Firewall Matthew Prestifilippo, Bill Kazmierski, Pat Sparrow.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

Firewalls and Intrusion Detection Systems
Standard, Extended and Named ACL.  In this lesson, you will learn: ◦ Purpose of ACLs  Its application to an enterprise network ◦ How ACLs are used to.
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.

Cisco PIX 515E Firewall. Overview What a PIX Firewall can do Adaptive Security Algorithm Address Translation Cut-Through Proxy Access Control Network.
CISCO PIX FIREWALL Configuration for DCSL Tuan Anh Nguyen CSCI 5234 University of Houston Clear Lake Fall Semester, 2005.
Chapter 8 PIX Firewall. Adaptive Security Algorithm (ASA)  Used by Cisco PIX Firewall  Keeps track of connections originating from the protected inside.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
1 Figure 5-4: Drivers of Performance Requirements: Traffic Volume and Complexity of Filtering Performance Requirements Traffic Volume (Packets per Second)
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
NAT (Network Address Translation) Natting means "Translation of private IP address into public IP address ". In order to communicate with internet we must.
Chapter 6: Packet Filtering
Cisco PIX firewall Set up 3 security zones ***CS580*** John Trafecanty Jules R. Nya Baweu August 23, 2005.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
Mr. Mark Welton.  Firewalls are devices that prevent traffic from entering or leaving a network  Firewalls are often used between networks, or when.
Network Address Translations Project no. : 12 Prof. Edmund Gean Presented by DhruvaPatel( ) Sweta Patel( ) Rushika Patel ( ) Guided.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Access Control List (ACL)
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Firewalls and proxies Unit objectives
Configuring the PIX Firewall Presented by Drew Spesard.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 11: Network Address Translation for IPv4 Routing And Switching.
Implementing Firewall Technologies
Tracking Rejected Traffic.  When creating Cisco router access lists, one of the greatest downfalls of the log keyword is that it only records matches.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Scaling Networks with Network Address Translation Scaling Networks with Network Address Translation Solutions for IPv4 Security and Scalability ECPI College.
NAT & PAT Network Address Translation Port Address Translation.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—6-1 Lesson 6 Translations and Connections.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
IP packet filtering Breno de Medeiros. Florida State University Fall 2005 Packet filtering Packet filtering is a network security mechanism that works.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
© 2001, Cisco Systems, Inc. CSPFA 2.0—5-1 Chapter 5 Cisco PIX Firewall Translations.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
S ECURITY APPLIANCES Module 2 Unit 2. S ECURE NETWORK TOPOLOGIES A topology is a description of how a computer network is physically or logically organized.
Lab 12 – Cisco Firewall.
Only Two Ways through the PIX Firewall
Network Address Translation (NAT)
1.
Instructor Materials Chapter 9: NAT for IPv4
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Network Address Translation (NAT)
Routing and Switching Essentials v6.0
6.6 Firewalls Packet Filter (=filtering router)
Network Security: IP Spoofing and Firewall
* Essential Network Security Book Slides.
Firewalls Purpose of a Firewall Characteristic of a firewall
Cabrillo College Building Cisco Remote Access Network
Instructor Materials Chapter 9: NAT for IPv4
Setting Up Firewall using Netfilter and Iptables
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
Firewalls By conventional definition, a firewall is a partition made
Firewall.
Firewalls Chapter 8.
Introduction to Network Security
Chapter 11: Network Address Translation for IPv4
Firewall Installation
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Firewall Matthew Prestifilippo, Bill Kazmierski, Pat Sparrow

Basics Intended to stop unauthorized traffic from traveling from one network to another Intended to stop unauthorized traffic from traveling from one network to another Between router and internal network setup Between router and internal network setup

All data arriving at or leaving the network passes through the firewall, where it can be accepted or denied. A list of rules can be set, allowing the firewall to determine what types of data should not be allowed to pass through. These rules can allow certain devices inside the network to have different privileges Basics

Filtering Packet Filters Packet Filters This job is done in the transport and network layerThis job is done in the transport and network layer Looks at the packets to see if forbidden IP’s are trying to come in.Looks at the packets to see if forbidden IP’s are trying to come in. Not affective in the case of spoofingNot affective in the case of spoofing Stateful Inspection Stateful Inspection Use ACK and SYN packet for verification/correspondenceUse ACK and SYN packet for verification/correspondence Keeps track of sessionsKeeps track of sessions

Filtering Application Proxies Application Proxies Application levelApplication level Extra processing power needed, but more security providedExtra processing power needed, but more security provided

Filtering A firewall can filter packets based on the source or destination IP address A firewall can filter packets based on the source or destination IP address A firewall can filter packets based on the destination port A firewall can filter packets based on the destination port A firewall can filter packets based on the protocol (UDP, TCP, IP …) A firewall can filter packets based on the protocol (UDP, TCP, IP …)

Interfaces 3 basic interfaces: 3 basic interfaces: 1. Inside – trusted network1. Inside – trusted network 2. Outside – untrusted network2. Outside – untrusted network 3. DMZ – demilitarized zone3. DMZ – demilitarized zone Web server Web server Why a DMZ? Why a DMZ?

NAT Static Static Permanent inside local -> inside global mappingPermanent inside local -> inside global mapping Dynamic Dynamic Pool of global addresses are defined. Machines that make a request to the outside are assigned accordingly.Pool of global addresses are defined. Machines that make a request to the outside are assigned accordingly.

NAT Overloading (PAT) Overloading (PAT) When there are more nodes than there are global addresses available, use port space to map to extra machinesWhen there are more nodes than there are global addresses available, use port space to map to extra machines This means that one address can be used for multiple computers (hence the term overloading)This means that one address can be used for multiple computers (hence the term overloading)

PAT

URL Filtering Need a N2H2 or a Websense server Need a N2H2 or a Websense server Filtering process includes the PIX relying on the server to determine whether or not a website is allowed. Filtering process includes the PIX relying on the server to determine whether or not a website is allowed. Could also use the access-list command Could also use the access-list command

Packet Inspection A Firewall must inspect every packet traveling in and out of a network A Firewall must inspect every packet traveling in and out of a network Too many rules can result in a bottleneck Too many rules can result in a bottleneck Looking up domain names while logging can slow performance Looking up domain names while logging can slow performance Using VPN and other functions can slow the performance Using VPN and other functions can slow the performance

PIX 515e Firewall 433 MHz Intel Celeron processor 433 MHz Intel Celeron processor 64 MB RAM 64 MB RAM 16 MB onboard flash memory 16 MB onboard flash memory 188 Mbps throughput 188 Mbps throughput can handle more than 130,000 sessions can handle more than 130,000 sessions Recommended for small to medium-sized business networks Recommended for small to medium-sized business networks

Our Setup We reset the firewall with the inside IP address of with a netmask of , which is the same as the inside address of the original network configuration We reset the firewall with the inside IP address of with a netmask of , which is the same as the inside address of the original network configuration We set the outside IP address to , which is the same as the original network configuration. We set the outside IP address to , which is the same as the original network configuration. The PIX515 has replaced the router. The PIX515 has replaced the router. By default, the firewall allows outgoing traffic to any IP address. By default, the firewall allows outgoing traffic to any IP address.

Rules Source and Destinations IPs Source and Destinations IPs Source and Destination interface Source and Destination interface Type of Packet Type of Packet Default rule: Default rule: Source: on inside interface Source: on inside interface Destination: on outside interface Destination: on outside interface Packet Type: IP Packet Type: IP Action: Permit Action: Permit

Our Rules Allow all traffic to enter the network Allow all traffic to enter the network Source: on the outside Source: on the outside Destination: on the inside Destination: on the inside Packet Type: IP Packet Type: IP Action: Permit Action: Permit  Prevent hosts from accessing Playboy.com Source: on the outside Source: on the outside Destination: on the inside Destination: on the inside Packet Type: IP Packet Type: IP Action: Deny Action: Deny

Work With IDS View IDS logs to find any bad IPS and add rules to prevent them from sending packets to the network View IDS logs to find any bad IPS and add rules to prevent them from sending packets to the network