Firewalls CSCI 454/554

Similar documents
Firewalls. Mahalingam Ramkumar

Chapter 20 Firewalls. Cryptography and Network Security Chapter 22. What is a Firewall? Introduction 4/19/2010

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Computer Security: Principles and Practice

Computer Security DD2395

Chapter 9 Firewalls and Intrusion Prevention Systems

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

What would you like to protect?

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

Firewall Design Principles Firewall Characteristics Types of Firewalls

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Computer Security DD2395

Proxy Server, Network Address Translator, Firewall. Proxy Server

IPv6 Firewalls. ITU/APNIC/MICT IPv6 Security Workshop 23 rd 27 th May 2016 Bangkok. Last updated 17 th May 2016

Chapter 20. Firewalls

Firewalls. Ahmad Almulhem March 10, 2012

Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

Lecture 23: Firewalls

Firewalls (IPTABLES)

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

12. Firewalls Content

Firewalls N E T W O R K ( A N D D ATA ) S E C U R I T Y / P E D R O B R A N D Ã O M A N U E L E D U A R D O C O R R E I A

CSCI Firewalls and Packet Filtering

Internet Security Firewalls

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Security threats and network. Software firewall. Hardware firewall. Firewalls

Intranet, Extranet, Firewall

FIREWALLS CHAPTER The Need for Firewalls Firewall Characteristics Types of Firewalls

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

Security Technology: Firewalls and VPNs

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

CSCE 465 Computer & Network Security

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

TECHNICAL NOTE 01/2006 ENGRESS AND INGRESS FILTERING

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

Internet infrastructure. Prof. dr. ir. André Mariën

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

CMPT 471 Networking II

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

CS549: Cryptography and Network Security

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

ACS-3921/ Computer Security And Privacy Lecture Note 8 October 28 th 2015 Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 6: Network Access Control

Firewalls. Chapter 3

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Cryptography and network security

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Internet Security Firewalls

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Application Firewalls

Lecture slides for Computer Security: Principles and Practice, 2/e, by William Stallings and Lawrie Brown, Chapter 9 Firewalls and Intrusion

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski

How To Understand A Firewall

CTS2134 Introduction to Networking. Module Network Security

Networking for Caribbean Development

Firewalls. CS 6v81 - Network Security. What is a firewall? Firewall capabilities. Firewall limitations. Firewall limitations, cont d

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Topics NS HS12 2 CINS/F1-01

How To Protect Your Network From Attack

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Network Security Topologies. Chapter 11

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK

Firewalls and System Protection

Firewall Architecture

Firewall Design Principles

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

FIREWALL POLICY DOCUMENT

Guideline on Firewall

Overview. Firewall Security. Perimeter Security Devices. Routers

HANDBOOK 8 NETWORK SECURITY Version 1.0

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Configuring a LAN SIParator. Lisa Hallingström Paul Donald Bogdan Musat Adnan Khalid Per Johnsson Rickard Nilsson

Cornerstones of Security

SIP Security Controllers. Product Overview

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Definition of firewall

CIT 480: Securing Computer Systems. Firewalls

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Transcription:

Firewalls CSCI 454/554 Why Firewall? 1

Why Firewall (cont d) w now everyone want to be on the Internet w and to interconnect networks w has persistent security concerns n can t easily secure every system in org w need "harm minimisation" w a Firewall usually part of this What is a Firewall? w firewall is any mechanism that acts to restrict access to a network according to a set of defined rules. n Function as front doors to a network n a choke point of control and monitoring w imposes restrictions on incoming and outgoing traffic n only authorized traffic is allowed w provides perimeter defence 2

Rules Determine WHO? WHEN? WHAT? HOW? My PC INTERNE T Firewall Firewall Limitations w cannot protect from attacks bypassing it n dial-in/out connection, trusted organisations, trusted services (eg SSL/SSH) w cannot protect against internal threats n eg disgruntled employee w cannot protect against transfer of all virus infected programs or files n because of huge range of O/S & file types 3

Firewall Classification w Two (three) types of firewall n Packet-filtering firewall l Address filtering (stateless) l Stateful packet filtering n Application-level gateway n Circuit-level gateway Firewalls Packet Filters 4

Packet Filters w foundation of any firewall system w examine each IP packet and permit or deny according to rules w hence restrict access to services (ports) w possible default policies n allow all except what is defined as unwanted n deny all except what is defined as wanted Address Filtering (stateless) 5

Stateful Packet Filters w examine each IP packet in context n keeps tracks of client-server sessions n checks each packet based on other packets and connections as well w better able to detect bogus packets out of context Example Stateful Firewall Connection State Table 6

Attacks on Packet Filters w IP address spoofing n fake source address to be trusted n countermeasure: add filters on router s interfaces to block w source routing attacks n attacker sets a route other than default n countermeasure: block source routed packets w tiny fragment attacks n split header info over several tiny packets n countermeasure: either discard or reassemble before check Application Level Gateway (or Proxy) 7

Application Level Gateway (or Proxy) w Look beyond IP/TCP/UDP headers n decision based on application data w Proxy relay information between two ends n more secure than packet filters n only scrutinize the specific application n easy to log and audit w need separate proxies for each service n clients need to be modified n relay incurs additional processing overhead Circuit Level Gateway 8

Circuit Level Gateway w relays between two TCP connections w imposes security by limiting which such connections are allowed w once created usually relays traffic without examining contents w typically used when trust internal users by allowing general outbound connections w SOCKS (Socket Secure) commonly used for this SOCKS Circuit-Level Gateway l l l SOCKS v5 defined in RFC1928 provide a framework for clientserver applications in TCP/UDP domains to conveniently and securely use the services of a network firewall client application contacts SOCKS server, authenticates, sends relay request l server evaluates and either establishes or denies the connection components SOCKSified client applications SOCKS server SOCKS client library 9

Bastion Host w highly secure host system w potentially exposed to "hostile" elements w hence is secured to withstand this w may support 2 or more network connections w may be trusted to enforce trusted separation between network connections w runs application level gateways w or provides externally accessible services Firewall Configurations 10

Firewall Configurations ㅇ Firewall Configurations DMZ 11

Internet Boundary router Example Firewall Configuration Web server(s) Internal DMZ network Email server DNS server Internal protected network External firewall LAN switch Internal firewall Application and database servers LAN switch Workstations Figure 9.3 Example Firewall Configuration Host-Based Firewalls w used to secure an individual host w available in operating systems or can be provided as an add-on package w filter and restrict packet flows w common location is a server advantages: filtering rules can be tailored to the host environment protection is provided independent of topology provides an additional layer of protection 12

Personal Firewall l controls traffic between a personal computer and the Internet or enterprise network l for both home or corporate use l typically is a software module on a personal computer l can be housed in a router that connects all of the home computers to a DSL, cable modem, or other Internet interface l typically much less complex than server-based or standalone firewalls l primary role is to deny unauthorized remote access l may also monitor outgoing traffic to detect and block worms and malware activity Data Access Control w given system has identified a user w determine what resources they can access w general model is that of access matrix with n subject - active entity (user, process) n object - passive entity (file or resource) n access right way object can be accessed w can decompose by n columns as access control lists (for each object) n rows as capability tickets (for each user) 13

Access Control Matrix Concept of Trusted Systems w information security is increasingly important w have varying degrees of sensitivity of information n cf military info classifications: confidential, secret etc w subjects (people or programs) have varying rights of access to objects (information) w want to consider ways of increasing confidence in systems to enforce these rights w known as multilevel security n subjects have maximum & current security level n objects have a fixed security level classification 14

Bell LaPadula (BLP) Model w one of the most famous security models w implemented as mandatory policies on system w has two key policies: w no read up (simple security property) n no subject may read objects at higher level w no write down (*-property) n no subject may write objects to a lower level Reference Monitor 15

Summary w have considered: n firewalls n types of firewalls n configurations n data access control n trusted systems 16