Top Banner
Introduction to Firewalls © N. Ganesan, Ph.D.
53

Introduction to Firewalls

Sep 13, 2015

Download

Documents

divya2316

Beginner to read about firewalls
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • Introduction to Firewalls N. Ganesan, Ph.D.

  • Overview

  • Overview of FirewallsAs the name implies, a firewall acts to provide secured access between two networksA firewall may be implemented as a standalone hardware device or in the form of a software on a client computer or a proxy serverThe two types of firewall are generally known as the hardware firewall and the software firewall

  • Firewalls in PracticeA computer may be protected by both a hardware and a software firewall

  • Mode of OperationA firewall that stands in between two networks will inspect a packet that is ready to pass between the networks and allow or block the packet based on the rules set for the firewall to operate

  • General Firewall FeaturesPort ControlNetwork Address TranslationApplication Monitoring (Program Control)Packet Filtering

  • Additional Firewall FeaturesData encryptionHiding presenceReporting/logginge-mail virus protectionPop-up ad blockingCookie digestionSpy ware protection etc.

  • Viruses and FirewallsIn general, firewalls cannot protect against virusesAn anti-virus software is needed for that purposeHowever, many security suites such as those offered by MacAfee and Norton offer the complete protectionSome software firewalls such as Zone Alarm Pro may contain limited virus protection features

  • A Rule of ThumbUse the best firewall and virus protection although each may originate from a different company

  • ISO-OSI Layers of Operation

  • Firewall Layer of OperationNetwork LayerApplication Layer

  • Network LayerMakes decision based on the source, destination addresses, and ports in individual IP packets.Based on routersHas the ability to perform static and dynamic packet filtering and stateful inspection.

  • Static & Dynamic FilteringStatic Packet Filtering looks at minimal information in the packets to allow or block traffic between specific service portsOffers little protection.Dynamic Packet Filtering maintains a connection table in order to monitor requests and replies.

  • Stateful InspectionCompares certain key parts of the packet to a database of trusted information. Incoming information is compared to outgoing information characteristics. Information is allowed through only If comparison yields a reasonable match.

  • Application LayerThey are generally, hosts running proxy servers which perform logging and auditing of traffic through the network.Logging and access control are done through software components.

  • Proxy ServicesApplication that mediates traffic between a protected network and the internet.Able to understand the application protocol being utilized and implement protocol specific security.Application protocols include: FTP, HTTP, Telnet etc.

  • Port ScansWhen hackers remotely spy on your computers to see what software and services they have.Port scans are common but with a properly configured and maintained firewall you can restrict access.

  • DMZDemilitarized zoneNeither part of the internal network nor part of the InternetNever offer attackers more to work with than is absolutely necessary

  • Firewall ScenarioMicrosoft Internet Security and Acceleration (ISA) Server as a Dedicated Server

  • Network ConfigurationSingle ComputerSmall Office NetworkLess than 250 ClientsIP Network ProtocolDemand Dial ConnectivityLarger OrganizationArray of ISA ServerInternetISA ServerLocal Area Network

  • Opening PortsDemonstration to be given later

  • Software FirewallsFirewall for WindowsZone AlarmWinrouteTrojan Trap - Trojan HorseFirewall for LinuxIptablesFirewall for MacNetbarrier

  • Software Firewall Implementation

  • Implementing a Firewall An ExampleUsing Winroute as a software router for a small LAN.Using Trojan Trap as protection against active code attack.Software installation.Firewall configuration.Test and scan.

  • Firewall software comparison

  • WinrouteRouting using NAT(Network Address Translation)Packet filteringPort mappingAnti-spoofingVPN supportDNS, DHCPRemote administration

  • Configuration and Rule Sets

  • Setup Winroute for LANWinroute-PC should at least have 2 NICsCheck that all IP addresses are pingable Validate NAT on the Winroute-PC Deactivate NAT on the NIC connected to internal LAN

  • Setup Winroute for LANNo gateway configured on your local interface of the Winroute-PC Configure forwarding options On each internal PC configure the default gateway On each internal PC configure the DNS server

  • Trojan TrapResources protection restrict access to system resources by unknown applicationApplication controlContent filtering IP ports monitoring

  • Hardware FirewallWhat is it?What it does.An example.Firewall use.What it protects you from.

  • Hardware Firewall (Cont.)What is it?It is just a software firewall running on a dedicated piece of hardware or specialized device.Basically, it is a barrier to keep destructive forces away from your property. You can use a firewall to protect your home network and family from offensive Web sites and potential hackers.

  • Hardware Firewall (Cont.)What it does !It is a hardware device that filters the information coming through the Internet connection into your private network or computer system.An incoming packet of information is flagged by the filters, it is not allowed through.

  • Hardware Firewall (Cont.)An example !

  • Hardware Firewall (Cont.)Firewalls use:Firewalls use one or more of three methods to control traffic flowing in and out of the network: Packet filtering Proxy serviceState-full inspection

  • Hardware Firewall (Cont.)Packet filtering - Packets are analyzed against a set of filters. Proxy service - Information from the Internet is retrieved by the firewall and then sent to the requesting system and vice versa. State-full inspection It compares certain key parts of the packet to a database of trusted information. Information traveling from inside to the outside is monitored for specific defining characteristics, then incoming information is compared to these characteristics.

  • Hardware Firewall (Cont.)What it protects you from:Remote loginsApplication backdoorsSMTP session hijackingE-mail AddressesSpamDenial of serviceE-mail bombsE-mail sent 1000s of times till mailbox is fullMacrosViruses

  • Software FirewallWhat it is?Also called Application Level FirewallsIt is firewall that operate at the Application Layer of the OSIThey filter packets at the network layer It Operating between the Datalink Layer and the Network Layer It monitor the communication type (TCP, UDP, ICMP, etc.) as well as the origination of the packet, destination port of the packet, and application (program) the packet is coming from or headed to.

  • Software Firewall (Cont.)How does software firewall works ?

  • Software Firewall (Cont.)Benefit of using application firewalls:allow direct connection between client and host ability to report to intrusion detection software equipped with a certain level of logicMake intelligent decisionsconfigured to check for a known Vulnerabilitylarge amount of logging

  • Software Firewall (Cont.)Benefit of application firewalls (Cont.)easier to track when a potential vulnerability happens protect against new vulnerabilities before they are found and exploitedability to "understand" applications specific information structure Incoming or outgoing packets cannot access services for which there is no proxy

  • Software Firewall (Cont.)Disadvantage of Firewall:slow down network access dramatically more susceptible to distributed denial of service (DDOS) attacks. not transparent to end users require manual configuration of each client computer

  • Top Picks Personal Firewalls Norton Personal Firewall ZoneAlarm Free/Plus/Pro

  • Conclusion

  • Benefits of Firewall-Summary Prevent intrusionChoke point for security auditReduce attacks by hackersHide network behind a single IP addressPart of total network security policy

  • Port Numbers

    The Well Known Ports are those from 0 through 1023.The Registered Ports are those from 1024 through 49151.The Dynamic and/or Private Ports are those from 49152 through 65535.http://www.iana.org/assignments/port-numbersftp://ftp.isi.edu/in-notes/rfc1700.txt

  • Well-know TCP / UDP ports

  • Hardware Firewalls

  • Some Hardware Firewall Features*Offers IP security and internet key exchange network encryption.Integrated firewall functions.Network address translation.Encrypted SNMP management traffic

  • Some Hardware Firewall ManufacturersDLinkLinksysCISCO

  • Some Software Firewall FeaturesNetwork access controlTrusted zones, Internet zones and Blocked zonesProgram access controlProgram access to the InternetPrivacy control

  • Some Software FirewallsZone AlarmMicrosoft Widows Firewall MacAfee Security SuiteNorton Security Suite

  • Layer of Operation