Download William Stallings, Cryptography and Network Security 3/e

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Next-Generation Secure Computing Base wikipedia , lookup

Trusted Computing wikipedia , lookup

Security-focused operating system wikipedia , lookup

Wireless security wikipedia , lookup

Computer security wikipedia , lookup

Proxy server wikipedia , lookup

Security and safety features new to Windows Vista wikipedia , lookup

Mobile security wikipedia , lookup

Network tap wikipedia , lookup

Denial-of-service attack wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Unix security wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Deep packet inspection wikipedia , lookup

Distributed firewall wikipedia , lookup

Transcript
FIREWALLS
What is a Firewall?

A firewall is hardware or software (or a
combination of hardware and software) that
monitors the transmission of packets of digital
information that attempt to pass through the
perimeter of a network.

A firewall is simply a program or hardware device
that filters the information coming through the
Internet connection into your private network or
computer system. If an incoming packet of
information is flagged by the filters, it is not
allowed through.
Perimeter Defense
A firewall is said to provide “perimeter security” because it sits on the
outer boundary, or perimeter, of a network. The network boundary is
the point at which one network connects to another.
What is a Firewall?



a choke point that keeps unauthorized users
out of the protected network.
interconnects networks with differing trust
imposes restrictions on network services


auditing and controlling access



only authorized traffic is allowed
can implement alarms for abnormal behavior
is itself immune to penetration
provides perimeter defence
Firewall Limitations
cannot protect from attacks bypassing it
 cannot protect against internal threats



e.g. disgruntled employee
cannot protect against transfer of all virus
infected programs or files

because of huge range of O/S & file types
Types of Firewalls

Packet Filters

Application-Level Gateways

Circuit-Level Gateways
Firewalls – Packet Filters
Firewalls – Packet Filters

A packet filtering router applies a set of
rules to each incoming IP packet and then
forwards or discards the packet.

The router is typically configured to filter
packets going in both directions (from and
to the internal network).
Firewalls – Packet Filters
Filtering rules are based on information contained
in a network packet:
 Source IP address: The IP address of the
system that originated the IP packet (e.g.,
192.168.1.1)
 Destination IP address: The IP address of the
system the IP packet is trying to reach (e.g.
192.168.1.2)
 Source and destination transport-level address:
The transport level (e.g., TCP or UDP) port
number, which defines applications such as
SNMP or TELNET
Firewalls – Packet Filters:
Default Policies
Packet filtering is typically set up as a list of rules
based on matches to fields in the IP or TCP header.
When there is no match to any rule, a default action
is taken.
There are two possible default policies: discard or
forward.
Firewalls – Packet Filters:
Default Policies
Default = discard: that which is not expressly
permitted is prohibited.
It is very conservative. Initially, everything is
blocked—services must be
added on a caseby-case basic.
Default = forward: that which is not expressly
prohibited is permitted.
It increases ease of use for end users but
provides reduced security. The security
administrator must, in essence, react to each new
security threat as it becomes available
Firewalls – Packet Filters
Attacks on Packet Filters

IP address spoofing
fake source address to be trusted
 add filters on router to block


source routing attacks
attacker sets a route other than default
 block source routed packets


tiny fragment attacks
split header info over several tiny packets
 either discard or reassemble before check

Firewalls - Application Level
Gateway (or Proxy)
Firewalls - Application Level
Gateway (or Proxy)
Acts as relay of application-level traffic. The user
contacts the gateway using a TCP/IP
application, such as FTP, and the gateway asks
the user for the name of a remote host to be
accessed. When the user responds and
provides a valid user ID and authentication
information, the gateway contacts the application
on the remote host and relays TCP segments
containing the application data between the two
points.
Firewalls - Application Level
Gateway (or Proxy)
Tend to be more secure than packet
filters.
 Need only scrutinize a few allowable
applications.
 It is easy to log and audit all incoming
traffic at the application level.

Firewalls - Application Level
Gateway (or Proxy)
Main Disadvantage

Additional Processing overhead on each
connection.
Firewalls - Circuit Level Gateway
Firewalls - Circuit Level Gateway

relays two TCP connections (one between itself and a
TCP user on an inner host and one between itself and a TCP user
on an outside host)




imposes security by limiting which such
connections are allowed
once created usually relays traffic without
examining contents
typically used when trust internal users by
allowing general outbound connections
SOCKS (a protocol) commonly used for this
Bastion Host



highly secure host system that serves as a
platform for an application-level or circuitlevel gateway.
host hardware platform executes a secure
version of it’s operating system, making it a
trusted system.
only services that the network administrator
considers essential are installed on the
bastion host (e.g. Telnet, DNS, FTP, and
user authentication)
Firewall Configurations
Single-Homed Bastion: Advantages
Consists of two systems: a packet-filtering router and a
bastion host. The router is configured so that
For traffic from the Internet, only IP packets destined for the
bastion host are allowed in.
For the traffic from the internal network, only IP packets from
the bastion host are allowed to out.


The bastion host performs authentication and proxy
functions.
Firewall Configurations
Firewall Configurations
Screened Subnet Firewall



There are now three levels of defense to thwart
intruders.
The outside router advertises only the existence
of the screened subnet to the Internet; therefore,
the internal network is invisible to the Internet.
Similarly, the inside router advertises only the
existence of the screened subnet to the internal
network; therefore, the systems on the inside
network cannot construct direct routes to the
Internet.