Download Firewalls - Eastern Michigan University

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Airborne Networking wikipedia , lookup

Net neutrality law wikipedia , lookup

Point-to-Point Protocol over Ethernet wikipedia , lookup

AppleTalk wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Network tap wikipedia , lookup

Lag wikipedia , lookup

Computer network wikipedia , lookup

Wireless security wikipedia , lookup

Internet protocol suite wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Asynchronous Transfer Mode wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

TCP congestion control wikipedia , lookup

Serial digital interface wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

IEEE 1355 wikipedia , lookup

Multiprotocol Label Switching wikipedia , lookup

Net bias wikipedia , lookup

RapidIO wikipedia , lookup

Real-Time Messaging Protocol wikipedia , lookup

Packet switching wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Deep packet inspection wikipedia , lookup

Distributed firewall wikipedia , lookup

Transcript
Firewalls
 Screen packets coming into the Privet
Networks from external, Untrusted Networks
(Internet)
 Ingress Packet Filtering
Firewall examine incoming packet and either pass or
drop (deny) the packet
 Egress Packet Filtering
Firewall examine the packet when the packet is leaving
the internal network
Border Firewall
Internal
Corporate
Network
(Trusted)
PC
Switch
Egress
Passed
Packet
Ingress
Passed
Packet
Attacker
Border Firewall
Dropped
Packet
Logs
Server
Internal
Corporate
Network
(Trusted)
Internet
(Not Trusted)
Firewalls – Type of Protection
Packet Inspection
IP, TCP, UDP, ICMP
Static packet filtering (Stateless filtering)
Stateful filtering
Application Inspection
Application Layer messages
Stop malicious executable attachment
Network Address Translation (NAT)
Spoofs the IP addresses of outgoing packets
Firewalls – Type of Protection
Denial-of-Services Inspection
SYN Flood
Cisco PIX – TCP intercept
Authentication
Only allow the packets from authenticated user
Not common
Virtual Private Networking
Usually work with authentication
Provide confidentiality
Firewall Hardware and Software
Screening Router Firewall
High Cost
Good place for Egress Filtering
Computer-based Firewalls
Lower Cost
Ease of use
Higher risk on Operating System part
Firewall Hardware and Software
Firewall Appliances
Like your toaster
Provide rules update
Host Firewalls
Individual client or server host
Defense in depth
Hard to manage
Static Packet Filter Firewalls
The Internet
Corporate Network
Arriving Packets
| IP-H | TCP-H | Application Message |
| IP-H | UDP-H | Application Message |
| IP-H | ICMP Message
|
| All Permitted Packets |
Denied Packets
Static Packet Filter
Log File
Access Control Lists (ACLs)
The way to organize the filtering rules
Use If-then Format
Sequential Rule Evaluation
Deny All
Access Control Lists (ACLs)
The way to organize the filtering rules
Use If-then Format
Sequential Rule Evaluation
Deny All
Sensitivity to Misordering
GUI Firewall Rule Maker