Intro to Firewalls. Summary



Similar documents
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Internet Security Firewalls

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

ΕΠΛ 674: Εργαστήριο 5 Firewalls

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Internet Security Firewalls

Overview. Firewall Security. Perimeter Security Devices. Routers

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

CMPT 471 Networking II

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

12. Firewalls Content

Basics of Internet Security

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

CIT 480: Securing Computer Systems. Firewalls

Cisco Advanced Services for Network Security

CIT 480: Securing Computer Systems. Firewalls

Lecture 23: Firewalls

How To Protect Your Network From Attack

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Technical Note. ForeScout CounterACT: Virtual Firewall

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

Firewalls, Tunnels, and Network Intrusion Detection

The Advantages of a Firewall Over an Interafer

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Solution of Exercise Sheet 5

Applied Security Lab 2: Personal Firewall

8. Firewall Design & Implementation

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Firewalls, IDS and IPS

Security threats and network. Software firewall. Hardware firewall. Firewalls

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA

FIREWALLS & CBAC. philip.heimer@hh.se

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Fig : Packet Filtering

INSTANT MESSAGING SECURITY

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

Firewalls. Chapter 3

Networking for Caribbean Development

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

How To Protect A Web Application From Attack From A Trusted Environment

Computer Security: Principles and Practice

FIREWALLS IN NETWORK SECURITY

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Firewalls. Mahalingam Ramkumar

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Firewalls Overview and Best Practices. White Paper

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Computer Security DD2395

Firewall Design Principles Firewall Characteristics Types of Firewalls

information security and its Describe what drives the need for information security.

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

CSCI 4250/6250 Fall 2015 Computer and Networks Security

SIP Security Controllers. Product Overview

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Firewall Design Principles

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Uncover security risks on your enterprise network

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Chapter 20 Firewalls. Cryptography and Network Security Chapter 22. What is a Firewall? Introduction 4/19/2010

Firewalls and Intrusion Detection

Firewalls for small business

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Lesson 5: Network perimeter security

Firewall Security. Presented by: Daminda Perera

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Security Technology: Firewalls and VPNs

Windows Remote Access

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

DoS/DDoS Attacks and Protection on VoIP/UC

Securizarea Calculatoarelor și a Rețelelor 13. Implementarea tehnologiei firewall CBAC pentru protejarea rețelei

Cornerstones of Security

Network Access Security. Lesson 10

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Guideline on Firewall

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Stopping secure Web traffic from bypassing your content filter. BLACK BOX

Protecting Your Organisation from Targeted Cyber Intrusion

Transcription:

Topic 3: Lesson 2 Intro to Firewalls Summary

Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer firewalls and application layer firewalls. Enumerate the benefits of a firewall Enumerate the limitations of a firewall

What is a firewall? Protect internal network from outside threats creates choke point from outside of network mechanism that permits access control between two or more networks come in various forms: hardware and software, usually a combination

What can a firewall do? keep outsiders from breaking in keep insiders from exposing valuable data enable secure communication between networks Firewall protects both direction Firewall can proxy an Internet service block services known to be problematic

What is packet filtering? One of the three types of firewall technology determines whether a packet can be accepted or not based on IP address, port number, protocol type Do IP and/or port # based filtering, doesn t look at contents firewall sets up rule set, verifies packets with header information what is inside a packet header: source IP, destination IP, protocol, source port, destination port, size of packet, sequence # Can viruses or Trojans attack a firewall? Yes, vulnerabilities in firewalls that can be exploited previous employer, viruses disable firewalls

What is proxying? use a proxy server as an intermediary between the service requestor and the service provider. Communication sent between the proxy and internal hides real IP address from whoever you are communicating to does logging and access control based on policy, takes requests for user in group don t permit traffic between networks

What is stateful packet filtering? across b/w functionality of packet filtering and firewalls provides more security checks inspects first packet, adds entry to state table state table= tabulates state of the system, state is how you define it to be. State is connections being made updated after valid connections are made. Follow up packets for new connections use that table for verification. use valid host to transmit malicious code Does state table have an expiration time? Session time, start and termination time time window, beyond the connection ends Does termination expire instantaneously depends based on configured session time;

Compare network layer firewalls and application layer firewalls. app layer firewalls block traffic based on what applications are doing network layer examines addresses and others network layer firewalls are faster but do less inspection can just block port rather than app? ports used by app can change most firewalls include aspects of both firewall can be strengthened by changing firmware example of network is packet filtering and example of application layer is proxying

Enumerate the benefits of a firewall cost benefits of firewall make economic sense, inexpensive and high rewards enforce organizational security policies enable logging of connections and data logs produced can give valuable information about the network help prevent net security issues from spreading across network segments firewalls are only as useful as the unified security policy which is defined

Enumerate the limitations of a firewall firewalls cant protect against malicious inside attacks not too effective against dialup susceptible to ip spoofing stop attacks at network level, so many attacks which they cannot block cant prevent against Trojans, viruses, etc can be compromised like any other part of the network Only as good as the policies only as good as updates need security updates/firmware cant protect against vulnerable protocols TCP/IP, http, etc