35
1 Implementing Firewall Technologies Source: CCNA Security

1 Implementing Firewall Technologies Source: CCNA Security

Embed Size (px)

Citation preview

Page 1: 1 Implementing Firewall Technologies Source: CCNA Security

1

Implementing Firewall Technologies

Source:

CCNA Security

Page 2: 1 Implementing Firewall Technologies Source: CCNA Security

2

Firewall Technologies Securing Networks with Firewalls Types of Firewalls Firewalls in Network Design

Page 3: 1 Implementing Firewall Technologies Source: CCNA Security

3

Securing Networks with Firewalls

Page 4: 1 Implementing Firewall Technologies Source: CCNA Security

4

Overview A firewall is a system that enforces an access

control policy between network Common properties of firewalls:

The firewall is resistant to attacks The firewall is the only transit (通路 ) point

between networks The firewall enforces the access control policy

Page 5: 1 Implementing Firewall Technologies Source: CCNA Security

5

Benefits of Firewalls Exposure of sensitive hosts and applications to

untrusted users can be prevented. The protocol flow can be sanitized (處理 ),

preventing the exploitation (利用 ) of protocol flaws. Malicious data can be blocked from servers and

clients. Security policy enforcement can be made simple,

scalable, and robust with a properly configured firewall.

Offloading (下放 ) most of the network access control to a few points in the network can reduce the complexity of security management.

Page 6: 1 Implementing Firewall Technologies Source: CCNA Security

6

Limitations of Firewalls If misconfigured, a firewall can have serious

consequences (single point of failure). Many applications cannot be passed over firewalls

securely. Users might proactively search for ways around the

firewall to receive blocked material, exposing the network to potential attack.

Network performance can slow down. Unauthorized traffic can be tunneled or hidden as

legitimate traffic through the firewall.

Page 7: 1 Implementing Firewall Technologies Source: CCNA Security

7

Types of Firewalls

Filtering Firewalls Packet Filtering Firewall Stateful Firewall Cisco Systems Firewall Solutions

Page 8: 1 Implementing Firewall Technologies Source: CCNA Security

8

Types of Filtering Firewalls Packet-filtering firewall—is typically a router that has the capability to filter

on some of the contents of packets (examines Layer 3 and sometimes Layer 4 information)

Stateful firewall—keeps track of the state of a connection: whether the connection is in an initiation, data transfer, or termination state

Application gateway firewall (proxy firewall) —filters information at Layers 3, 4, 5, and 7. Firewall control and filtering done in software.

Address-translation firewall—expands the number of IP addresses available and hides network addressing design.

Host-based (server and personal) firewall—a PC or server with firewall software running on it.

Transparent firewall—filters IP traffic between a pair of bridged interfaces. Hybrid firewalls—some combination of the above firewalls. For example,

an application inspection firewall combines a stateful firewall with an application gateway firewall.

Page 9: 1 Implementing Firewall Technologies Source: CCNA Security

9

Packet-Filtering Firewall Packet-filtering firewalls use a simple policy table

lookup that permits or denies traffic based on specific criteria: Source IP address Destination IP address Protocol Source port number Destination port number Synchronize/start (SYN) packet receipt

Page 10: 1 Implementing Firewall Technologies Source: CCNA Security

10

Packet-Filtering Firewall

Page 11: 1 Implementing Firewall Technologies Source: CCNA Security

11

Stateful Firewall

Page 12: 1 Implementing Firewall Technologies Source: CCNA Security

12

Stateful Firewall

10.1.1.1 200.3.3.3

Inside ACL

(Outgoing Traffic)

Outside ACL

(Incoming Traffic)

permit ip 10.0.0.0 0.0.0.255 any

Dynamic: permit tcp host 200.3.3.3 eq 80 host 10.1.1.1 eq 1500

permit tcp any host 10.1.1.2 eq 25

permit udp any host 10.1.1.2 eq 53

deny ip any any

source port 1500 destination port 80

Page 13: 1 Implementing Firewall Technologies Source: CCNA Security

13

Stateful Firewalls - Advantages/Disadvantages

Page 14: 1 Implementing Firewall Technologies Source: CCNA Security

14

Cisco Systems Firewall Solutions

Page 15: 1 Implementing Firewall Technologies Source: CCNA Security

15

Firewalls in Network Design

DMZ Scenario Layered Defense Scenario Firewall Best Practices Design Example

Page 16: 1 Implementing Firewall Technologies Source: CCNA Security

16

Design with DMZ

Page 17: 1 Implementing Firewall Technologies Source: CCNA Security

17

Layered Defense Scenario

Page 18: 1 Implementing Firewall Technologies Source: CCNA Security

18

Firewall Best Practices Position firewalls at security boundaries. Firewalls are the primary security device. It is unwise

to rely exclusively on a firewall for security. Deny all traffic by default. Permit only services that are

needed. Ensure that physical access to the firewall is

controlled. Regularly monitor firewall logs. Practice change management for firewall configuration

changes. Remember that firewalls primarily protect from

technical attacks originating from the outside.

Page 19: 1 Implementing Firewall Technologies Source: CCNA Security

19

Design Example

Page 20: 1 Implementing Firewall Technologies Source: CCNA Security

20

Zone-Based Policy Firewall Characteristics

Topology Benefits The Design Process Common Designs

Page 21: 1 Implementing Firewall Technologies Source: CCNA Security

21

Topology Example

Page 22: 1 Implementing Firewall Technologies Source: CCNA Security

22

Benefits

Zone-based policy firewall is not dependent on ACLs The router security posture is now “block unless explicitly

allowed” One policy affects any given traffic, instead of needing

multiple ACLs and inspection actions.

Page 23: 1 Implementing Firewall Technologies Source: CCNA Security

23

The Design Process

• Step 1. Determine the Zone 

• Step 2. Establish policies between zones

• Step 3. Design the physical infrastructure

• Step 4. Identify subset within zones and merge

traffic requirements

Page 24: 1 Implementing Firewall Technologies Source: CCNA Security

24

Common DesignsLAN-to-Internet Public Servers

Redundant FirewallsComplex Firewall

Page 25: 1 Implementing Firewall Technologies Source: CCNA Security

25

Zones Simplify Complex Firewall

Page 26: 1 Implementing Firewall Technologies Source: CCNA Security

26

Zone-Based Policy Firewall Operation

Actions Rules for Application Traffic Rules for Router Traffic

Page 27: 1 Implementing Firewall Technologies Source: CCNA Security

27

Actions

Inspect – This action configures Cisco IOS stateful packet inspection

Drop – This action is analogous to deny in an ACL

Pass – This action is analogous to permit in an ACL

Page 28: 1 Implementing Firewall Technologies Source: CCNA Security

28

Source interface

member of zone?

Destination interface

member of zone?

Zone-pair exists?

Policy exists?

RESULT

NO NO N/A N/ANo impact of zoning/policy

YES (zone 1) YES (zone 1) N/A* N/ANo policy

lookup (PASS)

YES NO N/A N/A DROP

NO YES N/A N/A DROP

YES (zone 1) YES (zone 2) NO N/A DROP

YES (zone 1) YES (zone 2) YES NO DROP

YES (zone 1) YES (zone 2) YES YES policy actions

*zone-pair must have different zone as source and destination

Rules for Application Traffic

Page 29: 1 Implementing Firewall Technologies Source: CCNA Security

29

Rules for Router TrafficSource

interface member of

zone?

Destination interface

member of zone?

Zone-pair

exists?

Policy exists?

RESULT

ROUTER YES NO - PASS

ROUTER YES YES NO PASS

ROUTER YES YES YESpolicy

actions

YES ROUTER NO - PASS

YES ROUTER YES NO PASS

YES ROUTER YES YESpolicy

actions

Page 30: 1 Implementing Firewall Technologies Source: CCNA Security

30

Configuring Zone-Based Policy Firewall with CLI

1. Create the zones for the firewall with the zone security command

3. Specify firewall policies with the policy-map type inspect command

2. Define traffic classes with the class-map type inspect command

4. Apply firewall policies to pairs of source and destination zones with zone-pair security

5. Assign router interfaces to zones using the zone-member security interface command

Page 31: 1 Implementing Firewall Technologies Source: CCNA Security

31

Step 1: Create the Zones

Page 32: 1 Implementing Firewall Technologies Source: CCNA Security

32

Step 2: Define Traffic Classes

FW(config)# class-map type inspect FOREXAMPLE FW(config-cmap)# match access-group 101FW(config-cmap)# match protocol tcpFW(config-cmap)# match protocol udpFW(config-cmap)# match protocol icmpFW(config-cmap)# exitFW(config)# access-list 101 permit ip 10.0.0.0 0.0.0.255 any

Page 33: 1 Implementing Firewall Technologies Source: CCNA Security

33

Step 3: Define Firewall Policies

FW(config)# policy-map type inspect InsideToOutside FW(config-pmap)# class type inspect FOREXAMPLEFW(config-pmap-c)# inspect

Page 34: 1 Implementing Firewall Technologies Source: CCNA Security

34

Step 4: Assign Policy Maps to Zone Pairsand Assign Router Interfaces to Zones

Page 35: 1 Implementing Firewall Technologies Source: CCNA Security

35