Architecture of a Distributed Object Firewall Proxy. Abstract

Size: px
Start display at page:

Download "Architecture of a Distributed Object Firewall Proxy. Abstract"

Transcription

1 NAI Labs #0768 Architecture of a Distributed Object Firewall Proxy July 16, 2000 Gary Lamperillo Gary_Lamperillo@NAI.com NAI Labs - The Security Research Division Network Associates 3415 S. Sepulveda Blvd. Suite 700 Los Angeles, CA Telephone Fax Abstract The Multi-Protocol Object Gateway (MPOG) provides access control for operations on distributed objects. MPOG provides support to allow distributed objects to cross enclave boundaries. An enclave is defined as an enclosed intra-network usually protected by a firewall. The MPOG is an application proxy server, written entirely in the Java programming language for platform independence, which has been installed on Network Associates Gauntlet Firewall. An application proxy server proxies connections from clients to application servers protected by enclave firewalls. The key distributed object technologies targeted in the MPOG are the Common Object Request Broker Architecture (CORBA) Internet Inter- ORB Protocol (IIOP) from the Object Management Group (OMG), Java Remote Method Invocations (RMI), and Microsoft Distributed Component Object Model (DCOM). The MPOG architecture provides reuse of the policy database and access control techniques for multiple distributed object technologies. The policy information can be identical for all distributed object models, since all such technologies have similar functionality, in that a remote invocation is made for a particular remote principal. This work is sponsored by DARPA and managed by Air Force Research Laboratory under contract number F C DARPA and Air Force Rome Laboratories have not approved this document for public release. Do not distribute to unauthorized personnel.

2 Architecture of a Distributed Object Firewall Proxy Gary Lamperillo Gary_Lamperillo@NAI.com 1. Distributed Object Technologies Corporations have embraced object oriented programming because of its promise to improve maintenance, reusability, and modifiability of software. With the recent growth of the Internet, there has been an increased need to use object oriented programming in a distributed environment. The distributed object technologies DCOM, CORBA, and Java RMI have become useful tools in creating distributed applications with relative ease. A common feature of these technologies is the notion of location transparency, an abstraction that lets a programmer call methods on an object without knowing where that object actually resides. An advantage of this feature is that programmers can continue to program within the context of a familiar model. Using distributed object technologies leads to the natural extension of using them from corporation-to-corporation and corporation-to-customer. However, handling of these protocols by commercial firewall proxies has not been developed prior to this effort. Prototyping and investigation into handling these emerging distributed object technologies have given us the opportunity to provide input to standards to modify specifications and/or code for increased firewall interoperation. The OMG CORBA 3 Firewall Specification is an example of NAI Labs efforts to facilitate interaction of distributed object technologies, in particular CORBA IIOP with firewall technologies [1]. Protected Enclave IIOP Client IIOP Server RMI Client MPOG RMI Server DCOM Client Firewall DCOM Server Figure 1: MPOG Message Routing 1

3 2. Routing for Distributed Object Messaging Distributed object technologies typically assume the existence of a direct communication channel between the client and the server. Routers and firewalls, which may be intermediaries, have not in general been addressed in the protocol designs. Once a firewall proxy intercepts a message, it can be difficult to determine how to forward the message. A firewall can operate in a transparent mode where it masquerades as the internal server and thus enables clients to specify the server as the communication endpoint even though the firewall is an intermediary. This approach allows TCP/IP protocol data to provide the forwarding information that is not present in the message. However, this approach may be unsatisfactory, since it allows outside hosts to successfully address traffic to inside hosts, which is sometimes undesirable. If direct addressing is disallowed, then the transparent forwarding approach is disabled [2]. The CORBA 3 Firewall Specification specifies a method for hiding internal IP addresses from external clients, however, this has not been implemented by any CORBA vendors to date, and is not available for Java RMI or DCOM [1]. Figure 1 shows a message routing diagram for the distributed object technologies used by the MPOG. The approach taken for the MPOG project was to assume that direct routing is allowable and to utilize the firewall s transparent feature. However, facilities in the MPOG are available to route based on the CORBA, Java RMI, or DCOM interface requested. This feature may be useful when direct addressing is not allowed. Using the route by interface approach may be problematic where multiple servers support the same interface behind a firewall, or where it is desired to have flexibility in the choice of a server without changing the proxy s policy. The CORBA 3 Firewall Specification also has this limitation since it specifies a well-known port for CORBA servers. Using a well-known port or ports will limit the amount of CORBA servers per host. 3. Security Issues for Distributed Object Messaging 3.1 Security Protocol Handlers The MPOG determines the expected security protocol of the incoming distributed object messaging based on the incoming port destination. Failure to establish a security association with the expected security protocol causes immediate termination of the connection from the outside client. Currently two protocol handlers are developed in MPOG: the Secure Socket Layer (SSL) handler and the non-secure handler. The non-secure handler uses an unencrypted communication channel created by TCP/IP socket. The non-secure handler may be used in the corporate-to-corporate environment where encryption of messaging and authentication of users may not be necessary. The non-secure handler may be used with other security measures available in the MPOG to determine the trust rating and domain (OO-DTE domain, see next paragraph) of a client based on the IP address of the source. The IP address may be useful as the sole attribute from the client connection for access control determination when Virtual Private Networks (VPNs) are utilized between client and servers. The MPOG SSL protocol handler acts as the endpoint of an incoming SSL session by performing an SSL handshake during which the client authenticates to the MPOG which operates as a server. The purpose of the SSL handshaking phase is to negotiate the supported cryptographic parameters between the client and server [2]. Following the cryptographic selection, compression and cipher suites are negotiated. Next, the server sends a certificate according to the cipher suite s key exchange algorithm (the MPOG utilizes X.509 certificates). The client then authenticates itself to the MPOG using the appropriate client 2

4 certificate. Assuming the client s certificate is signed by a trusted certificate authority (CA), communications proceed using established session keys for encryption of the traffic between the client and the MPOG. The attributes associated with the client side X.509 certificate are utilized for assigning the client to an Object Oriented Domain Type Enforcement (OO-DTE [3]) domain. Once the client is authorized for a given method call or a given method call on a given object the MPOG creates a connection to the distributed object server. The server side authentication is similar to that of the client side authentication. The server side protocol handler in the MPOG can be separated from the client side protocol handler by associating the requested interface with a security protocol. 3.2 Access Control The MPOG access control mechanism has been developed in a manner that decouples the access control decision from the distributed object message handling. This was accomplished using the JavaBean constrained property mechanism to develop an access control JavaBean. The access control JavaBean is passed the security context, which may include the attributes associated with the security protocol of the connection and information on the requested object. Based on the security context, the authorization decision is made by the installed JavaBean, which currently performs authorization using Trust Management Language (TMEL [2]), Domain Specification Language (DSPEL [2]), and OO-DTE [5,6]. The separation of components allows experimentation with other access control mechanisms, and also allows the current access control mechanism to be easily experimented with in other projects. 3.3 Domain Derivation OO-DTE domain derivation is based on the security mechanism/attribute/value trio. An attribute may be an X.509 certificate field, an IP address, or a hostname. The language can also be extended to support other security mechanisms as they become available. During the initialization and policy updates of the MPOG a file in the DSPEL is processed. The DSPEL allows security mechanism/attribute/value rules to be logical ands, ors and nots. The first matching rule for a domain places the client connection, or user making that connection, to the MPOG in the corresponding domain name 3.4 Trust Management Although domain derivation described in the previous section associates a domain with the incoming connection, all user or incoming connections associated with a domain may not be trusted at the same level. TMEL can be used to specify the trust level of all credentials issued by a particular authority, e.g. all X.509 certificates issued by a certain CA should be trusted at a certain level. There is a specified minimum trust rating that all attributes of a credential must meet in order for the credential, as a whole, to be considered trustworthy. For example, all certificate attribute values (i.e., issuer_name, subject_name, key bit length, etc.) must have a trust rating greater or equal to the minimum trust rating in order to consider the certificate as a whole to be trustworthy [2]. If any of the attributes have a trust rating below the minimum, then access is disallowed. 3.5 Per-Object Access Control The OO-DTE plug-in utilized in the MPOG makes access decisions for an incoming distributed object call after the domain is derived and the trust rating is determined. The incoming distributed object call specifies an operation, interface, and possibly an object name. The per-object access control relies on assigning unique identifiers (object names) to objects. A mechanism for defining per-object access for CORBA requests has been developed using CORBA interceptors. Using the operation, interface, and if 3

5 specified, the object name, a type can be derived using DTEL++ policy files. The DTEL++ policy files can be generated for CORBA, by utilizing a DTEL++ compiler on modified CORBA IDL files containing type information. Currently, DTEL++ compilers are not available for Java RMI or DCOM, however, there are plans to extend the DTEL++ compiler to other distributed object technologies. The DTEL++ policy files are currently hand crafted for Java RMI; this approach may be utilized for DCOM handling. The files either generated by the compiler or by hand contain: 1) tables that bind to methods and 2) domain definitions that are described in terms of the types that can be invoked and implemented [4]. Types that can be invoked may be called by Java RMI, CORBA IIOP, or DCOM clients. The types that can be implemented allow Java RMI, CORBA IIOP or DCOM servers to support clients of these calls. If the server or client does not have the appropriate rights to implement or invoke the object, the access is denied. 4. MPOG Message Handling 4.1 IIOP Handling The CORBA IIOP was introduced by the OMG to provide ORB interoperability. Prior to the IIOP specification, ORB vendors used transports that did not interoperate with other ORB vendor s transports, since this was not stated in the specifications. Today, many CORBA ORB vendors support their legacy transport and IIOP for interoperation with other vendor s ORBS. The General Inter-ORB Protocol (GIOP) specification describes a standard transfer syntax (low-level data representation) and set of message formats for communications between ORBs. The IIOP specification describes the exchange of GIOP messages over a TCP/IP connection. There are seven GIOP message types that must be handled by the MPOG IIOP handler: Request, Reply, CancelRequest, LocateRequest, CloseConnection, Fragment, and MessageError. Of special interest to the MPOG is the request header in the request message from the client to the server. The request header contains a request id, object key, and operation name ORB Compatibility CORBA utilizes an object reference for interoperability between multi-vendor ORBS. The Interoperable Object Reference (IOR) is the data structure that contains this information. The object key is an opaque value that is a member of the IOR data structure. The client passes the object key to the CORBA server, which must map the object key unambiguously onto a corresponding object. The object key may contain an interface name, a server hostname, and an object name. Currently, the MPOG has been tested with the Inprise Visibroker ORB and the Iona Orbix ORB. The handling of the object key is the main area where testing of ORB compatibility with the MPOG is necessary, since there are no standardized fields and it is vendor specific. SSL authenticated IIOP connections are another area in which ORB compatibility testing with the MPOG is necessary. The MPOG has been tested with SSL authenticated IIOP connecting clients from both the Inprise Visibroker ORB and the Iona Orbix ORB. Due to incompatibilities with SSL Reference 3.0, the Iona Orbix ORB is incompatible with the MPOGs SSL IIOP handling. The MPOG supports IIOP versions 1.0 and Role-Based Access Control Role-Based Access Control (RBAC) decisions are based on the roles that individual users take on as part of an organization. A role specifies a set of transactions that the user can perform within the context of an organization. RBAC mechanisms have been integrated into the MPOG using a Role-Based plug-in. The Role-Based plug-in makes a decision on the authority of a user to utilize a certain role based on credentials of the user. The specified role is determined by the service context field in the IIOP request, if 4

6 a requested role is not specified as in the RMI and DCOM case, the default role for a given credential is utilized. The GIOP request and reply headers contain a Service Context List, which is utilized by ORBs to pass service data from a client to a server. A CORBA interceptor is utilized to add the role information to the service context in the IIOP messages. The OO-DTE plug-in uses the requested role as a parameter in its access decisions. Client Host Firewall Server Host Pentium 133 Mhz with 32 MB RAM Sun Ultra M H Z with 64 MB RAM Pentium 166 Mhz with 64 MB RAM Figure 2: Performance Test Performance Comparisons An Inprise Visibroker 3.0 ORB was utilized to create a CORBA client and server test application. The test application was modified to include the OO-DTE interceptors and the Visibroker SSL package was utilized for all client and server communications. The performance on an operation per CORBA interface basis was measured from the start of the request until the reply was received. In order to evaluate the overhead associated with the MPOG, the MPOG was compared against the performance characteristics of the Gauntlet plug proxy using the hardware described in Figure 2. A large amount of the MPOG proxy overhead can be attributed to establishment of another SSL connection between the MPOG and the CORBA application server. For very lightweight operation calls a comparison of SSL to Non- SSL CORBA server application calls results in a nearly 100% performance decrease. For the above scenario, the comparison of the MPOG proxy attributed to a 155% decrease in performance for very lightweight CORBA operation calls. It should be noted that as the processing time of the CORBA server operation calls increased this performance hit was greatly reduced. For CORBA server operations requiring 100 seconds of server processing time the performance reduction was only 22% [5]. 5

7 Server Host Registry 2 Lookup request RMI Client 3 Remote Object 1 Bind Remote Object to string 4 RMI Streams RMI Server Figure 3: Standard Java RMI Messaging 4.2 RMI Handling The RMI wire transport protocol [6] uses both a direct TCP/IP socket and HTTP for transport. The RMI transport layer normally attempts to open direct sockets to hosts on the Internet. On failure, the RMI call data is sent using HTTP either to a proxy server or the server depending on the setup. The HTTP transport allows RMI through proxies, but calls using HTTP are at least an order of magnitude slower than those sent direct over a socket. The HTTP transport doesn t provide any added security, also the HTTP approach only bypasses the firewall, and doesn t perform an authorization decision. The MPOG handles the direct socket attempt by the client, since handling of HTTP transport would not provide any advantage over the primary transport handling for RMI. Object Serialization is a Java specific term, which is used to describe the formatting of Java primitives and objects into streams of bytes. The RMI data over either a direct socket or HTTP uses Object Serialization as the data format. The primary RMI wire transport protocol is represented by a stream, which can be either in or out. Both the in and out stream contain headers which contain protocol information along with data formatted using Object Serialization [7]. To distinguish one remote method call from another, RMI uses an Object Identifier in the stream along with an operation number. The Object Identifier is a unique identifier for the remote object being called, it is composed of an address space identifier that is unique with respect to a specific host, and an object number. The Object Identifier, operation number, and the port/hostname of the server must be available in order to perform access control and routing of Object Serialized RMI messages. The RMI Transport layer creates a representation of the connection to the remote neighbor, which is called a live reference. The live reference class contains the host name and port number information. 6

8 Since the Object Identifier is dynamically assigned from the Java Virtual Machine (JVM), the MPOG policy must be continuously updated as RMI servers (or remote objects) enter and leave. Policies based on RMI interfaces and its associated operation names can be static since the string names are static, but the mapping based on Object Identifiers must be dynamic. Generally RMI clients locate servers using the RMI Registry. The RMI server registers the Remote Server Objects via the method call bind() of the Naming class. The Registry process runs on the same host as the RMI Server, and RMI clients connect to the registry directly using a known port and hostname. Figure 3 describes the current passageways of Java RMI traffic from registering of the server to client look up, and followed by client invocation, and setup of the Object Streams between the client and server. Firewall 4 RMI Streams MPOG RMI Client 2 Update Policy 3 Lookup request 5 RMI Streams MPOG Registry 1 Registration of remote objects with object identifiers, ports, host and operation numbers Server Host RMI Server Figure 4: Modified Java RMI Messaging The Java RMI Registry lookup model is unacceptable for protection of RMI servers behind a firewall. The Java RMI Registry model would require clients to directly connect to the server host and would not give the MPOG an opportunity to obtain the Object Identifiers. Our solution to this problem is to replace the standard Java RMI Registry with a new type of Registry on the firewall that can be used to locate 7

9 remote objects behind the firewall. We call this replacement registry the MPOG Registry; connections to the MPOG Registry are based on SSL authentication, since the ability to connect and look up remote object references also provides the ability to replace existing object references defined by string names with other object references. Thus, authenticated clients can potentially cause a Trojan horse threat or a denial of service attack. Future enhancements to the MPOG Registry may be made to restrict registration of an RMI server interface to principals with specific X.509 credentials. Figure 4 shows the improved RMI architecture that is more appropriate for firewall interoperation Modifications to the RMI System Several modifications have been made to the Java RMI system. The Java RMI source code had to be modified to obtain object identifiers, live reference information (port and host), operation names, and operation numbers. The above mentioned information was maintained in non-serialized classes which was, in most cases, private attributes without public methods for obtaining the data. The UnicastRemoteObject class was modified to register every Remote Object with the MPOG Registry. This is a major difference from the standard operation of the Java RMI system, where only a start up object is registered, and further remote object references can be returned by method calls. The standard RMI was unsatisfactory, as discussed previously, since all of the mappings from the Object Identifiers to the remote objects would not be defined for the MPOG. The modified UnicastRemoteObject performs a standard RMI method to the MPOG Registry. The UnicastRemoteObject constructor was modified to include two additional parameters: the MPOG host name, or IP address; and the MPOG Registry port number. The RMI client must connect directly to the MPOG Registry to locate the Remote Object reference. This information can be passed in as command line arguments to the RMI client, in order to provide added flexibility to the application Access Control on Object Stream The MPOG Registry invokes an RMI method call of the MPOG to inform it of configuration updates. Connections from clients to the specified internal ports will only be granted access to the remote object which maps to the Object Ids which are associated with that server port for the remote object. Therefore, mappings from Object Ids to remote objects are not global to the RMI Handling system of MPOG, but are defined per service port. The RMI Streams are set in response to a client request and are maintained through the duration client and server communication unless access is denied for any operation or due to invalid object stream formats. Currently, only RMI Output Streams specifying a protocol type of Stream Protocol are allowed. Two other protocols exist according to the Java RMI Specification, the Single Operation and Multiplex protocols. Remote objects do not currently appear to have access to these protocols. The Object Ids are parsed from the Object Serialization stream and compared to Object Ids of known remote objects. If a mapping is not possible a no permission exception is propagated to the client and the streams are closed. Access control decisions can be determined once the mappings to valid remote objects and operation names have been made Performance Comparisons Utilizing the same configuration as described in Figure 2, a lightweight JDK 1.2 RMI operation call was repeated 1000 times from an client external to the firewall to an internal server and the average roundtrip transaction time was compared between a Gauntlet plug proxy and a MPOG proxy. The overhead associated with RMI operations resulted in a 2500% decrease in performance when the MPOG proxy was 8

10 utilized. The inefficiencies in the JDK 1.2 RMI protocol were attributed to the substantial decrease in performance as compared when the MPOG proxy was utilized for access decision on CORBA traffic. The overhead of the RMI packet inspection was quite large, and was attributed to the RMI wire protocol being less network friendly in comparison to CORBA IIOP. CORBA IIOP packages messages into request messages from the client and reply messages from the server. Although fragmentation is possible the packets in general are segmented very efficiently. On the other hand, the RMI wire protocol sets up 2 pairs of streams, which correspond to a TCP/IP s input and output streams from the client to the server and vice versa. Once these streams are set up the Java Object serialization protocol is utilized on these connections to transfer objects. These objects may not be packaged efficiently. Also, MPOG must also search these streams in an inefficient manner, since unlike the CORBA IIOP messaging, objects can be introduced several times in the same packet. When using CORBA IIOP, it is only necessary to search the request and the reply header for object names DCOM Handling DCOM is simply a high-level network protocol designed to allow Component Object Model (COM) based components to interoperate across a network. DCOM is the network enabling glue that sits in the middle of Microsoft COM. To provide this transparent access to remote COM objects, the COM libraries have been enhanced to allow object creation on other machines. In order to be able to create a remote object, the COM libraries need to know the network name of the server. Once the server name and the Class Identifier (CLSID) are known a portion of the COM Libraries called the service control manager (SCM) on the client machine connects to the SCM on the server machine and requests creation of this object. Due to the lack of use of Microsoft DCOM in DARPA projects, actual implementation of per object access control on DCOM messaging has been postponed. However, DCOM tunneling capabilities and DCOM parsing of Remote Procedure Calls (RPCs) through MPOG has been implemented Generic Protocol Handling As mentioned earlier, the MPOG architecture is very modular and additional handlers for TCP based protocols can be easily integrated. To take advantage of the per object access control, the TCP stream must contain an object name, which can be mapped to access rights in the OO-DTE policy files. 5. Conclusions The MPOG demonstrated that a relatively lightweight firewall proxy could perform access control on distributed object programming models. The MPOG performs packet inspection at the socket level for CORBA IIOP, and also handles Java RMI and Microsoft DCOM in this fashion. As demonstrated by the performance experiments for Java RMI and CORBA IIOP, the cost of adding the MPOG proxy is dependent on the distributed object protocol s network efficiency. The performance numbers for a CORBA request (discussed in section 4.1.3) shows that as the server processing time for operations increase the addition of the MPOG in the path has a minor decrease in performance. Additionally, this project demonstrated that an application proxy server written in Java can provide reliable, platform independent code at a reasonable overhead in comparison to C or C+ code. The introduction of a run-time interpreted language as a firewall proxy is controversial, since a firewall is perceived as a network component in which optimization techniques should be utilized in coding to produce better performance. However, the introduction of just in time (JIT) compilation techniques in 9

11 Java compilers have considerably reduced the extra overhead associated with Java code. The JIT compilation techniques can limit the overhead in relation to C or C++ code to 50% to 200%. However, if added speed is desired, tools that translate Java code to native code can be utilized. These tools may provide overhead that compares more favorable to that of C or C++ code. References [1] CORBA 3 CORBA/Firewall Security + Errata Specification. OMG orbos/ Document. July 6, [2] Sigma Interoperability Results and Recommendations. NAI Report #0767. NAI Labs The Security Research Division of Network Associates. December 8, [3] Scalable Access Control for Distributed Object Systems. D. Sterne, G. Tally, D. McDonell, P. Pasturel, D. Sames, D. Sherman, E. J. Sebes, To be published in Proceedings of the 8 th Usenix Security Symposium, August [4] Scalable Access Control for Distributed Object Systems. D. Sterne, G. Tally, D. McDonell, P. Pasturel, D. Sames, D. Sherman, E. J. Sebes, To be published in Proceedings of the 8 th Usenix Security Symposium, August [5] Performance Testing of the Multi-Protocol Object Gateway. D. Sames, D. Sherman, S. Pawlish., NAI Report # NAI Labs The Security Research Division of Network Associates. February 26, [6] Java Remote Method Invocation Specification, Revision 1.4, Sun Microsystems. Feburary 10, [7] Java Object Serialization Specification, Revision 1.4.1, Sun Microsystems. October 8,

CORBA Firewall Security: Increasing the Security of CORBA Applications. Abstract

CORBA Firewall Security: Increasing the Security of CORBA Applications. Abstract CORBA Firewall Security: Increasing the Security of CORBA Applications Habtamu Abie Norwegian Computing Center P. O. Box 114 Blindern, 0314 Oslo, Norway Tel.: +47 22 85 25 95, Fax: +47 22 69 76 60 abie@nr.no,

More information

Module 17. Client-Server Software Development. Version 2 CSE IIT, Kharagpur

Module 17. Client-Server Software Development. Version 2 CSE IIT, Kharagpur Module 17 Client-Server Software Development Lesson 42 CORBA and COM/DCOM Specific Instructional Objectives At the end of this lesson the student would be able to: Explain what Common Object Request Broker

More information

Chapter 6. CORBA-based Architecture. 6.1 Introduction to CORBA 6.2 CORBA-IDL 6.3 Designing CORBA Systems 6.4 Implementing CORBA Applications

Chapter 6. CORBA-based Architecture. 6.1 Introduction to CORBA 6.2 CORBA-IDL 6.3 Designing CORBA Systems 6.4 Implementing CORBA Applications Chapter 6. CORBA-based Architecture 6.1 Introduction to CORBA 6.2 CORBA-IDL 6.3 Designing CORBA Systems 6.4 Implementing CORBA Applications 1 Chapter 6. CORBA-based Architecture Part 6.1 Introduction to

More information

Status of the CORBA Firewall Traversal RFP

Status of the CORBA Firewall Traversal RFP Status of the CORBA Traversal RFP Brian Niebuhr Network Associates - NAI Labs DOCsec2001 - Annapolis, MD Overview Problem Statement Initial Solution RFP Information Current Submission Questions Status

More information

Introduction CORBA Distributed COM. Sections 9.1 & 9.2. Corba & DCOM. John P. Daigle. Department of Computer Science Georgia State University

Introduction CORBA Distributed COM. Sections 9.1 & 9.2. Corba & DCOM. John P. Daigle. Department of Computer Science Georgia State University Sections 9.1 & 9.2 Corba & DCOM John P. Daigle Department of Computer Science Georgia State University 05.16.06 Outline 1 Introduction 2 CORBA Overview Communication Processes Naming Other Design Concerns

More information

Layering a computing infrastructure. Middleware. The new infrastructure: middleware. Spanning layer. Middleware objectives. The new infrastructure

Layering a computing infrastructure. Middleware. The new infrastructure: middleware. Spanning layer. Middleware objectives. The new infrastructure University of California at Berkeley School of Information Management and Systems Information Systems 206 Distributed Computing Applications and Infrastructure Layering a computing infrastructure Middleware

More information

SOAP - A SECURE AND RELIABLE CLIENT-SERVER COMMUNICATION FRAMEWORK. Marin Lungu, Dan Ovidiu Andrei, Lucian - Florentin Barbulescu

SOAP - A SECURE AND RELIABLE CLIENT-SERVER COMMUNICATION FRAMEWORK. Marin Lungu, Dan Ovidiu Andrei, Lucian - Florentin Barbulescu SOAP - A SECURE AND RELIABLE CLIENT-SERVER COMMUNICATION FRAMEWORK Marin Lungu, Dan Ovidiu Andrei, Lucian - Florentin Barbulescu University of Craiova, Faculty of Automation, Computers and Electronics,

More information

Introduction to CORBA. 1. Introduction 2. Distributed Systems: Notions 3. Middleware 4. CORBA Architecture

Introduction to CORBA. 1. Introduction 2. Distributed Systems: Notions 3. Middleware 4. CORBA Architecture Introduction to CORBA 1. Introduction 2. Distributed Systems: Notions 3. Middleware 4. CORBA Architecture 1. Introduction CORBA is defined by the OMG The OMG: -Founded in 1989 by eight companies as a non-profit

More information

7.1. Remote Access Connection

7.1. Remote Access Connection 7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to

More information

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation

More information

Middleware Lou Somers

Middleware Lou Somers Middleware Lou Somers April 18, 2002 1 Contents Overview Definition, goals, requirements Four categories of middleware Transactional, message oriented, procedural, object Middleware examples XML-RPC, SOAP,

More information

Proxy Server, Network Address Translator, Firewall. Proxy Server

Proxy Server, Network Address Translator, Firewall. Proxy Server Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as

More information

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Fig. 4.2.1: Packet Filtering

Fig. 4.2.1: Packet Filtering 4.2 Types of Firewalls /DKo98/ FIREWALL CHARACTERISTICS 1. All traffic from inside to outside, and vice versa, must pass through the firewall. This is achieved by physically blocking all access to the

More information

Virtual Private Networks

Virtual Private Networks Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication

More information

Security Service Specification 15

Security Service Specification 15 Security Service Specification 15 [1] This chapter incorporates material that was adopted in three separate specifications related to security: CORBA Security Rev 1.1 (formal/97-12-22) Common Secure Interoperability

More information

Case Study for Layer 3 Authentication and Encryption

Case Study for Layer 3 Authentication and Encryption CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client

More information

21.4 Network Address Translation (NAT) 21.4.1 NAT concept

21.4 Network Address Translation (NAT) 21.4.1 NAT concept 21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially

More information

z/os Firewall Technology Overview

z/os Firewall Technology Overview z/os Firewall Technology Overview Mary Sweat E - Mail: sweatm@us.ibm.com Washington System Center OS/390 Firewall/VPN 1 Firewall Technologies Tools Included with the OS/390 Security Server Configuration

More information

Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords

Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Author: Paul Seymer CMSC498a Contents 1 Background... 2 1.1 HTTP 1.0/1.1... 2 1.2 Password

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human

More information

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc. Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet

More information

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc. Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component

More information

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1 Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches

More information

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Report of the case study in Sistemi Distribuiti A simple Java RMI application

Report of the case study in Sistemi Distribuiti A simple Java RMI application Report of the case study in Sistemi Distribuiti A simple Java RMI application Academic year 2012/13 Vessio Gennaro Marzulli Giovanni Abstract In the ambit of distributed systems a key-role is played by

More information

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall? What is a Firewall? Computer Security Firewalls fire wall 1 : a wall constructed to prevent the spread of fire 2 usually firewall : a computer or computer software that prevents unauthorized access to

More information

12. Firewalls Content

12. Firewalls Content Content 1 / 17 12.1 Definition 12.2 Packet Filtering & Proxy Servers 12.3 Architectures - Dual-Homed Host Firewall 12.4 Architectures - Screened Host Firewall 12.5 Architectures - Screened Subnet Firewall

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

Steelcape Product Overview and Functional Description

Steelcape Product Overview and Functional Description Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session

More information

ISM/ISC Middleware Module

ISM/ISC Middleware Module ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

OS/390 Firewall Technology Overview

OS/390 Firewall Technology Overview OS/390 Firewall Technology Overview Washington System Center Mary Sweat E - Mail: sweatm@us.ibm.com Agenda Basic Firewall strategies and design Hardware requirements Software requirements Components of

More information

Network Defense Tools

Network Defense Tools Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds ravikantvanjara@gmail.com What is Firewall? A firewall

More information

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY) E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system

More information

Introduction to Web Services

Introduction to Web Services Department of Computer Science Imperial College London CERN School of Computing (icsc), 2005 Geneva, Switzerland 1 Fundamental Concepts Architectures & escience example 2 Distributed Computing Technologies

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

A Framework for Virtual Enterprise Support Services

A Framework for Virtual Enterprise Support Services A Framework for Virtual Enterprise Support Services Vaggelis Ouzounis, Volker Tschammer ECCO Electronic Commerce Center of Competence, GMD-Fokus, Kaiserin-Augusta-Allee 31, D-10589, Berlin, Germany Tel:

More information

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)

More information

VLANs. Application Note

VLANs. Application Note VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static

More information

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts

More information

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall Page 1 of 6 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular

More information

Network Address Translation (NAT)

Network Address Translation (NAT) Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT. Taken from http://www.cs.virginia.edu/~itlab/ book/slides/module17-nat.ppt 1 Private Network Private IP network

More information

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN 1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10

More information

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall Page 1 of 9 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular

More information

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..

More information

Application of Java and CORBA to Distributed Control and Monitoring Applications in the PHENIX Online Control System

Application of Java and CORBA to Distributed Control and Monitoring Applications in the PHENIX Online Control System Application of Java and CORBA to Distributed Control and Monitoring Applications in the PHENIX Online Control System E. Desmond 1, S. Adler 1, Lars Ewell 1, J. Haggerty 1, Hyon Joo Kehayias 1, S. Pate

More information

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not

More information

Pre-lab and In-class Laboratory Exercise 10 (L10)

Pre-lab and In-class Laboratory Exercise 10 (L10) ECE/CS 4984: Wireless Networks and Mobile Systems Pre-lab and In-class Laboratory Exercise 10 (L10) Part I Objectives and Lab Materials Objective The objectives of this lab are to: Familiarize students

More information

Elements of Advanced Java Programming

Elements of Advanced Java Programming Appendix A Elements of Advanced Java Programming Objectives At the end of this appendix, you should be able to: Understand two-tier and three-tier architectures for distributed computing Understand the

More information

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

What is Firewall? A system designed to prevent unauthorized access to or from a private network. What is Firewall? A system designed to prevent unauthorized access to or from a private network. What is Firewall? (cont d) Firewall is a set of related programs, located at a network gateway server. Firewalls

More information

PERFORMANCE COMPARISON OF COMMON OBJECT REQUEST BROKER ARCHITECTURE(CORBA) VS JAVA MESSAGING SERVICE(JMS) BY TEAM SCALABLE

PERFORMANCE COMPARISON OF COMMON OBJECT REQUEST BROKER ARCHITECTURE(CORBA) VS JAVA MESSAGING SERVICE(JMS) BY TEAM SCALABLE PERFORMANCE COMPARISON OF COMMON OBJECT REQUEST BROKER ARCHITECTURE(CORBA) VS JAVA MESSAGING SERVICE(JMS) BY TEAM SCALABLE TIGRAN HAKOBYAN SUJAL PATEL VANDANA MURALI INTRODUCTION Common Object Request

More information

Intro to Firewalls. Summary

Intro to Firewalls. Summary Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer

More information

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004 SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004 Introduction: A computer firewall protects computer networks from unwanted intrusions which could compromise confidentiality

More information

Cisco AnyConnect Secure Mobility Solution Guide

Cisco AnyConnect Secure Mobility Solution Guide Cisco AnyConnect Secure Mobility Solution Guide This document contains the following information: Cisco AnyConnect Secure Mobility Overview, page 1 Understanding How AnyConnect Secure Mobility Works, page

More information

Cleaning Encrypted Traffic

Cleaning Encrypted Traffic Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation

More information

Executive Summary and Purpose

Executive Summary and Purpose ver,1.0 Hardening and Securing Opengear Devices Copyright Opengear Inc. 2013. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

Using Entrust certificates with VPN

Using Entrust certificates with VPN Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information

In this chapter, we will introduce works related to our research. First, we will

In this chapter, we will introduce works related to our research. First, we will Chapter 2 Related Works In this chapter, we will introduce works related to our research. First, we will present the basic concept of directory service and Lightweight Directory Access Protocol (LDAP).

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Middleware. Chapter 8: Middleware

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Middleware. Chapter 8: Middleware Middleware 1 Middleware Lehrstuhl für Informatik 4 Middleware: Realisation of distributed accesses by suitable software infrastructure Hiding the complexity of the distributed system from the programmer

More information

Installation and configuration guide

Installation and configuration guide Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For

More information

What is Middleware? Software that functions as a conversion or translation layer. It is also a consolidator and integrator.

What is Middleware? Software that functions as a conversion or translation layer. It is also a consolidator and integrator. What is Middleware? Application Application Middleware Middleware Operating System Operating System Software that functions as a conversion or translation layer. It is also a consolidator and integrator.

More information

Detailed Table of Contents

Detailed Table of Contents Detailed Table of Contents Foreword Preface 1. Networking Protocols and OSI Model 1 1.1 Protocols in Computer Communications 3 1.2 The OSI Model 7 1.3 OSI Layer Functions 11 Summary 19 Key Terms and Concepts

More information

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002 INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane SE 4C03 Winter 2005 Firewall Design Principles By: Kirk Crane Firewall Design Principles By: Kirk Crane 9810533 Introduction Every network has a security policy that will specify what traffic is allowed

More information

Application Note. Onsight Connect Network Requirements v6.3

Application Note. Onsight Connect Network Requirements v6.3 Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...

More information

OS/390 Firewall Technology Overview

OS/390 Firewall Technology Overview OS/390 Firewall Technology Overview Mary Sweat E - Mail: sweatm@us.ibm.com Washington System Center OS/390 Firewall/VPN 1 Agenda OS/390 Firewall OS/390 Firewall Features Hardware requirements Software

More information

Overview of CORBA 11.1 I NTRODUCTION TO CORBA. 11.4 Object services 11.5 New features in CORBA 3.0 11.6 Summary

Overview of CORBA 11.1 I NTRODUCTION TO CORBA. 11.4 Object services 11.5 New features in CORBA 3.0 11.6 Summary C H A P T E R 1 1 Overview of CORBA 11.1 Introduction to CORBA 11.2 CORBA architecture 11.3 Client and object implementations 11.4 Object services 11.5 New features in CORBA 3.0 11.6 Summary In previous

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

athenahealth Interface Connectivity SSH Implementation Guide

athenahealth Interface Connectivity SSH Implementation Guide athenahealth Interface Connectivity SSH Implementation Guide 1. OVERVIEW... 2 2. INTERFACE LOGICAL SCHEMATIC... 3 3. INTERFACE PHYSICAL SCHEMATIC... 4 4. SECURE SHELL... 5 5. NETWORK CONFIGURATION... 6

More information

ΕΠΛ 674: Εργαστήριο 5 Firewalls

ΕΠΛ 674: Εργαστήριο 5 Firewalls ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized

More information

Infrastructure that supports (distributed) componentbased application development

Infrastructure that supports (distributed) componentbased application development Middleware Technologies 1 What is Middleware? Infrastructure that supports (distributed) componentbased application development a.k.a. distributed component platforms mechanisms to enable component communication

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere White Paper 7KH#&KDOOHQJH Virtual Private Networks (VPNs) provides a powerful means of protecting the privacy and integrity

More information

Lecture 23: Firewalls

Lecture 23: Firewalls Lecture 23: Firewalls Introduce several types of firewalls Discuss their advantages and disadvantages Compare their performances Demonstrate their applications C. Ding -- COMP581 -- L23 What is a Digital

More information

Networking Security IP packet security

Networking Security IP packet security Networking Security IP packet security Networking Security IP packet security Copyright International Business Machines Corporation 1998,2000. All rights reserved. US Government Users Restricted Rights

More information

A Web-Based Real-Time Traffic Monitoring Scheme Using CORBA

A Web-Based Real-Time Traffic Monitoring Scheme Using CORBA A Web-Based Real-Time Traffic Monitoring Scheme Using CORBA Yuming Jiang, Chen-Khong Tham, Chi-Chung Ko Department of Electrical Engineering, National University of Singapore, 10 Kent Ridge Crescent, Singapore

More information

Security threats and network. Software firewall. Hardware firewall. Firewalls

Security threats and network. Software firewall. Hardware firewall. Firewalls Security threats and network As we have already discussed, many serious security threats come from the networks; Firewalls The firewalls implement hardware or software solutions based on the control of

More information

S y s t e m A r c h i t e c t u r e

S y s t e m A r c h i t e c t u r e S y s t e m A r c h i t e c t u r e V e r s i o n 5. 0 Page 1 Enterprise etime automates and streamlines the management, collection, and distribution of employee hours, and eliminates the use of manual

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

JAVA 2 Network Security

JAVA 2 Network Security JAVA 2 Network Security M A R C O PISTOIA DUANE F. RELLER DEEPAK GUPTA MILIND NAGNUR ASHOK K. RAMANI PTR, UPPER http://www.phptr.com PRENTICE HALL SADDLE RIVER, NEW JERSEY 07458 Contents Foreword Preface

More information

Enabling SSL and Client Certificates on the SAP J2EE Engine

Enabling SSL and Client Certificates on the SAP J2EE Engine Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine

More information

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Overview... 3 Installing Bridgit Software... 4 Installing Bridgit Software Services... 4 Creating a Server Cluster... 4 Using

More information

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with

More information

Sun Microsystems Inc. Java Transaction Service (JTS)

Sun Microsystems Inc. Java Transaction Service (JTS) Sun Microsystems Inc. Java Transaction Service (JTS) This is a draft specification for Java Transaction Service (JTS). JTS specifies the implementation of a transaction manager which supports the JTA specification

More information

TESTING & INTEGRATION GROUP SOLUTION GUIDE

TESTING & INTEGRATION GROUP SOLUTION GUIDE TESTING & INTEGRATION GROUP SOLUTION GUIDE AppDirecor optimizing the delivery of VMware View 4.5 Contents INTRODUCTION... 2 RADWARE APPDIRECTOR... 2 VMWARE VIEW... 2 RADWARE APPDIRECTOR AND VMWARE VIEW

More information

Chapter 4. Architecture. Table of Contents. J2EE Technology Application Servers. Application Models

Chapter 4. Architecture. Table of Contents. J2EE Technology Application Servers. Application Models Table of Contents J2EE Technology Application Servers... 1 ArchitecturalOverview...2 Server Process Interactions... 4 JDBC Support and Connection Pooling... 4 CMPSupport...5 JMSSupport...6 CORBA ORB Support...

More information

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

CS 356 Lecture 27 Internet Security Protocols. Spring 2013 CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls CEN 448 Security and Internet Protocols Chapter 20 Firewalls Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University mdahshan@ccis.ksu.edu.sa

More information

Securing EtherNet/IP Using DPI Firewall Technology

Securing EtherNet/IP Using DPI Firewall Technology Securing EtherNet/IP Using DPI Firewall Technology www.odva.org Technical Track About Us Erik Schweigert Leads device firmware development at Tofino Security BSc in Computer Science from VIU Michael Thomas

More information

Measurement of the Usage of Several Secure Internet Protocols from Internet Traces

Measurement of the Usage of Several Secure Internet Protocols from Internet Traces Measurement of the Usage of Several Secure Internet Protocols from Internet Traces Yunfeng Fei, John Jones, Kyriakos Lakkas, Yuhong Zheng Abstract: In recent years many common applications have been modified

More information

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity Secure Remote Monitoring of the Critical System Infrastructure An Application Note from the Experts in Business-Critical Continuity TABLE OF CONTENTS Introduction................................................2

More information

Firewall Design Principles

Firewall Design Principles Firewall Design Principles Software Engineering 4C03 Dr. Krishnan Stephen Woodall, April 6 th, 2004 Firewall Design Principles Stephen Woodall Introduction A network security domain is a contiguous region

More information