TCP/IP Basics A review for firewall configuration.

Slides:



Advertisements
Similar presentations
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Advertisements

1 Topic 2 – Lesson 4 Packet Filtering Part I. 2 Basic Questions What is packet filtering? What is packet filtering? What elements are inside an IP header?
Prentice HallHigh Performance TCP/IP Networking, Hassan-Jain Chapter 2 TCP/IP Fundamentals.
CCNA – Network Fundamentals
Transmission Control Protocol (TCP)
Intermediate TCP/IP TCP Operation.
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
IS333, Ch. 26: TCP Victor Norman Calvin College 1.
Chapter 7 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain the need for the transport layer.  Identify.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
CSE551: Computer Network Review r Network Layers r TCP/UDP r IP.
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Transport Layer 3-1 Transport Layer r To learn about transport layer protocols in the Internet: m TCP: connection-oriented protocol m Reliability protocol.
IP Basics. Physical Link Network IP ARP ICMP RoutingTables.
CSCI 4550/8556 Computer Networks Comer, Chapter 21: IP Encapsulation, Fragmentation, and Reassembly.
CS335 Networking & Network Administration Tuesday, May 11, 2010.
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
IP Basics. IP encapsulates TCP IP packets travel through many different routers (hops) before reaching it’s destination MTU variation at the physical.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
1 ICMP : Internet Control Message Protocol Computer Network System Sirak Kaewjamnong.
Internet Control Message Protocol ICMP. ICMP has two major purposes: –To report erroneous conditions –To diagnose network problems ICMP has two major.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer ICMP and fragmentation.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
1 Transport Layer Computer Networks. 2 Where are we?
Exploring the Packet Delivery Process Chapter
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Firewalls. Evil Hackers FirewallYour network Firewalls mitigate risk Block many threats They have vulnerabilities.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
TCP: A Closer Look Transmission Control Protocol.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
University of the Western Cape Chapter 12: The Transport Layer.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Routers and Routing Basics CCNA 2 Chapter 10.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
Transport Layer Moving Segments. Transport Layer Protocols Provide a logical communication link between processes running on different hosts as if directly.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Transport Layer COM211 Communications and Networks CDA College Theodoros Christophides
1 An Error Reporting Mechanism (ICMP). 2 IP Semantics IP is best-effort Datagrams can be –Lost –Delayed –Duplicated –Delivered out of order –Corrupted.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
Networking Basics CCNA 1 Chapter 11.
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
1 Introduction to TCP/IP. 2 OSI and Protocol Stack OSI: Open Systems Interconnect OSI ModelTCP/IP HierarchyProtocols 7 th Application Layer 6 th Presentation.
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
ICMPv6 Error Message Types Informational Message Types.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
1 Version 3.1 Module 10 Intermediate TCP/IP (Layer 4)
4343 X2 – The Transport Layer Tanenbaum Ch.6.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
© 2002, Cisco Systems, Inc. All rights reserved..
K. Salah1 Security Protocols in the Internet IPSec.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Chapter 9 The Transport Layer The Internet Protocol has three main protocols that run on top of IP: two are for data, one for control.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
Chapter4 Packet and Protocol.
Introduction to TCP/IP networking
COMP2322 Lab 6 TCP Steven Lee Mar 29, 2017.
Introduction to TCP/IP
COMPUTER NETWORKS CS610 Lecture-33 Hammad Khalid Khan.
CCNA 2 v3.1 Module 10 Intermediate TCP/IP
Net 323 D: Networks Protocols
ITIS 6167/8167: Network and Information Security
Computer Networks Protocols
Presentation transcript:

TCP/IP Basics A review for firewall configuration

Configuring a firewall Primary approach to configuring a firewall Study service –IP ADDRESSES –PORTS Set up rules for allowing or denying access to the services you want utilized. Problem: –Some of the issues are more subtle than IP/PORT

IP Basics IP encapsulates TCP IP packets travel through many different routers (hops) before reaching it’s destination MTU variation at the physical layer requires IP to fragment the message into smaller units along the way Reassembly is an option at each hop. IP does NOT guarantee delivery!

IP Fragmentation R R R 1000 b500 b 250 b Every link has the potential to dictate adjusting size of frames. It is possible to reassemble at any point. R R R 1000 b500 b 1000 b

What if frames are lost? R R 250 b Receive Computer Receive computer will hold the first 2 frames awaiting the 3 rd. After a period of time, a timer expires and IP level passes the 500 bytes up and stops looking for the other pieces. TCP (NOT IP) then will acknowledge receipt of 500 more bytes to the sending TCP layer. If the first frame is lost, NONE are passed up to TCP

IP Summary Fragmentation results in delivery of frames which are potentially smaller than the original transmission. Some of the frames can be lost If a message is fragmented and frames are lost, all frames up to the first lost frame are passed up to the receiving TCP and all subsequent frames are dropped. TCP views this as a stream and is unaware of the loss of frames. It just accepts the next “n” bytes, acks the receipt, and waits for subsequent data.

TCP basics Connection-oriented –Sets up the connection prior to data transmission SYN and 3-way handshake –Guarantees delivery of data Sender holds a copy of the data for retransmission if necessary Receiver ACKS specific byte positions in the stream so sender can resend from any byte position Encapsulated by IP Receiver tells sender it’s receive window size to limit rate of data arrival (flow control)

Consider How TCP and IP Work Together

Transport Network(IP) Physical Network(IP) Physical Transport Network(IP) Physical (Send 2000 bytes) (ACK 500 bytes) TCP handling of fragmentation

What does the TCP frame look like? Source Port Destination Port LengthChecksum Data

And after TCP is encapsulated in IP? IP Header IP Trailer TCP

And if the encapsulated frame is fragmented? IP Header IP Trailer Assume fragmented in 2 parts Has headers No headers Port info Included NO Port Info Included

Back to the Firewall! No headers Port info Included CAN See ports CAN’T See ports ? Knows what to do!

Options to Solve Fragmentation Reassembly can be forced at the firewall –Slows down transmission –Lets the firewall process the entire frame identically Make sure the sender doesn’t send frames which will be fragmented. –Path MTU discovery uses ICMP to test for deliverability Sends a message and marks it not to be fragmented Looks for ICMP response saying too large Repeat the process with a smaller packet if necessary Firewall must allow ICMP

Only filter the first frames in a fragmented sequence –Allow all others to pass through –Assume other frames will be trashed at receiver if the first one doesn’t make it through –Places undue traffic on network and receiver if the unfragmented sequence is to be filtered Can be used to create denial of service –Allows attackers to substitute overlapping “tail” frames Different OSs handle the repeated packets differently. I.e. which one do you keep? Options to Solve Fragmentation

More TCP Issues

TCP handshake/setup time Host AHost B Ack 0, Syn 1 Ack 1, Syn 0 Ack 1, Syn 1 Ack 1, Syn setup data

TCP Connection Issues Once you make a connection it can be used to transmit data bi-directionally Inside clients-> out, is ok Outside clients -> inside, is NOT ok (usually) Deny the setup sequence and no connection can be established If hacker can determine setup sequence number and window size, “noise” packets can be injected –Not a typical problem but possible

UDP Issues

UDP basics No connection establishment No special features of the frame to identify connection information Requires a little more effort on the part of the firewall Must remember what has happened in previous transmissions This is a STATEFUL packet filter firewall

Stateful Packet Filter Allowing if connected from inside UDP SP = 2987 SA = DP = 1000 DA = Host A I N S I D E Host B O U T S I D E FIREWALLFIREWALL UDP SP = 1000 SA = DP = 2987 DA =

ICMP

ICMP Basics Lower than IP Doesn’t use ports Frequently used at the firewall to –deny ping of death (too large message), and –denial of service (ping flood) Denying is message-type specific Denying precludes utility of a useful tool

ICMP Message types Echo Request Echo Response Time Exceeded Destination Unreachable Redirect

IP Tunnelling Transport (IP) Physical Network(IP) Physical Apple talk Intermediate Routers only See IP Firewalls CAN do AT in IP Receiving Firewall Inside Network Connected Network Transport (IP) Physical Apple talk

Transport (IP) Physical Apple talk IP Tunnelling at one end Physical Appletalk Physical Appletalk Appletalk to local Appletalk to non-local AT IP AT IP Route to Destination As IP

Tunnelling Problem Firewall sees IP not what is embedded Packets can be hidden inside IP Not as problematic as it seems –Usually the tunneller at each end is set up by the network admin to implement a desired policy –Still provides a leak into the other network