Network Security Management with Firewalls

Similar documents
Firewall Design Principles Firewall Characteristics Types of Firewalls

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING COURSE PLAN

CIT 480: Securing Computer Systems. Firewalls

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

CIT 480: Securing Computer Systems. Firewalls

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

Internet Security Firewalls

12. Firewalls Content

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

CMPT 471 Networking II

Cornerstones of Security

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

Network Security. Raj Jain. The Ohio State University. Columbus, OH Raj Jain 31-1

Chapter 31 Network Security

What would you like to protect?

ΕΠΛ 674: Εργαστήριο 5 Firewalls

An Overview of Firewall Technologies. Abstract

Overview. Firewall Security. Perimeter Security Devices. Routers

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Internet Security Firewalls

Security Technology: Firewalls and VPNs

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Best Practices for Securing IP Telephony

Design and Implementation of A Content Filtering Firewall

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Internet Firewalls and Security. A Technology Overview

Host/Platform Security. Module 11

CS155 - Firewalls. Simon Cooper <sc@sgi.com> CS155 Firewalls 22 May 2003

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Internet infrastructure. Prof. dr. ir. André Mariën

The Future Of The Firewall

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Techniques for Securing Networks against Criminal Attacks

Firewalls CSCI 454/554

Patch Management Marvin Christensen /CIAC

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

How To Understand A Firewall

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Stateful Inspection Technology

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Computer Security: Principles and Practice

FIREWALL ARCHITECTURES

CISCO IOS NETWORK SECURITY (IINS)

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Chapter 9 Firewalls and Intrusion Prevention Systems

Network Security and SunScreen SPF-100. Technical White Paper

Multi-Homing Dual WAN Firewall Router

Network Security and Firewall 1

Firewall Architectures of E-Commerce

OS/390 Firewall Technology Overview

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Proxies. Chapter 4. Network & Security Gildas Avoine

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

Network Access Security. Lesson 10

Network Security. Internet Firewalls. Chapter 13. Network Security (WS 2002): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Network System Design Lesson Objectives

information security and its Describe what drives the need for information security.

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Computer Security DD2395

Computer Firewalls. The term firewall was originally used with forest fires, as a means to describe the

Guideline on Firewall

INTRODUCTION TO FIREWALL SECURITY

Packet filtering and other firewall functions

Firewall Design Principles

7. Firewall - Concept

8. Firewall Design & Implementation

How To Protect Your Network From Attack

Host Security. Host Security: Pro

Chapter 20. Firewalls

Internet Firewalls and Security

Tales From The Early Days of the Firewall

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

Gateway Security at Stateful Inspection/Application Proxy

Network Security Controls. CSC 482: Computer Security

Intro to Firewalls. Summary

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Global Partner Management Notice

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Firewalls. Mahalingam Ramkumar

Transcription:

Network Security Management with Firewalls Stephen P. Cooper Advanced Security Projects Computer Security Technology Center Lawrence Livermore National Laboratory Email: SPCooper@LLNL.GOV Computer Security Practitioners Conference February 7, 1996 UCRL-MI-123352 Work performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract W-7405-ENG-48. Reference to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation or favoring by the U.S. Department of Energy or the University of California.

This is your network... Proprietary Data Personnel Data Sensitive Data

This is your network on the Internet Sensitive Data VIRUS Trojan Horse Personnel Data Proprietary Data

Unless you have a Firewall Proprietary Data Personnel Data Sensitive Data Computer Security Technology Center 4

Why a firewall? You have information and resources that need protection. You have a need to connect to a network that has a different view of the world. Strong host-based security is too costly or difficult. Computer Security Technology Center 5

On the WWW, everyone is a neighbor Computer Security Technology Center 6

A Firewall is... A gateway between a trusted network and a less trusted one. An enforcer of security policy. A system designed to: Control external access to company data and resources. Control internal access to Internet systems and services. Provide a security and monitoring choke point. Computer Security Technology Center 7

... or in a nutshell A firewall is a tool for managing and controlling traffic that crosses a network boundary. Computer Security Technology Center 8

Reality Check! The purpose of a business is to provide some product or service. The purpose of security is to reduce some of the risks associated with operating and maintaining a business. The purpose of a firewall is to support some aspects of the security policy. Computer Security Technology Center 9

Reality Check, Part 2! A firewall, as a chokepoint, may also be a single point-of-failure. Reliability, performance become issues. Therefore, the firewall s status may quickly be elevated to a mission critical one. Computer Security Technology Center 10

How do you set up a firewall? Products Services Policies Magic Requirements Resources Our goal is to try and reduce the magic. Computer Security Technology Center 11

Develop a policy and requirements Need to understand the assets to be protected and the threats to those assets. Need to understand the user requirements. The target is probably somewhere between the two. Security Too Weak Too Strong Computer Security Technology Center 12

Assess the threats vs. assets High Threat External Internal Low Computer Security Technology Center 13

What about protocols? The good... Telnet...the bad... Any UDP, finger...and the ugly. FTP, X11 Actually depends on your point of view. Computer Security Technology Center 14

Understand your resources Financial. Time. Technical expertise. Systems used. Computer Security Technology Center 15

To build your own... It takes a certain level of expertise in computer network security, UNIX system administration, and programming. The FWTK is meant for individuals who: know C know TCP/IP know UNIX as a system manager have built C software packages on UNIX systems. Frederick Avolio, Trusted Information Systems Computer Security Technology Center 16

Products and Services There are over 40 commercial firewalls offering a wide range of configurations and capabilities. There is a wide range of services available. Computer Security Technology Center 17

Configurations range from simple to complex Application Gateway Router Application Gateway Dual-homed Gateway Screened Host Gateway Router Application Gateway(s) Router Screened Subnet Gateway Computer Security Technology Center 18

Here is a physical sample... External Network Screening Router Internal Network Bastion Host Computer Security Technology Center 19

...and here is the logical view Remote User? Internal Services Secure Authentication Bastion Host Proxy Services Screening Router Remote Services Internal User Computer Security Technology Center 20

White House Firewall* DEC SEAL, Gauntlet based. 9 months and $275K. 2 full-time Secret Service agents for administration. 25-30K mail messages per day, filtered for content. * From a presentation by Bill Hancock to the DECUS Bay LUG, 7/10/95. Computer Security Technology Center 21

Build your own? There is ample software available: TIS Firewall Toolkit (FWTK) Freestone from SOS Corp. Socks Screend KarlBridge (demo and commercial), DrawBridge S/Key Others Computer Security Technology Center 22

Other Sources: Commercial Services Internet Providers Consultants Commercial Products Screening Routers Software Operating Systems Hardware Services Computer Security Technology Center 23

How to select Start with the go/no-go decisions: Will a particular product or service support your security policy? Do you have the necessary resources? Are there other show stoppers? Performance (T1, Ethernet, FDDI, etc.) Protocols supported (Appletalk, DECnet) Encryption Computer Security Technology Center 24

How to select (cont.) For the rest, balance your priorities against the offerings of the target products. Priorities Support Reliability Cost Flexibility User Interface Offerings GUI Reboot for changes 24h phone support $20,000 + 1200/year 2 year MTBF, 1 day MTTR Computer Security Technology Center 25

Some Selection Criteria Protocols Hardware and Operating Systems Management Interfaces User Authentication Encryption Firewall Validation Services Computer Security Technology Center 26

A Sampling of Products Sidewinder Gauntlet Digital s Firewall Service (formerly SEAL) Firewall-1 Internet Site Patrol Firewall-Plus SunScreen Computer Security Technology Center 27

Future directions Better integration of security components. Management, host-based security, intrusion detection. CSTC and partners have several research projects on the table. Standards Firewall management, cooperative firewalls. Performance Computer Security Technology Center 28

References: Cheswick, William R. and Steven M. Bellovin. Firewalls and Internet Security: Repelling the Wily Hacker, Addison-Wesley, 1994. Chapman, Brent and Elizabeth Zwicky. Building Internet Firewalls, O Reilly & Associates, 1995. Hare, R. Christopher and Karanjit Siyan. Internet Firewalls and Network Security, New Riders Publishing, 1995. Computer Security Technology Center 29

On the WWW: The Firewall Report, by Outlink Market Research (http://www.outlink.com), contains over 600 pages reviewing over 40 firewall products. Catherine Fulmer maintains a list of firewall products at: http://www.waterw.com/~manowar/vendor.html. The Firewalls Mailing List: Send E-Mail to firewalls-request@greatcircle.com with subscribe firewalls as the message body. Computer Security Technology Center 30

Crossing the finish line There are many good products out there, with more emerging. Avoid analysis paralysis. Don t fall into a false sense of security. We (the CSTC) are here to help you reach your security goals through our various services and projects, but... Computer Security Technology Center 31

...We need your help! Feedback on commercial products and services. Information on what products and services you are using so that we may serve as an information broker. Visit: http://ciac.llnl.gov/ cstc/cstchome.html CSTC CONTACTS SPCooper@LLNL.GOV CIAC@LLNL.GOV Computer Security Technology Center 32