Internet timestamp Guide to Network Defense and Countermeasures, Second Edition
49
Control Internet Services (continued)
Filtering by service Rules should follow a few general practices Firewall with a “Deny All” security policy should start from a clean slate Nobody can connect to the firewall except the administrator Block direct access from the Internet to any computer behind the firewall Permit access to public services in the DMZ Guide to Network Defense and Countermeasures, Second Edition
50
Guide to Network Defense and Countermeasures, Second Edition
51
Guide to Network Defense and Countermeasures, Second Edition
52
Designing Firewall Configurations
Firewalls can be deployed in several ways As part of a screening router Dual-homed host Screen host Screened subnet DMZ Multiple DMZs Multiple firewalls Reverse firewall Guide to Network Defense and Countermeasures, Second Edition
53
Screening Router Screening router
Determines whether to allow or deny packets based on their source and destination IP addresses Or other information in their headers Does not stop many attacks Especially those that use spoofed or manipulated IP address information Should be combined with a firewall or proxy server For additional protection Guide to Network Defense and Countermeasures, Second Edition
54
Guide to Network Defense and Countermeasures, Second Edition
55
Dual-Homed Host Dual-homed host
Computer that has been configured with more than one network interface Only firewall software can forward packets from one interface to another Provides limited security Host serves as a single point of entry to the organization Guide to Network Defense and Countermeasures, Second Edition
56
Guide to Network Defense and Countermeasures, Second Edition
57
Screened Host Screened host Similar to a dual-homed host
Can add router between the host and the Internet To carry out IP packet filtering Combines a dual-homed host and a screening router Can function as a gateway or proxy server Guide to Network Defense and Countermeasures, Second Edition
58
Guide to Network Defense and Countermeasures, Second Edition
59
Screened Subnet DMZ DMZ
Subnet of publicly accessible servers placed outside the internal LAN Called a “service network” or “perimeter network” Firewall that protects the DMZ is connected to the Internet and the LAN Called a three-pronged firewall Guide to Network Defense and Countermeasures, Second Edition
60
Guide to Network Defense and Countermeasures, Second Edition
61
Multiple DMZ/Firewall Configurations
Server farm Group of servers connected in their own subnet Work together to receive requests with the help of load-balancing software Load-balancing software Prioritizes and schedules requests and distributes them to servers Clusters of servers in DMZs help protecting the network from becoming overloaded Each server farm/DMZ can be protected with its own firewall or packet filter Guide to Network Defense and Countermeasures, Second Edition
62
Guide to Network Defense and Countermeasures, Second Edition
63
Multiple Firewall Configurations
Protecting a DMZ with two or more firewalls One firewall controls traffic between DMZ and Internet Second firewall controls traffic between protected LAN and DMZ Can also serve as a failover firewall Advantage Can control where traffic goes in the three networks you are dealing with Guide to Network Defense and Countermeasures, Second Edition
64
Guide to Network Defense and Countermeasures, Second Edition
65
Multiple Firewall Configurations (continued)
Protecting branch offices with multiple firewalls Multiple firewalls can implement a single security policy Central office has a centralized firewall Directs traffic for branch offices and their firewalls Deploys security policy through this firewall using a security workstation Guide to Network Defense and Countermeasures, Second Edition
66
Guide to Network Defense and Countermeasures, Second Edition
67
Reverse Firewall Reverse firewall
Monitors connections headed out of a network Instead of trying to block what’s coming in Helps monitor connection attempts out of a network Originated from internal users Filters out unauthorized attempts Guide to Network Defense and Countermeasures, Second Edition
68
Guide to Network Defense and Countermeasures, Second Edition
69
Comparing Software and Hardware Firewalls
Software-based firewalls Hardware-based firewalls Hybrid firewalls Guide to Network Defense and Countermeasures, Second Edition
70
Software-Based Firewalls
Free firewall programs They are not perfect Logging capabilities are not as robust as some commercial products Configuration can be difficult Popular free firewall programs Netfilter ZoneAlarm Sygate Personal Firewall Guide to Network Defense and Countermeasures, Second Edition
71
Software-Based Firewalls (continued)
Commercial firewall programs: Personal firewalls Located between the Ethernet adapter driver and the TCP/IP stack Inspect traffic going between the driver and the stack Popular choices Norton Personal Firewall ZoneAlarm Pro BlackICE PC Protection Sygate Personal Firewall Pro Considered “lightweight” in terms of protection Guide to Network Defense and Countermeasures, Second Edition
72
Software-Based Firewalls (continued)
Commercial firewall programs: Enterprise firewalls Include centralized management option Capable of installing multiple instances from a centralized location Some examples include PGP Desktop 9.0 Check Point NG Proventia security products Novell’s BorderManager Guide to Network Defense and Countermeasures, Second Edition
73
Hardware Firewalls Advantages Disadvantages
Do not depend on conventional OSs Generally more scalable than software firewalls Disadvantages They do depend on nonconventional OSs Tend to be more expensive than software products Guide to Network Defense and Countermeasures, Second Edition
74
Hybrid Firewalls Hybrid firewall
Combines aspects of hardware and software firewalls Benefits from the strengths of both solutions Guide to Network Defense and Countermeasures, Second Edition
75
Guide to Network Defense and Countermeasures, Second Edition
76
Summary Firewall Firewalls are not a standalone solution
Hardware or software that blocks unauthorized network access Firewalls are not a standalone solution Combine them with antivirus software and IDSs Firewalls are effective only if configured correctly You can use several different firewall configurations to protect a network Guide to Network Defense and Countermeasures, Second Edition
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.