ENSC 427: Communication Networks

Similar documents
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

BASIC ANALYSIS OF TCP/IP NETWORKS

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

VPN. Date: 4/15/2004 By: Heena Patel

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Fig : Packet Filtering

SSL VPN Technology White Paper

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

ReadyNAS Remote White Paper. NETGEAR May 2010

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Internet Security Firewalls

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Security Technology: Firewalls and VPNs

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Networking for Caribbean Development

Intranet, Extranet, Firewall

21.4 Network Address Translation (NAT) NAT concept

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Lecture 23: Firewalls

NAS 224 Remote Access Manual Configuration

Firewalls. Network Security. Firewalls Defined. Firewalls

Figure 41-1 IP Filter Rules

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

Testing Network Security Using OPNET

Security Labs in OPNET IT Guru

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

12. Firewalls Content

How To Configure SSL VPN in Cyberoam

Chapter 9 Firewalls and Intrusion Prevention Systems

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

Solution of Exercise Sheet 5

IP Filter/Firewall Setup

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Chapter 11 Cloud Application Development

Analysis and Simulation of VoIP LAN vs. WAN WLAN vs. WWAN

Are Second Generation Firewalls Good for Industrial Control Systems?

Security threats and network. Software firewall. Hardware firewall. Firewalls

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Security. TestOut Modules

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Building A Secure Microsoft Exchange Continuity Appliance

Protecting and controlling Virtual LANs by Linux router-firewall

Firewall and UTM Solutions Guide

Firewall Defaults and Some Basic Rules

CTS2134 Introduction to Networking. Module Network Security

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Sage ERP Accpac Online

OCR LEVEL 3 CAMBRIDGE TECHNICAL

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, Page 1

Internet Security Firewalls

NETWORK DESIGN BY USING OPNET IT GURU ACADEMIC EDITION SOFTWARE

CompTIA Network+ (Exam N10-005)

- Introduction to Firewalls -

Lab Configuring Access Policies and DMZ Settings

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Network Access Security. Lesson 10

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Advanced Higher Computing. Computer Networks. Homework Sheets

Technical White Paper

EXPLORER. TFT Filter CONFIGURATION

Firewall Design Principles Firewall Characteristics Types of Firewalls

Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from

IVCi s IntelliNet SM Network

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch

- Introduction to PIX/ASA Firewalls -

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Configuration Example

Firewall VPN Router. Quick Installation Guide M73-APO09-380

allow all such packets? While outgoing communications request information from a

Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Multi-Homing Dual WAN Firewall Router

Intro to Firewalls. Summary

Basics of Internet Security

Using IPsec VPN to provide communication between offices

Network Defense Tools

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0

Cornerstones of Security

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Transcription:

Spring 2012 ENSC 427: Communication Networks Creating a Secure Network through Firewalls and Virtual Private Networks http://www.sfu.ca/~msa102 Team #2 Maxim Soleimani-Nouri Andy Cheng Saman Mehdizadeh msa102@sfu.ca alc21@sfu.ca sas20@sfu.ca 301103660 301090416 301092517

Roadmap Motivation Background Information OPNET Simulation Results & Discussion Related Works Future Works Conclusion References 2

Roadmap Motivation Background Information OPNET Simulation Results & Discussion Related Works Future Works Conclusion References 3

Motivation Why bother with security? These services connect to the internet. Internet has evolved into a place ridden with viruses, spyware, and malicious users. What forms of security are available? 4

Roadmap Motivation Background Information OPNET Simulation Results & Discussion Related Works Future Works Conclusion References 5

What is a Firewall? DEFINITION: A device used to regulate traffic by enforcing specific policies Three main types: Packet filtering Network (or stateful packet inspection) Application 6

Packet Filtering Firewall Began in 1988 as a Packet Filter Looks at IP header of packet containing the protocol (TCP/UDP), source/destination and port number Block certain applications (http, ftp, telnet, etc.) by blocking a specific port. Ex. Select TCP and port 23 to block telnet access Advantages: most devices on your network have it, easy to implement for fast security Disadvantages: cannot look into the payload 7

Stateful inspection Firewalls 1989-1990 emergence of stateful filters, or inspection Looks at the session information such as protocol, new or existing connection and source and destination port numbers. Ability to inspect the payload if it matches the protocol (if HTTP connection, it checks if the content is legitimate HTTP data) Advantage: very fast (compared to application firewalls) 8

How Packet-Inspections Works 9

Application/Proxy Firewall Operates at layer 7 of the OSI model (application layer) The firewall or proxy acts as a mediator between client and IP service Advantages: acts on behalf of client, protects against port scans and application attacks Disadvantages: much slower than packet filtering and inspection (must host the application) 10

How Proxies Work 11

The Modern Firewall Ex : Allow firewall to permit only database traffic to flow in and/or out of the server Internet Database Firewall Server 12

Virtual Private Networks We now know how to protect our network from unauthorized access How do you remotely access network services? Create a logical private tunnel between two routers over the internet, or Virtual Private Network (VPN) No need for physical connection Remote user can access anything on the protected network regardless of firewall 13

Types of VPNs Two types of VPNs Voluntary Compulsory Voluntary: client initiates connection with VPN server Compulsory: connection created between two VPN servers or routers Compulsory connections are done through either LAN or the internet Tunnels can be created at layer 2 and 3 of the OSI (data-link and network) 14

VPN Example Remote user trying to access services on the server located on a local area network VPN router is placed between the LAN and firewall creating a tunnel User sees direct connection to the server and the services that are offered by it Remote user can also access peripherals such as printers located inside the LAN through applications such as Telnet 15

Virtual Private Networks Remote User LAN VPN router Internet Firewall VPN router Server 16

Roadmap Motivation Background Information OPNET Simulation Results & Discussion Related Works Future Works Conclusion References 17

Firewall Scenario Application configuration is used to set which services are used in this project Profile configuration is used to set the applications accessible by the users 3 users(a,b,c) are connected through IP cloud Server is set to offer all services but is protected by the firewall Users A, B, and C are set to request HTTP & Database services Firewall is set to deny access to the Database 18

Firewall Scenario 19

Firewall and VPN Scenario VPN router is placed between the firewall and the server VPN configuration is set to create a tunnel between router A and the VPN router granting user A services offered by the server 20

Firewall and VPN Scenario 21

Roadmap Motivation Implementation OPNET Simulation Results & Discussion Related Works Future Works Conclusion References 22

Results and Discussion Response time for DB Queries is higher on networks with firewalls and VPNs. VPN networks introduced a little more delay as opposed to the firewall. Database Query Response time 23

Results and Discussion In default scenario, no packets were dropped globally Introducing a firewall caused a spike in packets dropped due to the blocking of DB access(red) When routera was tunneled to VPN_router, a Virtual Private Network was established, granting access to usera # of packets dropped per second This can be seen in the reduction of packet drops for the VPN scenario(green) 24

Results and Discussion In the case of the HTTP application, the response time was roughly the same for the default and firewall scenario In the VPN scenario, a slight delay was introduced. Page response time (HTTP) 25

Results and Discussion # of hops Here we look at the number of hops made A Hop is simply a distance between two network devices in a network For the firewall scenario, the packet must first hop from usera to routera, then to the IP cloud, then to the firewall, and finally to the server making a total of 4 hops as seen on the graph VPN introduces less hops on average since it creates a virtual gateway directly between usera and VPN_router 26

Results and Discussion Comparing usera and userb for Database traffic received usera Traffic Received for Database userb Traffic Received for Database 27

Results and Discussion Comparison of traffic statistics between usera and userb UserA and UserB Database traffic received. UserA receives traffic in the default scenario and also in the VPN scenario since it was tunnelled to VPN_router. 28

Results and Discussion Comparing usera and userb for HTTP traffic received usera: HTTP Traffic Received userb: HTTP Traffic Received 29

Results and Discussion Comparison of traffic statistics between usera and userb Web browsing (HTTP) traffic received for User A and UserB Since no restriction was placed upon web browsing applications for all scenarios, it is expected that the received traffic at users A, B, and C remain fairly static 30

Results and Discussion Comparing end-to-end packet delay usera: end to end packet delay userb: end to end packet delay 31

Results and Discussion Comparing end-to-end packet delay End-to-end delay is the time it takes for a packet to travel across the network from the source to destination UserA saw more delay in the VPN configuration as opposed to the default and firewall scenarios In a VPN connection, the client and server are sending packets at the UPLOAD speed. Upload speed is usually much slower than download, hence the higher end-toend delay UserB sees more delay in the default scenario mostly because no applications are blocked A higher traffic leading to longer delays will be expected. 32

Roadmap Motivation Background Information OPNET Simulation Results & Discussion Related Works Future Works Conclusion References 33

Related Works Security Comparison of Wired and Wireless Network with Firewall and Virtual Private Network (VPN). ICEIE 2010. Sapna, Sharma. Compares the performance of firewalls and VPNs in a wired and wireless scenario Examines which scenario is more secure for specific applications when both use a firewall and VPN Performance Evaluation of a wired Network with & without Load Balancer and Firewall. 2010 International Conference on Recent Trends in Information, Telecommunications and Computing. Kosta, Dalal, Jha. Examines performance of a WAN by comparing the effect of using a Load Balancer in a firewall Tests the network against a variety of applications including FTP, ATM, remote login and Print 34

Roadmap Motivation Background Information OPNET Simulation Results & Discussion Related Works Future Works Conclusion References 35

Future Work The capabilities of a firewall can be fully understood when put under high traffic Such traffic includes illegitimate traffic such as Distributed Denial of Service attacks As a future improvement, we want to implement the topology below Each attacker subnet consists of 8 zombies, configured to simultaneously bombard the firewall with high traffic We can employ several different Quality of Service (QoS) congestion methods such as Priority Queuing (PQ) and Weighted Fair Queuing (WFQ) 36

Future Work Topology of our existing VPN network with Attacker subnets 37

Future Work Topology of Attacker subnet 38

Roadmap Motivation Background Information OPNET Simulation Results & Discussion Related Works Future Works Conclusion References 39

Conclusion Three different scenarios (default, firewall, VPN) were created and compared various statistics. To verify that firewalls preventing Database access properly, received traffic statistics were examined. Firewalls and VPNs introduce latency as observed, however it is mostly negligible. VPNs in general have more latency compared to firewalls, although this is also because the VPN router was placed behind the firewall Traffic must pass through firewall first (more delay) VPN traffic travels through each same LAN wire twice, degrading performance Ex. From client to first VPN router, then VPN router encrypts data and then sends through the IP cloud to firewall 40

Roadmap Motivation Background Information OPNET Simulation Results & Discussion Related Works Future Works Conclusion References 41

References [1] Y.P. Kosta, U.D Dalal, R.K Jha, Security Comparison of Wired and Wireless Network with Firewall and Virtual Private Network (VPN) in 2010 Int. Conf. on Recent Trends in Information, Telecommunications and Computing. 2010. [2] Sapna, M. Sharma, Performance Evaluation of a wired Network with and without Load Balancer and Firewall, in 2010 Int. Conf. on Electronics and Information Engineering, ICEIE 2010. 2010. [3] Ray Blair, Arvind Durai. (2009, May 21). Chapter 1: Types of Firewalls [Online]. Available: http://www.networkworld.com/subnets/cisco/060109-ch1-cisco-securefirewalls.html?page=2 [4] Microsoft. VPNs and Firewalls [Online]. Available: http://technet.microsoft.com/enus/library/cc958037.aspx [5] Tech-faq. Tunneling [Online]. Available: http://www.tech-faq.com/tunneling.html 42

References [6] Shabana Razak, Miam Zhou, S.H. Lang, Network Intrusion Simulation using OPNET, IEEE Computer Design and Applications Repository. [7] Mian Zhou, Network Intrusion Detection: Monitoring, Simulation and Visualization, unpublished, 2005. [8] K. Salah, A. Alkhoraidly. An OPNET-based Simulation Approach for Deploying VoIP, unpublished. 43

44

45