Top Banner

of 15

Firewall Course Work

Apr 05, 2018

Download

Documents

Abdul Mannan
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 7/31/2019 Firewall Course Work

    1/15

    Date: 16/03/2012

    Module Tutor: Bo Li

    Module code:CC3021N

    Comparison of different types of firewall | Abdul Mannan 06037871

    LONDONMETROPOLITANUNIVERSITY

    Principles of Network Security: CWFirewall

  • 7/31/2019 Firewall Course Work

    2/15

    Abdul Mannan Student ID 06037871

    ContentsContents .............................................................................................. 2

    1 Introduction ...................................................................................... 3

    2 Literature review .............................................................................. 4

    2.1 Firewall.......................................................................................................... 4

    2.1.1 Hardware Firewall.................................................................................... 4

    2.2 Purpose of Firewall........................................................................................ 7

    2.3 How does it work ........................................................................................... 8

    2.4 Types of firewall ........................................................................................... 8

    2.4.1 Packet Filtering ....................................................................................... 8

    2.4.2 Circuit-Level Gateways .......................................................................... 10

    2.4.3 Application Gateways ............................................................................ 10

    2.4.4 Stateful Multilayer Inspection ................................................................ 12

    3 Comparison ..................................................................................... 13

    4 Conclusion ......................................................................................13

    4.1 Recommendation ....................................................................................... 13

    2 | P a g e

  • 7/31/2019 Firewall Course Work

    3/15

    Abdul Mannan Student ID 06037871

    Abstract

    In this report my main aim is to assume that I am working as a consultant for a

    network security organisation and prepare a report comparing different type of

    firewalls available.by using the internet and other sources I will create a report

    that will give the strengths and weakness of each product, I will also state wherethis product would generally be used.

    1 Introduction

    The internet has millions of data available for free to users to consume and share

    it has evolved to such an extent we now play games, stream live TV, and even talk

    using the internet on the go most are completely free, for many of us it has

    become so essential that we cant get on with our normal lives but yet by

    connecting to the internet has become a risk our confidential data could be

    available to hackers or intruders if we dont have a firewall in place.

    Threat has moved slowly from being most dominant in lower layer of the network

    traffic to the application layer, this has reduced the effectiveness of firewall in

    stopping threats that is carried through the network communications but firewall is

    still needed to stop the threats that continue to work at the lower layer of network

    traffic .firewall is good at providing some protection at the application layer

    supplementing the capabilities of other network security technologies (CNG)

    Firewall is the most basic form of protection users can have for their network andthere are many types of firewall to choose from depending on the network.

    Firewall watches the traffic and examines suspicious activity and used for two

    main reason

    To keep people (intruders, hackers) out

    To keep people (students, lecturers) in (VSC)

    3 | P a g e

  • 7/31/2019 Firewall Course Work

    4/15

    Abdul Mannan Student ID 06037871

    2 Literature review

    2.1 Firewall

    Firewall can be hardware or software program that prevents unauthorised access

    to or from a network and it must have at least two network interfaces, one for thenetwork it is intended to protect, and one for the network it is exposed to.

    Firewall also control the flow of network traffic between network and hosts that

    employs differing security postures at one time most firewall was deployed at the

    network perimeters.(VSC) This provided some form of protection for internal host

    but did not recognise all forms of attacks, and attacks sent from one internal host

    to another do no pass through the network firewall because of this reason network

    designers now include firewall functionality at other places other than the network

    perimeter to provide additional layer of security and also to protect mobile devices

    that are place onto external networks.(CNG)

    Firewall is used to safeguard the data within the network all data entering or

    leaving the network will have to pass through a security check (firewall) which will

    examine each packet that do no not meet the specified security criteria and then

    will be rejected and denied access. The firewall is part of an overall security policy

    that creates a perimeter defence designed to protect the information resources of

    the network. (LSC)

    The firewall will sit at the junction point or gateway between the two networks,

    normally a private network and a public network such as the Internet. The earliest

    firewalls were just routers. The term firewall comes from the fact that bysegmenting a network into different physical sub networks, they will limit the

    damage caused that could of spread from one subnet to another just like fire doors

    or firewalls. Below I have included diagrams showing the connection taking place.

    (VSC)

    2.1.1 Hardware Firewall

    The hardware firewall will be often called a network firewall because its an

    external box sitting between the internet and the computer for home network they

    are normally integrated in the routers itself. This will allow you to connect on the

    public network (internet) and even share the connection with other computers.

    (CSR)

    2.1.1.1 Advantages

    Hardware firewall can protect an entire network compared to software firewall

    which is thumbs up for big companies that would like minimize their spending

    because firewall dont run on the computer it doesnt slow it down, hardware

    firewall work more efficiently for businesses that use high speed connection such

    as DSL or cable modem and also hardware firewall is harder to reach and also

    difficult for malicious software to turn it off.

    4 | P a g e

  • 7/31/2019 Firewall Course Work

    5/15

    Abdul Mannan Student ID 06037871

    2.1.1.2 Disadvantages

    Hardware firewalls can be expensive at first and might be more difficult to

    configure and hardware firewalls treat outgoing traffic from the local network as

    safe, which can be a hazard if malware, such as a worm, penetrates your network

    and attempts to connect to the Internet (TIC)

    (VSC)

    Products for hardware firewalls

    UTM10EW-100EUS - Netgear NG Prosecure UTM10 Hardware Firewall inc 1YR

    Email, Web & Maintenance/Support Subscription

    The ProSecure UTM series of all-in-one gateway security has a combination of

    security options to keep business safe and secure from the Web, email, and

    network threats. Malware hosted on Web pages, phishing attacks, spam, virus

    infected emails, hackers, and denial-of-service attacks,

    Because comprehensive network security requires a lot of processing power to

    examine the network in real time this all in one security solution is all a network

    needs.

    5 | P a g e

  • 7/31/2019 Firewall Course Work

    6/15

    Abdul Mannan Student ID 06037871

    2.1.2 Software FirewallSoftware firewall work in a similar manner as the hardware firewall by monitoring

    and blocking data that comes in to the computer via public networks but software

    firewalls need to be installed as a program in to the computer. (AWC)

    2.1.2.1 Advantages

    Because software firewall runs on a computer it can get more information about

    the network traffic and the ports it is using and familiarise with application that are

    running so there are no errors based on this a software firewall can allow or block

    traffic overall software firewall is able to take and investigate further at the

    malicious traffic and have a report of it (SLB)

    2.1.2.2 Disadvantages

    One of the main disadvantages of software firewall is that it only protects the

    machine that the software is installed on and for multiple implementations thesoftware has to be configured individually that will take time and can get

    expensive. (SLB)

    (VSC)

    Products for software firewall:

    6 | P a g e

  • 7/31/2019 Firewall Course Work

    7/15

    Abdul Mannan Student ID 06037871

    Zone alarm firewall

    Blocks hackers and prevents viruses & spyware from stealing your personal dataand sending it out to the Internet zone alarm has 2-Way Firewall (Inbound &

    Outbound) Stops Internet attacks at the front door and even catches thieves on

    their way out. Our 2-way firewall proactively protects against inbound and

    outbound attacks while making you invisible to hackers.

    Inbound & Outbound - monitors and blocks threat traffic in or out.

    Full Stealth Mode - makes you invisible to hackers

    Kill Controls - instantly disable malicious programs. (ZAS)

    2.2 Purpose of Firewall

    The firewall will help prevent unauthorised guests from accessing the computer

    through public network and stealing important data and even infecting the

    computer with virus a hacker is able to access the computer through open ports

    that is connected to the internet, with a firewall these ports will be protected and

    monitored from any attacks

    Hackers or intruders can do massive damage such as they can plant viruses in the

    computer that will send confidential details to the hacker Many firewalls will block

    outbound traffic that will help prevent this from happening.The main purpose of a firewall is to separate a secure area from a less secure area

    and to control communications between the two. Firewalls can perform other

    functions, but is mainly responsible for controlling inbound and outbound

    communications. (WMI)

    Such as allowing or not allowing an application to send or receive data through a

    port. Firewall should be an essential part for any computer security approach.

    (AWC)

    7 | P a g e

  • 7/31/2019 Firewall Course Work

    8/15

    Abdul Mannan Student ID 06037871

    2.3 How does it work

    The firewall will allow or block traffic between devices based upon the rules that

    have been set by the firewall admin each rule defines a specific patter you would

    want the firewall to detect (VSC)

    There are many different methods firewall will use to filter out the information,

    these methods work at different layers of the network which will determine how

    specific the filtering option can be. (CDC)

    The data gets analyses by the firewall to check if the IP address that is coming

    from and the contents that its carrying, then it checks if the information is

    compliant with the rules that has been configured on the firewall and then action is

    taken if that rule detected is Brocken it also has the ability to analyse data at the

    application level. For example all application accessed over the internet use port

    depending on type of service performed and network traffic is identified by the

    port number. (AWC)

    2.4 Types of firewall

    There are many types of firewall each with various capabilities to analyse network

    traffic to allow or block traffic under set conditions by monitoring traffic

    characteristics by understanding the capabilities of each type of firewall network

    engineer can better understand which to implement and also critical to achieving

    the protection of the network and its security needs

    To compare the capabilities of different types of firewall is to look at the

    transmission control protocol/internet protocol (TCP/IP) layers that is able toexamine TCP/IP communication are made of four layers that works together to

    transfer data between hosts. When a user wants to transfer the data across

    network the data is passed from the highest layer through intermediate layer to

    the lowest layer with each layer adding more data. The lowest layer will then send

    the accumulated data through the physical network. With the data then passed

    upwards through the layer to its destination (CNG)

    I have documented below most types of firewall and it advantages and

    disadvantages and discussing their security capabilities to

    2.4.1 Packet Filtering

    Packet filtering firewall examines the information that is contained in the header of

    a packet that is trying to pass; it will examine the source address and its

    destination it works on the network level of the open system interconnection (KLT)

    Packet filtering is mostly used as a first line of defence against attacks from

    outside the network because most routers have built in packet filtering capabilities

    it has become common. (SPS)

    8 | P a g e

  • 7/31/2019 Firewall Course Work

    9/15

    Abdul Mannan Student ID 06037871

    Below is a product that can be used for small or medium sized business this

    product has the functionality of a router,packet filtering firewall, VPN gateway,and modem pool in one cost effective solution

    The Epipe 2000

    Shared Internet access for your entire office

    Packet filtering firewall, robust security features

    Secure Remote Access for mobile clients (PPTP server)

    Site to Site VPN using IPsec and E2B (MLIP bonding technology) or IPsec and

    IKE

    Direct dial access for remote workers, and Site to Site direct dial

    connections

    (MLI)

    Advantages

    Uses very little CPU resources

    Rules are set by the administrator

    Very cheap

    Disadvantages

    Visible to hackers

    No password

    Lack identification options

    No user authentication

    9 | P a g e

  • 7/31/2019 Firewall Course Work

    10/15

    Abdul Mannan Student ID 06037871

    2.4.2 Circuit-Level Gateways

    Circuit gateway firewalls is transparent and works on the transport level of the

    protocol stack they are very fast (KLT)

    Product Description: Juniper Networks Secure Services Gateway 5 with ISDN

    backup, S/T Interface, 128 MB Memory

    The Juniper Networks SSG5 it is built for small sized offices protected from outside

    network by making it invisible as everything coming from within the firewall

    appears to have originated from the firewall itself. (VSJ)

    Advantages

    Data hidden

    No need to filter each packets

    Fast

    Simple

    Disadvantages

    No protection from attacks (CRN)

    Boot time

    2.4.3 Application Gateways

    The Application Level Gateway works as a proxy for applications all data is

    exchanged with the remote system it has the option of controlling the trafficaccording to specific rules even limiting access to certain file or accounts carrying

    10 | P a g e

  • 7/31/2019 Firewall Course Work

    11/15

    Abdul Mannan Student ID 06037871

    rules according to authentication and privilege and can monitor events on the host

    system and capabilities of sounding alarm or notification if rules are disobeyed An

    application gateway is normally implemented on a separate computer on the

    network whose primary function is to provide proxy service.(PHO)

    Description

    Blocking of harmful information on the web / Time Control of Internet access

    Multi-Connection - By Using only one ADSL or Cable line, up to 253 PCs can

    be connected to the Internet

    NAT-based IP sharing - Multiple PC's in LAN can access Internet

    simultaneously on a single IP account

    NAT-based firewall - Provides an effective firewall

    HUB - Enables multiple PC's to communicate data in LAN

    Port mapping - Provides application gateway function like Web server, FTP

    server, etc.(TKP)

    Advantages

    Examines packets at the application level

    High security features such as denial of service attacks

    Reject packets

    11 | P a g e

  • 7/31/2019 Firewall Course Work

    12/15

    Abdul Mannan Student ID 06037871

    No direct connection

    Disadvantages

    CPU requirements is high

    Slow

    Complicated to set up

    2.4.4 Stateful Multilayer Inspection

    Stateful multilayer inspection firewall has the facility of three types of firewall

    combined they filter packets at the network layer and evaluate packets at the

    application layer they also allow direct connection between the client and host.

    (CSU)

    ZyXEL ZyWALL USG50 Internet Security Firewall with Dual-WAN, 4 Gigabit LAN /

    DMZ Ports, 5 IPsec VPN, SSL VPN, and 3G WAN Support

    The ZyWALL is very powerful solutions for small business has the capabilities to

    perform deep packet inspection and also It embodies a Stateful Packet Inspection(SPI) firewall, Anti-Virus, Intrusion Detection and Prevention (IDP), Content

    Filtering, Anti-Spam, and VPN (IPsec/SSL) all in one box. This multi-layered security

    safeguards your organization's customer and company records, intellectual

    property, and critical resources from external and internal threats. (NCP)

    Advantages

    More performance then proxies

    Very high security feature such as enforcing security policies at theapplication

    12 | P a g e

  • 7/31/2019 Firewall Course Work

    13/15

    Abdul Mannan Student ID 06037871

    Transparency to the end user

    Disadvantages

    Expensive

    Complex

    3 Comparison

    Above I have compared most firewall type and come to a conclusion that the best

    firewall is not a product itself but the feature and option it provides for the homeor a business.in most cases there is no universal firewall that best suites the

    security need for all.

    4 Conclusion

    Serious evaluation should be taken when choosing a firewall solution for a

    network. Firstly before any firewall is implemented at home user need to note

    down any task they would be performing with the computers to best match what

    firewall device they need for the home but I think software firewall should do the

    job, but in a corporate firewall it needs to be evaluated for any security issues and

    how important the data is and from that they will create a firewall security policyand then implemented after successful evaluation.

    4.1 Recommendation

    Network architecture and threat analysis should be performed before any

    security implementation.

    Firewall policies should be based on strict rule set.

    Policies handling all incoming and outgoing traffic

    13 | P a g e

  • 7/31/2019 Firewall Course Work

    14/15

    Abdul Mannan Student ID 06037871

    References

    (CNG) http://csrc.nist.gov/publications/nistpubs/800-41-Rev1/sp800-41-rev1.pdf

    (VSC)http://www.vicomsoft.com/learning-center/firewalls/

    (LSC) www.linuxsecurity.com/resource_files/firewalls/nsc/500619.html

    (CSR) http://www.computer-security-review.org/faqs/firewalls/are-there-different-

    types-of-firewalls.html

    (SLB)

    http://www.smallbusinesscomputing.com/webmaster/article.php/3103431/Firewall-

    Debate-Hardware-vs-Software.htm

    (AWC) http://www.antivirusware.com/articles/what-is-firewall.htm

    (ZAS) http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-

    firewall.htm

    (TIC) http://technology.inc.com/2006/11/01/choosing-a-firewall-hardware-v-

    software/

    (WMI) www.whatismyipaddress.com/firewall

    (CDC) http://www.comodo.com/resources/home/how-firewalls-work.php

    (KLT) http://kimberleytaylor.com/articles/firewalls_type.htm

    (SPS) http://www.support.psi.com/support/common/routers/files/Filter-Desc.html

    (MLI) http://www.ml-ip.com/html/documentation/vpn-ug-intro-hw.html

    (VSJ) http://www.vology.com/shop/juniper-ssg-5-sb-bt-5358

    (CRN) http://www.careerride.com/nw-circuit-level-gateway.aspx

    (PHO) http://www.pc-help.org/www.nwinternet.com/pchelp/security/firewalls.htm

    (TKP) http://www.tradekorea.com/product-detail/P00006352/RG_1000.html#

    (CSU) http://www.c-sharpcorner.com/uploadfile/pmalik/what-is-a-firewall/

    (NCP) http://www.newegg.ca/Product/Product.aspx?Item=N82E16833181137

    14 | P a g e

    http://csrc.nist.gov/publications/nistpubs/800-41-Rev1/sp800-41-rev1.pdfhttp://www.vicomsoft.com/learning-center/firewalls/http://www.vicomsoft.com/learning-center/firewalls/http://www.computer-security-review.org/faqs/firewalls/are-there-different-types-of-firewalls.htmlhttp://www.computer-security-review.org/faqs/firewalls/are-there-different-types-of-firewalls.htmlhttp://www.antivirusware.com/articles/what-is-firewall.htmhttp://www.comodo.com/resources/home/how-firewalls-work.phphttp://kimberleytaylor.com/articles/firewalls_type.htmhttp://www.support.psi.com/support/common/routers/files/Filter-Desc.htmlhttp://www.ml-ip.com/html/documentation/vpn-ug-intro-hw.htmlhttp://www.vology.com/shop/juniper-ssg-5-sb-bt-5358http://www.careerride.com/nw-circuit-level-gateway.aspxhttp://www.pc-help.org/www.nwinternet.com/pchelp/security/firewalls.htmhttp://www.tradekorea.com/product-detail/P00006352/RG_1000.htmlhttp://www.c-sharpcorner.com/uploadfile/pmalik/what-is-a-firewall/http://www.newegg.ca/Product/Product.aspx?Item=N82E16833181137http://csrc.nist.gov/publications/nistpubs/800-41-Rev1/sp800-41-rev1.pdfhttp://www.vicomsoft.com/learning-center/firewalls/http://www.computer-security-review.org/faqs/firewalls/are-there-different-types-of-firewalls.htmlhttp://www.computer-security-review.org/faqs/firewalls/are-there-different-types-of-firewalls.htmlhttp://www.antivirusware.com/articles/what-is-firewall.htmhttp://www.comodo.com/resources/home/how-firewalls-work.phphttp://kimberleytaylor.com/articles/firewalls_type.htmhttp://www.support.psi.com/support/common/routers/files/Filter-Desc.htmlhttp://www.ml-ip.com/html/documentation/vpn-ug-intro-hw.htmlhttp://www.vology.com/shop/juniper-ssg-5-sb-bt-5358http://www.careerride.com/nw-circuit-level-gateway.aspxhttp://www.pc-help.org/www.nwinternet.com/pchelp/security/firewalls.htmhttp://www.tradekorea.com/product-detail/P00006352/RG_1000.htmlhttp://www.c-sharpcorner.com/uploadfile/pmalik/what-is-a-firewall/http://www.newegg.ca/Product/Product.aspx?Item=N82E16833181137
  • 7/31/2019 Firewall Course Work

    15/15

    Abdul Mannan Student ID 06037871

    Bibliography

    http://www.vicomsoft.com/learning-center/firewalls/

    http://www.buzzle.com/articles/what-is-the-purpose-of-a-firewall.html

    http://www.pc-help.org/www.nwinternet.com/pchelp/security/firewalls.htm

    http://whatismyipaddress.com/firewall

    http://www.networkworld.com/subnets/cisco/060109-ch1-cisco-secure-

    firewalls.html?page=1

    http://acw1-nt.wikidot.com/what-is-a-firewall

    http://www.comtest.com/tutorials/firewalls.html

    http://searchnetworking.techtarget.com/tutorial/Introduction-to-firewalls-Types-of-

    firewalls

    http://www.computer-security-review.org/faqs/firewalls/are-there-different-types-

    of-firewalls.html

    http://www.aboutonlinetips.com/what-is-a-computer-firewall/

    http://en.wikipedia.org/wiki/Internet_security#Types_of_firewalls

    http://www.techrepublic.com/forum/questions/101-314601/stateful-firewalls

    http://csrc.nist.gov/publications/nistpubs/800-41-Rev1/sp800-41-rev1.pdf

    15 | P a g e

    http://www.vicomsoft.com/learning-center/firewalls/http://www.buzzle.com/articles/what-is-the-purpose-of-a-firewall.htmlhttp://www.pc-help.org/www.nwinternet.com/pchelp/security/firewalls.htmhttp://whatismyipaddress.com/firewallhttp://www.networkworld.com/subnets/cisco/060109-ch1-cisco-secure-firewalls.html?page=1http://www.networkworld.com/subnets/cisco/060109-ch1-cisco-secure-firewalls.html?page=1http://acw1-nt.wikidot.com/what-is-a-firewallhttp://www.comtest.com/tutorials/firewalls.htmlhttp://searchnetworking.techtarget.com/tutorial/Introduction-to-firewalls-Types-of-firewallshttp://searchnetworking.techtarget.com/tutorial/Introduction-to-firewalls-Types-of-firewallshttp://www.computer-security-review.org/faqs/firewalls/are-there-different-types-of-firewalls.htmlhttp://www.computer-security-review.org/faqs/firewalls/are-there-different-types-of-firewalls.htmlhttp://www.aboutonlinetips.com/what-is-a-computer-firewall/http://en.wikipedia.org/wiki/Internet_security#Types_of_firewallshttp://www.techrepublic.com/forum/questions/101-314601/stateful-firewallshttp://csrc.nist.gov/publications/nistpubs/800-41-Rev1/sp800-41-rev1.pdfhttp://www.vicomsoft.com/learning-center/firewalls/http://www.buzzle.com/articles/what-is-the-purpose-of-a-firewall.htmlhttp://www.pc-help.org/www.nwinternet.com/pchelp/security/firewalls.htmhttp://whatismyipaddress.com/firewallhttp://www.networkworld.com/subnets/cisco/060109-ch1-cisco-secure-firewalls.html?page=1http://www.networkworld.com/subnets/cisco/060109-ch1-cisco-secure-firewalls.html?page=1http://acw1-nt.wikidot.com/what-is-a-firewallhttp://www.comtest.com/tutorials/firewalls.htmlhttp://searchnetworking.techtarget.com/tutorial/Introduction-to-firewalls-Types-of-firewallshttp://searchnetworking.techtarget.com/tutorial/Introduction-to-firewalls-Types-of-firewallshttp://www.computer-security-review.org/faqs/firewalls/are-there-different-types-of-firewalls.htmlhttp://www.computer-security-review.org/faqs/firewalls/are-there-different-types-of-firewalls.htmlhttp://www.aboutonlinetips.com/what-is-a-computer-firewall/http://en.wikipedia.org/wiki/Internet_security#Types_of_firewallshttp://www.techrepublic.com/forum/questions/101-314601/stateful-firewallshttp://csrc.nist.gov/publications/nistpubs/800-41-Rev1/sp800-41-rev1.pdf