Firewall COSC 513 By Lerraj Khommeteeyuthakan. Introduction to Firewall zA method for keeping a network secure zFirewall is an approach to security zHelps.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

IUT– Network Security Course 1 Network Security Firewalls.
Network Security Introduction Security technologies protect mission-critical networks from corruption and intrusion. Network security enables new business.
FIREWALLS Chapter 11.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Electronic Commerce 2. Definition Ecommerce is the process of buying and selling products and services via distributed electronic media, usually the World.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Implementing Standard and Extended Access Control List (ACL) in Cisco Routers.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
1 Enabling Secure Internet Access with ISA Server.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Internet/Intranet firewall security – policy, architecture and transaction services Written by Ray Hunt This presentation will Examines Policies that influence.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Chapter 20 Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Chapter 6: Packet Filtering
Chapter 13 – Network Security
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
1 Firewalls A firewall is a system or group of systems that enforces an access control policy between two networks. Cars have this part that separates.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Firewall Security.
CSCE 522 Firewalls.
CSCE 201 Windows XP Firewalls Fall Reading Windows XP help and Support: search on “Firewall” Tony Bradley, CISSP-ISSAP, Windows XP SP2 Firewall,
1.1 1 Purpose of firewall : –Control access to or from a protected network; –Implements network access policy connections pass through firewall and are.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
CSCE 201 Network Security Firewalls Fall CSCE Farkas2 Traffic Control – Firewall Brick wall placed between apartments to prevent the spread.
1 An Introduction to Internet Firewalls Dr. Rocky K. C. Chang 12 April 2007.
Role Of Network IDS in Network Perimeter Defense.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Security Benefits of Firewall Protection
CONNECTING TO THE INTERNET
Computer Data Security & Privacy
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
PROJECT PRESENTATION ON INTERNET FIREWALLS PRESENTED BY THE GUARDS
Firewalls.
Firewalls Jiang Long Spring 2002.
دیواره ی آتش.
Presentation transcript:

Firewall COSC 513 By Lerraj Khommeteeyuthakan

Introduction to Firewall zA method for keeping a network secure zFirewall is an approach to security zHelps implement a larger security policy zTo control access to or from a protected network

The Firewall Concept

zA firewall system can be a router zA personal computer zA host, or a collection of hosts  Firewall set up specifically to shield a site or subnet from protocols and services that can be abused from hosts outside the subnet

The Firewall Concept zA firewall system is usually located at a higher-level gateway zfirewall systems can be located at lower-level gateways to provide protection for some smaller collection of hosts or subnets

Why Firewalls  Protection from Vulnerable Services  Controlled Access to Site Systems  Concentrated Security  Enhanced Privacy  Logging and Statistics on Network Use, Misuse  Policy Enforcement

Protection from Vulnerable Services zA firewall can greatly improve network security zReduce risks to hosts on the subnet by filtering inherently insecure services  Only selected protocols will be able to pass through the firewall

Controlled Access to Site Systems zProvides the ability to control access to site systems zPrevent outside access to its hosts except for special cases such as mail servers or information servers

Enhanced Privacy zPrivacy is of great concern to certain sites z Using a firewall, some sites wish to block services such as finger and Domain Name Service z finger displays information about users such as their last login time, read mail z finger could leak information to attackers about how often a system is used, system could be attacked without drawing attention. zFirewalls can also be used to block DNS information about site systems zThe names and IP addresses of site systems would not be available to Internet hosts

Logging and Statistics on Network Use, Misuse zFirewall can log accesses and provide valuable statistics about network usage zFirewall, will alarms that sound when suspicious activity occurs zProvide details on whether the firewall and network are being probed or attacked zIt is important to collect network usage statistics  Network usage statistics are also important as input into network requirements studies and risk analysis activities

Policy Enforcement zFirewall provides the means for implementing and enforcing a network access policy zProvides access control to users and services zA network access policy can be enforced by a firewall zWithout a firewall, a policy depends entirely on the cooperation of users

Issues and Problems with Firewalls  Restricted Access to Desirable Services  Large Potential for Back Doors  Little Protection from Insider Attacks

Restricted Access to Desirable Services zThe most obvious disadvantage of a firewall -block certain services that users want -block services as TELNET, FTP, X Windows, NFS (Network File System) zNetwork access could be restricted at the host level

Large Potential for Back Doors zfirewalls do not protect against back doors into the site zif unrestricted modem access is still permitted into a site protected by a firewall, attackers could effectively jump around the firewall zModem speeds are now fast enough to make running SLIP (Serial Line IP) and PPP (Point-to- Point Protocol) practical; a SLIP or PPP connection inside a protected subnet is in essence another network connection and a potential backdoor

Little Protection from Insider Attacks zFirewalls generally do not provide protection from insider threats. zWhile a firewall may be designed to prevent outsiders from obtaining sensitive data, the firewall does not prevent an insider from copying the data onto a tape and taking it out of the facility.

znetwork policy zadvanced authentication mechanisms zpacket filtering zapplication gateways Firewall Components

Network Policy zThe higher-level policy is an issue-specific, network access policy that defines those services that will be allowed or explicitly denied from the restricted network zThe lower-level policy describes how the firewall will actually go about restricting the access and filtering the services that were defined in the higher level policy

Advanced Authentication zSmartcards, authentication tokens, biometrics, and software-based mechanisms are designed to counter the weaknesses of traditional passwords zThe passwords generated by advanced authentication devices cannot be reused by an attacker who has monitored a connection

Advanced Authentication on a Firewall

Packet Filtering zIP packet filtering is using a packet filtering router designed for filtering packets as they pass between the router's interfaces  A packet filtering router usually can filter IP packets ysource IP address ydestination IP address yTCP/UDP source port  TCP/UDP destination port zused a variety of ways to block connections from or to specific hosts or networks

Representation of Packet Filtering on TELNET and SMTP

Application Gateways zfirewalls need to use software applications to forward and filter connections for services such as TELNET and FTP zan application is referred to as a proxy service, while the host running the proxy service is referred to as an application gateway  application gateways and packet filtering routers can be combined to provide higher levels of security and flexibility than if either were used alone

Firewall Policy zPolicy was discussed in in terms of a service access policy and a firewall design policy yincludes decisions concerning host systems security ydial-in access yoff-site Internet access yprotection of information off-site ydata communications security and others

What Should a Firewall Contain? zsupport a ``deny all services except those specifically permitted'' design policy, zsupport your security policy zThe firewall should be flexible zshould be able to accommodate new services and needs if the security policy of the organization changes

What Should a Firewall Contain? zshould contain advanced authentication measures or should contain the hooks for installing advanced authentication measures zshould employ filtering techniques to permit or deny services to specified host systems as needed zThe IP filtering language should be flexible, user- friendly to program zshould filter on as many attributes as possible, including source and destination IP address, protocol type, source and destination TCP/UDP port, and inbound and outbound interface

What Should a Firewall Contain? zshould use proxy services for services such as FTP and TELNET zshould contain the ability to centralize SMTP access, to reduce direct SMTP connections between site and remote systems zshould accommodate public access to the site ysuch public information servers can be protected by the firewall  can be segregated from site systems that do not require the public access  The firewall should contain the ability to concentrate and filter dial-in access

What Should a Firewall Contain? zshould contain mechanisms for logging traffic and suspicious activity, zshould contain mechanisms for log reduction so that logs are readable and understandable. zIf firewall requires an operating system such as UNIX, a secured version of the operating system should be part of the firewall

What Should a Firewall Contain? zThe operating system should have all patches installed zshould be developed in a manner that its strength and correctness is verifiable zIt should be simple in design so that it can be understood and maintained.  The firewall and any corresponding operating system should be updated with patches and other bug fixes in a timely manner

To Buy or Build a Firewall zshould first develop a policy and related requirements before proceeding zIf an organization is having difficulty developing a policy, it may need to contact a vendor who can assist in this process zunderstand the specifics of the design and use of the firewall

To Buy or Build a Firewall zhow will the firewall be tested zwho will verify that the firewall performs as expected zwho will perform general maintenance of the firewall, such as backups and repairs z who will install updates to the firewall such as for new proxy servers, new patches, and other enhancements, zcan security-related patches and problems be corrected in a timely manner  who will perform user support and training

Firewall Software zMcAfee Firewall  Norton Internet Security 2000