IUT– Network Security Course 1 Network Security Firewalls.

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 9 “Firewalls and Intrusion Prevention.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 9 – Firewalls and.
04/19/06 Hofstra University – Network Security Course, CSC290A 1 Network Security Firewalls.
Firewalls Uyanga Tserengombo
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
FIREWALLS – Chapter 20 network-based threats access to outside world Functionality, Design Security – trusted system.
Fall 2008CS 334: Computer Security1 Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Lecture 14 Firewalls modified from slides of Lawrie Brown.
Security Firewall Firewall design principle. Firewall Characteristics.
Firewalling Techniques Prabhaker Mateti. ACK Not linux specific Not linux specific Some figures are from 3com Some figures are from 3com.
—On War, Carl Von Clausewitz
Chapter 11 Firewalls.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 7 Network Perimeter Security.
Chapter 10 Firewalls. Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent.
Electronic Commerce 2. Definition Ecommerce is the process of buying and selling products and services via distributed electronic media, usually the World.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
A Brief Taxonomy of Firewalls
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Chapter 20 Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
NW Security and Firewalls Network Security
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
1 Pertemuan 13 IDS dan Firewall Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 11 Firewalls.
1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University R355.
Firewalls, etc.. Network Security2 Outline Intro Various firewall technologies: –Static Packet Filtering (or nonstateful packet filter) –Dynamic Packet.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
TCP/IP Protocols Contains Five Layers
IPtables Objectives Contents Practicals Summary
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Karlstad University Firewall Ge Zhang. Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…
Security fundamentals Topic 10 Securing the network perimeter.
Firewall C. Edward Chow CS691 – Chapter 26.3 of Matt Bishop Linux Iptables Tutorial by Oskar Andreasson.
1 An Introduction to Internet Firewalls Dr. Rocky K. C. Chang 12 April 2007.
Cryptography and Network Security
Computer Security Firewalls and Intrusion Prevention Systems.
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Security fundamentals
FIREWALL APOORV SRIVASTAVA VAIBHAV KUMAR
Why do we need Firewalls?
Firewall.
Computer Data Security & Privacy
Prepared By : Pina Chhatrala
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
* Essential Network Security Book Slides.
Firewalls Purpose of a Firewall Characteristic of a firewall
POOJA Programmer, CSE Department
Firewalls By conventional definition, a firewall is a partition made
دیواره ی آتش.
Firewalls.
Presentation transcript:

IUT– Network Security Course 1 Network Security Firewalls

IUT– Network Security Course 2 Why Firewalls? The Internet allows you access to worldwide resources, but… …the Internet also allows the world to try and access your resources

IUT– Network Security Course 3 Why Firewalls? A firewall is inserted between the private network and the Internet Provides a choke point where security and audits can be imposed Single computer system or a set of systems can perform the firewall function

IUT– Network Security Course 4 Design Goals All traffic, from inside to outside and vice versa, must pass through the firewall Only authorized traffic (defined by the security policy) is allowed to flow

IUT– Network Security Course 5 Scope of Firewalls Single choke point - to protect vulnerable services from various kinds of attack (spoofing, DOS) Platform for non-security functions – can be used for network address translation and network management Platform for IPSec – implements VPN via tunnel mode

IUT– Network Security Course 6 Limitations of Firewalls Cannot protect against attack that bypasses the firewall – bypass attack Does not protect against internal threats Cannot protect against the transfer of virus-infected programs

IUT– Network Security Course 7 Types of Firewalls Packet Filtering Router Application Level Gateway Circuit Level Gateway

IUT– Network Security Course 8 Packet Filtering

IUT– Network Security Course 9 Packet Filtering Router Applies a set of rules to each incoming IP packet and forwards or discards the packet Filters packets in both directions

IUT– Network Security Course 10 Packet Filtering Router Rules based on source and destination address and port number and IP protocol and interface List of rules looking for a match If no match, default action is taken

IUT– Network Security Course 11 Packet Filtering Router Two default policies: default = discard: That which is not expressly permitted is prohibited default = forward: That which is not expressly prohibited is permitted

IUT– Network Security Course 12 Packet Filtering Rules connection to our SMTP port **25OUR-GWallow we don’t trust these guys*SPIGOT**block commentporttheirhostportourhostaction Inbound mail is allowed (port 25), but only to a mentioned host Everything from SPIGOT is blocked

IUT– Network Security Course 13 Packet Filtering Rules default****block commentporttheirhostportourhostaction This is the default policy It is usually the last rule This rule drops everything

IUT– Network Security Course 14 Packet Filtering Rules Connection to their SMTP port 25***allow commentporttheirhostportourhostaction Inside host can send mail to the outside Some other application could be linked to port 25 Attacker could gain access through port 25

IUT– Network Security Course 15 Packet Filtering Rules their repliesACK**25*allow flags connection to their SMTP port 25**our hosts allow commentportdestportsrcaction This improves on the last situation Internal hosts can access SMTP anywhere ACKs from any SMTP server are permitted

IUT– Network Security Course 16 Packet Filtering Advantage: simple, transparent and very fast Disadvantage: difficulty in setting up rules correctly and completely

IUT– Network Security Course 17 Packet Filtering Attacks Vulnerable again Application layer attacks IP address spoofing – packets from the outside have internal addresses in their source IP address field Tiny fragment attack – designed to circumvent filtering rules that depend on TCP header information

IUT– Network Security Course 18 Real Life Example

IUT– Network Security Course 19 Stateful Inspection Layers Addressed By Stateful Inspection

IUT– Network Security Course 20 Stateful Inspection More secure because the firewall tracks client ports individually rather than opening all high-numbered ports for external access. Adds Layer 4 awareness to the standard packet filter architecture.

IUT– Network Security Course 21 Application Level Gateway

IUT– Network Security Course 22 Application Gateway Firewalls Layers Addressed by Application-Proxy Gateway Firewalls

IUT– Network Security Course 23 Application Level Gateway Acts as a relay of application level traffic Also called a proxy User contacts gateway for TELNET to remote host, user is authenticated, then gateway contacts remote host and relays info between two end points

IUT– Network Security Course 24 Application Level Gateway Can examine the packets to ensure the security of the application – full packet awareness Very easy to log since entire packet seen Disadvantage: additional processing overhead for each connection – increase load

IUT– Network Security Course 25 Circuit-Level Gateway

IUT– Network Security Course 26 Circuit Level Gateway Does not permit an end-to-end TCP connection Sets up two TCP connections one between itself and a TCP user on the inside and one between itself and a TCP user on the outside Relays TCP segments from one connection to the other without examining the contents

IUT– Network Security Course 27 Firewall Basing It is common to base a firewall on a stand- alone machine running a common operating system, such as UNIX or Linux. Firewall functionality can also be implemented as a software module in a router or LAN switch

IUT– Network Security Course 28 Bastion Host Usually a platform for an application or circuit level gateway Only essential services Allows access only to specific hosts Maintains detailed audit information by logging all traffic Choke point for discovering and terminating intruder attacks

IUT– Network Security Course 29 Bastion Host, Single-Homed Two systems: packet filtering router and bastion host For traffic from the Internet, only IP packets destined for the bastion host are allowed For traffic from the internal network, only relayed packets from the bastion host are allowed out

IUT– Network Security Course 30 Bastion Host, Single-Homed What happens if this is compromised? A Big Problem!!!

IUT– Network Security Course 31 Bastion Host, Dual-Homed

IUT– Network Security Course 32 Bastion Host, Dual-homed Bastion host second defense layer Internal network is completely isolated Packet forwarding is turned off More secure

IUT– Network Security Course 33 Screened Subnet

IUT– Network Security Course 34 Screened Subnet Most secure Isolated subnet with bastion host between two packet filtering routers Traffic across screened subnet is blocked Three layers of defense Internal network is invisible to the Internet

IUT– Network Security Course 35 Typical DMZ external network DMZ internal network

What Is iptables? Stateful packet inspection. The firewall keeps track of each connection passing through it, This is an important feature in the support of active FTP and VoIP. Filtering packets based on MAC address, IPv4 and IPv6 Filtering packets based the values of the flags in the TCP header Helpful in preventing attacks using malformed packets and in restricting access. Network address translation and Port translating NAT/NAPT Building DMZ and more flexible NAT enviroments to increase security. System logging of network activities Provides the option of adjusting the level of detail of the reporting A rate limiting feature Helps to block some types of denial of service (DoS) attacks.

Packet Processing In iptables Three builtin tables (queues) for processing: 1. MANGLE: is used in QOS to handle marking of packet or in data load distribution to distribute packets to different routes 2. FILTER: packet filtering, has three builtin chains (your firewall policy rules) Forward chain: filters packets to servers protected by firewall Input chain: filters packets destinated for the firewall Output chain: filters packets orginating from the firewall 3. NAT: network adress translation, has two builtin chains Pre-routing: NAT packets when destination address need changes Post-routing: NAT packets when source address need changes

Processing For Packets Routed By The Firewall 1/2

Processing For Packets Routed By The Firewall 2/2

40 Packet Traversal in Linux Input Output Local Processes Forward Routing Decision Pre- Routing Post- Routing

41 IPtables “chains” A chain is a sequence of filtering rules. Rules are checked in order. First match wins. Every chain has a default rule. If no rules match the packet, default policy is applied. Chains are dynamically inserted/ deleted.