8. Firewall Design & Implementation



Similar documents
Firewall Environments. Name

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Network Defense Tools

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Cisco Secure PIX Firewall with Two Routers Configuration Example

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls. Chapter 3

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Firewall Design Principles

CMPT 471 Networking II

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

Overview. Firewall Security. Perimeter Security Devices. Routers

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

A Model Design of Network Security for Private and Public Data Transmission

Internet Security Firewalls

Chapter 15. Firewalls, IDS and IPS

FIREWALLS & CBAC. philip.heimer@hh.se

Chapter 9 Firewalls and Intrusion Prevention Systems

Access control policy: Role-based access

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Building Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000

Chapter 11 Cloud Application Development

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

CCNA Security 1.1 Instructional Resource

Cisco PIX vs. Checkpoint Firewall

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Figure 41-1 IP Filter Rules

7. Firewall - Concept

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

A S B

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Internet Security Firewalls

Security Technology: Firewalls and VPNs

PROFESSIONAL SECURITY SYSTEMS

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Firewall and Router Policy

Network Security Topologies. Chapter 11

Proxy Server, Network Address Translator, Firewall. Proxy Server

CISCO IOS NETWORK SECURITY (IINS)

Firewall Security. Presented by: Daminda Perera

Firewalls, IDS and IPS

Intro to Firewalls. Summary

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewalls. Ahmad Almulhem March 10, 2012

INTRUSION DETECTION SYSTEMS and Network Security

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Firewalls (IPTABLES)

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

INTRODUCTION TO FIREWALL SECURITY

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Firewall Audit Techniques. K.S.Narayanan HCL Technologies Limited

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

Guideline on Firewall

The Bomgar Appliance in the Network

ICAB5238B Build a highly secure firewall

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Network Security Management

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

OLD DOMINION UNIVERSITY Router-Switch Best Practices. (last updated : )

Firewalls and Virtual Private Networks

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

12. Firewalls Content

Overview - Using ADAMS With a Firewall

Firewall Architecture

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Deploying Firewalls Throughout Your Organization

What would you like to protect?

Overview - Using ADAMS With a Firewall

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Firewalls. Pehr Söderman KTH-CSC

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Firewall Firewall August, 2003

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

CSCI 4250/6250 Fall 2015 Computer and Networks Security

ENTERPRISE IT SECURITY ARCHITECTURE SECURITY ZONES: NETWORK SECURITY ZONE STANDARDS. Version 2.0

Load Balance Router R258V

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance

Transcription:

DMZ Networks The most common firewall environment implementation is known as a DMZ, or DeMilitarized Zone network. A DMZ network is created out of a network connecting two firewalls; i.e., when two or more firewalls exist in an environment, the networks connecting the firewalls can be DMZ networks

DMZ Networks DMZ networks serve as attachment points for computer systems and resources that need to be accessible either externally or internally, but that should not be placed on internal protected networks. For example, an organization could employ a boundary router firewall and two internal firewalls, and place all externally accessible servers on the outer, or external DMZ between the router and the first firewall. The boundary router would filter packets and provide protection for the servers, and the first firewall would provide access control and protection from the servers in case they were attacked. The organization could locate other internally accessible servers on the internal DMZ located between the two internal firewalls; the firewalls could provide protection and access control for the servers, protecting them both from external and internal attack.

Virtual Private Networks A virtual private network is constructed on top of existing network media and protocols by using additional protocols and usually, encryption. If the VPN is encrypted, it can be used as an extension of the inner, protected network. In most cases, virtual private networks are used to provide secure network links across networks that are not trusted. For example, virtual private network technology is increasingly used in the area of providing remote user access to organizational networks via the global Internet.

Placement of VPN Servers In most cases, placing the VPN server at the firewall is the best location for this function. Placing it behind the firewall would require that VPN traffic be passed outbound through the firewall encrypted and the firewall is then unable to inspect the traffic, inbound or outbound, and perform access control, logging, or scanning for viruses, etc. Advanced virtual private network functionality comes with a price, however. For example, if VPN traffic is encrypted, there will be a decrease in performance commensurate with (a) the amount of traffic flowing across the virtual private network, and (b) the type/length of encryption being used. Performing encryption in hardware will significantly increase performance, however. For some DMZ environments, the added traffic associated with virtual private networks might require additional capacity planning and resources.

Intranets An intranet is a network that employs the same types of services, applications, and protocols present in an Internet implementation, without involving external connectivity. For example, an enterprise network employing the TCP/IP protocol suite, along with HTTP for information dissemination would be considered an Intranet. Most organizations currently employ some type of intranet, although they may not refer to the network as such. Within the internal network (intranet), many smaller intranets can be created by the use of internal firewalls. As an example, an organization may protect its personnel network with an internal firewall, and the resultant protected network may be referred to as the personnel intranet.

Extranets Extranets form the third piece of the modern enterprise connectivity picture. An extranet is usually a business-to-business intranet; that is, two intranets are joined via the Internet. The extranet allows limited, controlled access to remote users via some form of authentication and encryption such as provided by a VPN. Extranets share nearly all of the characteristics of intranets, except that extranets are designed to exist outside a firewall environment. By definition, the purpose of an extranet is to provide access to potentially sensitive information to specific remote users or organizations, but at the same time denying access to general external users and systems. Extranets employ TCP/IP protocols, along with the same standard applications and services. Many organizations and agencies currently employ extranets to communicate with clients and customers. Within an extranet, options are available to enforce varying degrees of authentication, logging, and encryption.

Infrastructure Components: Hubs and Switches There are numerous weaknesses associated with network hubs. First and foremost, network hubs allow any device connected to them to see the network traffic destined for, or originating from, any other device connected to that same network hub. For this reason, network hubs should not be used to build DMZ networks or firewall environments. A more advanced infrastructure device is the network switch. Network switches are Layer 2 devices, which means that they actually employ basic intelligence in providing attachment points for networked systems or components. Network switches are essentially multiport bridges, so they are also capable of delivering the full network bandwidth to each physical port. Another side effect of the bridging nature of switches is that systems connected to a switch cannot eavesdrop on each other. These anti-eavesdrop capabilities inherent in network switches make them useful for implementing DMZ networks and firewall environments.

Intrusion Detection Systems Intrusion Detection Systems (IDS) are designed to notify and in some cases prevent unauthorized access to a networked system or resource. Many intrusion detection systems are also capable of interacting with firewalls in order to bring a reactive element to the provision of network security services. Firewalls that interact with intrusion detection systems are capable of responding to perceived remote threats automatically, without the delays associated with a human response. For example, if an intrusion detection system detects a denial-of-service attack in progress, it can instruct certain firewalls to automatically block the source of the attack (albeit, false positives responses can occur).

Placement of Servers in Firewall Environments Where to place servers in a firewall environment depends on many factors, including the number of DMZs, the external and internal access required for the servers located on the DMZ, the amount of traffic, and the sensitivity of the data served. It is not possible to proscribe a one size fits all recommendation for server location, but several guidelines can be used to make the determination, including the following: Protect external servers with a Boundary Router/Packet Filter. Do not place externally accessible servers on the protected network. Place internal servers behind internal firewalls as their sensitivity and access require. Isolate servers such that attacks on the servers do not impair the rest of the network.

Firewall Implementation Keep It Simple The KISS principle is something that should be first and foremost in the mind of a firewall environment designer. Essentially, the more simple the firewall solution, the more secure it likely will be and the easier it will be to manage. Complexity in design and function often leads to errors in configuration.

Firewall Implementation Use Devices as They Were Intended to Be Used Using network devices as they were primarily intended in this context means do not make firewalls out of equipment not meant for firewall use. For example, routers are meant for routing; their packet filtering capability is not their primary purpose, and the distinction should never be lost on those designing a firewall implementation. Depending on routers alone to provide firewall capability is dangerous; they can be misconfigured too easily. Network switches are another example (see Section 3.6); when used to switch firewall traffic outside of a firewall environment, they are susceptible to attacks that could impede switch functionality. In many cases, hybrid firewalls and firewall appliances are better choices simply because they are optimized to be firewalls first and foremost

Firewall Implementation Create Defense in Depth Defense in depth involves creating layers of security as opposed to one layer. The infamous Maginot line is, in hindsight, an excellent example of what not to do in firewall environments: place all your protection at the firewall. Where several firewalls can be used, they should be used. Where routers can be configured to provide some access control or filtering, they should be. If a server s operating system can provide some firewall capability, use it.

Firewall Implementation Pay Attention to Internal Threats Lastly, attention to external threats to the exclusion of internal threats leaves the network wide open to attack from the inside. While it may be difficult to think of your work colleagues as posing a potential threat, consider that an intruder who gets past the firewall somehow could now have free reign to attack internal or external systems. Therefore, important systems such as internal web and email servers or financial systems should be placed behind internal firewalls or DMZ environments.

8. Firewall Policy Firewall Policy A firewall policy dictates how the firewall should handle applications traffic such as web, email, or telnet. The policy should describe how the firewall is to be managed and updated. The steps involved in creating a firewall policy are as follows: Identification of network applications deemed necessary, Identification of vulnerabilities associated with applications, Cost-benefits analysis of methods for securing the applications, Creation of applications traffic matrix showing protection method, and Creation of firewall rulesets based on applications traffic matrix.

8. Firewall Policy Applications traffic matrix

8. Firewall Policy Implementing a Firewall Ruleset Most of firewall platforms utilize rulesets ad their mechanism for implementing security controls. The contents of these rulesets determine the actual functionality of a firewall. Depending on the firewall platform architecture, firewall rulesets can contain various pieces of information. Nearly all rulesets, however, will contain the following fields, as minumum: The source address of packet. The destination address of packets. Possibly some characteristics of the Layer 4 communication sessions. Sometimes information pertaining to which interface of the router the packet came from and which interface of the router the packet is destined for. An action, such as Deny or Permit the packet, or Drop the packet.

8. Firewall Policy Implementing a Firewall Ruleset The firewall rulesets should always block the following types of traffic: Inbound traffic from a non-authenticated source system with a destination address of the firewall system itself. Inbound traffic with a source address indicating that the packet originated on a network behind the firewall. This type of packet likely represents some type of spoofing attack. Inbound traffic from a non-authenticated source system containing SNMP (Simple Network Management Protocol) traffic. These packets can be an indicator that an intruder is probing a network, but there are few reasons an organization or agency might want to allow inbound SNMP traffic, and it should be blocked in the vast majority of circumstances. Inbound or Outbound network traffic containing a source or destination address of 127.0.0.1 (localhost). Such traffic is usually some type of attack against the firewall system itself.

8. Firewall Policy Testing Firewall Policy In many cases, firewall policy can be verified using one of two methodologies. The first methodology, and by far the easiest, is Obtain hardcopies of the firewall configurations and compare these hardcopies against the expected configuration based on defined policy. All organizations, at a minimum, should utilize this type of review. in-place configuration testing. In this methodology, the organization utilizes tools that assess the configuration of a device by attempting to perform operations that should be prohibited. Although these reviews can be completed with public domain tools, many organizations, especially those subject to regulatory requirements, will choose to employ commercial tools.

8. Firewall Policy Implementing a Firewall Rulesets CheckPoint Policy Editor

8. Firewall Policy Implementing a Firewall Rulesets Cisco PIX Rules

8. Firewall Policy Implementing a Firewall Rulesets Symantec

8. Firewall Policy Implementing a Firewall Rulesets Firewall Builder

8. Firewall Policy

8. Firewall Policy Firewall Policy 1. Allow Web traffic (TCP 80/443) from any external address to internal web server 2. Allow DNS (UDP 53) from any external address to internal DNS server 3. Allow SMTP (TCP 25) from any external address to internal POP server 4. Allow Oracle (TCP 1521) from Accounting Dept. to internal DB server 5. Allow Web traffic (TCP 80/443) from Sales Dept. to any address. 6. Allow Web traffic (TCP 80/443) from Marketing Dept. to any address 7. DROP Firewall Rule Sets Source Src Port Destination Dst Port Protocol Action