Firewall (networking) - Wikipedia, the free encyclopedia



Similar documents
7. Firewall - Concept

Firewalls. Castle and Moat Analogy. Dr.Talal Alkharobi. Dr.Talal Alkharobi

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Proxy Server, Network Address Translator, Firewall. Proxy Server

Chapter 7. Firewalls

Network Defense Tools

Firewall Design Principles

Security Technology: Firewalls and VPNs

Status of Open Source and commercial IPv6 firewall implementations

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

8. Firewall Design & Implementation

CMPT 471 Networking II

Cisco PIX vs. Checkpoint Firewall

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

Introduction to Firewalls

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Availability Digest. Redundant Load Balancing for High Availability July 2013

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Firewalls for the Home & Small Business. Gordon Giles DTEC Professor: Dr. Tijjani Mohammed

Open Source Firewall

Firewalls. Pehr Söderman KTH-CSC

Internet infrastructure. Prof. dr. ir. André Mariën

Linux Network Security

Cornerstones of Security

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

Firewalls. Chapter 3

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

SECURITY in IT SYSTEM

Overview. Firewall Security. Perimeter Security Devices. Routers

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING

12. Firewalls Content

DMZ Network Visibility with Wireshark June 15, 2010

Chapter 9 Firewalls and Intrusion Prevention Systems

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

INTRODUCTION TO FIREWALL SECURITY

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Secure Web Appliance. Reverse Proxy

- Introduction to PIX/ASA Firewalls -

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Firewall Architecture

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Nuclear Plant Information Security A Management Overview

Lab Configuring Access Policies and DMZ Settings

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Guideline on Firewall

Network Address Translation (NAT)

Topics NS HS12 2 CINS/F1-01

DHCP & Firewall & NAT

FIREWALLS & CBAC. philip.heimer@hh.se

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Networking Basics and Network Security

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Firewalls. Ahmad Almulhem March 10, 2012

IPv6 Firewalls. ITU/APNIC/MICT IPv6 Security Workshop 23 rd 27 th May 2016 Bangkok. Last updated 17 th May 2016

Cisco Certified Security Professional (CCSP)

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

High Performance Cluster Support for NLB on Window

The ntop Project: Open Source Network Monitoring

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Multi-Homing Dual WAN Firewall Router

Network Security Topologies. Chapter 11

Introduction to Firewalls Open Source Security Tools for Information Technology Professionals

Networking for Caribbean Development

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Intro to Firewalls. Summary

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Cisco Secure PIX Firewall with Two Routers Configuration Example

What would you like to protect?

Gateway Security at Stateful Inspection/Application Proxy

Firewalls. Network Security. Firewalls Defined. Firewalls

Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures

BSD Firewalling with pfsense. NYCBSDCon 2010

Chapter 15. Firewalls, IDS and IPS

Firewalls, IDS and IPS

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

FIREWALL AND NAT Lecture 7a

How To Understand A Firewall

Stateful Inspection Technology

Configuration Example

Chapter 8 Security Pt 2

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Packet filtering and other firewall functions

CIO Update: The Gartner Firewall Magic Quadrant for 2H02

Cisco Which VPN Solution is Right for You?

Transcription:

Firewall (networking) From Wikipedia, the free encyclopedia In computing, a firewall is a piece of hardware and/or software which functions in a networked environment to prevent some communications forbidden by the security policy, analogous to the function of firewalls in building construction. A firewall is also called a Border Protection Device (BPD), especially in NATO contexts, or packet filter in BSD contexts. A firewall has the basic task of controlling traffic between different zones of trust. Typical zones of trust include the Internet (a zone with no trust) and an internal network (a zone with high trust). The ultimate goal is to provide controlled connectivity between zones of differing trust levels through the enforcement of a security policy and connectivity model based on the least privilege principle. Proper configuration of firewalls demands skill from the administrator. It requires considerable understanding of network protocols and of computer security. Small mistakes can render a firewall worthless as a security tool. Contents 1 Types of firewalls 2 Network layer firewalls 3 Application-layer firewalls 4 Proxies 5 Network address translation 6 Management 7 Implementations 8 Use case scenario 9 Online firewall check 10 See also 11 External links Types of firewalls There are three basic types of firewalls depending on: Whether the communication is being done between a single node and the network, or between two or more networks. Whether the communication is intercepted at the network layer, or at the application layer. Whether the communication state is being tracked at the firewall or not. With regard to the scope of filtered communications there exist: Personal firewalls, a software application which normally filters traffic entering or leaving a single computer. Network firewalls, normally running on a dedicated network device or computer positioned on the boundary of two or more networks or DMZs (demilitarized zones). Such a firewall filters all traffic entering or leaving the connected networks. The latter definition corresponds to the conventional, traditional meaning of "firewall" in networking. 1 of 5 5/15/06 3:30 PM

In reference to the layers where the traffic can be intercepted, three main categories of firewalls exist: Network layer firewalls. An example would be iptables. Application layer firewalls. An example would be TCP Wrapper. Application firewalls. An example would be restricting ftp services through /etc/ftpaccess file These network-layer and application-layer types of firewall may overlap, even though the personal firewall does not serve a network; indeed, single systems have implemented both together. There's also the notion of application firewalls which are sometimes used during wide area network (WAN) networking on the world-wide web and govern the system software. An extended description would place them lower than application layer firewalls, indeed at the Operating System layer, and could alternately be called operating system firewalls. Some firewalls have higher privileges than others like mysql and pj. Lastly, depending on whether the firewalls track packet states, two additional categories of firewalls exist: Stateful firewalls Stateless firewalls Network layer firewalls Main article: network layer firewall Network layer firewalls operate at a (relatively) low level of the TCP/IP protocol stack as IP-packet filters, not allowing packets to pass through the firewall unless they match the rules. The firewall administrator may define the rules; or default built-in rules may apply (as in some inflexible firewall systems). A more permissive setup could allow any packet to pass the filter as long as it does not match one or more "negative-rules", or "deny rules". Today network firewalls are built into most computer operating systems and network appliances. Modern firewalls can filter traffic based on many packet attributes like source IP address, source port, destination IP address or port, destination service like WWW or FTP. They can filter based on protocols, TTL values, netblock of originator, domain name of the source, and many other attributes. Application-layer firewalls Main article: application layer firewall Application-layer firewalls work on the application level of the TCP/IP stack (i.e., all browser traffic, or all telnet or ftp traffic), and may intercept all packets traveling to or from an application. They block other packets (usually dropping them without acknowledgement to the sender). In principle, application firewalls can prevent all unwanted outside traffic from reaching protected machines. By inspecting all packets for improper content, firewalls can even prevent the spread of the likes of viruses. In practice, however, this becomes so complex and so difficult to attempt (given the variety of applications and the diversity of content each may allow in its packet traffic) that comprehensive firewall design does not generally attempt this approach. The XML firewall exemplifies a more recent kind of application-layer firewall. Proxies 2 of 5 5/15/06 3:30 PM

Main article: Proxy server A proxy device (running either on dedicated hardware or as software on a general-purpose machine) may act as a firewall by responding to input packets (connection requests, for example) in the manner of an application, whilst blocking other packets. Proxies make tampering with an internal system from the external network more difficult and misuse of one internal system would not necessarily cause a security breach exploitable from outside the firewall (as long as the application proxy remains intact and properly configured). Conversely, intruders may hijack a publicly-reachable system and use it as a proxy for their own purposes; the proxy then masquerades as that system to other internal machines. While use of internal address spaces enhances security, crackers may still employ methods such as IP spoofing to attempt to pass packets to a target network. Network address translation Firewalls often have network address translation (NAT) functionality, and the hosts protected behind a firewall commonly use so-called "private address space", as defined in RFC 1918. Administrators often set up such scenarios in an effort (of debatable effectiveness) to disguise the internal address or network. Management The Middlebox Communication (midcom) Working Group of the Internet Engineering Task Force is working on standardizing protocols for managing firewalls and other middleboxes. See, e.g., Middlebox Communications (MIDCOM) Protocol Semantics (ftp://ftp.rfc-editor.org/in-notes/rfc3989.txt). Implementations Software Astaro Security Linux (http://www.astaro.com/) MCS Firewall - [1] (http://www.mcsstudios.com) Check Point VPN-1 (formerly Firewall-1) SC Gauntlet (discontinued, but still in use) ipchains Iptables IPFilter (ipf) ipfw Microsoft Internet Security and Acceleration (ISA) Server (http://www.microsoft.com/isa/) Netfilter/iptables PF WinGate Proxy / NAT Firewall (http://www.wingate.com) PORTUS-APS Appliances ActionTEC (a DSL Modem packaged by Qwest with new DSL customer orders) Celestix MSA Series Cisco PIX and Cisco ASA CyberGuard Global Technology Associates, Inc. NetASQ DataPower Juniper NetScreen Lightning MultiCom VPN Firewall - [2] (http://www.lightning.ch) Lucent VPN Firewall - [3] (http://lucent.com/security) Nortel Stand-alone and Switched Firewall - [4] (http://products.nortel.com/go/product_content.jsp?parid=0&segid=0&catid=-9460&prod_id=36220&locale= 3 of 5 5/15/06 3:30 PM

Phion NetFence PORTUS-APS Appliance Sarvega Sidewinder and Sidewinder G2 SofaWare Technologies XNet (Made in Pakistan) (Contact nadeem@xnet.com.pk) SonicWall Watchguard Free Software Distributions (that allows you to reuse your old computer as a firewall) Endian Firewall (http://www.efw.it) (GPL) IPCop (GPL) m0n0wall (BSD-style license) pfsense (BSD-style license) (m0n0wall fork) Devil-Linux (GPL) SmoothWall Express (GPL) ebox Platform (GPL) BrazilFW Firewall and Router (http://www.brazilfw.com.br/forum/portal.php) (GPL) - Formerly Coyote Linux - This runs from a floppy disk or hard disk, and is configured through a Windows or Linux program. Personal firewalls see that article Use case scenario The simplest form could be like this: node 1 and node 2 running an OS with a Linux kernel (Debian GNU/Linux for example) To create a redundancy firewall we could choose to build a high-availability cluster. Therefore we need to connect those nodes (at least two are necessary) to each another in a way they could "see" each other. The software to do so could be Heartbeat (http://www.linux-ha.org/heartbeatprogram) which is part of Linux-HA Project The most critical task in such a scenario is to ensure that all nodes share the same data at all times, better known as data integrity. This could be done with DRBD which is roughly speaking nothing else than a network RAID 1. A redundancy firewall reduces the possibility of an Internet connection Outage. Last but not least we need firewalling capabilities for the redundancy firewall. A packet filter like iptables helps here. Online firewall check These sites offer free online portscan services to check your firewall security. Please note that online port probes are not 100% bulletproof, as they always check the public IP address, which may be a proxy server. Online portscans are easy to use and offer basic insights, but to ensure network security, use tools like Nmap. 4 of 5 5/15/06 3:30 PM

ShieldsUP (Gibson Research Corporation) (https://www.grc.com/x/ne.dll?bh0bkyd2) Quick and easy to use Sygate Online Scan (http://scan.sygate.com/) Extended security check, concise (Stealth Scan, Trojan Scan) Planet Security Firewall-Check (http://www.planet-security.net/index.php?xid=%f7%04t%bdp%92nd) Quick, extended security check, checks current endangered ports, clearly laid out, TCP Scan See also Middlebox Windows Firewall Firewall pinhole End-to-end connectivity Access control list Bastion host Demilitarized zone (DMZ) Great Firewall of China External links Matt Curtin and Marcus J. Ranum Internet Firewalls: Frequently Asked Questions (http://www.faqs.org/faqs/firewalls-faq/) Evolution of the Firewall Industry (http://www.cisco.com/univercd/cc/td/doc/product/iaabu/centri4/user/scf4ch3.htm) - Discusses different architectures and their differences, how packets are processed, and provides a timeline of the evolution. Retrieved from "" Categories: Computer network security Network-related software Packets This page was last modified 13:35, 11 May 2006. All text is available under the terms of the GNU Free Documentation License (see Copyrights for details). Wikipedia is a registered trademark of the Wikimedia Foundation, Inc. 5 of 5 5/15/06 3:30 PM