Packet filtering and other firewall functions



Similar documents
Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Overview. Firewall Security. Perimeter Security Devices. Routers

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Security Technology: Firewalls and VPNs

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Internet Security Firewalls

- Introduction to Firewalls -

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

CMPT 471 Networking II

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Firewall Design Principles

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

FIREWALLS & CBAC. philip.heimer@hh.se

CS155 - Firewalls. Simon Cooper <sc@sgi.com> CS155 Firewalls 22 May 2003

Proxy Server, Network Address Translator, Firewall. Proxy Server

Firewalls and System Protection

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

How To Understand A Firewall

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Guideline on Firewall

CIT 480: Securing Computer Systems. Firewalls

Internet infrastructure. Prof. dr. ir. André Mariën

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

12. Firewalls Content

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

Linux firewall. Need of firewall Single connection between network Allows restricted traffic between networks Denies un authorized users

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

Firewall Architecture

CIT 480: Securing Computer Systems. Firewalls

Internet Security Firewalls

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Chapter 11 Cloud Application Development

Firewalls. Network Security. Firewalls Defined. Firewalls

CSCI Firewalls and Packet Filtering

Firewalls. Chapter 3

8. Firewall Design & Implementation

Firewalls & Intrusion Detection

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Network Defense Tools

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Chapter 15. Firewalls, IDS and IPS

allow all such packets? While outgoing communications request information from a

Implementing Network Address Translation and Port Redirection in epipe

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Firewall Firewall August, 2003

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Network Security. Internet Firewalls. Chapter 13. Network Security (WS 2002): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

A S B

Security threats and network. Software firewall. Hardware firewall. Firewalls

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

Chapter 8 Network Security

Network Address Translation (NAT)

Firewalls, IDS and IPS

ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

INTRODUCTION TO FIREWALL SECURITY

What would you like to protect?

Computer Security: Principles and Practice

MULTI WAN TECHNICAL OVERVIEW

How To Protect Your Network From Attack

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Computer Security DD2395

FIREWALLS IN NETWORK SECURITY

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

DMZ Network Visibility with Wireshark June 15, 2010

Appendix D: Configuring Firewalls and Network Address Translation

Chapter 7. Firewalls

Firewall Design Principles Firewall Characteristics Types of Firewalls

FIREWALL ARCHITECTURES

Firewall and Router Policy

CSCE 465 Computer & Network Security

Security perimeter. Internet. - Access control, monitoring and management. Differentiate between insiders and outsiders - Different types of outsiders

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

Protecting and controlling Virtual LANs by Linux router-firewall

Networking Basics and Network Security

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Transcription:

Packet filtering and other firewall functions Martin Krammer mk@sbox.tugraz.at Martin Krammer Graz, May 25, 2007 1

Overview Firewalls Principles Architectures Security aspects Packet filtering Principles Static packet filters Dynamic packet filters Attacks Additional functions NAT PAT port forwarding 2

Principles Firewalls protective device control traffic between computer networks different zones of trust interfaces between zones security policies default-deny as best practice only as good as its administrator relies heavily on network architecture 3

Software protects single machine Personal Firewalls Desktop Firewalls easy configuration Hardware Types easy to difficult configuration built into several device types Modems Routers Gateways Appliances... capable devices to secure different-sized networks 4

Dual homed host Architectures 2 network interfaces public network talks to dual homed host internal network talks to dual homed host no direct communication, IP traffic blocked proxying as a solution 5

Screened host security due to packet filtering separate router packet filtering on router external connections to bastion host bastion host inside internal network points-of-failure router bastion host Architectures 6

Screened subnet Architectures perimeter network (de-militarized zone) for additional security internal traffic doesn't pass perimeter network one or more hosts on the perimeter network internal to external connections packet filtering on routers proxy servers on perimeter network 2 routers interior exterior 7

many more possible individual network design Do multiple bastion hosts multiple internal networks merge interior & exterior routers merge bastion host & external router... Don't Architectures merge bastion host & interior router internal traffic visible to bastion host 2 or more interior routers between perimeter & internal network... 8

route packets selectively allow or block packets permit or deny services packet filter rules due to security policies Network layer layer 3 does not protect against faulty services on machines Alternative proxy servers Packet filtering 9

packet properties Packet information IP source address IP destination address Protocol (whether the packet is a TCP, UDP, or ICMP packet) TCP or UDP source port TCP or UDP destination port ICMP message type direction inbound outbound routers decisions (the interface the packet arrives on) the interface the packet will go out on route or not the packets content is not important for packet filtering 10

Services services reside on different port numbers ranges specify port number in rule-set 0-1023: fixed 1024-49151: registerable, IANA 49152-65535: dynamic, variable use 11

one packet filtering router can protect entire network no additional effort no user interaction no reconfiguration of client machines widely available hardware and software products Advantages 12

rule sets Disadvantages can be hard to configure difficult to test bugs implementation may permit packets which should be denied 13

for each packet go through the rules find the first one that matches take action according to rule default-rule or default-deny Rules product specific implementations tipps interface-based rules definition of rule-sets use addresses, not hostnames define explicit default-rule 14

Rules 2 static filtering according to fixed rules dynamic filtering stateful inspection remember outgoing packets let corresponding response in criteria: Socket host port layer 3 & 4 rules modified on the fly time-limited 15

Application firewalls layer 7 (application layer) separate proxy for each protocol advantages content inspection analysis of actions machine learning mechanisms authentication separation of networks disadvantages ressource intense real-time requirements protocol-specific proxies needed 16

hybrid solutions best of packet filtering proxy solutions internet technology changes IPv4 vs IPv6 NAT, masquerading,... 3 rd generation firewalls 17

obvious things Attacks intrusion communicate with services behind the firewall run code behind firewalls information theft DoS flooding re-route, redirect, spoofing eavesdropping network sniffing things that happen misconfigured firewall systems network security problems rendering firewall systems redundant 18

Firewall piercing Attacks 2 covert channel communication channel that allows transfer of information that violates the systems security policy without alerting firewalls & IDSs stealthy nature traffic sent through permitted ports HTTP-Tunnel http://www.nocrew.org/software/httptunnel.html http://entreelibre.com/cctt/index_en.html ICMP-Tunnel http://www.securiteam.com/tools/5pp0m0k60o.html DNS DNS is allowed to any internal client 19

network address translation NAT due to lack of IPv4-addresses reserved address ranges for internal uses e.g. class C: 192.0.0.1-223.255.255.255 map internal to external IP-addresses NAT-device remembers mapping convenient feature with security aspect not designed for security 20

port address translation port numbers rewritten outgoing packets Masquerading, PAT source-ip/port replaced by public-ip/port mapping saved in tables incoming packets use table to lookup inquirer external machines can't reach servers since connections can only be instantiated from internal machines solution: port forwarding 21

configured on routers servers port forwarding router listens on given public port forward port on public interface to specific address/port on internal network located in internal network become available to external network 22

Questions? 23

Exam Questions Name a common firewall architecture and describe its benefits as well as its drawbacks. What is the advantage of dynamic packet filtering over static packet filtering? Describe its mechanism in detail. 24

References Building internet firewalls D. Brent Chapman & Elizabeth D. Zwicky; O'Reilly 1995 Wikipedia, 05/2007 Firewalls OSI model Ports Firewalls FAQ http://www.interhack.net/pubs/fwfaq/, 05/2007 Firewall Tutorial Dr. Udo Payer, 2005 25