49
Guide to Firewalls and VPNs, 3 rd Edition Chapter Seven Working with Proxy Servers and Application-Level Firewalls

Guide to Firewalls and VPNs, 3 rd  Edition

Embed Size (px)

DESCRIPTION

Guide to Firewalls and VPNs, 3 rd  Edition. Chapter Seven Working with Proxy Servers and Application-Level Firewalls. Overview. Describe proxy servers and their function Identify the goals your organization can achieve using a proxy server - PowerPoint PPT Presentation

Citation preview

Page 1: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Chapter SevenWorking with Proxy Servers and

Application-Level Firewalls

Page 2: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Overview

• Describe proxy servers and their function

• Identify the goals your organization can achieve using a proxy server

• Discuss critical issues in proxy server configurations

• Evaluate the most popular proxy-based firewall products

• Explain how to deploy and use reverse proxy

2

Page 3: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Overview (cont’d.)

• Determine when a proxy server is not the correct choice

3

Page 4: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Introduction

• Proxies can: – Conceal the end users in a network– Filter out undesirable Web sites– Block harmful content

• Most proxy servers function as firewalls at the boundaries of networks– Perform packet filtering, Network Address

Translation (NAT), and other services

4

Page 5: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Overview of Proxy Servers

• Proxy servers– Also called proxy services, application-level

gateways, or application proxies– Specialized firewall software applications– Evaluate the application-layer data buried in the data

portion of an IP packet

• Most common to dedicate a device to a single application – HTTP for Web traffic, SMTP for e-mail, etc.

5

Page 6: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition 6

Figure 7-1 Application Layer of an IP Packet

@ Cengage Learning 2012

Page 7: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

How Proxy Servers Work

• Function as a software go-between

• Screen all traffic into and out of the relevant ports – Decide whether to block or allow traffic based on

rules set up by the proxy server administrator

• Figure 7-2– Steps involved in proxy server request

• Main complaint about proxy servers – Time they take to inspect, compare, and rebuild

packets and process client requests

7

Page 8: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition 8

Figure 7-2 Steps in an Example Proxy Transaction@ Cengage Learning 2012

Page 9: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

How Proxy Servers Differ from Packet Filters

• Create much more detailed log file listings than packet filters

• Rebuild the packet with new source IP information– Shields internal users from those on the outside

• Attacks that can start with mangled packet data never reach the internal host

• Far more critical to network communications than packet filters—failure of the proxy server usually blocks network access

9

Page 10: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Sample Proxy Server Configurations

• Figure 7-3– Computer that has two separate network interfaces,

one to the external Internet and one to the internal LAN

• Figure 7-4– Packet filter has an interface on the Internet – Configured so that external traffic is allowed to pass

only if it is destined for a service provided on the proxy server

– Sits on the protected side of the perimeter

10

Page 11: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition 11

Figure 7-3 Proxy Using a Dual-Homed Host@ Cengage Learning 2012

147.144.1.212

Figure 7-3 Proxy Using a Dual-Homed Host

Page 12: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition 12

Figure 7-4 Proxy Using a Screened Host@ Cengage Learning 2012

Figure 7-4 Proxy Using a Screened Host

Page 13: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Common Proxy Servers

• Small business:– Wingate for Windows (link Ch 7a)– Squid for many OS's (link Ch 7b)

• Large business– Microsoft Internet Security and Acceleration

Server has been replaced by Microsoft Forefront Threat Management Gateway (links Ch 7c, 7d)

– Sun Java System Web Proxy Server 4.0 is now Oracle iPlanet Proxy Server 4.0 (link Ch 7e)

13

Page 14: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Benefits of Proxy Servers

• Understand benefits that proxy systems can provide

14

Page 15: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Concealing Internal Clients

• Conceal internal clients from external clients

• External clients see a single machine

• Commonly used to share Internet connections

15

Page 16: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition 16

Figure 7-5 Concealing the Local Network

@ Cengage Learning 2012

147.144.1.212

147.144.1.212

Page 17: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Blocking URLs

• Block users from accessing certain URLs

• Configure either IP addresses or DNS names

• Security policy – More effective method of preventing employees from

visiting certain Web sites– Link Ch 7f– URLs can easily be changed

17

Page 18: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Blocking and Filtering Content

• Configure to scan packets for questionable content– Java applets or ActiveX controls– Executable files attached to e-mail messages

• Filtering parameters: time, IP address, and port number, etc.

• All proxy server products scan the payload of a packet – Provide some sort of content-filtering system

18

Page 19: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

E-Mail Proxy Protection

• Can be used to support and protect other network services, including e-mail

• Figure 7-7– Configuration that provides e-mail protection for a

network with a proxy Simple Mail Transfer Protocol (SMTP) server

19

Page 20: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition 20

Figure 7-7 E-Mail Proxy Protection@ Cengage Learning 2012@ Cengage Learning 2012

Figure 7-7 E-Mail Proxy Protection

Page 21: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Improving Performance

• Slow down some requests for information

• Speed up access to documents that have been requested repeatedly– Store Web pages in a disk cache

21

Page 22: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Ensuring Security

• Log files– Tedious and time consuming to review– Serve several different functions to help ensure the

effectiveness of a firewall

• Proxy servers provide very complete log files

22

Page 23: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Ensuring Security (cont’d.)

23

Figure 7-8 NetProxy Logging Services

@ Cengage Learning 2012

Page 24: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Providing User Authentication

• Most proxy server products can prompt users who connect to the server for a username and password

24

Page 25: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Redirecting URLs

• Scan specific parts of the data portion of an HTTP packet– Redirect it to a specific location – Known as URL redirection– Direct clients to a different Web server based on the

Host: field in the HTTP request

• Many Web servers have URL redirection built in– Alleviate the need for a proxy server to do redirection

25

Page 26: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

HTTP GET

Page 27: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Configuring Proxy Servers

• Make sure proxy server has enough capacity – If it gets overloaded, client performance will suffer

• Must configure the environment properly– Configuration of the proxy server itself – May need to configure each piece of client software

that uses the proxy server

• Potential security vulnerabilities– Present a single point of failure for the network– Susceptible to various forms of attack

27

Page 28: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Providing for Scalability

• As number of users on the network grows– Machine that hosts the proxy server should be

upgraded

• Capacity of the server must match the amount of traffic that has to flow through each gateway

• Can add multiple proxy servers to the same network connection

28

Page 29: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Working with Client Configurations

• Configure each client program to work with the proxy server– Specify for FTP and Gopher connections– Browser can use the SOCKS standard

• Configuration file – Browsers on your network can automatically retrieve

the proxy settings

29

Page 30: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

SOCKS Proxy

• SOCKS proxy is a circuit-level gateway– Layer 5

• Used by Tor– Link Ch 7g

• To open this box, in Windows– Internet Options– Connections– LAN Settings– Use a proxy server…– Advanced

Page 31: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Working with Client Configurations (cont’d.)

31

Figure 7-10 NetProxy Configuration Script Example

@ Cengage Learning 2012

Page 32: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Working with Service Configurations

• General-purpose firewall includes a proxy server that monitors all inbound and outbound traffic– HTTP and DNS– SMTP and POP3 for e-mail

• Use SOCKS generic proxy – For services for which no proxy server is available

32

Page 33: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Creating Filter Rules

• Firewall rules – Optimize the performance of the proxy environment– Enable known hosts to bypass the proxy– Filter out specific URLs– Enable internal users to send outbound requests

only at certain times– Govern the length of time a session can last

33

Page 34: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Recognizing the Single Point of Failure

• Potential to be a single point of failure for the network

• Network could be totally cut off from the Internet

• Most network architectures include alternate means of enabling traffic to flow

• Network load balancing (NLB) – Use multiple systems to take turns handling requests– Prevent any one system from getting overloaded

34

Page 35: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Recognizing Buffer Overflow Vulnerabilities

• Problems that result from misconfiguration or other vulnerabilities

• Buffer overflow– Attempt to store more data in a temporary storage

area than that area can hold– Resulting overflow of data renders the program

nonfunctional

• Check manufacturer’s Web site for patches

35

Page 36: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Choosing a Proxy Server

• WinGate– Commercial product primarily used by home and

small business users

• Squid– Designed to protect one type of service (Web or

FTP) and to serve cached Web pages

• Hybrid firewall– Combines several different security technologies

such as packet filtering, application-level gateways, and VPNs

36

Page 37: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Transparent Proxies

• Totally invisible to end users

• Sits between two networks like a router

• Firewall intercepts outgoing traffic– Directs it to a specific computer, such as a proxy

server– No client configuration needed– Can leaks client IP address out

37

Page 38: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Nontransparent Proxies

• Also called explicit proxies

• Require that the client software be configured

• All target traffic is forwarded to the proxy at a single target port– Typically by means of the SOCKS protocol

• Require more labor to configure than transparent proxies– Each client program must be set up to route all

requests to a single port

• Provide greater security than transparent proxies

38

Page 39: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

SOCKS-Based Proxies

• SOCKS – Protocol that enables the establishment of generic

proxy applications– Used to direct all traffic from the client to the proxy

using a target port of TCP/1080– Acts as a transparent proxy– Operates at Session Layer, as a circuit-level

gateway– Can encrypt data between client & proxy– Hides local IP addresses– Disadvantage: does not examine the data part of a

packet

39

Page 40: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

SocksCap

• Free SOCKS application available from Permeo Technologies

• Graphical interface – Quickly configure applications to use SOCKS

• Last updated in 2007

40

Page 41: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Proxy Server-Based Firewalls Compared

• Choice depends on: – Platform – Number of hosts and services to protect

41

Page 42: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Squid

• High-performance and free open-source application

• Specially designed to act as a proxy server and cache files for Web and FTP servers

• Performs access control and filtering

• Especially good at quickly serving cached files

• Runs on all UNIX-based systems (also Windows)

• Developers have come up with plug-in applications that enhance functionality

42

Page 43: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

WinGate

• WinGate– By QBIK– Very popular proxy server for home and small

business environments

• Components– WinGate– WinGate VPN– PurSight (Web content classification)– Kaspersky AV– NetPatrol (IDS)

43

Page 44: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Norton from Symantec

• Norton offers a number of residential firewall and security applications – Also provide various degrees of content filtering and

proxy services

• Combine antivirus functions with network and system protection

44

Page 45: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Microsoft Internet Security & Acceleration Server

• Microsoft proxy server product

• Complex, full-featured firewall – Includes stateful packet filtering as well as proxy

services, NAT, and intrusion detection

• Standard Edition and Enterprise Edition

• Replaced by Microsoft Forefront Threat Management Gateway

45

Page 46: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Reverse Proxies

• Acts as a proxy for inbound connections

• Used outside the firewall as a secure content server to outside clients– Prevent direct, unmonitored access to your server’s

data from outside your company

• Setup shown in Figure 7-14

46

Page 47: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

Reverse Proxies (cont’d.)

• Benefits– Performance

• Cut down on unnecessary requests

• Reduces the load on the company’s Web server

– Privacy• Stand-in for a Web server can protect sensitive

information stored on that Web server that must remain secure

47

Page 48: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition 48

Figure 7-14 Reverse Proxy Example@ Cengage Learning 2012

Figure 7-14 Reverse Proxy Example

Page 49: Guide to Firewalls and VPNs, 3 rd  Edition

Guide to Firewalls and VPNs, 3rd Edition

When a Proxy Server Isn’t the Correct Choice

• Some organizations find that a proxy server slows down traffic excessively

• Might use ISP proxy server– But better off installing and configuring own proxy

server even for small home or business network

49