POS SATPAM Firewall Ir. Risanuri Hidayat, M.Sc. Teknik Elektro FT UGM.

Slides:



Advertisements
Similar presentations
What are they and what do they (not) do?
Advertisements

Network Security Essentials Chapter 11
Firewalls Steven M. Bellovin Matsuzaki ‘maz’ Yoshinobu 1.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Guide to Network Defense and Countermeasures Second Edition
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Security Firewall Firewall design principle. Firewall Characteristics.
Controlling access with packet filters and firewalls.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Guide to Computer Network Security
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Firewall Slides by John Rouda
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
A Brief Taxonomy of Firewalls
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
NW Security and Firewalls Network Security
Intranet, Extranet, Firewall. Intranet and Extranet.
Chapter 6: Packet Filtering
1 Pertemuan 13 IDS dan Firewall Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
COEN 350 Network Defense in Depth Firewalls. Terms of the Trade Border Router First / last router under control of system administration. DMZ Demilitarized.
Network Security Part III: Security Appliances Firewalls.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Security fundamentals Topic 10 Securing the network perimeter.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Defining Network Infrastructure and Network Security Lesson 8.
Security fundamentals
CompTIA Security+ Study Guide (SY0-401)
Why do we need Firewalls?
Computer Data Security & Privacy
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Networking
CompTIA Security+ Study Guide (SY0-401)
6.6 Firewalls Packet Filter (=filtering router)
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Guide to Computer Network Security
* Essential Network Security Book Slides.
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewalls Routers, Switches, Hubs VPNs
Firewalls By conventional definition, a firewall is a partition made
AbbottLink™ - IP Address Overview
Introduction to Network Security
Implementing Firewalls
Presentation transcript:

POS SATPAM Firewall Ir. Risanuri Hidayat, M.Sc. Teknik Elektro FT UGM

Apa itu firewall Firewall adalah suatu mekanisme, sehingga suatu client dari luar dilarang/dibolehkan mengakses ke dalam jaringan (atau client yang berada di dalam dilarang/dibolehkan mengakses keluar jaringan) berdasarkan aturan-aturan yang ditetapkan. Seperti pos satpam di suatu instansi/perumahan Bekerja di layer: antara 3 dan 4 (bahkan 5) di TCP/IP Model

Istilah-istilah Masquerading –Allows many machines to use the appear to come from the same IP address –Connections can only be initiated by internal host NAT – Network Address Translation –The term “NAT” can mean many different things, see RFC2663 for details –Generally some router-level mapping and conversion between a set of private IP addresses and a single public IP address (IP Masq) or set of public IP addresses.

Mengapa butuh To implement your policy! To manage the risks of providing your services. To segregate networks with different policies. To provide accountability of network resources. Firewalls mitigate risk Blocking MOST threats They have vulnerabilities as well Improper configuration is the largest threat

Cara kerja Dengan meneliti paket-paket yang lewat firewall itu dan mencocokkannya dengan melihat daftar/aturan yang diberikan kepadanya. Firewalls block certain traffic, while allowing other traffic to pass. Different types of firewalls pass traffic using different methods Packet Filtering Proxy Connection State Analysis Firewall Boleh lewat mbak ? Nih surat-suratnya Anak kecil ga boleh keluar.. sudah malam

Ada dua tipe utama Firewalls rules are created to match policy Rules are based on: –Routing based filters (Who – siapa) Sender and Destination berasal dari mana ? Mau ke mana ? Tidak peduli mau ngapain di sana –Content based filters (What – mau apa) TCP/IP Port numbers and Services Apa yang akan kamu lakukan di sana ? Tidak semudah yang nomer 1, sebab kadang-kadang bisa ditipu seorang client

Dua pendekatan aturan Default allow –Mengijinkan semua lewat kecuali yang terdaftar –Place roadblocks/watch gates along a wide open road. Default deny –Semua dilarang lewat kecuali yang terdaftar –Build a wall and carve paths for everyone you like.

Packet Filtering Simplest form of firewalling Can often be implemented on network equipment (routers, switches) Blocks certain TCP/IP Ports, protocols, and/or addresses. Rules are applied to the headers of the packets Contoh: iptables,ipchains (Linux)

Packet Filtering Advantages of Packet Filtering –High Performance –Can usually be applied to current routers/switches (No additional equipment!) –Effective Disadvantages of Packet Filtering –Can quickly become a very complex configuration –Easy to misconfigure –Difficult to configure for dynamic protocols (like FTP) –Can’t do any content-based filtering (remove attachments, javascript, ActiveX)

Contoh Packet Filtering An abbreviated packet… Source SrcPort Destination DestPort A Cisco packet filter access-list 2640 deny any gt 1023

Proxy Firewall accepts requests, and executes them in behalf of the user –I want to see –Firewall gets contentwww.osu.edu –Firewall sends content to requester Contoh: Squid

Proxy Advantages of Proxy Firewall –They don’t allow direct connections between internal and external hosts –Can support authentication, ‘classes’ of users –Can allow/deny access based on content –Can keep very detailed logs of activity (including the data portions of packets) –Caching

Proxy Disdvantages of Proxy Firewall –Slower than packet filter firewalls –Require additional hardware more hardware for more users slow hardware = slow service –Some firewalls require special client configurations on the workstations. –Some protocols may not be supported (AIM, RealAudio, Napster, H.323) Varies by vendor. –Configuration can be complex Must configure proxy for each protocol

Connection State Analysis Similar to packet filtering, but analyzes packets to make sure connection requests occur in the proper sequence. Example: –ICMP Echo Replies are not accepted through the firewall unless there is an outstanding ICMP Echo Request.

Connection State Analysis Advantages –Caching –Content Monitoring Disadvantages –Performance –Overhead requires more expensive system

Topologi Bridge-type firewall –Invisible to users –Easy to install for already existing networks Router-type firewalls –Has IP Address, visible to users

Topologi Advantages of Bridge- type firewall –Invisible to users –Easy to install for already existing networks Disadvantages of Bridge- type firewall –Requires more equipment than packet filtering –Rules may be more confusing to configure Advantages of Router- type firewall –Rule configuration slightly better than bridge Disadvantages of Router-type firewall –System is ‘visible’ to users and outsiders

Problems Firewalls as filters can be considered for most part to be infallible... but as a security measure? They can only enforce rules (generally static) internet Firewall

Problems “Crunchy on the outside, but soft and chewy on the inside.” internet Jaringan kita Jaringan terpercaya Firewall

Setting Firewall Using the “DMZ” (DeMilitarized zone) to your advantage Firewalls as Intrusion Detection devices Configure VPN’s for management

DMZ Configuration Separate area off the firewall Different network segments may have different policies –Departments –Service areas –Public Services –Internal Services Usually a different subnet Commonly used to house Internet facing machines (i.e. Web Servers) Has its own firewall policy

DMZ Configuration Place web servers in the “DMZ” network Only allow web ports (TCP ports 80 and 443) internet Firewall Web Server

DMZ Configuration Don’t allow web servers access to your network Allow local network to manage web servers (SSH) Don’t allow servers to connect to the Internet Patching is not convenient Firewall Web Server internet Mas..yang merah gak boleh lewat lho

DMZ Configuration Firewall Web Server Jaringan Lokal: Semua boleh menghubungi web- server (port 80/443 PC-PC tertentu boleh menghubungi server lewat SSH (port 22) Server tidak boleh menghubungi jaringan lokal Internet: Semua boleh menghubungi web- server (port 80/443 Selain layanan web tidak diperkenankan Server tidak boleh jalan-jalan di internet

Firewall sebagai IDS IDS = Intrusion Detection System Collect log information from the deny rules Find Portscanning, hacking attempts, etc… Isolate traffic with deny rules helps cut down the information overload

Firewall sebagai IDS What to do with ALL that data…..Graph It! Shows trends, what people are looking for –Helps prioritize security tasks Occasionally you may want to block portscans

Firewall sebagai IDS Pay close attention to traffic leaving DMZ Often the first sign of a compromise Low traffic rules, so logs aren’t as enormous is nice, provided you’re the only one reading it

VPN VPN = Virtual Private Network VPN is far more secure than other management methods: –SSL and SSH are vulnerable to Man-In-The Middle Attacks –Telnet and SNMP are clear text –There are no known MIM attacks against IPSEC (Yet)

VPN VPN clients are supported on most platforms Most firewalls will work with most clients Netscreen now officially supports FreeSwan Mac OS X is now supporting VPN

Conclusions People don’t just put up a thick front door for their sensitive belongings, you shouldn’t for your network either. Firewalls are an effective start to securing a network. Not a finish. Care must be taken to construct an appropriate set of rules that will enforce your policy.