Firewall Introduction Several Types of Firewall. Cisco PIX Firewall



Similar documents
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Firewalls (IPTABLES)

FIREWALLS & CBAC. philip.heimer@hh.se

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

CSCE 465 Computer & Network Security

Security threats and network. Software firewall. Hardware firewall. Firewalls

Lecture 23: Firewalls

Security Technology: Firewalls and VPNs

Fig : Packet Filtering

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Proxy Server, Network Address Translator, Firewall. Proxy Server

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Chapter 9 Firewalls and Intrusion Prevention Systems

Cisco PIX vs. Checkpoint Firewall

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

INTRODUCTION TO FIREWALL SECURITY

Firewalls. Chapter 3

Firewall Design Principles

Types of Firewalls E. Eugene Schultz Payoff

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

Securizarea Calculatoarelor și a Rețelelor 13. Implementarea tehnologiei firewall CBAC pentru protejarea rețelei

Introduction of Intrusion Detection Systems

Internetwork Expert s CCNA Security Bootcamp. IOS Firewall Feature Set. Firewall Design Overview

Securing Networks with PIX and ASA

Stateful Inspection Technology

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

CMPT 471 Networking II

Firewall Design Principles Firewall Characteristics Types of Firewalls

Firewall VPN Router. Quick Installation Guide M73-APO09-380

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

IPv6 Firewalls. ITU/APNIC/MICT IPv6 Security Workshop 23 rd 27 th May 2016 Bangkok. Last updated 17 th May 2016

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

CIT 480: Securing Computer Systems. Firewalls

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Firewalls. Ahmad Almulhem March 10, 2012

Stateful Firewalls. Hank and Foo

Overview - Using ADAMS With a Firewall

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Overview - Using ADAMS With a Firewall

12. Firewalls Content

FIREWALLS IN NETWORK SECURITY

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Chapter 20. Firewalls

- Introduction to PIX/ASA Firewalls -

Cisco Firewall Technology

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Firewalls. Network Security. Firewalls Defined. Firewalls

allow all such packets? While outgoing communications request information from a

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Cryptography and network security

Multi-Homing Dual WAN Firewall Router

Computer Security DD2395

Cisco Configuring Commonly Used IP ACLs

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

8. Firewall Design & Implementation

CIT 480: Securing Computer Systems. Firewalls

Firewall Technologies. Access Lists Firewalls

Overview. Firewall Security. Perimeter Security Devices. Routers

Computer Security: Principles and Practice

Topics NS HS12 2 CINS/F1-01

Cisco Secure PIX Firewall with Two Routers Configuration Example

Chapter 8 Security Pt 2

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Classification of Firewalls and Proxies

PIX/ASA 7.x with Syslog Configuration Example

Computer Security DD2395

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Solution of Exercise Sheet 5

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

FIREWALL AND NAT Lecture 7a

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Firewalls, IDS and IPS

Introduction to Firewalls Open Source Security Tools for Information Technology Professionals

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

How Cisco IT Uses Firewalls to Protect Cisco Internet Access Locations

Intro to Firewalls. Summary

High Security Firewall: Prevent Unauthorized Access Using Firewall Technologies

CCNA Security 1.1 Instructional Resource

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Chapter 8 Network Security

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Packet Filtering using the ADTRAN OS firewall has two fundamental parts:

Transcription:

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls the spreading of a network threat. Software-Based Firewalls Advantages: Cheaper and ideal for personal or home use Disadvantages: Takes up system resources Susceptible to many of the security weaknesses inherent in Windows NT and UNIX Examples: Check Point Firewall-1 or Novell BorderManager 1

Hardware-Based Firewalls Devices that have the software preinstalled on a specialized hardware platform. Advantages: Speed: faster response times and handle more traffic loads. Security: its own operating system is less prone for attacks. Disadvantages: Cost more. All traffic from inside to outside and vice versa must pass through the firewall. Only authorized traffic is allowed in or out. 2

Common firewall technologies: Packet filtering Limits the information that enters a network based on IP header. Circuit level Gateway--Applies security mechanisms when a TCP/UDP connection is Established. o Once the connection has been made, packets can flow between the hosts without further checking. (TCP layer) Application Level Gateway --Applies security mechanisms to specific applications, such as FTP and Telnet servers. o Very effective, o Impose a performance degradation. (Application layer) Stateful inspection combine the aspects of the three types of firewalls techniques These technologies operate at different levels of detail, providing varying degrees of network access protection. These technologies are not mutually exclusive as some firewall products may implement several of these technologies simultaneously 3

Packet Filtering Work at IP layer of TCP/IP. They are usually part of a router. Each packet is compared to a set of access control rules before it is forwarded. o Rules include source and destination IP address, source and destination port number and protocol used o Depending on rules, the firewall can drop the packet, forward it or send a message to the originator 4

Source IP address Source port Destination IP address Destination port IP Protocol (TCP, UDP, ICMP, etc.) These elements are compared to the ACL to determine if the packets are permitted or denied. Advantage: Packet filters process information only up to layer 3, making them very efficient. Disadvantage: The least secure type of firewall. o Packet filters don't track the TCP session information generated when two computers are communicating with one another. o They are not application aware that is, they cannot understand the context of a given communication, making them easier for hackers to break. Example: if a packet filtering firewall was set to allow incoming email from the internet, then an attack on the SMTP service would pass through the firewall without problem. 5

Circuit Level Gateway Monitors TCP handshaking between packets of trusted clients to untrusted hosts Determine if a requested session is legitimate. Example: (1) A trusted client requests a service, and the gateway accepts this request. (2) Acting on behalf of the client, the gateway opens a connection to the requested untrusted host and then closely monitors the TCP handshaking that follows. It determines that a requested session is legitimate only if the SYN, ACK, and sequence numbers involved in the TCP handshaking are logical. Trusted Client Circuit level gateway untrusted host (3) The gateway establishes a connection. From this point on, the circuit-level gateway simply copies and forwards packets back and forth without further filtering them. 6

Disadvantage: It cannot examine the application-level content of the packets. Most circuit-level gateways are not stand-alone products but instead are packaged with application-level gateways. 7

Application Level Gateway Like a circuit-level gateway, it runs proxies that copy and forward information across the gateway. The proxies that an application-level gateway runs differ in two important ways from the circuit-level gateway: o The proxies are application specific. Accept only packets generated by services they are designed to copy, forward, and filter. For example, if an application-level gateway ran FTP and Telnet proxies, only packets generated by these services could pass through the firewall. All other services would be blocked. o The proxies can filter packets at the application layer of the TCP/IP model. Check each packet that passes through the gateway, verifying the contents of the packet up through the application layer. Example, the gateway could be configured to prevent users from performing the FTP put command. This command lets users write to the FTP server. Prohibiting this action can prevent serious damage of the information stored on the server. 8

The Application Level Gateway acts as a proxy for applications, performing all data exchanges with the remote system in their behalf. It can allow or disallow traffic according to very specific rules, for instance permitting some commands to a server but not others, limiting file access to certain types, varying rules according to authenticated users and so forth. 9

Example: allow selected internal users to telnet outside. 1. Require all telnet users to telnet through gateway. 2. For authorized users, gateway sets up telnet connection to destination host. Gateway relays data between two connections 3. Router filter blocks all telnet connections not originating from gateway Application Gateway Weakness Very CPU intensive: There are two spliced connections between the end users and the gateway must examine and forward all traffic in both directions. Requires high performance host computer 10

Stateful Inspection Combines aspects of a packet-filtering firewall, a circuit-level gateway, and an application-level gateway. Like a packet-filtering firewall, it operates at the network layer, filtering all packets based on source and destination IP addresses and port numbers. Like a circuit-level gateway, determining whether the packets in a session are appropriate. For example, a stateful inspection firewall verifies that SYN and ACK flags and sequence numbers are logical. Like an application-level gateway, evaluating the contents of each packet up through the application layer. 11

Stateful inspection firewall and application-level gateway Like an application-level gateway, a stateful inspection firewall can be configured to drop packets that contain specific commands. o For example, you could configure a stateful inspection firewall to drop FTP packets containing a Put or Get command. An application-level gateway requires two connections: one connection between the trusted client and the gateway and another connection between the gateway and the untrusted host. o A stateful inspection firewall does not require two connections, allowing a direct connection between a trusted client and an untrusted host. Application - level gateway rely on application-specific proxies. o A stateful inspection firewall relies on algorithms to recognize and process application-layer data. These algorithms compare packets against known patterns of authorized packets and are able to filter packets more efficiently. 12

Dynamic State Table o Stateful inspection combines the speed of packet filters with the enhanced security of stored session information. o While traffic is being forwarded through the firewall, the connection information (Source IP, Source port, Destination IP, Destination port, TCP sequencing information) is written to the state table. o If the connection is allowed by the security policy, the request goes out. Return traffic is compared to the existing state information. If the information does not match, the firewall drops the connection. 13

Overview of the Cisco PIX Firewall Finesse OS A secure, real-time, embedded system. Adaptive Security Algorithm (ASA) Implements stateful connection control. Cut-through proxy An authentication method of both inbound and outbound. (1) Finesse OS --- The PIX has a single system that is responsible for operating the device. Better security there is no separation between the operating system and the firewall application, there are no known vulnerabilities to exploit. Better performance The Cisco PIX 535 Firewall can handle 500,000 concurrent connections while maintaining stateful inspection of all connections. (2) Adaptive Security Algorithm (ASA) More secure and efficient than packet filtering and provides better performance than proxy firewalls (Circuit level and application gateways). ASA is a stateful, connection-oriented process that maintains session information in a state table. 14

How the Adaptive Security Algorithm Works 1 The internal host initiates a connection to an external resource. 2 The PIX writes the following information about this connection into the state table: Source IP, Source port, Destination IP, Destination port, and a randomly generated TCP sequence number. 3 The connection is compared to the security policy. If the connection is not allowed, the session is deleted, and the connection is dropped. 4 If the connection is approved by the ACL, the request continues to the external resource. 5 The external resource replies to the request. 6 The response arrives at the firewall and is compared to the state table. If the response matches the session object, the traffic passes to the internal host. If it does not match, the connection is dropped. 15

The ASA implements the ACL based on interface security levels. Interface Security Levels An interface with a higher security level can access an interface with a lower security level. Conversely, an interface with a lower security level cannot access an interface with a higher security level without an ACL. 16

ASA Security Levels Example More secure interface with a higher security level, to a less secure interface with a lower security level - allows all IP-based traffic unless restricted by ACLs. Less secure interface with a lower security level, to a more secure interface with a higher security level This rule drops all packets unless specifically allowed by the access list. Equally secure interfaces No traffic flows between two interfaces with the same security level for example, if both interfaces are set to level 50. 17

Example of Using ACL Permitting DMZ Access to Internal Mail A hole in the firewall must be opened up with an ACL that allows a particular type of traffic to move from a lower-security network to a higher-security network. The ACL permits the client mail access to the internal mail server on the inside interface. nameif ethernet0 inside sec100 nameif ethernet1 outside sec0 nameif ethernet2 dmz sec50 access-list 100 permit tcp host 172.16.0.6 host 172.8.10.8 eq smtp access-group 100 interface dmz 18

(3) Authentication with Cut-Through Proxy The PIX Firewall verify the identity of users at the firewall and permitting or denying access to any TCP- or UDP-based application. 1 A connection to the firewall is initiated via HTTP, FTP, or Telnet, and the user is prompted by the PIX Firewall for a user ID and password. 2 The PIX Firewall uses either RADIUS or TACACS+ protocols to forward the user information to an external authentication server, where it is validated. 3 After successful authentication, the connection is opened at the network layer, the session information is written to the connection table and the ASA process begins. 19

What a Firewall does? it is at the entry point of the networked system it protects. The firewall is the first process that receives and handles incoming network traffic, and it is the last to handle outgoing traffic. Provide strong authentication Allow VPN What a Firewall does not do? Protect against internal threats Protect against the transfer of virus-infected programs or files 20