Reti di Calcolatori II



Similar documents
Firewalls. Chapter 3

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Firewalls, IDS and IPS

Firewalls. Network Security. Firewalls Defined. Firewalls

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Chapter 15. Firewalls, IDS and IPS

Computer Networks II

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Security Technology: Firewalls and VPNs

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

CIT 480: Securing Computer Systems. Firewalls

CMPT 471 Networking II

CIT 480: Securing Computer Systems. Firewalls

A S B

FIREWALLS & CBAC. philip.heimer@hh.se

Overview. Firewall Security. Perimeter Security Devices. Routers

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Firewalls. Ahmad Almulhem March 10, 2012

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Firewalls and System Protection

Chapter 8 Security Pt 2

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Cryptography and network security

INTRODUCTION TO FIREWALL SECURITY

Multi-Homing Dual WAN Firewall Router

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

CSCE 465 Computer & Network Security

Firewalls. Castle and Moat Analogy. Dr.Talal Alkharobi. Dr.Talal Alkharobi

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Firewalls, Tunnels, and Network Intrusion Detection

Chapter 8 Network Security

Firewall Firewall August, 2003

8. Firewall Design & Implementation

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

10 Configuring Packet Filtering and Routing Rules

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Security Technology White Paper

Cisco Configuring Commonly Used IP ACLs

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Network Security. Internet Firewalls. Chapter 13. Network Security (WS 2002): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

Internet Security Firewalls

Introduction to Firewalls

Security perimeter. Internet. - Access control, monitoring and management. Differentiate between insiders and outsiders - Different types of outsiders

UNDERSTANDING FIREWALLS TECHNICAL NOTE 10/04

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Definition of firewall

Chapter 4 Firewall Protection and Content Filtering

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Content Distribution Networks (CDN)

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Network Defense Tools

Internet Security Firewalls

12. Firewalls Content

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Implementing Secure Converged Wide Area Networks (ISCW)

allow all such packets? While outgoing communications request information from a

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Introduction of Intrusion Detection Systems

Lab Configuring Access Policies and DMZ Settings

Proxy Server, Network Address Translator, Firewall. Proxy Server

Securing Networks with PIX and ASA

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

General Network Security

CS5008: Internet Computing

Networking Security IP packet security

Chapter 4 Firewall Protection and Content Filtering

Lecture 23: Firewalls

Chapter 9 Firewalls and Intrusion Prevention Systems

UIP1868P User Interface Guide

Lab Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance

Chapter 7. Firewalls

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Internet infrastructure. Prof. dr. ir. André Mariën

Network Security Topologies. Chapter 11

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Chapter 7 Troubleshooting

Basic Network Configuration

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Security Type of attacks Firewalls Protocols Packet filter

Broadband Phone Gateway BPG510 Technical Users Guide

Broadband Router ESG-103. User s Guide

Transcription:

Reti di Calcolatori II I Giorgio Ventre Dipartimento di Informatica e Sistemistica Università di Napoli Federico II Nota di Copyright Quest insieme di trasparenze è stato ideato e realizzato dai ricercatori del Gruppo di Ricerca sull Informatica Distribuita del Dipartimento di Informatica e Sistemistica dell Università di Napoli e del Laboratorio Nazionale per la Informatica e la Telematica Multimediali. Esse possono essere impiegate liberamente per fini didattici esclusivamente senza fini di lucro, a meno di un esplicito consenso scritto degli Autori. Nell uso dovrà essere esplicitamente riportata la fonte e gli Autori. Gli Autori non sono responsabili per eventuali imprecisioni contenute in tali trasparenze né per eventuali problemi, danni o malfunzionamenti derivanti dal loro uso o applicazione. 1

Border 2. Internet Border 1. Internet (Not Trusted) Attacker 1. Corporate Network (Trusted) Border 3. Attack Packet 4. Dropped Packet (Ingress) 4. Log File 2. Internet Border 1. Internet (Not Trusted) Attacker 2

Border 5. Passed Legitimate Packet (Ingress) 5. Legitimate Packet 2. Internet Border 1. Internet (Not Trusted) Legitimate User 1. Corporate Network (Trusted) Border 7. Passed Packet (Egress) 7. Dropped Packet (Egress) 4. Log File 2. Internet Border 1. Internet (Not Trusted) 1. Corporate Network (Trusted) Attacker 3

Border 6. Attack Packet that Got Through 6. Hardened Client PC Hardened Hosts Provide Defense in Depth 2. Internet Border 1. Internet (Not Trusted) Attacker 6. Hardened Server 1. Corporate Network (Trusted) Types of Inspection Virtual Private Network Handling» Virtual private networks offer message-bymessage confidentiality, authentication, message integrity, and anti-replay protection» Packets are encrypted for confidentiality, so firewall inspection is impossible» VPNs typically bypass firewalls, making border security weaker 4

s Hardware and Software» Screening router firewalls» Computer-based firewalls» appliances» Host firewalls (firewalls on clients and servers) Inspection Methods Architecture Configuring, Testing, and Maintenance Hardware and Software Screening Router s» Add firewall software to router» Usually provide light filtering only» Expensive for the processing power usually must upgrade hardware, too 5

Hardware and Software Screening Router s» Screens out incoming noise of simple scanning attacks to make the detection of serious attacks easier» Good location for egress filtering can eliminate scanning responses, even from the router Hardware and Software Computer-Based s» Add firewall software to server with an existing operating system: Windows or UNIX» Can be purchased with power to handle any load» Easy to use because know operating system 6

Hardware and Software Computer-Based s» vendor might bundle firewall software with hardened hardware and operating system software» General-purpose operating systems result in slower processing Hardware and Software Computer-Based s» Security: Attackers may be able to hack the operating system Change filtering rules to allow attack packets in Change filtering rules to drop legitimate packets 7

Hardware and Software Appliances» Boxes with minimal operating systems» Therefore, difficult to hack» Setup is minimal» Not customized to specific firm s situation» Must be able to update Hardware and Software Host s» Installed on hosts themselves (servers and sometimes clients)» Enhanced security because of host-specific knowledge For example, filter out everything but webserver transmissions on a webserver 8

Hardware and Software Host s» Defense in depth Normally used in conjunction with other firewalls Although on single host computers attached to internet, might be only firewall Hardware and Software Host s» The firm must manage many host firewalls» If not centrally managed, configuration can be a nightmare» Especially if rule sets change frequently 9

Hardware and Software Host s» Client firewalls typically must be configured by ordinary users Might misconfigure or reject the firewall Need to centrally manage remote employee computers Perspective Computer-Based» based on a computer with a full operating system Host» A firewall on a host (client or server) 10

Drivers of Performance Requirements: Traffic Volume and Complexity of Filtering Complexity of Filtering: Number of Filtering Rules, Complexity Of rules, etc. Performance Requirements If a firewall cannot inspect packets fast enough, it will drop unchecked packets rather than pass them Traffic Volume (Packets per Second) s Hardware and Software Inspection Methods» Static Packet Inspection» Stateful Packet Inspection» NAT» Application s» IPSs Architecture Configuring, Testing, and Maintenance 11

Static Packet Filter Corporate Network Permit (Pass) IP-H IP-H The Internet TCP-H Application Message UDP-H Application Message Deny (Drop) IP-H ICMP-H ICMP Message Log File Static Packet Filter Only IP, TCP, UDP and ICMP Headers Examined Static Packet Filter Corporate Network Permit (Pass) IP-H IP-H The Internet TCP-H Application Message UDP-H Application Message Deny (Drop) IP-H ICMP-H ICMP Message Log File Static Packet Filter Arriving Packets Examined One at a Time, in Isolation; This Misses Many Arracks 12

Access Control List (ACL) For Ingress Filtering at a Border Router 1. If source IP address = 10.*.*.*, DENY [private IP address range] 2. If source IP address = 172.16.*.* to 172.31.*.*, DENY [private IP address range] 3. If source IP address = 192.168.*.*, DENY [private IP address range] 4. If source IP address = 60.40.*.*, DENY [internal address range] Access Control List (ACL) for Ingress Filtering at a Border Router 5. If source IP address = 1.2.3.4, DENY [black-holed address of attacker] 6. If TCP SYN=1 AND FIN=1, DENY [crafted attack packet] 13

Access Control List (ACL) for Ingress Filtering at a Border Router 7. If destination IP address = 60.47.3.9 AND TCP destination port=80 OR 443, PASS [connection to a public webserver] 8. If TCP SYN=1 AND ACK=0, DENY [attempt to open a connection from the outside] Access Control List (ACL) for Ingress Filtering at a Border Router 9. If TCP destination port = 20, DENY [FTP data connection] 10. If TCP destination port = 21, DENY [FTP supervisory control connection] 11. If TCP destination port = 23, DENY [Telnet data connection] 12. If TCP destination port = 135 through 139, DENY [NetBIOS connection for clients] 14

Access Control List (ACL) for Ingress Filtering at a Border Router 13. If TCP destination port = 513, DENY [UNIX rlogin without password] 14. If TCP destination port = 514, DENY [UNIX rsh launch shell without login] 15. If TCP destination port = 22, DENY [SSH for secure login, but some versions are insecure] 16. If UDP destination port=69, DENY [Trivial File Transfer Protocol; no login necessary] Access Control List (ACL) for Ingress Filtering at a Border Router 17. If ICMP Type = 0, PASS [allow incoming echo reply messages] DENY ALL 15

Access Control List (ACL) for Ingress Filtering at a Border Router DENY ALL» Last rule» Drops any packets not specifically permitted by earlier rules» In the previous ACL, Rules 8-17 are not needed; Deny all would catch them Access Control List (ACL) for Egress Filtering at a Border Router 1. If source IP address = 10.*.*.*, DENY [private IP address range] 2. If source IP address = 172.16.*.* to 172.31.*.*, DENY [private IP address range] 3. If source IP address = 192.168.*.*, DENY [private IP address range] 4. If source IP address NOT = 60.47.*.*, DENY [not in internal address range]» Rules 1-3 are not needed because of this rule 16

Access Control List (ACL) for Egress Filtering at a Border Router 5. If ICMP Type = 8, PASS [allow outgoing echo messages] 6. If Protocol=ICMP, DENY [drop all other outgoing ICMP messages] 7. If TCP RST=1, DENY [do not allow outgoing resets; used in host scanning] Access Control List (ACL) for Egress Filtering at a Border Router 8. If source IP address = 60.47.3.9 and TCP source port = 80 OR 443, PERMIT [public webserver responses]» Needed because next rule stops all packets from well-known port numbers 9. If TCP source port=0 through 49151, DENY [well-known and registered ports] 10. If UDP source port=0 through 49151, DENY [well-known and registered ports] 17

Access Control List (ACL) for Egress Filtering at a Border Router 11. If TCP source port =49152 through 65,536, PASS [allow outgoing client connections] 12. If UDP source port = 49152 through 65,536, PERMIT [allow outgoing client connections]» Note: Rules 9-12 only work if all hosts follow IETF rules for port assignments (well-known, registered, and ephemeral). Windows computers do. Unix computers do not Access Control List (ACL) for Egress Filtering at a Border Router 13. DENY ALL» No need for Rules 9-12 18

s Hardware and Software Inspection Methods» Static Packet Inspection» Stateful Packet Inspection» NAT» Application s Architecture Configuring, Testing, and Maintenance Stateful Inspection s Default Behavior» Permit connections initiated by an internal host» Deny connections initiated by an external host» Can change default behavior with ACL Automatically Accept Connection Attempt Router Internet Automatically Deny Connection Attempt 19

Stateful Inspection s State of Connection: Open or Closed» State: Order of packet within a dialog» Often simply whether the packet is part of an open connection Stateful Inspection s Stateful Operation» If accept a connection» Record the two IP addresses and port numbers in state table as OK (open) (Figure 5-9)» Accept future packets between these hosts and ports with no further inspection This can miss some attacks 20

Stateful Inspection Operation I 1. TCP SYN Segment From: 60.55.33.12:62600 To: 123.80.5.34:80 2. Establish Connection 3. TCP SYN Segment From: 60.55.33.12:62600 To: 123.80.5.34:80 Client PC 60.55.33.12 Note: Outgoing Connections Allowed By Default Stateful Webserver 123.80.5.34 Connection Table Type IP Port IP Port Status TCP 60.55.33.12 62600 123.80.5.34 80 OK Stateful Inspection Operation I Client PC 60.55.33.12 Connection Table 6. TCP SYN/ACK Segment From: 123.80.5.34:80 To: 60.55.33.12:62600 Stateful 5. Check Connection OK; Pass the Packet 4. TCP SYN/ACK Segment From: 123.80.5.34:80 To: 60.55.33.12:62600 Webserver 123.80.5.34 Type IP Port IP Port Status TCP 60.55.33.12 62600 123.80.5.34 80 OK 21

Stateful Inspection s Stateful Operation» For UDP, also record two IP addresses and port numbers in the state table Connection Table Type IP Port IP Port Status TCP 60.55.33.12 62600 123.80.5.34 80 OK UDP 60.55.33.12 63206 1.8.33.4 69 OK Stateful Inspection s Static Packet Filter s are Stateless» Filter one packet at a time, in isolation» If a TCP SYN/ACK segment is sent, cannot tell if there was a previous SYN to open a connection» But stateful firewalls can (Figure 5-10) 22

Stateful Operation II Stateful Client PC 60.55.33.12 Connection Table 2. Check Connection Table: No Connection Match: Drop 1. Spoofed TCP SYN/ACK Segment From: 10.5.3.4.:80 To: 60.55.33.12:64640 Attacker Spoofing Webserver 10.5.3.4 Type IP Port IP Port Status TCP 60.55.33.12 62600 123.80.5.34 80 OK UDP 60.55.33.12 63206 222.8.33.4 69 OK Stateful Inspection s Static Packet Filter s are Stateless» Filter one packet at a time, in isolation» Cannot deal with port-switching applications» But stateful firewalls can (Figure 5-11) 23

Port-Switching Applications with Stateful s 1. TCP SYN Segment From: 60.55.33.12:62600 To: 123.80.5.34:21 2. To Establish Connection 3. TCP SYN Segment From: 60.55.33.12:62600 To: 123.80.5.34:21 Client PC 60.55.33.12 State Table Stateful FTP Server 123.80.5.34 Step 2 Type TCP IP 60.55.33.12 Port 62600 IP 123.80.5.34 Port 21 Status OK Port-Switching Applications with Stateful s Client PC 60.55.33.12 6. TCP SYN/ACK Segment From: 123.80.5.34:21 To: 60.55.33.12:62600 Use Ports 20 and 55336 for Data Transfers Stateful 5. To Allow, Establish Second Connection 4. TCP SYN/ACK Segment From: 123.80.5.34:21 To: 60.55.33.12:62600 Use Ports 20 and 55336 for Data Transfers FTP Server 123.80.5.34 State Table Type IP Port IP Port Status Step 2 TCP 60.55.33.12 62600 123.80.5.34 21 OK Step 5 TCP 60.55.33.12 55336 123.80.5.34 20 OK 24

Stateful Inspection s Stateful Inspection Access Control Lists (ACLs)» Primary allow or deny applications (port numbers)» Simple because no need for probe packet rules because they are dropped automatically» Simplicity of stateful firewall gives speed and therefore low cost» Stateful firewalls are dominant today for the main corporate border firewalls s Hardware and Software Inspection Methods» Static Packet Inspection» Stateful Packet Inspection» NAT» Application s» IPSs Architecture Configuring, Testing, and Maintenance 25

Network Address Translation (NAT) From 192.168.5.7, Port 61000 From 60.5.9.8, 1 Port 55380 2 Internet Client 192.168.5.7 NAT Sniffer Server Host Translation Table IP Addr Port IP Addr Port 192.168.5.7... 61000... 60.5.9.8... 55380... Network Address Translation (NAT) Internet Client 192.168.5.7 4 To 192.168.5.7, Port 61000 NAT 3 To 60.5.9.8, Port 55380 Sniffer Server Host Translation Table IP Addr Port IP Addr Port 192.168.5.7... 61000... 60.5.9.8... 55380... 26

Network Address Translation (NAT) Sniffers on the Internet cannot learn internal IP addresses and port numbers» Only learn the translated address and port number By themselves, provide a great deal of protection against attacks» attackers cannot create a connection to an internal computers s Hardware and Software Inspection Methods» Static Packet Inspection» Stateful Packet Inspection» NAT» Application s» IPSs Architecture Configuring, Testing, and Maintenance 27

Application Operation 1. HTTP Request From 192.168.6.77 2. Filtering 3. Examined HTTP Request From 60.45.2.6 Browser HTTP Proxy Webserver Application Application 60.45.2.6 Client PC 192.168.6.77 Filtering: Blocked URLs, Post Commands, etc. Webserver 123.80.5.34 Application Operation 6. Examined 4. HTTP Browser HTTP Proxy Response to Webserver HTTP 5. 60.45.2.6 Application Response To Filtering on 192.168.6.77 Hostname, URL, MIME, etc. Client PC 192.168.6.77 Application 60.45.2.6 Webserver 123.80.5.34 28

Application Operation A Separate Proxy Program is Needed for Each Application Filtered on the Client PC 192.168.6.77 FTP Proxy Outbound Filtering on Put Application 60.45.2.6 SMTP (E-Mail) Proxy Webserver 123.80.5.34 Inbound and Outbound Filtering on Obsolete Commands, Content Header Destruction With Application s Arriving Packet App MSG (HTTP) XOrig. Orig. TCP IP Hdr Hdr Header Removed App MSG (HTTP) App MSG (HTTP) New Packet New TCP Hdr New IP Hdr Attacker 1.2.3.4 Application 60.45.2.6 Webserver 123.80.5.34 Application Strips Original Headers from Arriving Packets Creates New Packet with New Headers This Stops All Header-Based Packet Attacks 29

Protocol Spoofing Trojan Horse 2. Protocol is Not HTTP Stops The Transmission Client PC 60.55.33.12 1. Trojan Transmits on Port 80 to Get Through Simple Packet Filter Application X Attacker 1.2.3.4 Circuit Generic Type of Application Webserver 60.80.5.34 3. Passed Transmission: No Filtering 4. Reply Circuit (SOCKS v5) 60.34.3.31 1. Authentication 2. Transmission 5. Passed Reply: No Filtering Client 123.30.82.5 30

s New Hardware and Software Inspection Methods» Static Packet Inspection» Stateful Packet Inspection» NAT» Application s» IPSs Architecture Configuring, Testing, and Maintenance Intrusion Prevention System (IPS) Provide More Sophisticated Inspection Examine Streams of Packets» Look for patterns that cannot be diagnosed by looking at individual packets (such as denial-of-service attacks» And cannot be diagnosed by simply accepting packets that are part of a connection Do Deep Packet Inspection» Examine all headers at all layers internet, transport, and application 31

Intrusion Prevention System (IPS) IPSs Act Proactively» Once an attack is diagnosed, future packets in the attacks are blocked» This frightens many firms because if an IPS acts incorrectly, it effectively generates a self-serve denial of service attack» First that use IPSs may only permit the most definitively identifiable attacks to be blocked, such as SYN flood denial of service attacks. s Types of s Inspection Methods Architecture» Single site in large organization» Home firewall» SOHO firewall router» Distributed firewall architecture Configuring, Testing, and Maintenance 32

Single-Site Architecture for a Larger Firm with a Single Site 172.18.9.x Subnet 1. Screening Router 60.47.1.1 Last Rule=Permit All Internet Screening Router Uses Static Packet Filtering. Drops Simple Attacks. Prevents Probe Replies from Getting Out. Public Webserver 60.47.3.9 DNS Server 60.47.3.4 Marketing Client on 172.18.5.x Subnet Last Rule is Permit All Accounting to Let Main Server on Handle Everything but 172.18.7.x Subnet Simple Attacks SMTP Relay Proxy 60.47.3.10 HTTP Proxy Server 60.47.3.1 Single-Site Architecture for a Larger Firm with a Single Site 2. Main Last Rule=Deny All 172.18.9.x Subnet Internet Public Webserver 60.47.3.9 Main Uses Stateful Inspection Last Rule is Deny All DNS Server 60.47.3.4 Marketing Client on 172.18.5.x Subnet Accounting Server on 172.18.7.x Subnet SMTP Relay Proxy 60.47.3.10 HTTP Proxy Server 60.47.3.1 33

Single-Site Architecture for a Larger Firm with a Single Site 3. 172.18.9.x Subnet Internet 4. Client Host Public Webserver s and Hardened 60.47.3.9 Hosts Provide Defense in Depth DNS Server 60.47.3.4 Marketing Client on 172.18.5.x Subnet Accounting Server on 172.18.7.x Subnet Stop Attacks from Inside SMTP HTTP Stop Attacks Relay that Get Past Proxy the Main Proxy Server 60.47.3.10 60.47.3.1 Single-Site Architecture for a Larger Firm with a Single Site Servers that must be accessed from outside are placed in a special subnet 172.18.9.x called the Subnet Demilitarized Zone (DMZ). Attackers cannot get to Other subnets from there Public Webserver 60.47.3.9 Internet DNS Server 60.47.3.4 DMZ servers are specially hardened 6. DMZ Marketing Client on 172.18.5.x Subnet Accounting Server on 172.18.7.x Subnet 5. Server Host SMTP Relay Proxy 60.47.3.10 HTTP Proxy Server 60.47.3.1 34

Home PC Internet Service Provider Always-On Connection Coaxial Cable Broadband Modem UTP Cord Home PC Windows XP has an internal firewall Originally called the Internet Connection Disabled by default After Service Pack 2 called the Windows Enabled by default SOHO Router Internet Service Provider Broadband Modem (DSL or Cable) UTP UTP SOHO Router --- Router DHCP Sever, NAT, and Limited Application Ethernet Switch UTP User PC User PC Many Access Routers Combine the Router and Ethernet Switch in a Single Box User PC 35

Distributed Architecture Management Console Remote Management is needed to reduce management labor Dangerous because if an attacker compromises it, they own the network Internet Remote PCs must be actively managed centrally Home PC Site A Site B s Types of s Inspection Methods Architecture Configuring, Testing, and Maintenance 36

Configuring, Testing, and Maintaining s Misconfiguration is a Serious Problem» ACL rules must be executed in series» Easy to make misordering problems» Easy to make syntax errors Configuring, Testing, and Maintaining s Create Policies Before ACLs» Policies are easier to read than ACLs» Can be reviewed by others more easily than ACLs» Policies drive ACL development» Policies also drive testing 37

Configuring, Testing, and Maintaining s Must test s with Security Audits» Attack your own firewall based on your policies» Only way to tell if policies are being supported Maintaining s» New threats appear constantly» ACLs must be updated constantly if firewall is to be effective FireWall-1 Modular Management Architecture Application Module (GUI) Create, Edit Policies Policy Log Files Management Module Stores Policies Stores Log Files Policy Module Enforces Policy Sends Log Entries Application Module (GUI) Read Log Files Log File Data Log File Entry Module Enforces Policy Sends Log Entries 38

FireWall-1 Service Architecture 2. Statefully Filtered Packet 1. Arriving Packet Client 3. DoS Protection Optional Authentications FireWall-1 4. Content Vectoring Protocol Server 5. Statefully Filtered Packet Plus Application Inspection Third-Party Application Inspection Security Level-Based Stateful Filtering in PIX s Automatically Accept Connection Security Level Inside=100 Security Level Outside=0 Router Internet Automatically Reject Connection Security Level=60 Network Connections Are Allowed from More Secure Networks to Less Secure Networks 39