NET 536 Network Security Firewalls and VPN

Slides:



Advertisements
Similar presentations
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Advertisements

Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
Module 5: Configuring Access for Remote Clients and Networks.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
Chapter 12 Network Security.
1 Internet Networking Spring 2004 Tutorial 13 LSNAT - Load Sharing NAT (RFC 2391)
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
1 Some TCP/IP Basics....NFSDNSTELNETSMTPFTP UDPTCP IP and ICMP Ethernet, serial line,..etc. Application Layer Transport Layer Network Layer Low-level &
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #12 LSNAT - Load Sharing NAT (RFC 2391)
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Virtual Private Network
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
A Brief Taxonomy of Firewalls
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Intranet, Extranet, Firewall. Intranet and Extranet.
Chapter 6: Packet Filtering
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
© MMII JW RyderCS 428 Computer Networking1 Private Network Interconnection  VPN - Virtual Private Networks  NAT - Network Address Translation  Describe.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
Chapter 13 – Network Security
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2004.
Proxy Servers.
The Intranet.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
D-Link Airplus Xtreme G DI-624 Wireless Router Packet Filtering Firewall w/NAT H. Victoria Bryant.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Virtual Private Network (VPN) 1. A corporation with multiple geographic sites can use one of two approaches to building a corporate intranet. – Private.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Virtual Local Area Networks In Security By Mark Reed.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Defining Network Infrastructure and Network Security Lesson 8.
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks
The Intranet.
Internet and Intranet.
Computer Data Security & Privacy
Troubleshooting Network Communications
Introduction to Networking
Virtual LANs.
NET323 D: Network Protocols
Internet and Intranet.
6.6 Firewalls Packet Filter (=filtering router)
Packet Sniffing.
* Essential Network Security Book Slides.
I. Basic Network Concepts
Access Control Lists CCNA 2 v3 – Module 11
Virus 18/11/2018.
NET323 D: Network Protocols
Firewalls Routers, Switches, Hubs VPNs
IS 4506 Server Configuration (HTTP Server)
Internet and Intranet.
Lecture 3: Secure Network Architecture
Firewalls Chapter 8.
AbbottLink™ - IP Address Overview
Introduction to Network Security
Firewall Installation
Internet and Intranet.
Topic 12: Virtual Private Networks
Chapter 8 – Data switching and routing
Presentation transcript:

NET 536 Network Security Firewalls and VPN Networks and Communication Department Firewalls and VPN

Firewall Provides a barrier and/or filter between networks Can be configured to block packets Sometimes called a level 4 switch Blocks access to network from certain applications and/or addresses by examining packets going throw it and deciding whether to forward them. Examines IP, TCP and UDP headers to determine specific IP addresses and/or specific applications (i.e. ports) to allow or block. Level 4 switch because it looks at port numbers in the Transport Layer (Level 4 of the OCI).

VPN VPN (Virtual Private Network) Uses IP Tunneling. Acts as a private network connection (inside a company for example) while running over a more public internet. Uses IP Tunneling.

Advantages: Firewall and VPN Firewalls Provides protection to network resources by restricting access based upon information contained in packets Common Use: Allows the separation of Intra-nets from the Internet VPN Allows access through firewalls by creating virtual circuits using tunneling. Common Use: Provides secure remote access to an institution's protected resources

Tunneling Wraps an IP frame inside another frame of the same layer. An IP frame inside another IP frame. The inner packet can be encrypted, which allows for privacy of the connection. You may remember IP6 was tested by tunneling inside IP4 packets. Because of this, can be used to bypass the firewall, because the packet you are sending is no longer of the type being blocked.

Disadvantages: VPNs Tunneling increases the length of IP packets May result in inefficient use of bandwidth, especially for short packets Potential performance impact at end routers as they need to do more work Remove headers, decrypt packet body‏ Administrative overhead and cost associated with managing the VPN server

Scenario 1- No Firewall

Scenario 1 - Described Simulates two sales people working offsite Characterized by light Web Browsing and light Database access Connect to a server via the Internet.

Scenario 2- Firewall

Scenario 2- Described Replaces the simple router previously used to connect to the server with a firewall Configured to block Database access. The Sales people can still engage in Web Browsing

Scenario 3- Firewall with VPN

Scenario 3- Described Scenario 3 configures a VPN for Sales A Sales A now tunnels through the firewall and can access the database Still allowing web browsing Sales B is restricted to web browsing with no database access.

Results Average Client DB and Client HTTP Traffic for the three scenarios. Show live.

Exercise1 From the obtained graphs, explain the effect of the firewall, as well as the configured VPN, on the database traffic requested by Sales A and Sales B.

Answer 1 - Observations From the captured graphs, it can be observed that without the firewall both Sales A and Sales B clients were able to access the database, while adding the firewall prevented both Sales clients from accessing it. Configuring the VPN access for Sales A allowed it to access the database through the firewall.

Exercise 2 2)Compare the graphs that show the received HTTP traffic with those that show the received database traffic.

Answer 2 - Observations Comparing the graphs of received HTTP and database traffic for both Sales A and B clients confirms that both clients receive HTTP traffic in all scenarios (i.e., the firewall permits HTTP traffic from both Sales clients). Once the firewall is in place however, database traffic is only permitted through the firewall using a VPN.

Exercise 3 3) Generate and analyze the graph(s) that show the effect of the firewall, as well as the configured VPN, on the response time (delay) of the HTTP pages and database queries.

Answer 3- DB Queries Obviously there is no DB Query response times for the Firewall without VPN Firewall with VPN response time is slower due to overhead from the VPN and additional router.