Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 9 “Firewalls and Intrusion Prevention.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 9: Firewalls and Intrusion Prevention.
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 9 – Firewalls and.
Firewalls Uyanga Tserengombo
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
FIREWALLS – Chapter 20 network-based threats access to outside world Functionality, Design Security – trusted system.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
Fall 2008CS 334: Computer Security1 Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Lecture 14 Firewalls modified from slides of Lawrie Brown.
Security Firewall Firewall design principle. Firewall Characteristics.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
—On War, Carl Von Clausewitz
Chapter 11 Firewalls.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
5/4/01EMTM 5531 EMTM 553: E-commerce Systems Lecture 7b: Firewalls Insup Lee Department of Computer and Information Science University of Pennsylvania.
Chapter 10 Firewalls. Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent.
Electronic Commerce 2. Definition Ecommerce is the process of buying and selling products and services via distributed electronic media, usually the World.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Cryptography and Network Security Chapter 20 Fourth Edition by William Stallings.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
Lecture 15 Firewalls modified from slides of Lawrie Brown.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Chapter 20 Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
NW Security and Firewalls Network Security
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Pertemuan 13 IDS dan Firewall Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
The Security Aspect of Social Engineering Justin Steele.
Chapter 11 Firewalls.
1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University R355.
Firewalls, etc.. Network Security2 Outline Intro Various firewall technologies: –Static Packet Filtering (or nonstateful packet filter) –Dynamic Packet.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Chapter 20 – Firewalls The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz.
Data Security and Encryption (CSE348)
Chapter 9 Firewalls and Intrusion Prevention Systems.
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Karlstad University Firewall Ge Zhang. Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…
Firewalls 1.
Firewalls Lesson Introduction Part of network defense-in-depth
Cryptography and Network Security
Computer Security Firewalls and Intrusion Prevention Systems.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Why do we need Firewalls?
Firewall.
Computer Data Security & Privacy
Firewalls.
Cryptography and Network Security Chapter 22
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
* Essential Network Security Book Slides.
Computer Security Firewalls November 19, 2018 ©2004, Bryan J. Higgs.
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewalls.
Presentation transcript:

Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings

Chapter 12 Firewalls

The function of a strong position is to make the forces holding it practically unassailable. — On War, Carl Von Clausewitz On the day that you take up your command, block the frontier passes, destroy the official tallies, and stop the passage of all emissaries. —The Art of War, Sun Tzu

The Need for firewalls Internet connectivity is no longer optional for organizationsInternet connectivity is no longer optional for organizations Individual users within the organization want and need Internet accessIndividual users within the organization want and need Internet access While Internet access provides benefits to the organization, it enables the outside world to reach and interact with local network assetsWhile Internet access provides benefits to the organization, it enables the outside world to reach and interact with local network assets This creates a threat to the organizationThis creates a threat to the organization While it is possible to equip each workstation and server on the premises network with strong security features, this may not be sufficient and in some cases is not cost-effectiveWhile it is possible to equip each workstation and server on the premises network with strong security features, this may not be sufficient and in some cases is not cost-effective FirewallFirewall An alternative, or at least complement, to host-based security servicesAn alternative, or at least complement, to host-based security services Is inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeterIs inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter The aim of this perimeter is to protect the premises network from Internet- based attacks and to provide a single choke point where security and auditing can be imposedThe aim of this perimeter is to protect the premises network from Internet- based attacks and to provide a single choke point where security and auditing can be imposed May be a single computer system or a set of two or more systems that cooperate to perform the firewall functionMay be a single computer system or a set of two or more systems that cooperate to perform the firewall function

Firewall characteristics Design goals for a firewall:Design goals for a firewall: All traffic from inside to outside, and vice versa, must pass through the firewallAll traffic from inside to outside, and vice versa, must pass through the firewall Only authorized traffic, as defined by the local security policy, will be allowed to passOnly authorized traffic, as defined by the local security policy, will be allowed to pass The firewall itself is immune to penetrationThe firewall itself is immune to penetration Techniques that firewalls use to control access and enforce the site’s security policy:Techniques that firewalls use to control access and enforce the site’s security policy: Service control Determines the types of Internet services that can be accessed, inbound or outbound Direction control Determines the direction in which particular service requests may be initiated and allowed to flow through the firewall User control Controls access to a service according to which user is attempting to access it Behavior control Controls how particular services are used

Firewall expectations Defines a single choke point that keeps unauthorized users out of the protected network, prohibits potentially vulnerable services from entering or leaving the network, and provides protection from various kinds of IP spoofing and routing attacks Provides a location for monitoring security-related events Is a convenient platform for several Internet functions that are not security related Can serve as the platform for IPsec A firewall

Firewall limitations Cannot protect against attacks that bypass the firewall May not protect fully against internal threats, such as a disgruntled employee or an employee who unwittingly cooperates with an external attacker Cannot guard against wireless communications between local systems on different sides of the internal firewall A laptop, PDA, or portable storage device may be used and infected outside the corporate network, and then attached and used internally A Firewall

Table 12.1 Packet-Filtering Example

Packet Filtering firewalls Weaknesses Because packet filter firewalls do not examine upper-layer data, they cannot prevent attacks that employ application-specific vulnerabilities or functions Because of the limited information available to the firewall, the logging functionality present in packet filter firewalls is limited Most packet filter firewalls do not support advanced user authentication schemes Packet filter firewalls are generally vulnerable to attacks and exploits that take advantage of problems within the TCP/IP specification and protocol stack Due to the small number of variables used in access control decisions, packet filter firewalls are susceptible to security breaches caused by improper configurations Strengths Its simplicity Transparent to users and are very fast

Attacks and countermeasures IP address spoofing The intruder transmits packets from the outside with a source IP address field containing an address of an internal host Countermeasure is to discard packets with an inside source address if the packet arrives on an external interface Source routing attacks The source station specifies the route that a packet should take as it crosses the internet, in the hopes that this will bypass security measures that do not analyze the source routing information Countermeasure is to discard all packets that use this option Tiny fragment attacks The intruder uses the IP fragmentation option to create extremely small fragments and force the TCP header information into a separate packet fragment Countermeasure is to enforce a rule that the first fragment of a packet must contain a predefined minimum amount of the transport header

Table 12.2 Example Stateful Firewall Connection State Table [SCAR09b]

Application Level Gateway Also called an application proxyAlso called an application proxy Acts as a relay of application-level trafficActs as a relay of application-level traffic If the gateway does not implement the proxy code for a specific application, the service is not supported and cannot be forwarded across the firewallIf the gateway does not implement the proxy code for a specific application, the service is not supported and cannot be forwarded across the firewall The gateway can be configured to support only specific features of an application that the network administrator considers acceptable while denying all other featuresThe gateway can be configured to support only specific features of an application that the network administrator considers acceptable while denying all other features Tend to be more secure than packet filtersTend to be more secure than packet filters Disadvantage:Disadvantage: The additional processing overhead on each connectionThe additional processing overhead on each connection

Circuit-Level Gateway Also called circuit-level proxyAlso called circuit-level proxy Can be a stand-alone system or it can be a specialized function performed by an application-level gateway for certain applicationsCan be a stand-alone system or it can be a specialized function performed by an application-level gateway for certain applications Does not permit an end-to-end TCP connectionDoes not permit an end-to-end TCP connection The security function consists of determining which connections will be allowedThe security function consists of determining which connections will be allowed Typical use is a situation in which the system administrator trusts the internal usersTypical use is a situation in which the system administrator trusts the internal users Can be configured to support application-level or proxy service on inbound connections and circuit-level functions for outbound connectionsCan be configured to support application-level or proxy service on inbound connections and circuit-level functions for outbound connections Example of implementation is the SOCKS packageExample of implementation is the SOCKS package

Bastion Host A system identified by the firewall administrator as a critical strong point in the network’s securityA system identified by the firewall administrator as a critical strong point in the network’s security Typically serves as a platform for an application-level or circuit-level gatewayTypically serves as a platform for an application-level or circuit-level gateway Common characteristics:Common characteristics: Executes a secure version of its operating system, making it a hardened systemExecutes a secure version of its operating system, making it a hardened system Only the services that the network administrator considers essential are installedOnly the services that the network administrator considers essential are installed May require additional authentication before a user is allowed access to the proxy servicesMay require additional authentication before a user is allowed access to the proxy services Each proxy is configured to support only a subset of the standard application’s command setEach proxy is configured to support only a subset of the standard application’s command set Each proxy is configured to allow access only to specific host systemsEach proxy is configured to allow access only to specific host systems Each proxy maintains detailed audit information by logging all traffic, each connection, and the duration of each connectionEach proxy maintains detailed audit information by logging all traffic, each connection, and the duration of each connection Each proxy module is a very small software package specifically designed for network securityEach proxy module is a very small software package specifically designed for network security Each proxy is independent of other proxies on the bastion hostEach proxy is independent of other proxies on the bastion host A proxy generally performs no disk access other than to read its initial configuration fileA proxy generally performs no disk access other than to read its initial configuration file Each proxy runs as a nonprivileged user in a private and secured directory on the bastion hostEach proxy runs as a nonprivileged user in a private and secured directory on the bastion host

Host-Based Firewall A software module used to secure an individual hostA software module used to secure an individual host Is available in many operating systems or can be provided as an add-on packageIs available in many operating systems or can be provided as an add-on package Filters and restricts the flow of packetsFilters and restricts the flow of packets Common location is a serverCommon location is a server Advantages:Advantages: Filtering rules can be tailored to the host environmentFiltering rules can be tailored to the host environment Protection is provided independent of topologyProtection is provided independent of topology Used in conjunction with stand-alone firewalls, provides an additional layer of protectionUsed in conjunction with stand-alone firewalls, provides an additional layer of protection

Personal Firewall Controls the traffic between a personal computer or workstation on one side and the Internet or enterprise network on the other sideControls the traffic between a personal computer or workstation on one side and the Internet or enterprise network on the other side Can be used in the home environment and on corporate intranetsCan be used in the home environment and on corporate intranets Typically is a software module on the personal computerTypically is a software module on the personal computer Can also be housed in a router that connects all of the home computers to a DSL, cable modem, or other Internet interfaceCan also be housed in a router that connects all of the home computers to a DSL, cable modem, or other Internet interface Primary role is to deny unauthorized remote access to the computerPrimary role is to deny unauthorized remote access to the computer Can also monitor outgoing activity in an attempt to detect and block worms and other malwareCan also monitor outgoing activity in an attempt to detect and block worms and other malware

Figure 12.2 Example Personal Firewall Interface

Summary of Firewall Locations and Topologies Host-resident firewall Host-resident firewall This category includes personal firewall software and firewall software on serversThis category includes personal firewall software and firewall software on servers Can be used alone or as part of an in-depth firewall deploymentCan be used alone or as part of an in-depth firewall deployment Screening router Screening router A single router between internal and external networks with stateless or full packet filteringA single router between internal and external networks with stateless or full packet filtering This arrangement is typical for small office/home office (SOHO) applicationsThis arrangement is typical for small office/home office (SOHO) applications Single bastion inline Single bastion inline A single firewall device between an internal and external routerA single firewall device between an internal and external router This is the typical firewall appliance configuration for small-to-medium sized organizationsThis is the typical firewall appliance configuration for small-to-medium sized organizations Single bastion T Single bastion T Similar to single bastion inline but has a third network interface on bastion to a DMZ where externally visible servers are placed Double bastion inline Double bastion inline DMZ is sandwiched between bastion firewalls Double bastion T Double bastion T DMZ is on a separate network interface on the bastion firewall Distributed firewall configuration Distributed firewall configuration Used by some large businesses and government organizations

Summary The need for firewallsThe need for firewalls Firewall characteristicsFirewall characteristics Types of firewallsTypes of firewalls Packet filtering firewallPacket filtering firewall Stateful inspection firewallsStateful inspection firewalls Application level gatewayApplication level gateway Circuit level gatewayCircuit level gateway Firewall basingFirewall basing Bastion host Host based firewalls Personal firewall Firewall locations and configurationsFirewall locations and configurations DMZ networks Virtual private networks Distributed firewalls Firewall location and topologies summary