Intranet, Extranet, Firewall



Similar documents
Proxy Server, Network Address Translator, Firewall. Proxy Server

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Firewall Design Principles Firewall Characteristics Types of Firewalls

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Chapter 20. Firewalls

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Security Technology: Firewalls and VPNs

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Cornerstones of Security

Fig : Packet Filtering

Cryptography and network security

12. Firewalls Content

Firewalls (IPTABLES)

Firewalls CSCI 454/554

Security threats and network. Software firewall. Hardware firewall. Firewalls

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Topics NS HS12 2 CINS/F1-01

Internet Security Firewalls

Chapter 9 Firewalls and Intrusion Prevention Systems

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Internet infrastructure. Prof. dr. ir. André Mariën

What would you like to protect?

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Internet Security Firewalls

IPv6 Firewalls. ITU/APNIC/MICT IPv6 Security Workshop 23 rd 27 th May 2016 Bangkok. Last updated 17 th May 2016

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Lecture 23: Firewalls

Computer Security: Principles and Practice

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

VPN. Date: 4/15/2004 By: Heena Patel

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

Computer Security DD2395

Chapter 20 Firewalls. Cryptography and Network Security Chapter 22. What is a Firewall? Introduction 4/19/2010

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

CMPT 471 Networking II

Types of Firewalls E. Eugene Schultz Payoff

Firewalls. Ahmad Almulhem March 10, 2012

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

CSCI Firewalls and Packet Filtering

21.4 Network Address Translation (NAT) NAT concept

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

ΕΠΛ 674: Εργαστήριο 5 Firewalls

CSCE 465 Computer & Network Security

Firewalls and Virtual Private Networks

Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering

Network Security and Firewall 1

Network Security and Firewalls. A Summary

Basics of Internet Security

Chapter 6: Network Access Control

OS/390 Firewall Technology Overview

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Solution of Exercise Sheet 5

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

CS5008: Internet Computing

Firewalls. Mahalingam Ramkumar

Firewall Implementation

How To Protect Your Network From Attack

Figure 41-1 IP Filter Rules

Security: Firewall/Proxy Server Chapter

Network Security Topologies. Chapter 11

Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs

Cisco Configuring Commonly Used IP ACLs

Network Defense Tools

CS155 - Firewalls. Simon Cooper <sc@sgi.com> CS155 Firewalls 22 May 2003

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Firewall Architecture

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

8. Firewall Design & Implementation

FIREWALL ARCHITECTURES

Overview. Firewall Security. Perimeter Security Devices. Routers

NETWORK SECURITY (W/LAB) Course Syllabus

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Computer Security DD2395

Virtual Private Networks

How To Understand A Firewall

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewalls. Chapter 3

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Overview - Using ADAMS With a Firewall

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Overview - Using ADAMS With a Firewall

Transcription:

Indian Institute of Technology Kharagpur Intranet, Extranet, Firewall Prof. Indranil Sen Gupta Dept. of Computer Science & Engg. I.I.T. Kharagpur, INDIA Lecture 31: Intranet, Extranet, Firewall On completion, the student will be able to: Define the terms Intranet and Extranet. Define the functionalities of Internet firewall. Describe various design alternatives for implementing a firewall. Illustrate a typical design of Intranet / Extranet. 1

Intranet and Extranet What is Intranet? Definition: An Intranet is a private computer network that uses Internet protocols, network connectivity, and possibly the public telecommunication system to securely share part of an organization s information or operations with its employees. 2

Basically. It uses the same concepts and technologies of the Internet (clients and servers) running on the TCP/IP protocol suite. HTTP, FTP and SMTP are very commonly used. Access to information is typically through browsers. Platform independent. No need to install special software on clients. Advantages: Intranets help employees to quickly locate information and applications relevant to their roles and responsibilities. Standard interface, allowing access from anywhere. Can serve as a powerful tool for communication within an organization. Both vertically and horizontally. Permits information to be published. 3

What is Extranet? Definition: An Extranet is a private network that uses Internet protocols, network connectivity, and possibly the public communication system to securely share part of an organization s information or operations with suppliers, partners, customers, or other businesses. Can be viewed as part of a company s Intranet that is extended to users outside the company. Basically. It is a private internet over the Internet. Used to designate private parts of a website. Only registered users can navigate. It requires security and privacy. Firewall server management. Issuance and use of digital certificates or similar means of authentication. Encryption of messages. Use of Virtual Private Networks (VPN) that tunnel through the public network. 4

Advantages: Can improve organization productivity. Allows information to be viewed at times convenient for external users. Cuts down on meeting times. Information can be updated instantly. Authorized users have immediate access to latest information. Can improve relationships with customers. Firewall 5

Why Firewalls? Firewalls are effective to: Protect local systems. Protect network-based security threats. Provide secured and controlled access to Internet. Provide restricted and controlled access from the Internet to local servers. Firewall Characteristics Design goals: All traffic from inside to outside must pass through the firewall. Only authorized traffic will be allowed to pass. Defined by local security policy. The firewall itself is immune to penetration. Use of trusted system with a secure operating system. 6

Types of Firewalls 1. Packet filters. 2. Application-level gateways. 3. Circuit-level gateways. Packet Filtering Firewall INTERNET Packet Filtering router PRIVATE NETWORK Some of the attacks that can be made on packet filtering routers: IP address spoofing Source Routing attacks Tiny fragment attacks 7

Packet Filtering Firewall (contd.) Applies a set of rules to each incoming IP packet and then forwards or discards the packet. Typically based on IP addresses and port numbers. Filter packets going in both directions. The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header. Two default policies (discard or forward). Packet Filtering Firewall (contd.) Advantages: Simplicity Transparency to users High speed Disadvantages: Difficulty of setting up packet filter rules Lack of authentication 8

Application-level Gateway Outside Host Outside connection TELNET FTP SMTP HTTP Inside connection Inside Host Application Level Gateway Also called a Proxy Server; acts as relay of application level traffic. It is service specific. Application-level Gateway Application-level Gateway Also called proxy server Acts as a relay of application-level traffic Advantages: Higher security than packet filters Only need to scrutinize a few allowable applications Easy to log and audit all incoming traffic Disadvantages: Additional processing overhead on each connection (gateway as splice point) 9

Circuit-Level gateway Outside connection Out In Outside Host Out Out In In Inside connection Circuit Level Gateway Inside Host Circuit-level Gateway (contd.) Stand-alone system, or specialized function performed by an Application-level Gateway. Does not permit end-to-end TCP connection; rather the gateway sets up two TCP connections: The gateway typically relays TCP segments from one connection to the other without examining the contents. The security function consists of determining which connections will be allowed. 10

Typically use is a situation in which the system administrator trusts the internal users. An example is the SOCKS package. Bastion Host It is a system identified by the firewall administrator as a critical point in the network s security. It executes a secure version of its OS and is trusted. It consists of services which are essential. Requires additional authentication before access is allowed. 11

Firewall Configurations In addition to the use of simple configuration of a single system, more complex configurations are possible. Three common configurations are in popular use. Single-homed host. Dual-homed host. Screened subnet. Single-homed Host Bastion Host Private Network Hosts Internet Packet filtering router Information Server Private Network Hosts 12

Firewall consists of two systems: A packet-filtering router A bastion host Configuration for the packet-filtering router: Only packets from and to the bastion host are allowed to pass through the router. The bastion host performs authentication and proxy functions. Greater security than single configurations because of two reasons: Implements both packet-level and application-level filtering (allowing for flexibility in defining security policy). An intruder must generally penetrate two separate systems. 13

Dual-homed host Bastion Host Internet Packet filtering router Information Server Private Network Hosts This configuration physically prevents security breach. The packet-filtering router is not completely compromised. Traffic between the Internet and other hosts on the private network has to flow through the bastion host. 14

Screened Subnet Bastion Host Internet Outside router Inside router Private Network Information Server Most secure configuration of the three. Two packet-filtering routers are used. Creation of an isolated sub-network. 15

Advantages: Three levels of defense to thwart intruders. The outside router advertises only the existence of the screened subnet to the Internet. Internal network is invisible to the Internet. The inside router advertises only the existence of the screened subnet to the internal network. The systems on the inside network cannot construct direct routes to the Internet. Intranet / Extranet Design Issues 16

For Intranet: Analysis of the organization flow. Identify various cross-sections of employees, and their access privileges. Enforce authentication mechanism. For Extranet: Security is the major concern. Combination of firewalls, authentication, VPN, etc. must be used. 17

SOLUTIONS TO QUIZ QUESTIONS ON LECTURE 30 Quiz Solutions on Lecture 30 1. What is the basic concept behind InputStream and OutputStream in Java? They are abstract classes supported by Java. Concept of InputStream can be used to abstract any kind of input. Concept of OutputStream can be used to abstract any kind of output. 18

Quiz Solutions on Lecture 30 2. How can you read one line of text at a time from a file called data.in? DataInputStream inp = new DataInputStream (new FileInputStream ( data.in )); String line = inp.readline(); 3. What are the functions of the ServerSocket() and the accept() methods? The ServerSocket() method is used to initialize a server socket, and the accept() method is used to make the server wait for client connection. Quiz Solutions on Lecture 30 4. When would you prefer to have a concurrent server? Concurrent servers are preferred in cases where multiple simultaneous client requests are likely, and also the service time is considerably long. 19

Quiz Solutions on Lecture 30 5. What are the functions of the DatagramPacket and the DatagramSocket classes? The DatagramPacket class acts as the data container; the packet data are contained in it. The DatagramSocket class defines the socket for sending and receiving datagrams. QUIZ QUESTIONS ON LECTURE 31 20

Quiz Questions on Lecture 31 1. What is the main difference between an Intranet and an Extranet? 2. How does a packet filtering router typically filters packets? 3. How does an application level gateway carry out the filtering process? 4. Which would be more suitable for email filtering: packet-level filter or applicationlevel gateway? 5. What is a bastion host? Quiz Questions on Lecture 31 6. In the dual-homed host firewall, how many security points must be broken by an intruder before he can get into the internal network? 7. Repeat the above for screened subnet firewall. 21