Firewalls CS591 Topics in Internet Security November 15 1999 Steve Miskovitz, Steve Peckham, Kan Hayashi.

Slides:



Advertisements
Similar presentations
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls.
Advertisements

Network Security Essentials Chapter 11
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Firewalls Uyanga Tserengombo
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Security Firewall Firewall design principle. Firewall Characteristics.
Chapter 11 Firewalls.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
5/4/01EMTM 5531 EMTM 553: E-commerce Systems Lecture 7b: Firewalls Insup Lee Department of Computer and Information Science University of Pennsylvania.
Chapter 10 Firewalls. Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Circuit & Application Level Gateways CS-431 Dick Steflik.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Internet/Intranet firewall security – policy, architecture and transaction services Written by Ray Hunt This presentation will Examines Policies that influence.
A Brief Taxonomy of Firewalls
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Chapter 20 Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
COEN 252 Computer Forensics
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
1 Pertemuan 13 IDS dan Firewall Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Network Firewall Technologies By: David W Chadwick Implementing a Distributed Firewall By: Sotiris Ioannidis Angelos D. Keromytis Steve M. Bellovin Jonathan.
1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University R355.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
(c) University of Technology, Sydney Firewall Architectures.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Firewall Security.
Karlstad University Firewall Ge Zhang. Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…
Security fundamentals Topic 10 Securing the network perimeter.
CSCE 201 Network Security Firewalls Fall CSCE Farkas2 Traffic Control – Firewall Brick wall placed between apartments to prevent the spread.
IP packet filtering Breno de Medeiros. Florida State University Fall 2005 Packet filtering Packet filtering is a network security mechanism that works.
Cryptography and Network Security
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Security fundamentals
Firewall Techniques Matt Cupp.
Firewall.
Network Security Marshall Leitem 11/30/04
Computer Data Security & Privacy
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Firewalls.
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
* Essential Network Security Book Slides.
Firewalls Purpose of a Firewall Characteristic of a firewall
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
Firewalls Jiang Long Spring 2002.
دیواره ی آتش.
Introduction to Network Security
Implementing Firewalls
Presentation transcript:

Firewalls CS591 Topics in Internet Security November Steve Miskovitz, Steve Peckham, Kan Hayashi

Outline Overview/Motivation Packet Filtering Application Gateway

Overview/Motivation Why Do We Need Firewalls? Design Issues Firewall Characteristics Typical Setups/Analysis

Why Do We Need Firewalls? Prevent unauthorized access to private networks Prevent unauthorized export of private information

Design Issues That which is not expressly permitted is prohibited –firewall is designed to block everything, services are enabled on a case-by-case basis –can be seen as a hindrance by users That which is not expressly prohibited is permitted –reactive, must predict what kinds of actions would compromise the security of the firewall

Firewall Characteristics Damage Control –If the firewall is compromised or destroyed what kinds of threats does it leave the private network open to? Zones of Risk –How large is the zone of risk during normal operation?

Firewall Characteristics Failure Mode –If the firewall is broken into or destroyed, how easy is it to detect? –How much information is retained to analyze the attack? Ease of Use –How much of an inconvenience is the firewall? Stance –Permissive or prohibitive?

Typical Setups Screening Router Dual Homed Gateway Screened Host Gateway Screened Subnet

Screening Router Basic router with some kind of packet filtering capability –Typically will be able to block traffic between networks or specific hosts on an IP level

Analysis of Screening Router Damage control is difficult because you would need to examine every host for traces of a break-in Zone of risk is the all the hosts on the private network because direct communication is permitted Usually set up as permissive

Analysis of Screening Router In the case of destruction of the firewall it is very hard to trace because commercial routers generally do not keep logs Can fairly easily get around the screening using tunnelling Popular because they allow fairly free access from any point in the private network

Dual Homed Gateway Has a system on both the private network and the Internet, with TCP/IP forwarding disabled

Analysis of Dual Homed Gateway Often used and easy to implement Hosts on the private network can communicate with the gateway, as can hosts on the Internet, but direct traffic between the networks is blocked If the gateway is compromised then the whole private network is accessible Zone of risk is only the gateway host

Analysis of Dual Homed Gateway Permissiveness dependant on the stance of the gateway –logins on gateway is permissive –application gateways is prohibitive Can be adapted more easily to keep logs which can help with tracing what went wrong and which machines on the private network were compromised

Screened Host Gateway Combines a screening router and a dual homed gateway. The screening router is configured such that the gateway is the only system reachable from the Internet

Analysis of Screened Host Gateway Can be configured to block traffic to the gateway on certain ports, permitting only a small number of services to communicate with it Generally very secure, while fairly easy to implement Router is configured to only permit Internet access to the gateway

Analysis of Screened Host Gateway Zone of risk is the gateway and the router Gateway can be on the private network so connectivity is good for local users Stance is dependant upon the gateway Similar to a dual homed gateway

Screened Subnet An isolated subnet is created, between the private network and the Internet –isolate the private network using screening routers with varying levels of filtering

Analysis of Screened Subnet Generally, both the Internet and the private network have access to the subnet but traffic across the screened subnet is blocked Usually configured with one host as the sole point of access on the subnet Zone of risk is host and any screening routers that connect the subnet Appealing for firewalls that use routing to reinforce the existing screening

Analysis of Screened Subnet Forces all services to be provided by application gateways Strongly prohibitive Much harder to break into since you need to compromise multiple systems Can be an inconvenience since hosts that are not addressed correctly cannot use the firewall properly

Packet Filtering Overview Control data traffic using header of each packet –source IP address –destination IP address –etc Screened (Host, Subnet) Setups

Static Packet Filtering “Static” = “doors” are open at all times Advantages –Low overhead / High throughput –Inexpensive or free –Good for traffic management Disadvantages –Allows dangerous direct connections –Leaves holes open –Unsuitable for complex environment –No user authentication

Dynamic Packet Filtering “Dynamic” = opens and closes “doors” according packet header data Can keep track of context information about a session. (stateful filtering) Advantages –Only temporarily opens holes in Network Perimeter –Low overhead / High throughput –Supports almost any service Disadvantages –Allows direct IP connections –No user authentication (requires application gateway)

Application Gateways Overview First Generation vs. Second Generation (transparent) TCP connection state and sequencing are maintained. Prevents direct access to services on the internal network. Outgoing traffic appears to be coming from the firewall rather than the internal network. Works on an application (or service) level.

Application Gateways Lawyer Example A B B’s Lawyer Approved Message Unapproved Message

Application Gateways Example of masking internal network

Application Gateways Advantages Doesn’t allow direct connections between internal and external hosts (proxy). Supports user-level authentication. Ability to analyze application specific commands inside traffic. Can keep logs of traffic.

Application Gateways Disadvantages Takes time to check requests. Doesn’t support every type of connection.

References Thinking About Firewalls V2.0: Beyond Perimeter Security (1997) – htm Application Gateways and Stateful Inspection: A Brief Note Comparing and Contrasting (Avolio & Blask 1998) –