Firewalls.

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 9 “Firewalls and Intrusion Prevention.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
Firewalls Uyanga Tserengombo
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Firewalls.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
Security Firewall Firewall design principle. Firewall Characteristics.
Chapter 10 Firewalls. Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent.
1 Some TCP/IP Basics....NFSDNSTELNETSMTPFTP UDPTCP IP and ICMP Ethernet, serial line,..etc. Application Layer Transport Layer Network Layer Low-level &
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Spring 2004 CMPE 151: Network Administration Lecture 6.
Firewalls. What is a Firewall? A choke point of control and monitoring A choke point of control and monitoring Interconnects networks with differing trust.
Cryptography and Network Security Chapter 20 Fourth Edition by William Stallings.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Chapter 9: Kinds of Firewalls Kate Solinger Tamara Teslovich.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Firewalls.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Figure 5-4: Drivers of Performance Requirements: Traffic Volume and Complexity of Filtering Performance Requirements Traffic Volume (Packets per Second)
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Chapter 6: Packet Filtering
Chapter 11 Firewalls.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
Firewalls. What is a Firewall? A choke point of control and monitoring A choke point of control and monitoring Interconnects networks with differing trust.
Chapter 20 – Firewalls The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz.
Internet and Intranet Fundamentals Class 9 Session A.
Firewalls. What is a Firewall? A choke point of control and monitoring A choke point of control and monitoring Interconnects networks with differing trust.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Cryptography and Network Security
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Security fundamentals
FIREWALL APOORV SRIVASTAVA VAIBHAV KUMAR
Firewalls.
Why do we need Firewalls?
Firewall.
Firewalls.
Computer Data Security & Privacy
Prepared By : Pina Chhatrala
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
PROJECT PRESENTATION ON INTERNET FIREWALLS PRESENTED BY THE GUARDS
Introduction to Networking
Indian Institute of Technology Indore
Firewalls.
* Essential Network Security Book Slides.
Firewalls (March 2, 2016) © Abdou Illia – Spring 2016.
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewalls. What is a Firewall? A choke point of control and monitoring A choke point of control and monitoring Interconnects networks with differing trust.
POOJA Programmer, CSE Department
Firewalls Jiang Long Spring 2002.
دیواره ی آتش.
Firewall.
Firewalls Chapter 8.
Firewalls.
Firewalls.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Firewalls.
CSCD 434 Spring 2019 Lecture 16 Firewalls.
Presentation transcript:

Firewalls

Firewall A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services only authorized traffic is allowed Auditing and controlling access can implement alarms for abnormal behavior Itself immune to penetration Provides perimeter defence

Classification of Firewall Packet filtering Circuit gateways Application gateways Combination of above is dynamic packet filter

Firewalls – Packet Filters

Firewalls – Packet Filters Simplest of components Uses transport-layer information only IP Source Address, Destination Address Protocol/Next Header (TCP, UDP, ICMP, etc) TCP or UDP source & destination ports TCP Flags (SYN, ACK, FIN, RST, PSH, etc) ICMP message type Examples DNS uses port 53 No incoming port 53 packets except known trusted servers

Usage of Packet Filters Filtering with incoming or outgoing interfaces E.g., Ingress filtering of spoofed IP addresses Egress filtering Permits or denies certain services Requires intimate knowledge of TCP and UDP port utilization on a number of operating systems

How to Configure a Packet Filter Start with a security policy Specify allowable packets in terms of logical expressions on packet fields Rewrite expressions in syntax supported by your vendor General rules - least privilege All that is not expressly permitted is prohibited If you do not need it, eliminate it

Port Numbering TCP connection Server port is number less than 1024 Client port is number between 1024 and 16383 Permanent assignment Ports <1024 assigned permanently 20,21 for FTP 23 for Telnet 25 for server SMTP 80 for HTTP Variable use Ports >1024 must be available for client to make any connection This presents a limitation for stateless packet filtering If client wants to use port 2048, firewall must allow incoming traffic on this port Better: stateful filtering knows outgoing requests

Stateful Filtering

Firewall Gateways Firewall runs set of proxy programs Proxies filter incoming, outgoing packets All incoming traffic directed to firewall All outgoing traffic appears to come from firewall Policy embedded in proxy programs Two kinds of proxies Application-level gateways/proxies Tailored to http, ftp, smtp, etc. Circuit-level gateways/proxies Working on TCP level

Firewalls - Application Level Gateway (or Proxy)

Firewalls - Circuit Level Gateway

Firewalls - Circuit Level Gateway Relays two TCP connections Imposes security by limiting which such connections are allowed Once created usually relays traffic without examining contents Typically used when trust internal users by allowing general outbound connections SOCKS commonly used for this

Screened Host Architecture

Dynamic Packet Filters Most common Provide good administrators protection and full transparency Network given full control over traffic Captures semantics of a connection

Firewalls Aren’t Perfect? Useless against attacks from the inside Evildoer exists on inside Malicious code is executed on an internal machine Organizations with greater insider threat Banks Military Protection must exist at each layer Assess risks of threats at every layer Rely on transitive trust