Network Design and Implementation of Proxies
|
|
|
- Tracey Joleen Horton
- 5 years ago
- Views:
Transcription
1 Advanced Security Proxies: An Architecture and Implementation for High- Performance Network Firewalls Roger Knobbe, Andrew Purtell, Stephen Schwab {rknobbe, apurtell, TIS Labs at Network Associates 3415 S. Sepulveda Blvd., Suite 700 Los Angeles, CA Abstract -- The TIS Labs Advanced Security Proxies (ASP) project is investigating software architectures for highperformance firewalls to enable the secure use of next generation networks. The project objective is to demonstrate an architecture and implementation in which protocol-specific proxies control when data transmission is allowed across the firewall, but which allows the proxy a range of options in determining how that data transits the firewall. By employing proxies that selectively use a range of lower-level protocol stack features, this novel architecture provides higher performance and greater flexibility in determining exactly what information the proxies examine. These decisions are made at the granularity of each proxied connection. We describe the firewall design and implementation and report preliminary experimental results using Fast Ethernet. I. INTRODUCTION The Advanced Security Proxies (ASP) project at TIS Labs is experimenting with novel firewall architectures and implementations suitable for use in high-performance network environments. Firewall implementations have traditionally been classified as either packet filtering firewalls, in which individual packets are examined and permitted or denied according to policy, or proxy firewalls. In a proxy firewall, the client or process initiating the connection contacts an intermediary, known as a proxy, running on the firewall. After establishing a connection with the proxy, and some additional authentication is performed between the client and the proxy, a second connection is established from the proxy to the server or other remote process listening for a network connection request. Thereafter, the client and server both carry on their normal activities, including sending and receiving application-level protocol messages. However, the messages are relayed through the proxy firewall, which performs all lower-level / protocol handling, and delivers the data to the application proxy. The application proxy checks the message, to prevent illegal activity or possible attack, and then forwards the message, once again requiring the firewall to perform all the / processing involved in transmitting data. While proxies allow for the implementation of high assurance firewalls, they have often required that all data flow up and down the protocol stacks, even though much of the data was simply being copied from one side of the firewall to the other side. As network speeds have increased, protocol stacks on general purpose operating systems have not been sufficiently fast to keep pace. As a result, proxy firewalls had become speed bumps on the network. One way of mitigating these performance limitations has been to direct some classes of network traffic through packet filtering software on the firewall hosts. Under proxy control, the packet filters can be programmed to permit packets belonging to approved connections to pass through the firewall. At the completion of a proxied connection, the packet filter rules are dynamically removed, plugging the hole that is temporarily opened to carry the traffic. In order to support higher speed network technologies with proxy firewalls, we are studying a variety of methods by which a proxy can control the lower-layers of the network hardware or software in order to optimize the flow of data across the firewall. Our research objective is to demonstrate an approach that can keep pace with increasing network speeds without resorting to expensive, overly specialized custom hardware solutions. Our current implementation goal is focused on reaching OC- 12 ATM speeds of 622 Mbits/second, which represent a significantly higher performance network than is usually protected using a proxy firewall. Our initial implementation work has utilized 100 Mbit/s FastEthernet, with OC-12 ATM experimentation on the roadmap. The rest of this paper continues with an overview of the architecture of the ASP firewall. This is followed by sections describing the implementation of the firewall using the Scout operating system, and experimental measurements reporting on the performance of the current prototype. The paper concludes with a review of related work, an outline of our future work and conclusions. This work was sponsored by the Defense Advanced Research Projects Agency and the Department of Defense and managed by USAF Rome Laboratory under contract number F C-0336.
2 II. ARCHITECTURE The ASP firewall architecture is designed to provide multiple fast datapaths across the firewall between the protected and unprotected networks. These network services, accessed through well-defined interfaces, are utilized by ASP firewall proxies to accelerate the traffic transiting the network boundary. Because each proxy retains full control over when traffic is switched to a fast datapath, security functions can be applied to the specific application protocol messages that must be inspected and checked against the security policy enforced by the proxy. For example, an FTP proxy might check that each FTP command including a file pathname uses a bounded length to prevent a buffer overrun attack. In contrast, network traffic which is not subject to examination by the proxy may be directed over a fast datapath, reducing the delay experienced by each individual packet, and reducing the overall load on the firewall host system. For connections, this will often allow greater throughput, while the firewall as a whole will expend more of its computational resources on performing useful proxy activity rather than just copying data bytes from one network protocol stack endpoint to another endpoint. The architecture envisions multiple fast datapaths, corresponding to distinct implementation layers and degree of processing of network traffic. In an ATM environment, cells on switched virtual circuits (SVCs) might be the unit of traffic to be forwarded by the network plumbing. In more general environments, the datagram, with or without defragmentation support, can be forwarded. A connection forwarder would deliver connection establishment and termination notifications to a proxy while immediately forwarding packets on an established connection. Finally, the approach is not limited to connection-oriented traffic. Other classes of traffic including UDP based multimedia protocols or media level signaling protocols (such as ATM UNI or ILMI) can also be handled within this framework. For a number of reasons, the ASP firewall prototype described below is a software-only implementation of the architecture. In addition, we have focused exclusively on -oriented connection traffic and -based fast datapaths as the former are the most widely deployed proxy firewalls, and the latter are the most generically supported WAN networks. However, the architecture itself is applicable to a wider range of network technologies and hardware implementations. After describing our implementation and experiments, utilizing the Scout extensible operating system, we also identify requirements for hardware support for the architecture in future work. III. IMPLEMENTATION Two separate fast datapath facilities have been implemented in the prototype ASP firewall. Known as CUT and NETTAP, both implementations are designed to accelerate the handling of packets traversing the firewall. The difference between the two is that CUT is designed to carry traffic belonging to a connection that has not been established prior to the proxy issuing commands to CUT, while NETTAP is designed to handle traffic belonging to a previously extant connection. In particular NETTAP can switch traffic from the currently proxied connection onto the fast datapath. To evaluate the performance of the firewall acceleration facilities, FTP and HTTP proxies have been implemented that utilize CUT and NETTAP respectively. Both proxies and fast datapath mechanisms have been implemented in the Scout extensible operating system. A. Scout Operating System The Scout O.S. [1], developed at the University of Arizona, is a modular O.S. directed toward communication-oriented applications. These included thin-client Java stations, file- and web-servers, QoS routers and firewalls. The key abstraction of Scout is the path, which replaces the process as the execution-time entity created to service a user request. Unlike a process, a path is explicitly tied to one or more I/O devices. Its purpose is to handle incoming messages across the set of composable modules that comprise the path. The Scout infrastructure provides general facilities for manipulating messages; scheduling threads associated with each path; creating, managing and destroying paths; and demultiplexing messages from an input device to a path capable of processing it. Paths are composed of sequences of modules (confusingly called routers by the Scout developers) that process messages as they traverse the path. Many of the modules are designed to process one layer of a network protocol stack, and there are modules for,, ARP and Ethernet devices (), as well as specific network devices. A Scout kernel is configured by specifying all the modules that will be present in the system, and the router (module) graph indicating which modules have connecting edges. Each module has a number of interfaces, drawn from a small number of types defined by the Scout infrastructure. Interfaces may only be connected to each other if the are of the same type, reducing, though not eliminating, configuration errors. The workhorse type in the system is NET, corresponding to an abstract network interface over which a message between two layers in a protocol stack may be passed. The usual convention for naming protocol stack interfaces is to refer to them by orientation such as UP or DOWN. Thus the module s DOWN:NET interface
3 is connected to the module s UP:NET interface in an ordinary protocol stack. Fig. 1 illustrates a firewall configuration with two protocol stacks. At boot time, each router is initialized, with addresses or routing entries. The Proxy calls pathcreate creating a path from the Proxy to. This passive path waits for a connection request. A software demultiplexing mechanism delivers each incoming packet to the path responsible for processing it. Demultiplexing is accomplished using a distributed approach in which each module attempts to match the fields in its own network layer with one or more possible paths. In the case of, if no established connection exists, the demultiplexing search would first match the incoming packet s address with the local host, then the packet type () and port number with the passive path previously created. In response to the connection request, pathcreate is called to construct an active path. Each module along the path initializes perstage state used by that module in processing packets. control block variables specifying sequence and acknowledgement numbers are stored here, along with congestion control windows and retransmission timers. After the connection closes, a pathdestroy operation frees the stages associated with each module, and also removes the demultiplexing entries for that path. B. Optimized Firewall Datapaths Following earlier proxy firewall optimization work, we implemented a pair of identical / protocol stacks with one or two modules at the top, inspecting and shuttling application messages from one side of the network to the other. Without any datapath optimization modules, the system performs all the protocol stack processing associated with any other proxy firewall. However, since Scout is a single address space system, data is passed via reference wherever possible. The message handling library takes care to avoid extra byte Proxy Path Command Path Optimized Path F ARP CUT PROXY Fig. 1. Configuration of ASP Firewall with CUT ARP copying as headers are removed during input processing and latter added during output processing. The modules described below provide fast forwarding datapaths. CUT, illustrated in Fig. 1, provides an optimized datapath by connecting via its DOWN interface to two different modules. In addition, a command interface is provided and used by the FTP proxy to enable the flow of packets over the fast path. CUT connects to at the same point where a module would connect. An CUT command includes parameters describing a connection, consisting of the source and destination addresses and port numbers. Optional arguments may include the selection of different initial sequence numbers on each side of the firewall connection. In response to the command, CUT creates a path in two steps. First, pathcreate is called to build a path from CUT down one protocol stack, through and modules. CUT uses a hook in the module to add this path to the demultiplexing map. From the Scout point-of-view, CUT represents an optimized form of. More importantly, the demultiplexing tree implementation is deterministic, and the module is configured at compile time to demultiplex all packets with protocol field equal to 6, the standard value for. Once the first half of the path is established, a pathextend call is made to repeat the process on the other protocol stack connected to the opposite network interface. PathExtend is functionally equivalent to pathcreate, except the starting point is the existing path, and new stages are added in turn for each module of the new protocol stack. Once the optimized CUT path is established between the two networks, the FTP proxy proceeds to forward the application level message which triggers the file transfer. FTP uses a separate connection for data, which means the original control connection does not need to be optimized. It remains quiescent while the file data moves over the CUT path. After the operation completes, the CUT module observes the connection teardown by recording the packets with FIN flags, and the respective acknowledgements of these FIN packets by each side. At that point, CUT tears down the optimized datapath using pathdestroy, and the proxy is notified of the change. NETTAP, illustrated in Fig. 2, provides applicationlevel proxies with several additional approaches to establishing and managing fast datapaths. The NETTAP module is inserted directly between the and modules, in a position where it can intercept and redirect the traffic under proxy control. When using NETTAP, a typical application will first establish two connections and will initially fully proxy data between these connections. Our HTTP proxy currently makes use of the NETTAP module. HTTP traffic is collected and examined until a complete HTTP GET request has been received. The simple proxy implements a policy that
4 filters out URLs, protecting some private URLs on the server, while allowing the rest to be accessed across the firewall. Other policies are easily implemented. Once the proxy determines that the GET request is allowed, it forwards it to the web server, and issues a NETTAP JOIN command, resulting in the HTTP response being carried over an optimized datapath. Unlike the CUT module, the NETTAP module switches the same connection used to carry the HTTP traffic onto the fast datapath. NETTAP affords the proxying application with a range of cost-benefit tradeoffs by operating in one of three selectable modes. The first, JOIN, optimizes host and application processing out of the path completely, in an analogous manner to CUT. Once the application has switched a connection to this mode, it cannot receive data on, send data to, or control either connection on the path. The second, SNOOP, establishes a fast datapath but also collects and queues payload data, which is delivered to the application as available CPU cycles permit. In this mode, the application may monitor traffic and, if needed, terminate both connections, but cannot guarantee that some hostile traffic has not already been forwarded before the moment it is detected. The third mode, INSPECT, addresses this issue by queuing and delaying the forwarding of traffic until the application has signaled that the collected data may be sent. Of these modes, JOIN has the least impact on system resources, and INSPECT the greatest. Both CUT and NETTAP perform many of the same low-level operations on packets. addresses and port numbers may be changed to facilitate network address translation and port hiding. In addition, the sequence and acknowledgement fields of the header must be translated between the two halves of the network connection. numbers the bytes transmitted from sender to receiver in order to provide reliable service. Acknowledgements in the header of packets traveling in the opposite direction indicate the greatest Control Operations Proxy Path Optimized Path NETTAP PROXY NETTAP Fig. 2. Configuration of ASP Firewall with NETTAP Maximum Throughput (megabytes per second) k 8k 16k 32k 64k 128k File Size (bytes) proxy packet filter no firewall ASP Fig. 3. FTP Firewall Performance sequence number received, and confirm delivery of data to the host. Sequence numbers do not start from any fixed initial value. Instead, each host picks an initial sequence number. In order for a fast datapath to be created, the firewall must modify the sequence and acknowledgement fields by adding or subtracting a constant value corresponding to the difference in the initial sequence numbers. Finally, the and checksum fields must be updated to reflect any changes made to the headers. In our implementation, we use an efficient differential checksum algorithm. Instead of examining all the data in the segment to re-compute a fresh checksum, the original checksum is used as a starting point, and is modified based on the old and new values of the header fields that change. IV. EXPERIMENTS Initial measurements of firewall performance have been collected using a testbed consisting of 450 Mhz Pentium II PCs with 128 Mbytes of RAM and 100 Mbit/second full-duplex FastEthernet interfaces. A client and server machine are each connected via switches to a firewall machine with two separate network interfaces. Fig. 3 compares the performance of the ASP FTP proxy using CUT against a proxy and packet filter firewall. The peak CPU utilization of the ASP firewall was 30%. Fig. 4 compares the performance of the ASP HTTP proxy using NETTAP JOIN mode against a proxy and packet filtering firewall. For large transfer sizes, the ASP firewall provides nearly the same throughput as the control case with no firewall between the client and web server. The peak CPU utilization of this configuration was 28%, in contrast to 61% with the NETTAP SNOOP mode. Smaller transfer sizes result in performance similar to traditional proxies, as the costs of connection setup and inspecting the HTTP GET messages dominate overall performance in this regime. 256k 512k 1024k
5 Maximum Throughput (megabits per second) k 8k 16k V. RELATED WORK 32k 64k 128k proxy packet filter no firewall ASP 256k 512k File Size (Bytes) Fig. 4. HTTP Firewall Performance Several other researchers have investigated ways of improving firewall proxy performance by optimizing the underlying network protocol stacks. Spatscheck et. al. [1] describes a connection optimization for Scout paths and a firewall proxy that utilizes it. Maltz and Bhagwat [2] have implemented similar splicing mechanisms in a Unix kernel to support firewall and web caching applications. Fall [3] investigated more general mechanisms for optimizing data copying between both files and network sockets, and introduced a Unix interface to control optimization. VI. FUTURE DIRECTION AND CONCLUSION There are many additional features we would like to implement in our ASP firewall prototype. While the current Scout system required a simple change to the module to allow CUT to insert paths into the demultiplexing map, a more sophisticated Scout infrastructure would allow CUT to lookup and access the demultiplexing map dynamically. This would remove a dependency between the CUT module on low-level internals of the module. Also, while the path operations are conceptually very simple, the actual interface in Scout requires developers to directly manipulate the pointers linking the various stages of the path together. This code is difficult to debug, extremely dense, and highly prone to coding errors resulting in deformed paths. An enhanced version of the system should provide a higher-level interface to aid developers in the construction and management of paths. An additional NETTAP command, SPLIT, is currently in development, which will resume the full proxying of a connection by switching the traffic away from the fast datapath and back to the two distinct / protocol stacks below the proxy. SPLIT will provide the ability for proxies to periodically re-inspect a connection. A security policy might require re-examination of a 1024k connection after a fixed time period, or after a specified number of bytes or packets had traversed the fast path. Once the ASP architecture is well established, it should be feasible to implement key pieces in hardware, allowing proxy firewalls to scale with increasing network bandwidth. Many hardware routing devices include the capability of updating the checksum, but do not have the capability to update the checksum. This is probably due to the fact that all routers must decrement the time-to-live field, requiring changes to the checksum, but do not change any fields. One clearly identified hardware requirement to support optimized datapaths in firewalls is a method for differential or constant time checksum recalculation. The demultiplexing of packets to different destinations involves the inspection of both and fields. The hardware requirements for firewalls vs. routing are not dramatically different, except that flags are also useful as part of the demultiplexing rules. However, the rate at which new connections are established and destroyed may be much greater than the rate at which routing table changes propagate to forwarding engines in routers. Firewalls require an interface to the demultiplexing mechanisms that supports many more changes per second, and with small, bounded latency. Finally, firewalls need to track and record connection termination. A simple state machine for recording the sequence number of packets with the FIN flag, and generating a notification when the corresponding acknowledgement number is seen would also be a requirement for implementing all of the optimized network plumbing in hardware. As more proxies are implemented that utilize optimize datapaths, the configuration of firewall security policies becomes more complicated. More investigation of the various ways in which security policies exploit dynamic firewall behavior to improve performance without compromising network boundary integrity is needed. ACKNOWLEDGEMENTS John Sebes conceived of the original ASP project goals and architecture, and contributed to its success. Hilarie Orman suggested the use of Scout as a firewall platform. REFERENCES [1] D. Mosberger and L. Peterson. Making paths explicit in the Scout operating system. In Proceedings of Second USENIX Symposium on Operating Systems Design and Implementation, October 1996, Seattle, Washington, pages [2] M.K. Ranum and F.M. Avolio. A toolkit and methods for Internet firewalls. In Proceedings of the Summer 1994 USENIX Conference, Boston, Massachusetts, pages [3] D. Maltz and P. Bhagwat. Splicing for Application Layer Proxy Performance. IBM Research Report RC 21139, March 17, [4] B. Cheswick and S. Bellovin. Firewalls and Internet Security. Reading, MA, Addison-Wesley, [5] K. Fall, A Peer-to-Peer I/O System in Support of I/O Intensive Worloads, Ph.D. Thesis, 1993, Department of Computer Science, U.C. San Diego. [6] O. Spatscheck, J. Hansen, J. Hartman and L. Peterson. Optimizing Forwarder Performance, Technical Report 98-01, Department of Computer Science, The University of Arizona, February 9, 1998.
6
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Proxy Server, Network Address Translator, Firewall. Proxy Server
Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as
High Performance VPN Solutions Over Satellite Networks
High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
VLAN und MPLS, Firewall und NAT,
Internet-Technologien (CS262) VLAN und MPLS, Firewall und NAT, 15.4.2015 Christian Tschudin Departement Mathematik und Informatik, Universität Basel 6-1 Wiederholung Unterschied CSMA/CD und CSMA/CA? Was
High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Network Address Translation (NAT)
Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT. Taken from http://www.cs.virginia.edu/~itlab/ book/slides/module17-nat.ppt 1 Private Network Private IP network
This topic lists the key mechanisms use to implement QoS in an IP network.
IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Protocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
Network Layer. Introduction Datagrams and Virtual Circuits Routing Traffic Control. Data delivery from source to destination.
Layer Introduction Datagrams and Virtual ircuits Routing Traffic ontrol Main Objective Data delivery from source to destination Node (Router) Application Presentation Session Transport Data Link Data Link
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
Optimizing TCP Forwarding
Optimizing TCP Forwarding Vsevolod V. Panteleenko and Vincent W. Freeh TR-2-3 Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556 {vvp, vin}@cse.nd.edu Abstract
TCP Offload Engines. As network interconnect speeds advance to Gigabit. Introduction to
Introduction to TCP Offload Engines By implementing a TCP Offload Engine (TOE) in high-speed computing environments, administrators can help relieve network bottlenecks and improve application performance.
QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
Operating Systems Design 16. Networking: Sockets
Operating Systems Design 16. Networking: Sockets Paul Krzyzanowski [email protected] 1 Sockets IP lets us send data between machines TCP & UDP are transport layer protocols Contain port number to identify
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
OpenFlow Based Load Balancing
OpenFlow Based Load Balancing Hardeep Uppal and Dane Brandon University of Washington CSE561: Networking Project Report Abstract: In today s high-traffic internet, it is often desirable to have multiple
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls
Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
Firewall Design Principles
Firewall Design Principles Software Engineering 4C03 Dr. Krishnan Stephen Woodall, April 6 th, 2004 Firewall Design Principles Stephen Woodall Introduction A network security domain is a contiguous region
PART OF THE PICTURE: The TCP/IP Communications Architecture
PART OF THE PICTURE: The / Communications Architecture 1 PART OF THE PICTURE: The / Communications Architecture BY WILLIAM STALLINGS The key to the success of distributed applications is that all the terminals
Module 1. Introduction. Version 2 CSE IIT, Kharagpur
Module 1 Introduction Lesson 2 Layered Network Architecture Specific Functional Objectives On Completion of this lesson, the students will be able to: State the requirement for layered approach Explain
CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding
CS 78 Computer Networks Internet Protocol (IP) Andrew T. Campbell [email protected] our focus What we will lean What s inside a router IP forwarding Internet Control Message Protocol (ICMP) IP
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
Access Control: Firewalls (1)
Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
Encapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Improving DNS performance using Stateless TCP in FreeBSD 9
Improving DNS performance using Stateless TCP in FreeBSD 9 David Hayes, Mattia Rossi, Grenville Armitage Centre for Advanced Internet Architectures, Technical Report 101022A Swinburne University of Technology
12. Firewalls Content
Content 1 / 17 12.1 Definition 12.2 Packet Filtering & Proxy Servers 12.3 Architectures - Dual-Homed Host Firewall 12.4 Architectures - Screened Host Firewall 12.5 Architectures - Screened Subnet Firewall
Distributed Systems 3. Network Quality of Service (QoS)
Distributed Systems 3. Network Quality of Service (QoS) Paul Krzyzanowski [email protected] 1 What factors matter for network performance? Bandwidth (bit rate) Average number of bits per second through
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Wedge Networks: Transparent Service Insertion in SDNs Using OpenFlow
Wedge Networks: EXECUTIVE SUMMARY In this paper, we will describe a novel way to insert Wedge Network s multiple content security services (such as Anti-Virus, Anti-Spam, Web Filtering, Data Loss Prevention,
Fig. 4.2.1: Packet Filtering
4.2 Types of Firewalls /DKo98/ FIREWALL CHARACTERISTICS 1. All traffic from inside to outside, and vice versa, must pass through the firewall. This is achieved by physically blocking all access to the
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT
IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,
hp ProLiant network adapter teaming
hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
VOICE OVER IP AND NETWORK CONVERGENCE
POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
Globus Striped GridFTP Framework and Server. Raj Kettimuthu, ANL and U. Chicago
Globus Striped GridFTP Framework and Server Raj Kettimuthu, ANL and U. Chicago Outline Introduction Features Motivation Architecture Globus XIO Experimental Results 3 August 2005 The Ohio State University
Cisco PIX vs. Checkpoint Firewall
Cisco PIX vs. Checkpoint Firewall Introduction Firewall technology ranges from packet filtering to application-layer proxies, to Stateful inspection; each technique gleaning the benefits from its predecessor.
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir [email protected].
What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir [email protected] CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms
IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
Network Programming TDC 561
Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating
SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane
SE 4C03 Winter 2005 Firewall Design Principles By: Kirk Crane Firewall Design Principles By: Kirk Crane 9810533 Introduction Every network has a security policy that will specify what traffic is allowed
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
Chapter 3. Internet Applications and Network Programming
Chapter 3 Internet Applications and Network Programming 1 Introduction The Internet offers users a rich diversity of services none of the services is part of the underlying communication infrastructure
Improving Quality of Service
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
CHAPTER 3 STATIC ROUTING
CHAPTER 3 STATIC ROUTING This chapter addresses the end-to-end delivery service of IP and explains how IP routers and hosts handle IP datagrams. The first section discusses how datagrams are forwarded
Content Distribution Networks (CDN)
229 Content Distribution Networks (CDNs) A content distribution network can be viewed as a global web replication. main idea: each replica is located in a different geographic area, rather then in the
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Switch Fabric Implementation Using Shared Memory
Order this document by /D Switch Fabric Implementation Using Shared Memory Prepared by: Lakshmi Mandyam and B. Kinney INTRODUCTION Whether it be for the World Wide Web or for an intra office network, today
Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding
Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Objectives of Lecture. Network Architecture. Protocols. Contents
Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking
MANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: [email protected] [email protected] Abstract:
Network Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
VMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Lecture 23: Firewalls
Lecture 23: Firewalls Introduce several types of firewalls Discuss their advantages and disadvantages Compare their performances Demonstrate their applications C. Ding -- COMP581 -- L23 What is a Digital
What is Firewall? A system designed to prevent unauthorized access to or from a private network.
What is Firewall? A system designed to prevent unauthorized access to or from a private network. What is Firewall? (cont d) Firewall is a set of related programs, located at a network gateway server. Firewalls
Understanding Latency in IP Telephony
Understanding Latency in IP Telephony By Alan Percy, Senior Sales Engineer Brooktrout Technology, Inc. 410 First Avenue Needham, MA 02494 Phone: (781) 449-4100 Fax: (781) 449-9009 Internet: www.brooktrout.com
2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004
SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004 Introduction: A computer firewall protects computer networks from unwanted intrusions which could compromise confidentiality
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging In some markets and scenarios where competitive advantage is all about speed, speed is measured in micro- and even nano-seconds.
Proxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
Overview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
Smart Queue Scheduling for QoS Spring 2001 Final Report
ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang([email protected]) & Liu Tang([email protected])
