Internet Security: Firewall

Similar documents
W is a Firewall. Internet Security: Firewall. W a Firewall can Do. firewall = wall to protect against fire propagation

Information Systems Security

Why Firewalls? Firewall Characteristics

Internet Security Firewalls

CSC Network Security

What is a firewall? Firewall and IDS/IPS. Firewall design. Ingress vs. Egress firewall. The security index

Firewall and IDS/IPS. What is a firewall?

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015

Computer Security and Privacy

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways

COMPUTER NETWORK SECURITY

Chapter 8 roadmap. Network Security

CSC 474/574 Information Systems Security

Chapter 9. Firewalls

Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

SE 4C03 Winter 2005 Network Firewalls

Spring 2010 CS419. Computer Security. Vinod Ganapathy Lecture 14. Chapters 6 and 9 Intrusion Detection and Prevention

CSE 565 Computer Security Fall 2018

Agenda of today s lecture. Firewalls in General Hardware Firewalls Software Firewalls Building a Firewall

CHAPTER 8 FIREWALLS. Firewall Design Principles

10 Defense Mechanisms

Protection of Communication Infrastructures

Firewall and IDS/IPS. What is a firewall?

Firewall and IDS/IPS. What is a firewall? Ingress vs. Egress firewall. M.Aime, A.Lioy - Politecnico di Torino ( ) 1

CS155 Firewalls. Simon Cooper CS155 - Firewalls 23 May of 30

CS155 Firewalls. Why Firewalls? Why Firewalls? Bugs, Bugs, Bugs

Unit 4: Firewalls (I)

4. The transport layer

Firewalls N E T W O R K ( A N D D ATA ) S E C U R I T Y / P E D R O B R A N D Ã O M A N U E L E D U A R D O C O R R E I A

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr.

Indicate whether the statement is true or false.

Intranets 4/4/17. IP numbers and Hosts. Dynamic Host Configuration Protocol. Dynamic Host Configuration Protocol. CSC362, Information Security

CyberP3i Course Module Series

Application Firewalls

Networking midterm. 5. As a data unit moves up from one protocol layer to another, control headers are:

CSE 461 Midterm Winter 2018

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

CTS2134 Introduction to Networking. Module 08: Network Security

Network Security: Firewalls. Tuomas Aura T Network security Aalto University, Nov-Dec 2013

Filtering Trends Sorting Through FUD to get Sanity

CSC 4900 Computer Networks: Security Protocols (2)

Computer Security Spring Firewalls. Aggelos Kiayias University of Connecticut

Firewalls. IT443 Network Security Administration Slides courtesy of Bo Sheng

Broadcast Infrastructure Cybersecurity - Part 2

COSC 301 Network Management

Overview. Computer Network Lab, SS Security. Type of attacks. Firewalls. Protocols. Packet filter

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II

Managing SonicWall Gateway Anti Virus Service

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

20-CS Cyber Defense Overview Fall, Network Basics

Firewalls. Firewall. means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense

Routers use access lists to control incoming or outgoing traffic. You should know the following characteristics of an access list.

Configuring NAT for IP Address Conservation

Access Control List Enhancements on the Cisco Series Router

Avaya Port Matrix: Avaya Diagnostic Server 3.0

Network Security. Thierry Sans

Firewalls, IDS and IPS. MIS5214 Midterm Study Support Materials

Configuring Access Rules

Router and ACL ACL Filter traffic ACL: The Three Ps One ACL per protocol One ACL per direction One ACL per interface

Access Control List Overview

VG422R. User s Manual. Rev , 5

Firewalls. Content. Location of firewalls Design of firewalls. Definitions. Forwarding. Gateways, routers, firewalls.

Implementing Firewall Technologies

Finding Feature Information

The DNS. Application Proxies. Circuit Gateways. Personal and Distributed Firewalls The Problems with Firewalls

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

DMZ Networks Virtual Private Networks Distributed Firewalls Summary of Firewall Locations and Topologies

Network and Security: Introduction

Port Mirroring in CounterACT. CounterACT Technical Note

Some of the slides borrowed from the book Computer Security: A Hands on Approach by Wenliang Du. Firewalls. Chester Rebeiro IIT Madras

Advanced Security and Mobile Networks

Three interface Router without NAT Cisco IOS Firewall Configuration

Novell TCP IP for Networking Professionals.

Internet Routing Basics

Firewalls and NAT. Firewalls. firewall isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others.

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

TCP/IP THE TCP/IP ARCHITECTURE

Overview of Firewalls. CSC 474 Network Security. Outline. Firewalls. Intrusion Detection System (IDS)

Network Interconnection

Avaya Port Matrix: Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy.

Information about Network Security with ACLs

Introduction TELE 301. Routers. Firewalls. Gateways. Sample Large Network

Firewall Simulation COMP620

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Protocol Layers, Security Sec: Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017

Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.

Firewall Policy. Edit Firewall Policy/ACL CHAPTER7. Configure a Firewall Before Using the Firewall Policy Feature

Computer Security. 12. Firewalls & VPNs. Paul Krzyzanowski. Rutgers University. Spring 2018

Security Assessment Checklist

Configuring Firewall Access Rules

CS61C Machine Structures Lecture 37 Networks. No Machine is an Island!

Back to basics J. Addressing is the key! Application (HTTP, DNS, FTP) Application (HTTP, DNS, FTP) Transport. Transport (TCP/UDP) Internet (IPv4/IPv6)

Network Control, Con t

TCP Overview Revisited Computer Networking. Queuing Disciplines. Packet Drop Dimensions. Typical Internet Queuing. FIFO + Drop-tail Problems

Routing Overview. Information About Routing CHAPTER

Transcription:

Internet Security: Firewall What is a Firewall firewall = wall to protect against fire propagation More like a moat around a medieval castle restricts entry to carefully controlled points restricts exits to carefully controlled points

Firewall Combination of hardware and software to regulate traffic between an internal network and an external network (Internet) of threats What a Firewall can Do Focus security decisions Enforce security policies Log Internet activity What Protect against malicious insiders Protect against connections that bypass it Protect against completely new threats Protect against viruses and worms Set itself up correctly

Ingress vs. Egress Firewall Ingress firewall incoming connections typically to select the (public) services offered sometimes as part of an application exchange initiated by my users outgoing connections Egress firewall typically to check the activity of my personnel Firewall Design we need to achieve an optimal trade-off...... between security and functionality... with minimum cost

Firewall Design Principles Firewall Characteristics Four general techniques: Service control: determines the types of Internet services that can be accessed, inbound or outbound) Direction control: determines the direction in which particular service requests are allowed to flow) User control: controls access to a service according to which user is attempting to access it) Behavior control: control how particular services are used

Authorisation Policies Classification of Firewalls Characterised by protocol level it controls: Packet filtering Circuit Gateways Application Gateways Firewall basic components: screening router that filters traffic at IP level bastion host secure system, with auditing proxy service that works on behalf of an application, dual-homed gateway system with two network cards and routing disabled

At which level does a firewall work? Packet Filtering Implemented through a screening router Router: can the packet be routed to its destination? Screening router: should the packet be routed to its destination? Decision based on information in the IP packet header IP source address IP destination address Protocol (TCP, UDP, ICMP) Source port number Destination port number Packet size

Packet Filtering Additional information Interface the packet arrives on Interface the packet will go out on State information Is the packet a response to an earlier packet? Number of recent packets seen from the same host Is the packet identical to a recently seen packet? Is the packet a fragment? Stateful Packet Filtering Traditional packet filters do not examine higher layer context ie matching return packets with outgoing flow Stateful packet filters address this need They examine each IP packet in context Keep track of client-server sessions Check each packet validly belongs to one Hence are better able to detect bogus packets out of context

Security & Performance of Packet Filters IP address spoofing Fake source address to be trusted Add filters on router to block Tiny fragment attacks Split TCP header info over several tiny packets Either discard or reassemble before check Degradation depends on number of rules applied at any point Order rules so that most common traffic is dealt with first Correctness is more important than speed

Proxy Servers Specialized application programs for Internet services (HTTP, FTP, telnet, etc.) Proxy server Proxy client Need a mechanism to restrict direct communication between the internal and external networks Policy embedded in proxy servers Two kinds of proxies Application-level gateways/proxies Tailored to http, ftp, smtp, etc. Circuit-level gateways/proxies Working on TCP level Application Level Gateway

Application-Level Gateways 1. Has full access to protocol user requests service from proxy proxy validates request as legal then actions request and returns result to user Need separate proxies for each service E.g., SMTP (E-Mail) NNTP (Net news) DNS (Domain Name System) NTP (Network Time Protocol) custom services generally not supported Application-Level Gateways 2. composed by a set of proxies inspecting the packet payload at application level often requires modifications to the client application may optionally mask / renumber the internal IP addresses when used as part of a firewal, usually performs also peer authentication top security!! (e.g. against buffer overflow of the target application) rules are more fine-grained and simple than those of a packet filter

Limitations of App-Level Gateways delay in supporting new applications heavy on resources (many processes) low performance (user-mode processes) completely breaks the client/server model not transparent to the client Circuit Level Gateway

a - creates a transport-level circuit between client and server any way the payload data breaks the TCP/UDP-level client/server model during the connection may authenticate the client but this requires modification to the application still exhibits many limitations of the packet filter

Firewall Architectures Screening Router Dual-Homed Host Screened Host Screened Subnet Screening Router

Dual-Homed Host Screened Host

Screened Subnet

Useless against attacks from the inside Evildoer exists on inside Malicious code is executed on an internal machine Organizations with greater insider threat Banks and Military Protection must exist at each layer Assess risks of threats at every layer Cannot protect against transfer of all virus infected programs or files because of huge range of O/S & file types