1 pertemuan 05 firewall matakuliah: h0451/praktikum jaringan komputer tahun: 2006 versi: 1/0

Post on 20-Dec-2015

216 Views

Category:

Documents

3 Downloads

Preview:

Click to see full reader

TRANSCRIPT

1

Pertemuan 05Firewall

Matakuliah : H0451/Praktikum Jaringan Komputer

Tahun : 2006

Versi : 1/0

2

Learning Outcomes

Pada akhir pertemuan ini, diharapkan mahasiswa akan mampu :

• Menjelaskan mengenai Firewall

3

Outline Materi

• Fungsi• Type

4

Firewall

• A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets of digital information that attempt to pass through the perimeter or a network.

• A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or Computer system. If an incoming packet of information is flagged by the filters, it is not allowed through.

5

• Sole purpose is to filter traffic• Placed at appropriate location in network• Can also be host-based• Performance is important

Firewall

6

Perimeter Defense

                                                                                           

                                                        

A firewall is said to provide “perimeter security” because it sits on the outer boundary, or perimeter, or a network. The network boundary is the point at which one network

connects to another.

7

Firewall Limitations

• Cannot protect from attacks bypassing it• Cannot protect against internal threats

– e.g. disgruntled employee• Cannot protect against transfer of all virus

infected programs or files– because of huge range of O/S & file types

8

• Network firewalls usually run on proprietary or minimized operating systems

• Two approaches to establishing rules– Default permit– Default deny

Characteristic

9

• Types– Packet filter– Stateful inspection– Application proxy– Personal

Type Firewall

10

Packet Filtering Firewall

• Routers are the most common example– implemented via Access Control Lists

(ACL’s)• Controls access based on src/dest ip

address, port and protocol– does not see the contents of the packet

• Used for egress and ingress filters– ensure outgoing and incoming addresses

are appropriate

11

Stateful Inspection Firewall

• Maintains “state” from one packet to another in the network stream

• Tracks the sequence of packets and conditions for packets within a connection– Examine each IP packet in context– Keeps tracks of client-server sessions– Checks each packet validly belongs to one

• Better able to detect bogus packets out of context

12

Application Proxy Firewall

• Runs pseudo-applications• Internal clients talk to the proxy and it in

turn talks to the “outside”• More resource intensive on the firewall box

than stateful inspection firewall

13

Personal Firewalls

• Application that runs on a workstation (the one being protected) to block unwanted traffic

• Some vended products include host-based intrusion detection features

14

Firewall Configurations

15

Firewall Configurations

16

Firewall Configurations

top related