Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)

Slides:



Advertisements
Similar presentations
Any Questions?.
Advertisements

1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
DMZ (De-Militarized Zone)
©2012 ClearOne Communications. Confidential and proprietary. COLLABORATE ® Video Conferencing Networking Basics.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
Firewalling Techniques Prabhaker Mateti. ACK Not linux specific Not linux specific Some figures are from 3com Some figures are from 3com.
Firewalls and Intrusion Detection Systems
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
1 Enabling Secure Internet Access with ISA Server.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Securing a Wireless Network
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Day15 IP Space/Setup. IP Suite of protocols –TCP –UDP –ICMP –GRE… Gives us many benefits –Routing of packets over internet –Fragmentation/Reassembly of.
4: Addressing Working At A Small-to-Medium Business or ISP.
Windows Internet Connection Sharing Dave Eitelbach Program Manager Networking And Communications Microsoft Corporation.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
FIREWALL Mạng máy tính nâng cao-V1.
Network Address Translation (NAT)
Chapter 6: Packet Filtering
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
Introduction to Network Address Translation
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
Windows 7 Firewall.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Unleashing the Power of IP Communications™ Calling Across The Boundaries Mike Burkett, VP Products September 2002.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Firewall Matthew Prestifilippo, Bill Kazmierski, Pat Sparrow.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
© 2001, Cisco Systems, Inc. CSPFA 2.0—5-1 Chapter 5 Cisco PIX Firewall Translations.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
S ECURITY APPLIANCES Module 2 Unit 2. S ECURE NETWORK TOPOLOGIES A topology is a description of how a computer network is physically or logically organized.
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Chapter Objectives In this chapter, you will learn:
Module 3: Enabling Access to Internet Resources
CONNECTING TO THE INTERNET
Computer Data Security & Privacy
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introducing To Networking
Introduction to Networking
Firewalls.
6.6 Firewalls Packet Filter (=filtering router)
Digital Pacman: Firewall Edition
* Essential Network Security Book Slides.
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewalls Routers, Switches, Hubs VPNs
Chapter 8 Network Perimeter Security
Firewalls Jiang Long Spring 2002.
Firewalls Chapter 8.
AbbottLink™ - IP Address Overview
Session 20 INST 346 Technologies, Infrastructure and Architecture
Implementing Firewalls
Presentation transcript:

Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000) Firewalls Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)

Firewalls are not just for companies any more: the changing home

High Speed Internet Connections Drive the importance of security

The home Network: always on the Net

Always on, all hackers all the time For me to attack your system, I must send packets to it With dial, you get a different IP address for each call and in relative terms that call is not long Big issue is that you will have the same IP address for a long time with persistent connections You may have the same IP address ALL the time. So plenty of time for someone to go after you Personal PCs have the standard OS vulnerabilities Private Web servers easy targets

Windows file sharing does not help Admin Shares $c On by default in Win 9* and older NT Browser Service Network Neighborhood Could see everyone else's PCs Hard to turn it off on Internet facing interfaces interfaces Who cares? QDATA.*

Multiple security problems Defense in Depth

The tradeoffs

Costs Dollars for the software Download of updates Customization most software out of the box works fine File and print sharing on your home LAN special apps Checking logs

Example of customization

The firewall: The first line of defense

What a firewall does not do

Firewall technologies Network Address Translation

A digression, TCP/IP

Internet Protocol

TCP

TCP connection flow the syn is unique to session start

TCP Ports Identify the App

IP addresses

‘Private’ IP addresses Routable IP addresses are scarce Not every system in the world needs direct and always on access to the Internet Private addresses allows you to address many more systems than the ‘public’ address space (public addresses can be routed over the internet For a private addressed system to access the internet it must be translated to a public address Private addresses are defined by RFC 1918 10.*.*.*, 172.16.*.*-172.31.*.*, 192.168.*.*

Public IP address assignment If you are dialing up, you get one for the duration of the call and it will change If you are on a ‘always on’ you MAY get a one Providers charge for more than 1 permanent IP addresses Some cable systems change your address so you cant host a server without them knowing (and of course you paying) To address multiple PCs and have them access the internet you must NAT

Network Address Translation

Enterprise NAT NAT is also used to ‘hide’ addresses Remote end can only see the NATed address not the real one Both ends use private addresses And will often have duplicates (10.1.1.1) So will often ‘dual nat’ that is translate both source and destination Can even map ports so 1 address, multiple servers 200.200.200.200 port 80; 10.1.1.1 200.200.200.200 port 25; 10.1.1.2 200.200.200.200 port 20: 10.1.1.3

Pat Port address translation Allows many stations to share 1 ip address Depends on keeping track what source port and IP address for each connection Then select a unique port to associate with the single public IP address

Packet Filtering the basis of a firewall

Packet Filtering Firewalls will trust inside addresses Spoofing: attacker makes their address look like an inside address Will rely on the TCP ACK bit to determine if a connection is inbound or outbound will permit all outbound (you to the Inet) by default Can configure what inbound connections you want to allow (home web server) Does not work well with certain applications FTP opens connections from the outside Media and VOIP use dynamic ports

Stateful Inspection

Stateful inspection Look at outbound connection request to the Internet Remember the addresses and the ports Only permit traffic from the Internet if it saw that it was initiated from the inside network All modern firewalls work this way

Proxy Server

Proxy Server Since application is intercepted Can authenticate by user Can log content Can block content by looking at the URLs All web access is via proxy

Authentication w/o proxy Telnet or web to the firewall the login then can access all other services Dedicated client Firewall-1 has a custom client Firewall contacts client code when user tries to access a service ask for login and if ok grants it.

A firewall: Always does packet filters Always does stateful packet filtering Always logs May have a proxy May do authentication

Corporate Firewalls Appliance based ‘Computer’ based PIX, FW1 Nokia more expensive Dedicated OS Harder to crack as fewer OS issues Harder to scale (as based on specific hardware) ‘Computer’ based Runs on NT or Unix Can leverage existing computers Easier to learn at home

Home Firewalls Device Based OS based Part of your access box or can get a dedicated appliance May be ‘free’ with a box you are already getting Does not touch your OS but then may need more configuration Do not have to touch multiple computers Does not impact ‘inside the house’ OS based Tied into the network stack Can easily deal with custom apps May need to modify for home access

Linksys Router (appliance)

Linksys Router Filtering

Linksys Router logs

Norton Personal Firewall (part of OS)

Application list

Summary If you access the internet at all get an OS based firewall If you have always on get an appliance based Or even better use both.