Download CIS484-FIREWALL

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Mobile security wikipedia , lookup

Malware wikipedia , lookup

Wireless security wikipedia , lookup

Norton Internet Security wikipedia , lookup

Computer security wikipedia , lookup

Cybercrime wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Deep packet inspection wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Unix security wikipedia , lookup

Distributed firewall wikipedia , lookup

Transcript
Firewall
Kidane Ghebresilassie
Sandra Corona
Sirisha Garimella
Christopher Mora
Elizabeth Canela
Contents
•
Introduction
•
Software firewall
•
Hardware firewall
•
•
Home/Corporate
Network
Future trends
Software Firewall



A firewall ISOLATES the computer from the
Internet.
A “wall of code” inspects each individual
“packet” of data as it arrives at either side of
the firewall — inbound or outbound.
Determines whether the data packet should
be allowed to pass or be blocked.
How does a firewall work?

Exchange of individual "packets" of data.

Each packet is transmitted by its source machine
toward its destination machine.


Each machine sends back "acknowledgement
packets" to let the source machine know that data
was received.
The software firewall has total veto power over the
computer's receipt of any data from the internet.
Illustration
Personal firewalls

Top Picks : Zone Alarm,
Norton Internet Security

More Choices : Black Ice,
PcInternet patrol, Kerio,
Norman, Outpost, Sygate,
Terminet

Fading Away : ConSeal,
eSafe, HackTracer, PC
Viper, NeoWatch & Sphinx
Free firewall and security software

Zonealarm - PC firewall that keeps personal data
and privacy safe from internet hackers and data
thieves. Protection against worms, Trojans, spyware
and 47 types of malicious email attachments.

Kerio Personal Firewall - Controls all dataflow in
both directions - from the internet to the computer
and vice versa and it can block all attempted
communication, allowing only what is permitted.
Hardware Firewall
Devices Used As Firewalls
Firewall
Router
Hub
PC
Host
Collection of Hosts
Dial-Up System
Internet
Workstation/s
101011
Firewall
(DMZ)
(HUB)
LAN
HUB
Performs basic packet filtering at the router level without
purchasing additional hardware or software.
Firewall with Proxy Server
Proxy /
Internet
LAN
10101
Firewall
HUB
Proxy is the shield of the network
Workstation/s
Buying a Firewall
•
•
•
Product prices range from a few hundred
dollars to thousands of dollars.
Features range from a couple dozen
configuration parameters to detailed level of
control.
Variety of alarms, controls and alert sounds.
Buying a Firewall
Umax Technologies



Model : Ugate-3000
Price : $399.95
Capabilities : Provides a secure, high- speed LAN-
connected gateway to the internet for 253 users
over cable or an Asymmetric Digital Subscriber Line
(ASDL) modem.
Contd.
3Com
Model : Office Connect Internet
Price : $695.00
Capabilities :
•
•
•
Protects the LAN from unauthorized access .
Prevents denial of service attacks from the internet.
Includes two 10Mbps Ethernet ports.
Contd.
RADGUARD
Model : cIPro
Price : $4,950.00
Capabilities :
•
•
•
•
Offers IP security and internet key exchange network
encryption.
Integrated firewall functions.
Network address translation.
Encrypted SNMP management traffic.
Contd.



Consider that not all packet filtering routers filter the
source TCP/UDP port, however more vendors are
starting to incorporate this capability.
Some routers examine the network’s interface as a
packet arrives, then uses additional criterion.
Some UNIX hosts provide packet filtering capability,
although most don’t.
Basic Firewall Configuration

Option 1:
Internet <--> Firewall Hardware or Software
<--> Internal Network/Individual Computer

Option 2:
Internet <--> Hardware Firewall/Router <-->
Personal Firewall Software <--> PC
Home Network
Sorting Data
Workstation/s
Internet
Firewall
LAN
Router
Or
(DMZ)
Cable
Modem
(HUB)
HUB
Outside Server
Packet filtering - a simple method, packet filtering entails analyzing small
packets or chunks of data through a series of filters.
Contd.

Proxy service - some information is transmitted by
proxy, automatically responding to the source with
some small amount of data.

Stateful inspection - this method looks at parts of
packets to see if they match specific characteristics
that are allowable. Most modern firewalls offer
stateful inspection.
Firewall Analysis



Depends on both ports and application names.
Users can define rules according to actual ports or
they can set rules to match a program.
The firewall will detect common programs such as
web browsers and email programs and auto
configure the necessary ports as they attempt to
connect to the internet.
Contd.


The firewall can be set to learn new programs to
begin with and later changed to only allow those that
have been predefined. The firewall tends to default
to “any port” for detected applications.
Recommended that users learn the required port for
each allowable Internet program and edit the remote
ports to match.
Features of firewall


Port Control, Application
Monitoring (Program Control)
and Packet Filtering.
Additional features: Data
encryption, hiding presence,
reporting/logging, e-mail virus
protection, pop-up ad blocking,
cookie digestion, spy ware
protection, laptop protection.
Corporate network
Setting up your personal firewall
Kerio Firewall Basics

Software or hardware between
your LAN and the Internet,
inspecting both inbound and
outbound traffic by rules that
you set, which define the sort
of security you want.
Kerio Choices



Permit Unknown
Ask Me First
Deny Unknown
What Traffic Is Good/What's Bad?




Experience
Reading
Learning
Installation Note
Concerns



Do Firewalls Prevent Viruses and Trojans?
NO!! A firewall can only prevent a virus or Trojan from
accessing the internet while on your machine.
95% of all viruses and Trojans are received via e-mail,
through file sharing (like Kazaa or Gnucleus) or through
direct download of a malicious program.
Firewalls can't prevent this - only a good anti-virus software
program can.
Contd.



However, once installed on your PC, many viruses and
Trojans "call home" using the internet to the hacker that
designed it.
This lets the hacker activate the Trojan and he/she can now
use your PC for his/her own purposes.
A firewall can block the call home and can alert you if there
is suspicious behavior taking place on your system.
The key to security awareness is embedded in
the word security
If not you, who? If not now, when?
FUTURE TRENDS

Evolution

Security
FUTURE DEVELOPMENTS


IP Security (IPSec) standards
Level of fragmentation in the firewall
market
Summary
References
www.howstuffworks.com
http://www.microsoft.com
http://www.securityfocus.com
www.google.com
http://grace.com/us-firewalls.htm
http://www.kerio.com/us/supp_kpf_manual.html
http://www.broadbandreports.com/faq/security/2.5.1.
http://www.firewall-software.com
Glossary



ASDL (Asymmetric Digital Subscriber Line): A new technology that
provides high transmission speeds for video and voice to homes over
ordinary copper telephone wire.
DMZ (Demilitarized Zone): An area outside the firewall that guards
valuable information inside the firewall.
Firewall: A computer firewall protects networked computers from
intentional hostile intrusion that could compromise confidentiality or
result in data corruption or denial of service. It may be a hardware
device or a software program running on a secure host computer.