ELEN 689: Topics in Network Security: Firewalls. Ellen Mitchell Computing and Information Services 20 April 2006



Similar documents
Firewalls. Chapter 3

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Firewalls. Ahmad Almulhem March 10, 2012

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

CS5008: Internet Computing

FIREWALLS & CBAC. philip.heimer@hh.se

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

CIT 480: Securing Computer Systems. Firewalls

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

CIT 480: Securing Computer Systems. Firewalls

Firewalls. configuring a sophisticated GNU/Linux firewall involves understanding

Solution of Exercise Sheet 5

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Introduction to Firewalls Open Source Security Tools for Information Technology Professionals

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

CSCE 465 Computer & Network Security

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Lecture Objectives. Lecture 6 Mobile Networks: Nomadic Services, DHCP, NAT, and VPNs. Agenda. Nomadic Services. Agenda. Nomadic Services Functions

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

NETWORK SECURITY (W/LAB) Course Syllabus

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

Chapter 8 Security Pt 2

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Firewalls. Chien-Chung Shen

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Firewall Firewall August, 2003

Security Technology: Firewalls and VPNs

Network Defense Tools

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Linux Network Security

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

IPv6 Firewalls. ITU/APNIC/MICT IPv6 Security Workshop 23 rd 27 th May 2016 Bangkok. Last updated 17 th May 2016

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

FIREWALL AND NAT Lecture 7a

Firewalls. Network Security. Firewalls Defined. Firewalls

Firewalls. Pehr Söderman KTH-CSC

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

CMPT 471 Networking II

Cisco PIX vs. Checkpoint Firewall

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

Networking Basics and Network Security

Chapter 9 Firewalls and Intrusion Prevention Systems

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Firewalls, Tunnels, and Network Intrusion Detection

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Introduction of Intrusion Detection Systems

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Topics NS HS12 2 CINS/F1-01

Chapter 8 Network Security

Cryptography and network security

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski

Introduction to Firewalls

Firewalls and System Protection

CS Computer and Network Security: Firewalls

CIS 433/533 - Computer and Network Security Firewalls

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

Internet Security Firewalls

Stateful Firewalls. Hank and Foo

Lab 3: Recon and Firewalls

- Introduction to Firewalls -

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Security threats and network. Software firewall. Hardware firewall. Firewalls

OS/390 Firewall Technology Overview

CSE543 - Computer and Network Security Module: Firewalls

CS Computer and Network Security: Firewalls

Overview. Firewall Security. Perimeter Security Devices. Routers

Computer Security: Principles and Practice

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

This chapter describes how to set up and manage VPN service in Mac OS X Server.

CSCI 4250/6250 Fall 2015 Computer and Networks Security

BorderWare Firewall Server 7.1. Release Notes

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Transcription:

ELEN 689: Topics in Network Security: Firewalls Ellen Mitchell Computing and Information Services 20 April 2006

Firewall Historically: a wall constructed to prevent the spread of fire

Firewall Function Used on computer networks to protect one area from another Permits or denies access to computer services

Security Stances Deny-Based (deny by default) Allow-Based (allow by default)

Protocols Generally TCP/UDP IP (v4), ICMP

Types of Firewalls Generally correspond to a layer in the ISO model Application Presentation Session Transport Network Data Link Physical

Hardware/Software Dedicated hardware is fast, though may not be as flexible as software firewalls Software firewalls tend to run on top of or as part of an operating system (needing security updates)

Host-based/Network based/network-based Protect one computer? Protect many? Recommend layers of protection

Firewalls Packet Filter Stateful Packet Filter Proxy Hybrids

Packet Filters Work at layers 3 and 4 Make packet-level decisions Simple, powerful, fast

Packet Filter Decisions Source or destination host Source or destination port Protocol (TCP/UDP/ICMP)

Packet Filtering Firewall Inside Firewall Outside Firewall. Bad Guy >:[ Server Firewall

Three-way handshake SYN SYN/ACK ACK Host 1 Host 2

Stateless Firewalls No knowledge of previous traffic is used to make decision on whether to permit/deny the next packet

Stateful Firewalls Firewall keeps a record of previous traffic Permits traffic if it belongs to the current session Flags (SYN, FIN, RST; ECHO REQ/REP, etc.)

Stateless/Stateful Stateful Trade-offs Speed Additional security

Proxy Firewall Application-level level decisions Applies to protocols such as HTTP, rather than TCP Protects computers because they don t receive traffic directly

Before Proxy Firewall Inside Firewall Outside Firewall. Bad Guy >:[ Server Firewall

Using Proxy Firewall Inside Firewall Outside Firewall Proxy Bad Guy >:[ Server Firewall

Hybrids Combinations and customization are possible

Response when traffic s denied Drop packets (TCP RST) or time out? People tend to prefer one or another Some firewalls offer configuration options for this

Personal Firewalls Many available at reasonable cost BlackIce -- http://www.netice.com www.netice.com/ ($39.95) ZoneAlarm -- http://zonelabs.com zonelabs.com/ / (Free) ConSeal -- http://www.signal9.com/ ($49.95) IPChains -- linux kernel (Free)

Securing Hosts Eliminate Extra Services Educate Users Use good passwords

Firewall Weaknesses Misconfiguration Misunderstanding

Network Address Translation (NAT) Process that maps addresses between an external network and (hides the addresses on) the internal network One to one, one to many Increase in security is debatable

Virtual Private Networks (VPN) Allows people outside the firewall to authenticate and connect to the inside of the firewall Permissions are configurable Removes the need to open ports through the firewall

VPN Implementation Students, Faculty, Staff No additional cost neo login/password

VPN Implementation continued Client software at http://www.net.tamu.edu/network/vpn.html Not all hand-helds helds are supported, but we re trying to improve that

Technical Overview LDAP RADIUS Database (Address Translation Not Done) Non-TAMU traffic Drivers Shim OS Campus machine VPN Server (Address Translation Regular IP is performed) Firewall Home machine Key Negotiation (IKE) via UDP IPSEC (IP+AH & ESP)

Firewalls on Campus Campus Firewall NetSQUID F-boxes Departmental firewalls Government Regulations Credit Card Industry Equipment Protection

TAMU Firewall History Implemented in 1992 Assembly, DOS, Unix Drawbridge freely available (http://drawbridge.tamu.edu/ http://drawbridge.tamu.edu/) Supports our Gig connection to the Internet

NetSQUID Network Security Quarantine and Isolation Device Used in Residence Halls + some departments Linux-based Uses iptables iptables + snort Intrusion detection + firewall

F-boxes These firewalls enforce our policy that wireless traffic must be authenticated and encrypted Permit only IPSEC traffic to cross the Access Point to reach the Rest Of The World (Forcing VPN enforces our policy)

Departmental Firewalls Some departments on campus want to further protect themselves from, say, the Residence Halls

Government Regulations Some research areas are regulated and must meet federal guidelines Patriot Act, Office of the State Chemist, etc.

Credit Card Industry VISA/MasterCard have regulations on how credit card transactions may be done using computers Requires NAT

Equipment Protection Some vendors products are based on old, vulnerable operating systems

Summary Types of firewalls Packet filter, proxy, Stateful/stateless Host-based, network-based Security stances Allow-based, deny-based

Local resources... TAMU firewall papers ftp://net.tamu.edu/pub/security/tamu/tamu -security-overview.ps and tamu_summary.txt TAMU firewall change request information http://net.tamu.edu/network/tcpip.html#fire wall Choose a firewall based on your needs

Resources continued... TAMU VPN information page http://net.tamu.edu/network/vpn.html TAMU ISF page http://cis.tamu.edu/security/isf/ My team s page http://security.tamu.edu/

Questions?