+ All Categories
Home > Documents > Firewalls (7)

Firewalls (7)

Date post: 18-Jul-2016
Category:
Upload: xozan
View: 227 times
Download: 0 times
Share this document with a friend
Description:
Firewalls (7)
21
Why do we need Firewalls? Internet connectivity is a must for most people and organizations especially for me But a convenient Internet connectivity is an invitation for intruders and hackers yet another example of tradeoff between convenience and security Question: What do we mean by “convenient” Internet connection? Firewall basically provides us an option to play within the spectrum of this tradeoff
Transcript
Page 1: Firewalls (7)

Why do we need Firewalls? Internet connectivity is a must for most people and

organizations especially for me

But a convenient Internet connectivity is an invitation for intruders and hackers yet another example of tradeoff between convenience and

security Question: What do we mean by “convenient” Internet

connection? Firewall basically provides us an option to play within the

spectrum of this tradeoff

Page 2: Firewalls (7)

What is a Firewall?

Effective means of protecting local network of systems from network-based security threats from outer worldwhile providing (limited) access to the outside

world (the Internet)

Page 3: Firewalls (7)

Firewall Basics The firewall is inserted between the internal

network and the Internet (a choke point) Establish a controlled link and protect the network

from Internet-based attacks keeps unauthorized users away, imposes restrictions on network services; only authorized

traffic is allowed Location for monitoring security-related events

auditing, alarms can be implemented some firewalls supports IPSec, so VPNs can be

implemented firewall-to-firewall some firewalls support NAT (not so security

related) Open discussion: can’t we put one firewall for

each station within the local network? What are pros and cons?

Page 4: Firewalls (7)

Firewall Characteristics - 1

Design goals: All traffic from inside from/to outside must pass

through the firewall Only authorized traffic (defined by the local security

policy) will be allowed to pass The firewall itself should be immune to penetration

(use of trusted system with a secure operating system)

Page 5: Firewalls (7)

Firewall Characteristics - 2 General techniques for access control

Service control Determines the types of Internet services that can be accessed

Mostly using TCP/UDP port numbers Direction of traffic is important for the decision

Some services are open for outbound, but not inbound (or vice versa) User control

Controls access to a service according to which user is attempting to access it

need to authenticate users. This is easy for internal users, but what can be done for external ones?

Behavior control Controls how particular services are used (e.g. filter e-mail for spam control)

Page 6: Firewalls (7)

Firewall Limitations

cannot protect from attacks bypassing it typical example: dial-in, dial-out

cannot protect against internal threats e.g. fired sysadmin

cannot protect against transfer of all virus infected programs or files because of heavy traffic and huge range of O/S &

file types

Page 7: Firewalls (7)

Types of Firewalls

Packet-filtering routers Application-level gateways Circuit-level gateways (not common, so

skipped)

Page 8: Firewalls (7)

Packet-filtering Router Foundation of any firewall system Applies a set of rules to each incoming IP packet and

then forwards or discards the packet (in both directions)

The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header

context is not checked Two default policies (discard or forward)

Page 9: Firewalls (7)

Packet-filtering Router Filtering rules are based on

Source and Destination IP addresses Source and destination ports (services) and transport protocols

(TCP or UDP) Router’s physical interface

Rules are listed and a match is tried to be found starting with the first rule Action is either forward or discard Generally first matching rule is applied If no match, then default policy is used

Default is either discard or forward

Page 10: Firewalls (7)

2121

{our hosts}

Packet Filtering Examples

{our hosts}

{our hosts}

For data traffic in passive mode

Page 11: Firewalls (7)

Stateful Inspection Example E shows that

>1024 ports need to be opened not only due to FTP, all services have such a structure

<1024 ports are for servers, a client using a service should use a local port number between 1024 and 16383

So the firewall should keep track of the currently opened >1024 ports

A stateful inspection firewall keeps track of outbound TCP connection with local port numbers in a table and allow inbound traffic for >1024 ports if there is an entry in that table (see next slide for an example table)

Page 12: Firewalls (7)

Stateful Inspection

Page 13: Firewalls (7)

Packet-filtering Router Advantages:

Simplicity High speed Transparency to users

Disadvantages Difficulty of setting up packet filter rules

configuration is error-prone a port is either open or close; no application layer

flexibility IP address spoofing

attacker uses an internal IP address and hopes that packet penetrates into the system

countermeasure: do not accept internal IPs from external interface

Page 14: Firewalls (7)

Application-level Gateway Application-level Gateway (proxy server)

Acts as a relay of application-level traffic Proxy obtains application specific information from the

user and relays to the server Optionally authenticates the users

Only allowable applications can pass through Feature-based processing is possible

Additional processing overhead on each connection

Page 15: Firewalls (7)

Bastion Host A system identified by the firewall administrator

as a critical strong point in the network security Used in various firewall configuration (we’ll see now)

The bastion host serves as a platform for an application-level gateway i.e. a proxy

Potentially exposed to "hostile" elements, hence is secured to withstand this Trusted system Carefully configured and maintained

Page 16: Firewalls (7)

Firewall Configurations

In addition to the use of simple configuration of a single system (single packet filtering router or single gateway), more complex configurations are possible

Page 17: Firewalls (7)

Screened host firewall system (dual-homed bastion host) Only packets from and to the bastion host are

allowed to pass through the router The bastion host performs authentication and

proxy functions

Page 18: Firewalls (7)

Dual-homed Bastion Host Good security because of two reasons:

This configuration implements both packet-level and application-level filtering

An intruder must generally penetrate two separate systems in order to get to the internal network

This configuration also has flexibility in providing direct Internet access to a public information server, e.g. Web server by configuring the router

Page 19: Firewalls (7)

Screened-subnet Firewall System securer creates an isolated sub-network between routers

Internet and private network have access to this subnet Traffic across the subnet is blocked This subnet is called DMZ (demilitarized zone)

Internal network is invisible to the Internet

DMZ

Outside packet filtering router

Inside packet filtering router

Page 20: Firewalls (7)

Host-Based Firewalls Software module to secure individual hosts

filter packet flowsAvailable as add-on for many OSs

Often used on servers Advantages:

additional layer of protection to organizational firewall

tailored filter rules for specific host needsprotection from both internal / external attacks

Page 21: Firewalls (7)

Personal Firewall controls traffic flow to/from PC/workstation for both home or corporate use software module on PC

or in home cable/ADSL router/gateway typically less complex than standalone

firewalls primary role to deny unauthorized access

may also monitor/detect/block malware activity


Recommended