Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture.

Similar presentations


Presentation on theme: "1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture."— Presentation transcript:

1

2 1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture Configuring, Testing, and Maintenance

3 2 Figure 5-8: Stateful Inspection Firewalls State of Connection: Open or Closed  State: Order of packet within a dialog  Often simply whether the packet is part of an open connection

4 3 Figure 5-8: Stateful Inspection Firewalls Stateful Firewall Operation  For TCP, record two IP addresses and port numbers in state table as OK (open) (Figure 5-9)  By default, permit connections from internal clients (on trusted network) to external servers (on untrusted network) This default behavior can be changed with an ACL  Accept future packets between these hosts and ports with little or no inspection

5 4 Figure 5-9: Stateful Inspection Firewall Operation I External Webserver 123.80.5.34 Internal Client PC 60.55.33.12 1. TCP SYN Segment From: 60.55.33.12:62600 To: 123.80.5.34:80 2. Establish Connection 3. TCP SYN Segment From: 60.55.33.12:62600 To: 123.80.5.34:80 Stateful Firewall Type TCP Internal IP 60.55.33.12 Internal Port 62600 External IP 123.80.5.34 External Port 80 Status OK Connection Table Note: Outgoing Connections Allowed By Default

6 5 Figure 5-9: Stateful Inspection Firewall Operation I External Webserver 123.80.5.34 Internal Client PC 60.55.33.12 6. TCP SYN/ACK Segment From: 123.80.5.34:80 To: 60.55.33.12:62600 5. Check Connection OK 4. TCP SYN/ACK Segment From: 123.80.5.34:80 To: 60.55.33.12:62600 Stateful Firewall Type TCP Internal IP 60.55.33.12 Internal Port 62600 External IP 123.80.5.34 External Port 80 Status OK Connection Table

7 6 Figure 5-8: Stateful Inspection Firewalls Stateful Firewall Operation  For UDP, also record two IP addresses in port numbers in the state table Type TCP UDP Internal IP 60.55.33.12 Internal Port 62600 63206 External IP 123.80.5.34 1.8.33.4 External Port 80 69 Status OK Connection Table

8 7 Figure 5-8: Stateful Inspection Firewalls Static Packet Filter Firewalls are Stateless  Filter one packet at a time, in isolation  If a TCP SYN/ACK segment is sent, cannot tell if there was a previous SYN to open a connection  But stateful firewalls can (Figure 5-10)

9 8 Figure 5-10: Stateful Firewall Operation II Attacker Spoofing External Webserver 10.5.3.4 Internal Client PC 60.55.33.12 Stateful Firewall 2. Check Connection Table: No Connection Match: Drop 1. Spoofed TCP SYN/ACK Segment From: 10.5.3.4.:80 To: 60.55.33.12:64640 Type TCP UDP Internal IP 60.55.33.12 Internal Port 62600 63206 External IP 123.80.5.34 222.8.33.4 External Port 80 69 Status OK Connection Table

10 9 Figure 5-8: Stateful Inspection Firewalls Static Packet Filter Firewalls are Stateless  Filter one packet at a time, in isolation  Cannot deal with port-switching applications  But stateful firewalls can (Figure 5-11)

11 10 Figure 5-11: Port-Switching Applications with Stateful Firewalls External FTP Server 123.80.5.34 Internal Client PC 60.55.33.12 1. TCP SYN Segment From: 60.55.33.12:62600 To: 123.80.5.34:21 2. To Establish Connection 3. TCP SYN Segment From: 60.55.33.12:62600 To: 123.80.5.34:21 Stateful Firewall Type TCP Internal IP 60.55.33.12 Internal Port 62600 External IP 123.80.5.34 External Port 21 Status OK State Table Step 2

12 11 Figure 5-11: Port-Switching Applications with Stateful Firewalls External FTP Server 123.80.5.34 Internal Client PC 60.55.33.12 6. TCP SYN/ACK Segment From: 123.80.5.34:21 To: 60.55.33.12:62600 Use Ports 20 and 55336 for Data Transfers 5. To Allow, Establish Second Connection 4. TCP SYN/ACK Segment From: 123.80.5.34:21 To: 60.55.33.12:62600 Use Ports 20 and 55336 for Data Transfers Stateful Firewall Type TCP Internal IP 60.55.33.12 Internal Port 62600 55336 External IP 123.80.5.34 External Port 21 20 Status OK State Table Step 2 Step 5

13 12 Figure 5-8: Stateful Inspection Firewalls Stateful Inspection Access Control Lists (ACLs)  Primary allow or deny applications  Simple because probing attacks that are not part of conversations do not need specific rules because they are dropped automatically  In integrated firewalls, ACL rules can specify that messages using a particular application protocol or server be authenticated or passed to an application firewall for inspection


Download ppt "1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture."

Similar presentations


Ads by Google