Internet infrastructure. Prof. dr. ir. André Mariën



Similar documents
CMPT 471 Networking II

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

12. Firewalls Content

Internet Security Firewalls

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

CS155 - Firewalls. Simon Cooper <sc@sgi.com> CS155 Firewalls 22 May 2003

Proxy Server, Network Address Translator, Firewall. Proxy Server

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Intranet, Extranet, Firewall

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Network Security Topologies. Chapter 11

What would you like to protect?

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Firewalls. Chapter 3

Internet Security Firewalls

Cryptography and network security

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Security Technology: Firewalls and VPNs

Chapter 11 Cloud Application Development

Linux firewall. Need of firewall Single connection between network Allows restricted traffic between networks Denies un authorized users

Firewalls. Mahalingam Ramkumar

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Chapter 7. Firewalls

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewalls CSCI 454/554

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

Firewalls. Ahmad Almulhem March 10, 2012

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

FIREWALL ARCHITECTURES

Firewall Design Principles Firewall Characteristics Types of Firewalls

Firewalls. Chien-Chung Shen

Chapter 15. Firewalls, IDS and IPS

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Packet filtering and other firewall functions

CIT 480: Securing Computer Systems. Firewalls

Firewall Security. Presented by: Daminda Perera

Focus on Security. Keeping the bad guys out

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

DMZ Network Visibility with Wireshark June 15, 2010

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

CIT 480: Securing Computer Systems. Firewalls

How To Protect Your Network From Attack

Chapter 9 Firewalls and Intrusion Prevention Systems

Cornerstones of Security

CSCE 465 Computer & Network Security

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

- Introduction to Firewalls -

Networking Basics and Network Security

Chapter 20 Firewalls. Cryptography and Network Security Chapter 22. What is a Firewall? Introduction 4/19/2010

Overview. Firewall Security. Perimeter Security Devices. Routers

Firewalls, IDS and IPS

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

INTRUSION DETECTION SYSTEMS and Network Security

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

Network Security and Firewall 1

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Firewall Firewall August, 2003

8. Firewall Design & Implementation

Lab Configuring Access Policies and DMZ Settings

Linux Network Security

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

How To Understand A Firewall

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

Security Awareness. Wireless Network Security

INTRODUCTION TO FIREWALL SECURITY

How To Protect Your Network From Attack From Outside From Inside And Outside

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Firewall Environments. Name

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING COURSE PLAN

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

Network Security. Internet Firewalls. Chapter 13. Network Security (WS 2002): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

Firewall VPN Router. Quick Installation Guide M73-APO09-380

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Firewalls N E T W O R K ( A N D D ATA ) S E C U R I T Y / P E D R O B R A N D Ã O M A N U E L E D U A R D O C O R R E I A

Definition of firewall

CTS2134 Introduction to Networking. Module Network Security

Firewall Architecture

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski

Firewalls and System Protection

Transcription:

Internet infrastructure Prof. dr. ir. André Mariën (c) A. Mariën 31/01/2006

Topic Firewalls (c) A. Mariën 31/01/2006

Firewalls Only a short introduction See for instance: Building Internet Firewalls, second edition, E.D. Zwicky, S. Cooper, D.B. Chapman, O Reilly, ISBN: 1-56592-871-7 Troubleshooting linux firewalls, M. Shinn, S. Shinn, addison wesley Linux firewalls (attack detection and response with iptables, psad and fwsnort), M. Rash, no starch press

Requirements RFC 2979: Behavior of and Requirements for Internet Firewalls Firewalls either act as a protocol end point and relay as a packet filter some combination of both Firewall as a protocol end point implement a "safe" subset of the protocol perform extensive protocol validity checks use an implementation methodology designed to minimize the likelihood of bugs run in an insulated, "safe" environment use some combination of these techniques in tandem Firewalls acting as packet filters aren't visible as protocol end points. The firewall examines each packet and then passes the packet through to the other side unchanged drops the packet entirely handles the packet itself in some way.

What does a Firewall do? Focus for security decisions Enforce security policy Log activities Limit exposure

What does a Firewall not do? Protect against insiders Protect connections it does not see Protect against day-zero attacks Protect against all viruses Configure itself automatically

Attacks Attack types Intrusions Denial of Service (DoS) Information theft Attacks: examples Port scanning IP spoofing IP based DoS

Security principles Least privilege Defense in depth Choke point Weakest link Fail-safe Diversity of defense Simplicity

Technologies Packet filtering Allow protocols and services Allow connections in defined directions Proxy services Proxies provide choke point Proxies enforce policies

Technologies (cont.) Network Address Translation (NAT) Information hiding De-facto blocking (non-routable addresses) Virtual Private Networks (VPN) Support for extranets

NAT & filtering in IP tables Application socket Filter INPUT Filter OUTPUT NAT prerouting route Filter FORWARD NAT postrouting

Filters: Source Destination State Protocol Content MAC Action ACCEPT DROP LOG RETURN IP tables filter definitions

Proxy usage Proxies require proxy-aware application software Proxy-aware OS software OS libraries JVM Proxy-aware router transparent proxy

Proxy types Application level proxy Circuit level proxy SOCKS protocol: RFC 1928: SOCKS Protocol Version 5

Proxy operation: 2 connections client proxy server

Proxy operation: client aware client GET /index.htm GET http://server/index.htm proxy GET /index.htm server

Transparent proxy Proxy system behaves as a router Transparently passes requests through a proxy service Configuration: as if a direct connection with the Internet is possible Mind IP addresses INSIDE the protocol

Proxy FTP Access style one: ftp proxy User: userid@targetftpserver... Alternative ftp proxy Optionally, proxy authentication: User & password OPEN targetftpserver...

Proxy authentication HTTP Authentication to get out HTTP proxy authentication HTTP proxy sends reply: 407 (proxy authentication required) Client Prompts user for UID/password sends Proxy-Authorization header back with repeated request

Proxy authentication: scheme Proxy authentication: Proxy-authorization: xy65f client proxy server Server authentication: Authorization: DFER5SD

Caching proxy Proxy is central point of access Caching at this point very interesting Typically some active subset exists Need to address unwanted caching in applications (inter-user contamination)

Common firewall types Single box screening router dual homed host Screened host screening router + host Screened subnet exterior router + LAN + hosts + interior router

Bastion host hardening secure the machine use checklist and scripts disable non-required services enable only required services enable auditing provide secured access for management (SSH) run security audit See also: http://checklists.nist.gov/ http://www.sans.org/reading_room/whitepapers/linux/

Firewalls in infrastructure (c) A. Mariën 31/01/2006

Infrastructure goal: zones basic: two zones internet intranet simple: three zones internet De-Militarized Zone: DMZ intranet

Two zones, one firewall internet internet intranet intranet

Two zones, one firewall firewall does everything: filters traffic does NAT runs proxies single point of failure most basic set-up: firewall is actually screening router:

More realistic internet internet Router Firewall intranet HUB

Three zones, one firewall internet internet DMZ intranet DMZ intranet

Three zones, two firewalls internet internet DMZ DMZ intranet intranet

More realistic internet internet internet DMZ intranet Router Firewall switch Firewall HUB Router Firewall switch Router HUB