Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Guide to Network Defense and Countermeasures Second Edition
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
Personal Info 1 Prepared by: Mr. NHEAN Sophan  Presenter: Mr. NHEAN Sophan  Position: Desktop Support  Company: Khalibre Co,. Ltd 
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Security Firewall Firewall design principle. Firewall Characteristics.
How (not) to use your firewall Jurjen N.E. Bos Information Security Consultant.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Chapter 6: Packet Filtering
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
CONTENTS  INTRODUCTION.  KEYWORDS  WHAT IS FIREWALL ?  WHY WE NEED FIREWALL ?  WHY NOT OTHER SECURITY MECHANISM ?  HOW FIREWALL WORKS ?  WHAT IT.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Internet and Intranet Fundamentals Class 9 Session A.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
1 An Introduction to Internet Firewalls Dr. Rocky K. C. Chang 12 April 2007.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Firewall.
Network Security Marshall Leitem 11/30/04
Computer Data Security & Privacy
Firewalls.
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Digital Pacman: Firewall Edition
* Essential Network Security Book Slides.
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewalls Routers, Switches, Hubs VPNs
FIREWALL By Abhishar Baloni I.D
Firewalls Jiang Long Spring 2002.
دیواره ی آتش.
Firewalls.
Firewalls Chapter 8.
AbbottLink™ - IP Address Overview
Firewall Installation
Implementing Firewalls
Presentation transcript:

Hafez Barghouthi

Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082

Definition  "Firewall is an information technology security device which is configured to permit, deny or proxy data connections set and configured by the organization's security policy. Firewall can either be hardware or software based. 3

In our simple words-1  firewall is a separator between a trusted network area (your company local area network (LAN)) and the UN trusted network area (internet).so it is installed in a point where you protected internal network connects to the internet.  Note:We talk about internet firewall not intranet firewall (within the same site) 4

In a simple picture Patrick BoursAuthentication Course 2007/20085

Firewall Types  Packet filters  Stateful packet filters  Circuit level proxies  Application level proxies  Network address Translator(NAT).  We will talk about 1,4. 6

Packet filters  The packet filter firewall depends on allowing or blocking packets usually while routing them from one network to another.  set of rules that specify what types of packets to allow and what types of packets to block. 7

Filtering depends on what  IP src. and dest. address. restrict which internal network machines have access to the internet and vise versa depending on the possible range of IP addresses.  TCP or UDP src. and dest. port limit external access to a specific internal services or vise versa. example mail service SMTP uses TCP port number 25. 8

Screening router 9

Advantages  Widely available in many hardware and software products.  Easy to install.  Packet filters make use of current network routers. Therefore implementing packet filter is less complicated than other firewall approaches.  Support high speed with simple network condition. 10

Disadvantages  Packet filters make decisions based on individual packet and not on the context of traffic. This will not provide good security condition.  Creating complex access rules with packet filters can be difficult.  With packet filtering users connect directly from network to network. Direct connection leaves data susceptible to exposure. Hacker can use packet- sniffer to access information such as an external host sniffer can use an internal IP address to access the internal network. 11

proxies  Instead of working on network and transport layer, proxy services work on the application protocol layer.  It plays as an intermediate blocks between the internal user and the service on the internet (indirect connection).  The major benefit of this approach is called Transparency which means that the proxy server (firewall) presents the illusion that user (internal client) is dealing directly with a real server (external) and the proxy also presents the illusion that the real server is dealing directly with a user on the internal network. 12

Dual Homed host proxy 13

Advantages  Transparency  Filtering based on content.  Much better in virus detection than packet Filtering.  ex: A mail proxy could filter viruses,spams and worms 14

Disadvantages  Cost is higher and performance is lower.  You need a proxy server for each service you want to protect.  Limitation of proxy services (Not available for every service) for example no proxy server available for any of the new audio and video streaming service [3]. 15

In real life  In real firewalls to use a combination between firewall technologies in order to build a reliable firewall and getting the advantages of more than one technique.  Examples Combination of packet filtering with proxy services. Perimeter security approach. Combination of packet filtering with Network address translator 16

Perimeter Networks(DMZ) 17

Firewall policies-1  Permissive policies :allow all but block certain dangerous service  Restrictive policies: prevent all but allow only traffic to meet a useful purpose http, pop3,SSH 18

Rules  Firewall rules can be as following: Allow from internal network to internet:http,ftp,SSH,DNS Allow from anywhere to mail server smtp only. Allow from mail server to internet smtp,DNS. Allow from inside to mail server smtp,pop3. Allow reply packets. Block everything else. 19

Limitiations  Firewall can't protect against viruses so having a firewall doesn't mean that you don't need any an antivirus program such as MacAfee antivirus or Norton antivirus.  Firewall can't protect against all the software vulnerabilities such as SQL injection. This type of attack is difficult to detect at the network level.[4]  Firewall can't protect against insider threat because firewall is considered as an external defender protection (the inside from the outside) but if the attacker is behind you (on your internal network) firewall can't do anything.  A lot of configuration need to set up a firewall many people have firewalls that are in the end not effective this is because they are not configure the firewall properly. 20

solutions  Intrusion detection and prevention  Software security  Database security  Again cryptology to provide end to end solution.  Personal firewalls to provide end to end security. 21

References. [1] Elizabeth D. Zwicky, Simon Cooper and D. Brent Chapman: 'Building Internet Firewalls', O'Reilly and Associates 2000: Second Edition. [2] S D Hubbard and J C Sager: 'Fire walling the net', BT TechnolJ, 15, No2, pp (April 1997). [3] Rudkin S et al: ‘Real time applications on the Internet’, BTTechnol 15, No 2, pp 208—224 (April 1997). [4] Stephen D. Wolthusen: 'SQL injection', lecture slides of session 5, [5] Firewall(networking)', networking). 22