firewall

38
Firewalls

Upload: aravindh-ramanan

Post on 15-Jan-2015

72 views

Category:

Internet


5 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Firewall

Firewalls

Page 2: Firewall

A firewall forms a barrier through which the traffic going in each direction must pass. A firewall security policy dictates which traffic is authorized to pass in each direction.

Firewall is an effective means of protecting a local system or network of

systems from network based security threats while at the same time affording access to outside world via WAN or Internet.

Firewalls

Page 3: Firewall

◦ All traffic from inside to outside and vice versa, must pass

through the firewall (physically blocking all access to the

local network except via the firewall).

◦ Only authorized traffic (defined by the local security policy)

will be allowed to pass.

Design goals

Page 4: Firewall

Service control◦ Determines the types of Internet services that can be accessed,

inbound or outbound. Direction control

◦ Determines the direction in which particular service requests are allowed to flow through the firewall.

User control◦ Controls access to a service according to which user is

attempting to access it. Behavior control

◦ Controls how particular services are used (e.g. filter e-mail).

Four general techniques:

Page 5: Firewall

cannot protect against attacks bypassing it.◦eg sneaker net, utility modems.

cannot protect against internal threats.◦eg disgruntled employee

cannot protect against transfer of all virus infected programs or files.◦because of huge range of O/S & file types

Firewall Limitations

Page 6: Firewall

QUESTIONS?

Page 7: Firewall

What Is Firewall?

Name The Techniques Involved In Firewall?

Explain any two techniques?

Any Two Limitations Of Firewall?

QUESTIONS ?

Page 8: Firewall

Three common types of Firewalls:

◦Packet-filtering routers◦Application-level gateways◦Circuit-level gateways◦Bastion host

Types of Firewalls

Page 9: Firewall

Packet-filtering Router

Page 10: Firewall

PACKET-FILTERING ROUTER

◦Applies a set of rules to each incoming IP packet and then forwards or discards the packet.

◦Filter packets going in both directions.

◦The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header.

◦Two default policies (discard or forward).

Page 11: Firewall
Page 12: Firewall
Page 13: Firewall

Advantages:◦Simplicity◦Transparency to users◦High speed

Disadvantages:◦Difficulty of setting up packet filter rules◦Lack of Authentication

Page 14: Firewall

Possible attacks and appropriate countermeasures◦IP address spoofing◦Source routing attacks◦Tiny fragment attacks

Page 15: Firewall

examine each IP packet in context– keeps tracks of client-server sessions– checks each packet validly belongs to one

better able to detect bogus packets out of context

Firewalls – Stateful Packet Filters

Page 16: Firewall

Application-level Gateway

Page 17: Firewall
Page 18: Firewall

Application-level Gateway◦Also called proxy server.◦Acts as a relay of application-level traffic.

Advantages:◦Higher security than packet filters.◦Easy to log and audit all incoming traffic.

Disadvantages:◦Additional processing overhead on each

connection (gateway as splice point).

Page 19: Firewall

Circuit-level Gateway

Page 20: Firewall

Circuit-level Gateway◦Stand-alone system or◦Specialized function performed by an The

gateway typically Application-level Gateway◦Sets up two TCP connections◦ relays TCP segments from one connection

to the other without examining the contents

Page 21: Firewall
Page 22: Firewall

◦A system identified by the firewall administrator as a critical strong point in the network´s security.

◦The bastion host serves as a platform for an application-level or circuit-level gateway.

Bastion Host

Page 23: Firewall

What are the types of firewall?

Questions?

Page 24: Firewall

What is packet filter?

Name the possible attacks involved in packet filter?

What is Application level gateway?

what is circiut level gateway?

Difference between application and circiut level gateway?

Page 25: Firewall

In addition to the use of simple configuration of a single system (single packet filtering router or single gateway), more complex configurations are possible.

Firewall Configurations

Page 26: Firewall

Screened host firewall system (single-homed bastion host)

Screened host firewall syste (dual-homed bastion host) Screened-subnet firewall system

Three common configurations

Page 27: Firewall

Screened host firewall system (single-homed bastion host)

Page 28: Firewall

Screened host firewall, single-homed bastion configuration

Firewall consists of two systems:◦A packet-filtering router.◦A bastion host.

Configuration for the packet-filtering router:◦Only packets from and to the bastion host are

allowed to pass through the router. The bastion host performs authentication and proxy

functions.

Page 29: Firewall

Screened host firewall system (dual-homed bastion host)

Page 30: Firewall

Screened host firewall, dual-homed bastion configuration

◦The packet-filtering router is not completely compromised.

◦Traffic between the Internet and other hosts on the private network has to flow through the bastion host.

Page 31: Firewall

Screened-subnet firewall system

Page 32: Firewall

Screened subnet firewall configuration

◦Most secure configuration of the three.◦Two packet-filtering routers are used.◦Creation of an isolated sub-network.

Page 33: Firewall

Advantages:

◦Three levels of defense to thwart intruders.◦The outside router advertises only the existence of

the screened subnet to the Internet (internal network is invisible to the Internet).

◦The inside router advertises only the existence of the screened sub-net to the internal network ( the systems on the inside cannot construct direct routes to the internet.

Page 34: Firewall

• given system has identified a user• determine what resources they can access• general model is that of access matrix with– subject - active entity (user, process)– object - passive entity (file or

resource)– access right – way object can be

accessed

Access Control

Page 35: Firewall

• can decompose by– columns as access control lists– rows as capability tickets

Page 36: Firewall

• information security is increasingly important• have varying degrees of sensitivity of information– cf military info classifications: confidential, secret etc• subjects (people or programs) have varyingrights of access to objects (information)• want to consider ways of increasing confidencein systems to enforce these rights• known as multilevel security– subjects have maximum & current security level– objects have a fixed security level classification

Trusted Computer Systems

Page 37: Firewall

Questions?

Page 38: Firewall

THANK YOU