Access Control: Firewalls (1)



Similar documents
ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

[Prof. Rupesh G Vaishnav] Page 1

Computer Networks. Chapter 5 Transport Protocols

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:

Transport Layer Protocols

Protocols. Packets. What's in an IP packet

CPS221 Lecture: Layered Network Architecture

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Transport and Network Layer

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Overview of TCP/IP. TCP/IP and Internet

CS335 Sample Questions for Exam #2

IP address format: Dotted decimal notation:

(Refer Slide Time: 02:17)

Lecture Computer Networks

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

Ethernet. Ethernet. Network Devices

Networking Test 4 Study Guide

Chapter 5. Transport layer protocols

NETWORK LAYER/INTERNET PROTOCOLS

Unix System Administration

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Why SSL is better than IPsec for Fully Transparent Mobile Network Access

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Transport Layer. Chapter 3.4. Think about

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Protocol Data Units and Encapsulation

TCP for Wireless Networks

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Fig : Packet Filtering

Internet Architecture and Philosophy

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Protocols and Architecture. Protocol Architecture.

The TCP/IP Reference Model

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Network layer: Overview. Network layer functions IP Routing and forwarding

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Data Link Layer Overview

Security threats and network. Software firewall. Hardware firewall. Firewalls

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

Mobile Communications Chapter 9: Mobile Transport Layer

Per-Flow Queuing Allot's Approach to Bandwidth Management

Objectives of Lecture. Network Architecture. Protocols. Contents

How do I get to

IP - The Internet Protocol

Architecture and Performance of the Internet

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Internet Packets. Forwarding Datagrams

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

CS101 Lecture 19: Internetworking. What You ll Learn Today

High Performance VPN Solutions Over Satellite Networks

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

What is Network Latency and Why Does It Matter?

Internet Protocols. Background CHAPTER

Question: 3 When using Application Intelligence, Server Time may be defined as.

The OSI and TCP/IP Models. Lesson 2

Final for ECE374 05/06/13 Solution!!

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Improved Digital Media Delivery with Telestream HyperLaunch

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

Network Security TCP/IP Refresher

Lecture 23: Firewalls

CSCI Firewalls and Packet Filtering

DATA COMMUNICATION AND NETWORKS

Security vulnerabilities in the Internet and possible solutions

Zarządzanie sieciami telekomunikacyjnymi

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

Protocol Rollback and Network Security

Multiple Choice Questions

Internet Protocols. Addressing & Services. Updated:

ELEC3030 Computer Networks

Computer Networks and the Internet

Mobile Computing/ Mobile Networks

Based on Computer Networking, 4 th Edition by Kurose and Ross

Security Technology: Firewalls and VPNs

TCP in Wireless Mobile Networks

Overview of Computer Networks

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Computer Networks Vs. Distributed Systems

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Transcription:

Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception desk in computer networks: firewalls

Access Control: Firewalls (2) Firewalls fall into four broad categories dependent on which layer they are implemented: packet filters circuit-level gateways application-level gateways multilayer inspection firewall Packet Filtering Firewall Circuit-Level Gateway

Access Control: Firewalls (3) Example of packet filtering rules Results of packet filtering

Access Control: Firewalls (4) Application-Level Gateway Multilayer Inspection Firewall Multilayering offer a high level of security and good performance but are expensive due to their complexity they are potentially less secure than simpler types of firewalls ---> require administration by highly competent personnel Firewalls introduce a trade-off between the degree of communication with the outside world and the level of security filters cannot prevent spoofing of IP addresses and port numbers ---> often use a all-or-nothing policy gateways can have software bugs ---> may allow attackers to penetrate them using wireless communication or dial-up modems ---> possibility of bypassing firewalls

Transport Layer(1) Ultimate goal: To provide efficient, reliable, and cost-effective service to its users, i.e. processes in the application layer. To achieve this goal, the transport layer makes use of the services provided by the network layer. This work is done by the so-called transport entity. It may be implemented in the OS kernel in a separate user process in a library package bound into network applications on a separate network interface card Logical relationship between the involved layers

Transport Layer(2) Why using two distinct layers (network and transport) for similar services: The network layer is part of the communication subnet and is run by the carrier (at least for WAN s) ---> The transport layer forms the major boundary between the provider and the user of a (reliable) data transmission service ---> Thanks to the transport layer, it is possible for application programs to run, using a standard set of primitives, on different networks with possibly different subnet interfaces and reliability features ---> It fulfills the key function of isolating the upper layers from the technology, design, and imperfections of the subnet ---> In essence, it makes it possible for the transport service to be more reliable than the underlying network service ---> This is the main difference between the two services: real networks can lose packets, are not error-free because of its connectionless (datagram) type the (connection-oriented) transport service provides a reliable service on top Nesting of TPDU s, packets, and frames

Transport Layer(4) Different environments for data link and transport protocols, resp. Implications for transport protocols: explicit addressing of destinations is required initial connection establishment is more complicated potential existence of storage capacity in the subnet larger and dynamically varying number of connections

Transport Layer(5) Addressing (first approach) Addressing (second approach)

Transport Layer(6) How to deal with delayed duplicates? We must devise mechanisms to kill aged packets that are still wandering about ---> Packet lifetime can be restricted to a known maximum using one of the following techniques: restricted subnet design putting a hop counter in each packet timestamping each packet Establishing a Connection Problem: Getting both sides (sender and receiver) to agree on the initial sequence number Solution: The three-way handshake (also adopted in TCP) Normal operation

Transport Layer(8) Duplicate CR (Connection request) Duplicate CR and ACK

Transport Layer(9) Releasing a Connection Easier than establishing one, but still with pitfalls Abrupt disconnection with loss of data The two-army problem

Transport Layer(10) Four scenarios of releasing using a three-way handshake a) normal use b) final ACK TPDU is lost c) second DR lost d) case c) plus attempts to retransmit also fail

Transport Layer(11) Flow control and buffering There are similarities and differences w.r.t. to the same topic in the data link layer. Basic Similarity: sliding window or other scheme is needed on each connection to keep a fast transmitter from overrunning a slow receiver Main difference: a router usually has relatively few lines whereas a host may have numerous connections Question of buffer size Another bottleneck: the carrying capacity of the subnet ---> congestion problem Solution approach (also adopted in TCP): A sliding window flow control scheme in which the sender adjusts dynamically the window size to match the network s carrying capacity

Transport Layer(14) The Internet TCP (Transmission Control Protocol) Goal: Provide a reliable (connection-oriented) end-to-end byte stream over an unreliable internetwork Service to provide: Accepted user data streams from local processes are broken into pieces not exceeding 64K bytes Reconstruction of the original byte stream by reassembling the pieces in the proper sequence Time out and retransmission in order to guarantee proper delivery The TCP service model both the sender and receiver create end points called sockets Each socket has an identifier (address):= (IP address, 16-bit number local to that host called port) To obtain TCP service, a connection must be established between sockets of the sender and receiver A socket may be used for multiple connections at the same time Connections are identified by the socket identifiers at both ends: (socket1, socket2)

Transport Layer(16) The TCP Segment header

Transport Layer(17) The window management (transmission policy) in TCP

Transport Layer(18) The silly window syndrome

Transport Layer(19) UDP (User Data Protocol) Goal: Provide a connectionless (unreliable) way for applications to send encapsulated raw IP datagrams ---> UDP is nothing else than IP + transport layer header The UDP header Typical use: Client-server applications that have one request and one response

Transport Layer(20) Summary The transport layer is the key to understanding layered protocols. Its most important service is to provide an end-to-end, reliable, connection-oriented byte stream from sender to receiver. To do so, it must establish connections over unreliable networks ---> it must cope with delayed duplicate packets ---> it is done by means of a three-way-handshake release connections which is easier but still has to face the two-army problem handle the service primitives that permit establishing, using, and releasing of connections manage connections(transmission policy) and timer The main Internet transport protocol is TCP data is exchanged in the form of segments it uses a fixed 20-byte header + optional part + zero or more data bytes the basic transmission protocol used is the sliding window protocol a great deal of work has gone into optimizing TCP performance using various algorithms