* Essential Network Security Book Slides.

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 9 “Firewalls and Intrusion Prevention.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 9 – Firewalls and.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Firewalls Uyanga Tserengombo
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
Fall 2008CS 334: Computer Security1 Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for.
Lecture 14 Firewalls modified from slides of Lawrie Brown.
Security Firewall Firewall design principle. Firewall Characteristics.
—On War, Carl Von Clausewitz
Chapter 11 Firewalls.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Spring 2004 CMPE 151: Network Administration Lecture 6.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Chapter 20 Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Chapter 6: Packet Filtering
1 Pertemuan 13 IDS dan Firewall Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 11 Firewalls.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University R355.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
Data Security and Encryption (CSE348)
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Karlstad University Firewall Ge Zhang. Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
1 An Introduction to Internet Firewalls Dr. Rocky K. C. Chang 12 April 2007.
Cryptography and Network Security
Computer Security Firewalls and Intrusion Prevention Systems.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
FIREWALL APOORV SRIVASTAVA VAIBHAV KUMAR
Why do we need Firewalls?
Firewall.
IT443 – Network Security Administration Instructor: Bo Sheng
Computer Data Security & Privacy
Prepared By : Pina Chhatrala
Introduction to Networking
Cryptography and Network Security Chapter 22
Chapter 4: Access Control Lists (ACLs)
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Firewalls Purpose of a Firewall Characteristic of a firewall
Subject Name: NETWORK SECURITY Subject Code: 10EC832
POOJA Programmer, CSE Department
Firewalls By conventional definition, a firewall is a partition made
Firewalls Jiang Long Spring 2002.
دیواره ی آتش.
Chapter 20: Firewalls Fourth Edition by William Stallings
Firewalls.
Introduction to Network Security
Presentation transcript:

* Essential Network Security Book Slides. Firewall 1 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi

Introduction In organization, internet connectivity is no longer optional, with information and services essential to the organization. individual users want and need Internet access. However, Internet access it enables the outside world to reach and interact with local network assets, creating a threat to the organization. While it is possible to equip each workstation and server on the premises network with strong security features, this is not a practical approach in general. Firewalls can be an effective means of protecting a local system or network of systems from network-based security threats at the same time affording access to the outside world via wide area networks and the Internet

What is a firewall A firewall is inserted between the network and the Internet to establish a controlled link defines a single choke point that keeps unauthorized users out of the protected network, prohibits potentially vulnerable services from entering or leaving the network, and provides protection from various kinds of IP spoofing and other attack. [IP spoofing refers to the creation of IP packets with a forged source IP address with the purpose of impersonating the sender] NAT : network address translation, s the process of modifying IP address information in IP packet headers while in transit across a traffic routing device.

What is a firewall 3. provides a location for monitoring security-related events 4. is a convenient platform for several Internet functions that are not security related, such as NAT (network address translation) and Internet usage audits or logs 5. A firewall can serve as the platform for IPSec to implement virtual private networks. The firewall itself must be immune to penetration, since it will be a target of attack. NAT : network address translation, s the process of modifying IP address information in IP packet headers while in transit across a traffic routing device.

What is a firewall

IT352 | Network Security |Najwa AlGhamdi Types of firewalls There are three common types of firewalls: packet filters, application-level gateways, & circuit-level gateways. IT352 | Network Security |Najwa AlGhamdi

1. Packet filtering firewall A packet-filtering router applies a set of rules to each incoming and outgoing IP packet to forward or discard the packet. Filtering rules are based on information contained in a network packet such as src & dest IP addresses Ports transport protocol & interface. Some Advantages Simplicity Transparency speed.

1. Packet filtering firewall If there is no match to any rule, then one of two default policies are applied: Default = discard : that which is not expressly permitted is prohibited (default action is discard packet), conservative policy . Default = forward : that which is not expressly prohibited is permitted (default action is forward packet), permissive policy.

1. Packet filtering firewall Stallings Figure 11.1b (along with 4/e Figure 20.1a) illustrates the packet filter firewall role as utilising information from the transport, network & data link layers to make decisions on allowable traffic flows, and its placement in the border router between the external less-trusted Internet and the internal more trusted private network.

1.Packet filtering firewall Inbound mail is allowed to a gateway host only (port 25 is for SMTP incoming B. explicit statement of the default policy C. tries to specify that any inside host can send mail to the outside, but has problem that an outside machine could be configured to have some other application linked to port 25 D. properly implements mail sending rule, by checking ACK flag of a TCP segment is set

2. Application level gateway A user contacts the gateway to access some service, provides details of the service, remote host & authentication details, contacts the application on the remote host and relays all data between the two endpoints. Application-level gateways tend to be more secure than packet filters, &can log and audit traffic at application level. IT352 | Network Security |Najwa AlGhamdi

IT352 | Network Security |Najwa AlGhamdi 3. Circuit Level Gateway A circuit-level gateway relays two TCP connections one between itself and an inside TCP user, and the other between itself and a TCP user on an outside host. Once the two connections are established, it relays TCP data from one connection to the other without examining its contents. The security function consists of determining which connections will be allowed. It is typically used when internal users are trusted to decide what external services to access. IT352 | Network Security |Najwa AlGhamdi

IT352 | Network Security |Najwa AlGhamdi 3. Circuit Level Gateway One of the most common circuit-level gateways is SOCKS It consists of a SOCKS server on the firewall, and a SOCKS library & SOCKS-aware applications on internal clients. When a TCP-based client wishes to establish a connection to an object that is reachable only via a firewall , it must open a TCP connection to the appropriate SOCKS port on the SOCKS server system. If the connection request succeeds, the client enters a negotiation for the authentication method to be used, authenticates with the chosen method, and then sends a relay request. The SOCKS server evaluates the request and either establishes the appropriate connection or denies it. UDP exchanges are handled in a similar fashion IT352 | Network Security |Najwa AlGhamdi

IT352 | Network Security |Najwa AlGhamdi 3. Circuit Level Gateway One of the most common circuit-level gateways is SOCKS It consists of a SOCKS server on the firewall, and a SOCKS library & SOCKS-aware applications on internal clients. When a TCP-based client wishes to establish a connection to an object that is reachable only via a firewall , it must open a TCP connection to the appropriate SOCKS port on the SOCKS server system. If the connection request succeeds, the client enters a negotiation for the authentication method to be used, authenticates with the chosen method, and then sends a relay request. The SOCKS server evaluates the request and either establishes the appropriate connection or denies it. UDP exchanges are handled in a similar fashion IT352 | Network Security |Najwa AlGhamdi

IT352 | Network Security |Najwa AlGhamdi 3. Circuit Level Gateway IT352 | Network Security |Najwa AlGhamdi