6.6 Firewalls Packet Filter (=filtering router)

Slides:



Advertisements
Similar presentations
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls.
Advertisements

Network Security Essentials Chapter 11
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
FIREWALLS Chapter 11.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
5/4/01EMTM 5531 EMTM 553: E-commerce Systems Lecture 7b: Firewalls Insup Lee Department of Computer and Information Science University of Pennsylvania.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Guide to Computer Network Security
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 6: Packet Filtering
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
Internet and Intranet Fundamentals Class 9 Session A.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
TCP/IP Protocols Contains Five Layers
Firewall – Survey Purpose of a Firewall – To allow ‘proper’ traffic and discard all other traffic Characteristic of a firewall – All traffic must go through.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Security fundamentals Topic 10 Securing the network perimeter.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
1 Firewalls - Introduction l What is a firewall? –Firewalls are frequently thought of as a very complex system that is some sort of magical, mystical..
Firewall Matthew Prestifilippo, Bill Kazmierski, Pat Sparrow.
Firewall – Survey  Purpose of a Firewall  To allow ‘proper’ traffic and discard all other traffic  Characteristic of a firewall  All traffic must go.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Defining Network Infrastructure and Network Security Lesson 8.
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Security fundamentals
CompTIA Security+ Study Guide (SY0-401)
The Intranet.
NET 536 Network Security Firewalls and VPN
Why do we need Firewalls?
Firewalls.
Network Security Marshall Leitem 11/30/04
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
PROJECT PRESENTATION ON INTERNET FIREWALLS PRESENTED BY THE GUARDS
Introduction to Networking
Firewalls.
CompTIA Security+ Study Guide (SY0-401)
Guide to Computer Network Security
Virus 18/11/2018.
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewalls Routers, Switches, Hubs VPNs
POOJA Programmer, CSE Department
Firewalls By conventional definition, a firewall is a partition made
Firewalls Jiang Long Spring 2002.
Firewalls Chapter 8.
AbbottLink™ - IP Address Overview
Introduction to Network Security
FIREWALL.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Implementing Firewalls
Presentation transcript:

6.6 Firewalls Packet Filter (=filtering router) Passes/blocks packets, based on IP address and/or port number of source/destination Application gateway (=proxy) All requests/response of certain application must go through its proxy in intranet. Direct access to Internet is forbidden Need gateway for each type of application (telnet, ftp, http, X-window, etc). 2018/9/21

Telnet example In client machine, telnet is configured to use application gateway (software). When user invokes telnet, request is sent to local telnet gateway, which prompts user for destination. Application gateway works as intermediary (proxy) throughout telnet session. 2018/9/21

Firewall location Internet Intranet Intranet Packet filter and/or - Application gateway 2018/9/21

Typical configurations DMZ 2018/9/21

(a) Filtering router Mail server (port=25) Filtering router Internet Intranet 2018/9/21

Filtering router implementation - Blocks all incoming packets, except those with certain destination IP addresses and/or port numbers (25, 80) - It may also block outgoing packets, depending on source and/or destination. Action Our host Port Their host Block * SPIGOT Allow Our-MailServ 25 Our-WebServ 80 2018/9/21

(b) Filtering router and Bastion host Internet Protected Intranet Router only permits traffic to/from bastion host 2018/9/21

Bastion Host Runs special, secured OS. Can communicate with Machines in Internet Machines in protected network whose addresses are not externally visible. 2018/9/21

(c) Demilitarized Zone (DMZ) Modem access Bastion host Protected intranet inside router Internet outside router Web server DMZ 2018/9/21

DMZ Routers only permit traffic to/from DMZ network IP addresses in protected net not made public Unlike configuration (b), intranet is not affected by excessive attacking traffic from Internet to Bastion. It is also safe if Web server is compromised. 2018/9/21

More on proxy server (application gateway) Can deny requests from certain internal users IP addresses of internal machines never appear in Internet Can also function as caching proxy All packets can be logged with address of requesting machines May run on Bastion host, intranet or in DMZ Disadvantages= extra delay 2018/9/21

HTTP proxy 2018/9/21

Local HTTP proxy Proxy Server Internet (B) HTTP (A) Proxy HTTP www.company.com:80 Client is configured to use proxy HTTP via (B). (B) Sends GET page.html to http://www.company.com/ on behalf of (A). 2018/9/21

HTTP proxy = application gateway Works in application level. Can check if requested URL is allowed for this user. Can search, e.g., for “CAFEBABE” (written in hex) in first 4 bytes of payload to block java bytecode being transferred. 2018/9/21

RMI thru firewall HTTP server Internet RMI server client_stub port POST “data” to www.company.com:80/cgi-bin/ java-rmi.cgi?forward=<rmiServerPort> 2018/9/21

Intrusion detection system DMZ may contain Intrusion Detection System (IDS) It inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate network or system attack from someone attempting to break into or compromise system. 2018/9/21

IDS vs. firewall IDS differs from firewall in that firewall looks out for intrusions in order to stop them from happening. Firewall limits access between networks in order to prevent intrusion and does not signal attack from inside network. IDS evaluates suspected intrusion once it has taken place and signals an alarm. IDS also watches for attacks that originate from within system. 2018/9/21

Private network 2018/9/21

Hybrid network 2018/9/21

Virtual private network 2018/9/21

Addressing in a VPN 2018/9/21

Tunneling 2018/9/21

Virtual Private Network (VPN) Internet Intranet B Intranet A Tunneling Router RA Router RB RB 200 Data Station 200 Station 100 encrypted 2018/9/21

Reverse proxy Controls inbound requests (accept/reject) May be placed in DMZ or outside firewall If request is accepted, it communicates securely with the server in the intranet Some web pages may be made accessible to only to remote company employees Company net Firewall W eb server Random external user Remote company Internet Reverse proxy 2018/9/21

Filtering router 2018/9/21

Bastion host 2018/9/21

Web server directly accessible Web server invasion doesn’t endanger intranet. 2018/9/21

Intranet protected from compromised web server penetration detected and some actions will be taken 2018/9/21