SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING COURSE PLAN Course Code : CS0446 Course Title : Firewall Architecture Semester : VIII Course Duration : January 2015 April 2015 Day Hour Timing Day 1 4 11.25-12.15 Day 2 2, 4 9.35-10.25, 11.25-12.15 Day 3 Day 4 Day 5 Location : S.R.M. Faculty Details Gro up 1 Name Office Office hour Mail id Dr.T.PEER MEERA LABBAI 2 JEYASEKAR. A. 3 4 Mrs.R.MANGAL AGOWRI Mrs.G.NIRANJA NA 706A 703A 703A 803A peermeera.t@ktr.srmuniv.ac.in Jeyasekar.a@ktr.srmuniv.ac.in mangalagowri.r@ktr.srmuniv.ac.in niranjana.g@ktr.srmuniv.ac.in Required Text Books: 1. Elizabeth D Zwicky, Simon Cooper, D. Brent Chapman Building Internet Firewalls, Second edition, Shroff Publishers 2000 Prerequisite Nil
Objectives To study the network security To study the firewall technology and its architecture To design a firewall architecture To study the proxy systems and boston hosts To study the maintenance of firewall architecture Assessment Details Attendance : 5 Marks Cycle Test I : 10 Marks Cycle Test I : 10 Marks Model Exam : 20 Marks Surprise Test//Assign. : 5 Marks Test Schedule Total : 50 Marks S.No. DATE TEST DURATION 1 As per Calander Cycle Test I and II 2 periods 2 As per Calander Model Exam 3 Hrs Outcomes Students who have successfully completed this course will have full understanding of the following concepts Course outcome To understand the security mechanism provided in the internet To understand the concepts of firewall architecture and its types To understand the firewall architecture and its design criteria To understand the maintenance of firewall architecture Program outcome An ability to understand the security mechanism used in the Internet. An ability to understand the concepts of firewall and its types An Ability to design a firewall architecture for Internet. An ability to understand the maintenance of firewall architecture used in the Internet Detailed Session Plan
Network Security Sessi on No. 1 2 3 4 5 Internet firewalls Topics to be covered Internet services: secure services and safe services Email and news, file transfer, File sharing and printing Remote access, real time conferencing services Authentication and auditing services, databases, games Time (min) Ref Teaching Method Testing Method Open Discussion and Security strategies: Least privilege 6 7 Defense in depth, choke point, 8 9 Weakest link, fail safe stance universal-participation, simplicity Unit II FIREWALL TECHNOLOGIES AND ARCHITECTURE 10 11 Firewall technologies: Definitions, Packet filtering Proxy Services, Network Address Translation 12 Virtual Private Networks Surprise Test 13 Firewall architecture 14 Single box Architectures, 15 Screened Host Architectures, 16 Multiple Screened Subnets Architectures
17 18 Variations on firewall architectures, Terminal servers and modem pools Internal Firewalls Unit III FIREWALL DESIGN 19 20 21 22 Firewall design Packet Filtering, Configuring A Packet Filtering Router Packet Filtering Tips and rules Filtering by address 23 Filtering by service 24 25 26 27 Choosing a packet filtering router Implementations Where to do packet filtering What Rules should use for packet filtering Unit IV PROXY SYSTEMS AND BASTION HOSTS 28 Proxy systems, server terminology, SOCKS for proxying 29 TIS internal firewall toolkit for proxying 30 31 32 33 34 Bastion hosts, principles Choosing Machine And Location Locating Bastion Hosts, selecting services Disabling User Accounts, Building A Bastion Host Securing Disabling Non Required Services, Operating Bastion Hosts,, Comparative study Surprise Test Comparative study Comparative study
35 36 Protecting the machine Case study: Screened subnet architecture Merged Routers And Bastion Host Unit V MAINTAINING FIREWALLS 1 BB 37 Maintaining firewalls Comparative study 38 House Keeping Comparative study 39 Monitoring your systems 40 Keeping up to date 41 42 43 44 45 Two sample firewalls: Screened Subnet Architecture Screened Subnet Architecture - Continuation Screened Subnet Architecture - continuation Merged Routers And Bastion Host Using General Purpose Hardware Merged Routers And Bastion Host Using General Purpose Hardware - continuation Signature of the Staff (A. Jeyasekar) Signature of the HOD/CSE (Dr E.Poovammal)