+ All Categories
Home > Documents > An Introduction to Firewall Technology

An Introduction to Firewall Technology

Date post: 13-Oct-2015
Category:
Upload: okaka
View: 11 times
Download: 0 times
Share this document with a friend
Description:
Network Perimeter Security device
44
 An Introduction to Firewall Technology 凌群電腦  : 潘志豪  E-Mail : [email protected] TEL : 04-2202-1221
Transcript
  • 5/21/2018 An Introduction to Firewall Technology

    1/44

    An Introduction to FirewallTechnology

    :

    E-Mail : [email protected]

    TEL : 04-2202-1221

  • 5/21/2018 An Introduction to Firewall Technology

    2/44

    Agenda

    What is a firewall

    Why an organization needs a firewall

    Types of firewalls and technologiesDeploying a firewall

    What is a VPN

  • 5/21/2018 An Introduction to Firewall Technology

    3/44

    What is a Firewall ?

    A firewall :

    Acts as a securitygateway between two

    networks Usually between trusted

    and untrusted networks(such as between acorporate network andthe Internet)

    Internet

    Corporate

    Site

    Corporate NetworkGateway

  • 5/21/2018 An Introduction to Firewall Technology

    4/44

    What is a Firewall ?

    A firewall :

    Acts as a securitygateway between two

    networks Tracks and controls

    network communications

    Decides whetherto pass, reject,encrypt, or logcommunications(Access Control)

    Corporate

    Site

    Allow Traffic

    to Internet

    Internet

    Block traffic

    from Internet

  • 5/21/2018 An Introduction to Firewall Technology

    5/44

    Why Firewalls are Needed

    Prevent attacks from untrustednetworks

    Protect data integrity of criticalinformation

    Preserve customer and partner

    confidence

  • 5/21/2018 An Introduction to Firewall Technology

    6/44

    Evolution of Firewalls

    PacketFilter

    Stateful

    Inspection

    Stage of Evolution

    Application

    Proxy

  • 5/21/2018 An Introduction to Firewall Technology

    7/44

    Packets examined at the network layer

    Useful first lineof defense - commonlydeployed on routers

    Simple accept or reject decision modelNo awareness of higher protocol layers

    Packet Filter

    Applications

    Presentations

    Sessions

    Transport

    DataLink

    Physical

    Data Link

    Physical

    Applications

    Presentations

    Sessions

    Transport

    Data Link

    Physical

    Network

    Presentations

    Sessions

    Transport

    Applications

    Network Network

  • 5/21/2018 An Introduction to Firewall Technology

    8/44

    Application Gateway or Proxy

    Applications

    Presentations

    Sessions

    Transport

    Data Link

    Physical

    Data Link

    Physical

    Applications

    Presentations

    Sessions

    Transport

    Data Link

    Physical

    Network NetworkNetwork

    Presentations

    Sessions

    Transport

    Applications

    Packets examined at the application layer

    Application/Content filtering possible -prevent FTP putcommands, for example

    Modest performanceScalability limited

  • 5/21/2018 An Introduction to Firewall Technology

    9/44

    Stateful Inspection

    Applications

    Presentations

    Sessions

    Transport

    Data Link

    Physical

    Data Link

    Physical

    Applications

    Presentations

    Sessions

    Transport

    Data Link

    Physical

    Network Network

    Network

    Presentations

    Sessions

    Transport

    INSPECT Engine

    Applications

    DynamicState TablesDynamic

    State TablesDynamic

    State Tables

    Packets Inspected between data link layer and networklayer in the OS kernel

    State tables are created to maintain connection context

    Invented by Check Point

  • 5/21/2018 An Introduction to Firewall Technology

    10/44

    Network Address Translation(NAT)

    Converts a networks illegal IP addresses tolegal or public IP addresses Hides the true addresses of individual hosts,

    protecting them from attack Allows more devices to be connected to the

    network

    Internet

    Internal

    IP Addresses

    219.22.165.1

    Corporate LAN

    192.172.1.1-192.172.1.254

    Public

    IP Address(es)

  • 5/21/2018 An Introduction to Firewall Technology

    11/44

    Port Address Translation

    Hiding

    192.168.0.15

    10.0.0.2

    49090

    23

    10.0.0.3

    2000

    2001

    23

    10.0.0.3

    49090

    23

    10.0.0.2

    PATGlobal

    23

    172.30.0.50

    192.168.0.15

    172.30.0.50

    192.168.0.15

    172.30.0.50

    172.30.0.50

  • 5/21/2018 An Introduction to Firewall Technology

    12/44

    Personal Firewalls

    Need arises from always onconnections

    Your PC is not protected enough byyour OS

    Intrusion detection facilities

    Different levels of security

    Templates

  • 5/21/2018 An Introduction to Firewall Technology

    13/44

    Firewall Deployment

    Corporate NetworkGateway

    Protect internal network

    from attack Most common

    deployment point

    Internet

    Human Resources

    Network

    Corporate

    Site

    Demilitarized Zone

    (DMZ)

    Public Servers

    DMZ

    Corporate Network

    Gateway

  • 5/21/2018 An Introduction to Firewall Technology

    14/44

    Firewall Deployment

    Corporate NetworkGateway

    Internal Segment

    Gateway Protect sensitive

    segments (Finance, HR,Product Development)

    Provide second layer ofdefense

    Ensure protection againstinternal attacks andmisuse

    Internet

    Human Resources

    Network

    Corporate

    Site

    Public Servers

    Demilitarized Zone(Publicly-accessible

    servers)

    Internal Segment Gateway

  • 5/21/2018 An Introduction to Firewall Technology

    15/44

    Firewall Deployment

    Corporate NetworkGateway

    Internal SegmentGateway

    Server-BasedFirewall

    Protect individualapplication servers

    Files protect

    Internet

    Human Resources

    Network

    Corporate

    Site

    Server-Based

    Firewall

    SAP

    Server

    Public Servers

    DMZ

  • 5/21/2018 An Introduction to Firewall Technology

    16/44

    Firewall Deployment

    Hardware appliance based firewall

    Single platform, software pre-installed

    Can be used to support small organizationsor branch offices with little IT support

    Software based firewall

    Flexible platform deployment options

    Can scale as organization grows

  • 5/21/2018 An Introduction to Firewall Technology

    17/44

    Summary

    Firewalls foundation of an enterprisesecurity policy

    Stateful Inspection is the leadingfirewall technology

  • 5/21/2018 An Introduction to Firewall Technology

    18/44

    /?

    ?

    webemail

  • 5/21/2018 An Introduction to Firewall Technology

    19/44

    JavaActiveX

  • 5/21/2018 An Introduction to Firewall Technology

    20/44

  • 5/21/2018 An Introduction to Firewall Technology

    21/44

    What is a VPN?

    A VPN is a privateconnection over anopen network

    A VPN includesauthentication andencryption toprotect dataintegrity andconfidentiality

    VPN

    VPN

    Internet

    Acme Corp

    Acme Corp

    Site 2

    Acme Corp

    Site 1

  • 5/21/2018 An Introduction to Firewall Technology

    22/44

    Why Use Virtual PrivateNetworks?

    More flexibility

    Leverage ISP point of presence

    Use multiple connection types (cable, DSL,T1, T3)

    Most attacks originate within anorganization

  • 5/21/2018 An Introduction to Firewall Technology

    23/44

    Why Use Virtual PrivateNetworks?

    More flexibility

    More scalability

    Add new sites, users quickly Scale bandwidth to demand

  • 5/21/2018 An Introduction to Firewall Technology

    24/44

    Why Use Virtual PrivateNetworks?

    More flexibility

    More scalability

    Lower costs Reduced frame relay/leased line costs

    Reduced long distance

    Reduced equipment costs (modem

    banks,CSU/DSUs) Reduced technical support

  • 5/21/2018 An Introduction to Firewall Technology

    25/44

    Types of VPNs

    Remote Access VPN

    Provides access tointernal corporatenetwork over the

    Internet Reduces long distance,

    modem bank, andtechnical support costs

    PAP,CHAP,RADIUS

    Internet

    Corporate

    Site

  • 5/21/2018 An Introduction to Firewall Technology

    26/44

    Types of VPNs

    Remote Access VPN

    Site-to-Site VPN

    Connects multiple offices

    over Internet Reduces dependencies

    on frame relay andleased lines

    Internet

    Branch

    Office

    Corporate

    Site

  • 5/21/2018 An Introduction to Firewall Technology

    27/44

    Types of VPNs

    Remote Access VPN

    Site-to-Site VPN

    Extranet VPN Provides business

    partners access tocritical information(leads, sales tools, etc)

    Reduces transactionand operational costs

    Corporate

    Site

    Internet

    Partner #1

    Partner #2

  • 5/21/2018 An Introduction to Firewall Technology

    28/44

    Types of VPNs

    Remote Access VPN

    Site-to-Site VPN

    Extranet VPNClient/Server VPN

    Protects sensitiveinternal

    communications

    InternetLAN

    clients

    Database

    Server

    LAN clients with

    sensitive data

  • 5/21/2018 An Introduction to Firewall Technology

    29/44

    Components of a VPN

    Encryption

    Key management

    Message authenticationEntity authentication

  • 5/21/2018 An Introduction to Firewall Technology

    30/44

    Encryption

    Current standards: DES and Triple-DES Over 20 years in the field

    AES beginning deployment New standard

    More computationally efficient

    Longer keys = more secure

    HR Server

    E-Mail Server

    Joes PC to HR Server

    All Other Traffic

    Cleartext

    Encrypted

    Marys PC

    Joes PC

  • 5/21/2018 An Introduction to Firewall Technology

    31/44

    Key Management

    Public key cryptosystemsenable secure exchange ofprivate crypto keys acrossopen networks

    Re-keying at appropriate intervals

    IKE = Internet Key Exchange protocols Incorporates ISAKMP/Oakley

  • 5/21/2018 An Introduction to Firewall Technology

    32/44

    Authentication

    IPsec standards focus on authentication of twonetwork devices to each other

    IP address/preshared key

    Digital certificates

    User authentication is added on top if required RADIUS and TACACS+ are the standard protocols for

    authentication servers

    XAUTH is being added to the standards to address

    user authentication

    P i t t P i t T li

  • 5/21/2018 An Introduction to Firewall Technology

    33/44

    Point-to-Point TunnelingProtocol

    Layer 2 remote access VPN distributed with Windows productfamily Addition to Point-to-Point Protocol (PPP)

    Allows multiple Layer 3 Protocols

    Uses proprietary authentication and encryptionLimited user management and scalability

    Known security vulnerabilities

    InternetRemote PPTP Client

    ISP Remote Access

    Switch

    PPTP RAS Server

    Corporate Network

    L 2 T li P t l

  • 5/21/2018 An Introduction to Firewall Technology

    34/44

    Layer 2 Tunneling Protocol(L2TP)

    Layer 2 remote access VPN protocol Combines and extends PPTP and L2F (Cisco supported

    protocol)

    Weak authentication and encryption

    Does not include packet authentication, data integrity, orkey management

    Must be combined with IPSec for enterprise-level security

    Internet

    Remote L2TP Client

    ISP L2TP Concentrator

    L2TP Server

    Corporate Network

    I t t P t l S it

  • 5/21/2018 An Introduction to Firewall Technology

    35/44

    Internet Protocol Security(IPSec)

    Layer 3 protocol for remote access,intranet, and extranet VPNs

    Internet standard for VPNs Provides flexible encryption and message

    authentication/integrity

    Includes key management

  • 5/21/2018 An Introduction to Firewall Technology

    36/44

    Components of an IPSec VPN

    Encryption

    MessageAuthentication

    EntityAuthentication

    Key

    Management

    DES, 3DES, and more

    HMAC-MD5, HMAC-SHA-1, or others

    Digital Certificates,Shared Secrets,HybridMode IKE

    Internet Key Exchange(IKE), Public Key

    Infrastructure (PKI)

    All managed by security associations (SAs)

  • 5/21/2018 An Introduction to Firewall Technology

    37/44

    Encryption Explained

    Used to convert data to a secret codefor transmission over an untrusted

    network

    Encryption

    Algorithm

    The cow jumped

    over the moon

    4hsd4e3mjvd3sd

    a1d38esdf2w4d

    Clear Text Encrypted Text

  • 5/21/2018 An Introduction to Firewall Technology

    38/44

    Symmetric Encryption

    Same key used to encrypt and decryptmessage

    Faster than asymmetric encryption

    Examples: DES, 3DES, RC5, Rijndael

    Shared Secret Key

  • 5/21/2018 An Introduction to Firewall Technology

    39/44

    Asymmetric Encryption

    Different keys used to encrypt and decryptmessage (One public, one private)

    Examples include RSA, DSA, SHA-1, MD-5

    Alice Public Key

    Encrypt

    Alice Private Key

    Decrypt

    Bob Alice

  • 5/21/2018 An Introduction to Firewall Technology

    40/44

    Internet

    PGP IDEARSAMD5

    S/MIME

    SSL TCP/IP

    RSARC2RC4MD53-DES

    PCT TCP/IP

    RSARC2RC4MD5

    S-HTTP HTTP

    RSADES

    SET&

    CyberCash

    Internet

    RSAMD5RC2

  • 5/21/2018 An Introduction to Firewall Technology

    41/44

    Internet

    DNSSEC RSAMD5

    IPSec IP Diffie-HellmanDES3DESRC4IDEA

    Kerberos DES

    SSH RSADiffie-HellmanDES3-DESBlowfish

    DES Keys

  • 5/21/2018 An Introduction to Firewall Technology

    42/44

    DES Keys

    40-Bit 56-Bit 168-Bit3-DES

    400 5 38

    1 12 556 1019

    1

    0.02 21 1017

  • 5/21/2018 An Introduction to Firewall Technology

    43/44

    VPN-1/FireWall-1

    Gateway &StoneBeat FullCluster

    Extranet

    Partner Site

    IPSec-compliant

    Gateway

    VPN-1

    SecuRemote& RSA SecurID

    VPN-1

    SecureClient

    & RSA SecurID

    Remote Users

    Remote OfficeVPN-1/FireWall-1

    Nokia Appliance

    Enterprise Management Console

    Policy-based Management

    Reporting

    Account Management

    Open Security Extension

    Web Server Pool

    Extranet

    Application Server

    ConnectControl

    Server LoadBalancing

    VPN-1

    SecureServer

    LDAP

    Directory

    FloodGate-1QoS

    RSA

    ACE/Server

    CorporateNetwork

    Router

    ISS

    RealSecureIntrusion

    Detection

    Dial-up

    Broadband

    FireWall-1

    Trend InterScan ,

    WebManager , eManager

    & StoneBeat

    Security Cluster

    Secure Virtual Network Architecture

    VPN-1

    Accelerator Card

    RSA

    Advanced PKI

    RSA

    ACE/Agent

  • 5/21/2018 An Introduction to Firewall Technology

    44/44

    Thank You!


Recommended