Firewalls P+S Linux Router & Firewall 2013



Similar documents
Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

FIREWALL AND NAT Lecture 7a

Network Address Translation (NAT)

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Security Technology: Firewalls and VPNs

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Firewalls. Network Security. Firewalls Defined. Firewalls

Firewalls. Ahmad Almulhem March 10, 2012

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Internet Ideal: Simple Network Model

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Network Defense Tools

CSCE 465 Computer & Network Security

Chapter 15. Firewalls, IDS and IPS

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Firewalls, Tunnels, and Network Intrusion Detection

Internet Security Firewalls

Firewalls. configuring a sophisticated GNU/Linux firewall involves understanding

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

NAT Traversal for VoIP. Ai-Chun Pang Graduate Institute of Networking and Multimedia Dept. of Comp. Sci. and Info. Engr. National Taiwan University

Why SSL is better than IPsec for Fully Transparent Mobile Network Access

ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Chapter 11 Cloud Application Development

Proxies. Chapter 4. Network & Security Gildas Avoine

7. Firewall - Concept

GregSowell.com. Mikrotik Security

Polycom. RealPresence Ready Firewall Traversal Tips

Firewalls. Chapter 3

Security threats and network. Software firewall. Hardware firewall. Firewalls

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

INTRODUCTION TO FIREWALL SECURITY

Chapter 7. Firewalls

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Introduction to Computer Security Benoit Donnet Academic Year

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Overview. Firewall Security. Perimeter Security Devices. Routers

Source-Connect Network Configuration Last updated May 2009

Stateful Firewalls. Hank and Foo

Creating a VPN with overlapping subnets

Cisco PIX vs. Checkpoint Firewall

Technical Note. ISP Protection against BlackListing. FORTIMAIL Deployment for Outbound Spam Filtering. Rev 2.2

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

- Introduction to Firewalls -

Internet Security Firewalls

Definition of firewall

Firewalls, IDS and IPS

CIT 480: Securing Computer Systems. Firewalls

Introduction to Firewalls

Layer 4-7 Server Load Balancing. Security, High-Availability and Scalability of Web and Application Servers

White Paper. Traversing Firewalls with Video over IP: Issues and Solutions

Proxy firewalls.

VegaStream Information Note Considerations for a VoIP installation

CSE543 - Computer and Network Security Module: Firewalls

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong

Technical Support Information

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

21.4 Network Address Translation (NAT) NAT concept

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

FIREWALLS & CBAC. philip.heimer@hh.se

12. Firewalls Content

How To Set Up A Net Integration Firewall

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Stateful Inspection Technology

CS Computer and Network Security: Firewalls

Chapter 9 Firewalls and Intrusion Prevention Systems

Firewall Firewall August, 2003

Packet Filtering using the ADTRAN OS firewall has two fundamental parts:

Network Considerations for IP Video

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

+ iptables. packet filtering && firewall

Introduction TELE 301. Routers. Firewalls

Introduction of Intrusion Detection Systems

Availability Digest. Redundant Load Balancing for High Availability July 2013

Internet Firewall Tutorial A White Paper January 2005

CSC574 - Computer and Network Security Module: Firewalls

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Firewall Defaults and Some Basic Rules

CS Computer and Network Security: Firewalls

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Certes Networks Layer 4 Encryption. Network Services Impact Test Results

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski

NAT and Firewall Traversal with STUN / TURN / ICE

Firewalls and System Protection

VoIP LAB. 陳 懷 恩 博 士 助 理 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 TEL: # 255

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager

Networking Security IP packet security

A S B

Transcription:

Firewalls P+S Linux Router & Firewall 2013

Firewall Techniques What is a firewall? A firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network which has different levels of trust. Types of operation Simple packet filter Stateful filter Application layer/ proxy based Attack O Attack O 2

Firewall Rules Filtering Ingress: Filter incoming traffic Egress: Filter outgoing traffic Default Policy Accept all versus reject all Deny Access Drop - silently drop packet Reject - drop packet and inform sender Addressing Transparency Firewall and network fingerprinting 3

Firewall Rule Processing NIC = Network Interface Card 4

Stateless Firewall - Packet Filter Functionality Examine a packet at the network layer. Decision based on header in packet. Pros Application independent Good performance and scalability Cons No state or application context Source: CheckPoint 5

Stateful Firewall Functionality Keep track of the state of the network connections. Decision based on session state. Pros Easier to specifiy rules Cons State explosion State for UDP? 6

Application Layer Firewall Functionality Take application state into security decision. Pros Application layer awareness. Cons Supported application protocols. Performance, scalability 7

Web Application Firewall (WAF) Protect web-based applications from malicious requests Response to trend towards Software as a Service (SaaS) Instance of an application layer firewall Request filtering Request patterns (signatures) - Forceful browsing, SQL injection, cross-site scripting, buffer overflow attempts, checking number of form parameters,... Static or dynamic blacklisting / whitelisting False positive problem Implementation often as a reverse proxy 8

Organizational Challenges Extensive Rulesets Firewall rulesets are complex and grow over time, with thousands of rules on a single firewall. Rulesets are hard to manage and understand (do they really reflect your security policy?). Big Organizations Tools needed to manage hundreds of firewalls securely. What is the process to change rulesets? Conflicting goal: networking vs. security staff Networking staff: Paid for providing connectivity, blamed for disruptions. Security staff: Paid to protect and disrupt connectivity 9

Network Address Translation (NAT) A small man s firewall P+S Linux Router & Firewall 2013

NAT Network Adress Translation One way to the Internet ubiquitously deployed in home networks Hosts behind NAT device Initiate communiation NAT device Hosts in the public Internet Host A Home network 155.99.25.11 Public Internet Host B 10.0.0.1 18.181.0.31 Host B Host C Initiate communiation 10.0.0.2 10.0.0.3 11

Network Address Translation Enable multiple hosts on a private network to access the Internet using a single public IP address. Re-writing of source and/or destination addresses of IP packets as they pass through a router or firewall. Benefits Prevents malicious activity initiated by outside hosts. Saves address space. Drawbacks No true end-to-end connectivity. Some protocols can be disrupted (IPsec, SIP, ftp,..) 12

NAT Concept Session A session endpoint for TCP or UDP is a pair {IP address, port number}. A particular session is uniquely identified by its two session endpoints (local IP:port, remote IP:port) The direction of a session is normally the flow direction of the packet that initiates the session: - the initial SYN packet for TCP - the first user datagram for UDP. 13

NAT Modes Asymmetric bridge between private and public network. Allows only outbound sessions to traverse NAT. 1. Basic NAT Translates IP addresses only, keeps port numbers. One public IP for each internal host needed (one to one) 2. Network Address and Port Translation NAPT Translate entire session endpoints. Many internal host can share public IPs (many to one) 14

NAT Operation Src: 10.0.0.1:4321 Dst: 18.181.0.31:1234 NAT Device Src: 155.99.25.11:6200 Dst: 18.181.0.31:1234 Host A Private Network 155.99.25.11 Internet Host B 10.0.0.1 18.181.0.31 Src: 18.181.0.31:1234 Src:18.181.0.31:1234 Dst: 10.0.0.1:4321 NAT Binding 10.0.0.1:4321-155.99.25.11:6200 Dst:155.99.25.11:6200 15

Peer to Peer through NAT Peer A tries to contact Peer B but is blocked by router B Peer B tries to contect Peer A but is blocked by router A No communication can be established NAT hole punching techniques Public Internet Peer A A s NAT B s NAT Peer B Router Router 16

NAT UDP Hole Punching - 1 Hole punching assumes that the clients A and B already have active UDP sessions with a rendezvous server S Server S records the clients private and public session endpoints: A:(10.0.0.1:4321, 155.99.25.11:62000) B:(10.1.1.3:4321, 138.76.29.7:31000) Source http://pdos.csail.mit.edu/papers/p2pnat.pdf 17

NAT UDP Hole Punching - 2 1. A asks S for help to establish a session with B 2. S replies to A with B's public and private endpoints 3. S sends B a connection request with A s endpoints (using the pre-established session B-S) Now A and B know each others public and private endpoints 18

NAT UDP Hole Punching - 3 A and B start sending UDP packets to the peers endpoints (without synchronization) A s first packet to B s public endpoint punches a hole in A s NAT is blocked at B s NAT B s first packet to A s public endpoint punches a hole in B s NAT passes A s NAT A s next packet to B s public endpoint passes B s NAT 19

NAT UDP Hole Punching - 4 Communication through the peers public endpoints is established. Only the messages to the public endpoints get through. 20

NAT UDP Hole Punching - 5 Assumption: NAT-A is well behaved NAT-A preserves the identity of A s private endpoint, consistently translating all outbound sessions from (10.0.0.1:4321) to the corresponding public endpoint (155.99.25.111:62000). The new session s source endpoint (10.0.0.1:4321) is the same as that of the existing session A-S. This is supported by most vendors of NAT devices. Recommended reading http://pdos.csail.mit.edu/papers/p2pnat.pdf - Section 3: UDP Hole Punching - Section 5.1: Consistent Endpoint Translation 21