What is Firewall Builder



Similar documents
Configuring Firewalls An XML-based Approach to Modelling and Implementing Firewall Configurations

Firewalls. Pehr Söderman KTH-CSC

SECURE YOUR NETWORK WITH FIREWALL BUILDER

Lab Configuring Access Policies and DMZ Settings

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

- Introduction to Firewalls -

DHCP & Firewall & NAT

Cisco Configuring Commonly Used IP ACLs

IPv6 Security from point of view firewalls

- Network Address Translation -

Securing Networks with PIX and ASA

Jason Dixon DixonGroup Consulting. September 17, 2005 NYCBSDCON 2005

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Assignment 3 Firewalls

Craig Pelkie Bits & Bytes Programming, Inc. craig@web400.com

Check Point Software Technologies LTD. Creating A Generic Service Proxy (GSP) Using Network Address Translation (NAT)

Firewall Builder Architecture Overview

IPv6-only hosts in a dual stack environnment

GregSowell.com. Mikrotik Security

Lab Configuring Access Policies and DMZ Settings

Lab Objectives & Turn In

IP Address: the per-network unique identifier used to find you on a network

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

Firewall. IPTables and its use in a realistic scenario. José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 FEUP MIEIC SSIN

+ iptables. packet filtering && firewall

Firewall Builder 5 User's Guide

FreeBSD Firewalls SS- E Kevin Chege ISOC

TCP/IP Basis. OSI Model

Introduction to Firewalls

OpenBSD in the wild...a personal journey

Manuale Turtle Firewall

Status of Open Source and commercial IPv6 firewall implementations

Stateful Firewalls. Hank and Foo

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Innominate mguard Version 6

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Optimisacion del ancho de banda (Introduccion al Firewall de Linux)

How to Open HTTP or HTTPS traffic to a webserver behind the NetVanta 2000 Series unit (Enhanced OS)

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

Implementing Network Address Translation and Port Redirection in epipe

ipchains and iptables for Firewalling and Routing

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

CS Computer and Network Security: Firewalls

Policy Based Forwarding

Innominate Security Configuration Manager

FIREWALL AND NAT Lecture 7a

Firewall Firewall August, 2003

8. Firewall Design & Implementation

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

Firewalls. Chapter 3

PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example

CS Computer and Network Security: Firewalls

Adding an Extended Access List

Firewalls. Chien-Chung Shen

Protecting and controlling Virtual LANs by Linux router-firewall

Firewall Defaults and Some Basic Rules

CSE543 - Computer and Network Security Module: Firewalls

7. Firewall - Concept

NATed Network Testing IxChariot

CSC574 - Computer and Network Security Module: Firewalls

Application Note. Stateful Firewall, IPS or IDS Load- Balancing

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0

IPv6 Security:Threats and solutions

Safe network analysis

Focus on Security. Keeping the bad guys out

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

EXPLORER. TFT Filter CONFIGURATION

FWSM introduction Intro 5/1

Firewall Examples. Using a firewall to control traffic in networks

NETASQ MIGRATING FROM V8 TO V9

Configuring Network Address Translation

Firewalls. Ahmad Almulhem March 10, 2012

Firewall implementation and testing

Case Study 2 SPR500 Fall 2009

Cisco Secure PIX Firewall with Two Routers Configuration Example

Firewall. FortiOS Handbook v3 for FortiOS 4.0 MR3

Network Security Management

Definition of firewall

A Model Design of Network Security for Private and Public Data Transmission

How to protect your home/office network?

Snort. A practical NIDS

PAN-OS Syslog Integration

IPv6 Security Best Practices. Eric Vyncke Distinguished System Engineer

BorderWare Firewall Server 7.1. Release Notes

Packet filtering with Linux

CIS 433/533 - Computer and Network Security Firewalls

Enabling NAT and Routing in DGW v2.0 June 6, 2012

ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration

Firewalls und IPv6 worauf Sie achten müssen!

BF2CC Daemon Linux Installation Guide

WiNG 5.X How To. Policy Based Routing Cache Redirection. Part No. TME Rev. A

Parallels Plesk Panel

Linux as an IPv6 dual stack Firewall

Cisco Adaptive Security Device Manager Version 5.2F for Cisco Firewall Services Module Software Version 3.2

Transcription:

Firewall Builder

The Problem In a heterogeneous environment, the administrator needs to be proficient with many different tools and CLI Administrator should understand how various firewalls differ in their capabilities and features Transition from one platform to another requires complete reconfiguration Good Open Source firewall implementations do not have decent user interface (iptables, ipfilter, pf) 2

What is Firewall Builder Multi platform firewall configuration and management tool Administrator works with an abstract firewall rather than specific firewall implementation Uses object oriented approach to the firewall policy design Supports iptables, ipfilter, pf, ipfw and Cisco PIX Designed to support complex firewall configurations, can manage multiple firewalls from a single management workstation 3

Model of the Firewall Synthetic firewall, combines useful features found in different implementations and adds new ones Uses emulation to implement features absent on the target firewall platform Some features can not be emulated; the GUI and policy compilers can check for these limitations 4

Firewall Created by Firewall Builder policy and Network Address Translation (NAT) are represented as a set of standardized rules the first rule that matches the packet makes a decision and stops processing "implied deny" empty policy blocks everything NAT is done before applying policy rules firewall assumed to be stateful policy rules may be associated with interfaces, but it is not mandatory negation is supported in policy and NAT rules 5

Supported Types of NAT rules translating source address and optionally a port translating destination address and optionally a port translating both source and destination address and optionally a port translating only port numbers "no nat" rule 6

GUI Uses object oriented approach Presents objects and rules visually uses drag and drop operations to edit the policy Supports quick object inspection in rules using standard tooltip GUI widgets Comes with a library of standard objects Integrates network discovery wizards for quick object creation 7

GUI Screenshot 8

Standard Objects Objects and address ranges representing networks RFC 1918, link local, test net, this net, multicast and broadcast addresses Over 130 objects representing often used services, such as http, smtp etc. Library is expanded with every release 9

Policy Compilers Translate rules defined in the GUI into the target firewall configuration language. Compiler consists of several elementary building blocks, or Rule Processors. Each rule processor performs elementary operation on a rule and passes it to the next. Original Rules rule #4 rule #3 rule #2 rule #1 Rule Processor 1 Rule Processor 2 Rule Processor 3 Processed Rules rule #4 rule #4.1 rule #3 rule #3.1 rule #2 10 rule #1

Rule Processors Operations include rule verification, transformation and optimization. Rule processors may operate on a single rule or the whole rule set. Each rule processor is a C++ class Rule processors can be reused in different policy compilers 11

Detecting Errors It is important to catch as many errors in the policy as possible off line Policy compilers recognize fatal and non fatal errors: misconfigurations of interfaces, addresses, netmasks missing objects Illegal and conflicting policy and NAT rules "rule shadowing" 12

Examples of Rule Processors 1.Convert complex rule to a set of atomic rules 2.Translate rule with negation 3.Optimization 13

Example 1: A policy rule with many objects If firewall does not support object grouping, this rule is expanded as follows: Src Dst Srv Action neta hostc http Accept neta hostc ftp Accept netb hostc http Accept netb hostc ftp Accept 14

Example 2: Policy Rule with Negation Many firewalls support negation in one of the rule elements, but the following simple translation is incorrect: Src Dst Srv Action! neta hostc http Accept! netb hostc http Accept 15

Example 2: Processed rule Rule processor converts the rule: Src Dst Srv Action!{netA,netB} hostc http Accept Src Dst Srv Action neta,netb Any Any Continue Any hostc http Accept 16

Example 2: Generated Code For iptables: For ipfilter: $IPTABLES -N TMPCHAIN $IPTABLES -A FORWARD -p tcp -d hostc --dport 80 -j TMPCHAIN $IPTABLES -A TMPCHAIN -s neta -j RETURN $IPTABLES -A TMPCHAIN -s netb -j RETURN $IPTABLES -A TMPCHAIN -m state --state NEW -j ACCEPT skip 2 in proto tcp from neta to any skip 1 in proto tcp from netb to any pass in quick proto tcp from any to hostc port = 80 skip 2 out proto tcp from neta to any skip 1 out proto tcp from netb to any pass out quick proto tcp from any to hostc port = 80 17

Example 3: Optimization Trivial translation leads to O(N 3 ) complexity: Src Dst Srv Action hosta net-1 http Accept hosta net-1 icmp Accept hosta net-2 http Accept hosta net-2 icmp Accept hostb net-1 http Accept hostb net-1 icmp Accept hostb net-2 http Accept hostb net-2 icmp Accept 18

Example 3: Optimization Better translation of the same rule: Chain Src Dst Srv Action hosta Any Any C1 hostb Any Any C1 C1 Any net-1 Any C2 C1 Any net-2 Any C2 C2 Any Any http Accept C2 Any Any icmp Accept This has only O(N) complexity 19

Conclusion Combines automation with flexibility, policy designer maintains full control Simplifies management of multiple firewalls in heterogeneous environments Provides easy migration path for different firewall platforms 20

The Project Started in 2000 Hosted on SourceForge Home page: http://www.fwbuilder.org/ Binary packages are built for RedHat 7.3, 8.0, 9.0 Fedora Core 1 SuSE 8.2, 9.0 Mandrake 9.1 FreeBSD 4.9, 5.1 OpenBSD 3.4 21

Future Development Import objects and policy from existing firewall configuration Log analyzer Loadable policy templates Loadable object libraries Support for QoS and VPN Support for IPv6 22