Karlstad University Firewall Ge Zhang. Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 9 “Firewalls and Intrusion Prevention.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 9: Firewalls and Intrusion Prevention.
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 9 – Firewalls and.
Firewalls Uyanga Tserengombo
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
FIREWALLS – Chapter 20 network-based threats access to outside world Functionality, Design Security – trusted system.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
Fall 2008CS 334: Computer Security1 Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for.
Lecture 14 Firewalls modified from slides of Lawrie Brown.
Security Firewall Firewall design principle. Firewall Characteristics.
Firewalling Techniques Prabhaker Mateti. ACK Not linux specific Not linux specific Some figures are from 3com Some figures are from 3com.
—On War, Carl Von Clausewitz
Chapter 11 Firewalls.
Firewall Configuration Strategies
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 7 Network Perimeter Security.
5/4/01EMTM 5531 EMTM 553: E-commerce Systems Lecture 7b: Firewalls Insup Lee Department of Computer and Information Science University of Pennsylvania.
Chapter 10 Firewalls. Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent.
Electronic Commerce 2. Definition Ecommerce is the process of buying and selling products and services via distributed electronic media, usually the World.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Firewall Slides by John Rouda
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Chapter 20 Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
NW Security and Firewalls Network Security
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Chapter 6: Packet Filtering
1 Pertemuan 13 IDS dan Firewall Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 11 Firewalls.
8: Network Management1 Firewalls. 8: Network Management2 Firewalls Two firewall types: m packet filter m application gateways To prevent denial of service.
1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University R355.
Firewalls, etc.. Network Security2 Outline Intro Various firewall technologies: –Static Packet Filtering (or nonstateful packet filter) –Dynamic Packet.
Defense Techniques Sepehr Sadra Tehran Co. Ltd. Ali Shayan November 2008.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
TCP/IP Protocols Contains Five Layers
Firewall – Survey Purpose of a Firewall – To allow ‘proper’ traffic and discard all other traffic Characteristic of a firewall – All traffic must go through.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Security fundamentals Topic 10 Securing the network perimeter.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Computer Security Firewalls and Intrusion Prevention Systems.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Security fundamentals
Why do we need Firewalls?
Firewall.
Computer Data Security & Privacy
Prepared By : Pina Chhatrala
Domain 4 – Communication and Network Security
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
* Essential Network Security Book Slides.
Firewalls Purpose of a Firewall Characteristic of a firewall
POOJA Programmer, CSE Department
دیواره ی آتش.
Presentation transcript:

Karlstad University Firewall Ge Zhang

Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…

Karlstad University

What is Firewall? A single checking point that reacts traffic to and from a network (pass, discard, block, log) Design goals –All traffic from inside to outside and vice versa must pass through the firewall Internet

Karlstad University Services by a firewall Service control Direction control User Control (internal network) Behavior control (the firewall needs to know the application protocol) Logging flow information Hidden internal topology

Karlstad University Capabilities and limitations Capabilities –Prevent unauthorized traffics –Monitoring security-related events –The platform for Network address translator (NAT) –The platform for IPSec tunnel mode (VPN) Limitations –Attacks the bypass the firewall (over other channels) –Internal threats (internal employees cooperate with external attackers) –Transferring virus-infected programs

Karlstad University The working flow of a Firewall if {condition_1} then {action_1} else if{condition_2} then {action_2} else if{condition_3} then {action_3} else if{condition_4} then {action_4} … else if{condition_n} then {action_n} How to define the conditions?

Karlstad University Layered TCP/IP model

Karlstad University Types of firewalls Packet-Filtering router Application-level gateway Circuit-level gateway

Karlstad University Packet-Filtering router (1) Packet-Filtering Firewall –Applies a set of rules –Decides forwarding or discarding the packet –Only examine the header, do not “ see inside ” a packet

Karlstad University Packet-Filtering router (2) sourcedestinationprotocoldest. portaction Ane_homeAne_workany Allow anySIP proxyTcp, udp5060, 5061Allow anyMail serverTcp, udp25Allow anyWeb servertcp80, 8080Allow any Deny sourcedestinationprotocoldest. portaction mal1any Deny mal2any Deny mal1any Deny mal3any Deny any Allow

Karlstad University Requirements on rule set design Consistency : The rules are ordered correctly Completeness : every packet satisfies at least one rule in the firewall Compactness : firewall has no redundant rules

Karlstad University An example Interfacesourcedestinationprotocoldest. portaction 0anyWeb servertcp80Allow 0anyWeb serverany Deny 0maliciousany Deny 1hostany Allow 1any Allow Consistency error Compactness error 0Not malicioushostany ???? Completeness error

Karlstad University Improvement Interfacesourcedestinationprotocoldest. portaction 0maliciousany Deny 0anyWeb servertcp80Allow 0anyWeb serverany Deny 0any Allow 1any Allow

Karlstad University Efficiency of rule set sourcedestinationprotocoldest. portaction anytcp80, 8080Deny anytcp80, 8080Deny anytcp80, 8080Deny anytcp80, 8080Allow anytcp80, 8080Allow sourcedestinationprotocoldest. portaction *anytcp80,8080Deny *anytcp80,8080Allow

Karlstad University Stateful PF For TCP connections –Server ports are mostly fixed (<1024) –Client ports are dynamically used ( from 1024 to 65535) Stateful: tightens up the rules for TCP traffic by creating a directory of outbound TCP connections srcSrc portdesDes portstate established established

Karlstad University Pro and cons in PF Pro: –Simple, high efficient –Transparent to users Con: –Does not work with application-specific vulnerabilities –Limited log information –No user authentication –Difficulty to configure rulesets

Karlstad University Attacks on a PF IP address spoofing: (use spoofed IP address which can be trusted) Fragment attacks –Tiny fragment –Overlapping fragment

Karlstad University IP fragment A firewall only inspects the first fragmented one.

Karlstad University Tiny fragment attack

Karlstad University Overlapping fragment

Karlstad University Application-level Gateway (mainly for inbound requests) Have more checking parameters (user names, message format, client software version, etc) Only deal with allowable applications More useful log information Con: high processing overhead

Karlstad University Circuit level gateway (mainly for outbound requests) Based on connections instead of packets Similar to stateful PF Perform authentication Implementations: Socks server

Karlstad University Bastion Host A secure version of its operating system A platform for an application-level gateway or circuit-level gateway Only support allowed applications Only support a subset of the standard applications Needs additional authentication

Karlstad University Demilitarized Zone (DMZ) Demilitarized zone is a subnet that contains and exposes an organization's public services to an external network DNS, web server, VoIP server Internal network, work stations

Karlstad University Setup Firewalls in a network Screened host firewall (single-homes bastion)

Karlstad University Sceened host firewall (dual-homed bastion host)

Karlstad University Screened subnet firewall

Karlstad University Practical experiences on firewall itself Stealth rule: drop any packet from outside to the firewall Insecure firewall management: drop packets to the firewall over insecure protocols (telnet, ftp, x11) Limited management machines: firewalls should be managed from a small number of machines

Karlstad University High-throughput firewall (1) Application Specific Integrated Circuit (ASIC) e.g., netscreen 100 (100Mbps firewall )

Karlstad University High-throughput firewall (2) Load balance

Karlstad University Key points Types of firewall Pros and cons of the three types Ruleset of PF (consistency, completeness, compactness, efficiency) Stateful PF Attack on PF Bastion host DMZ Setup firewalls in a network