30
Security Firewall Firewall design principle. Firewall Characteristics . Types of Firewalls . Firewall Components & Configurations .

Security Firewall

  • Upload
    javan

  • View
    90

  • Download
    1

Embed Size (px)

DESCRIPTION

Security Firewall. Firewall design principle. Firewall Characteristics. Types of Firewalls. Firewall Components & Configurations. Firewall Design Principles . Information System undergo a steady evolution( from small LAN’s to Internet connectivity). - PowerPoint PPT Presentation

Citation preview

Page 1: Security Firewall

Security Firewall

Firewall design principle.

Firewall Characteristics.

Types of Firewalls.

Firewall Components & Configurations.

Page 2: Security Firewall

Firewall Design Principles.

• Information System undergo a steady evolution( from small LAN’s to Internet connectivity).

• Strong security features for all workstations and servers not established.

Page 3: Security Firewall

Firewalls

• Effective means of protection a local system or network of systems from network_based security threats while affording access to the outside world via WAN’s or the Internet.

Page 4: Security Firewall

Firewall Design Principles

• The firewall is interested between the permission network and internet.

• Aims :1. Establish a controlled link.2. Protect the premises network from

internet_based attacks.3. Provide a single choke point.

Page 5: Security Firewall

Firewalls Characteristics

• Design goals:1. All traffic form the inside to outside must

pass through the firewall (physically blocking all access to the local network except via firewall).

2. Only Authorized traffic ( defined by the local security policy) will be allowed to pass.

Page 6: Security Firewall

Firewall Characteristics

• Design goals:3. The firewall itself is immune to penetration

( use of trusted systems with secure operating systems).

Page 7: Security Firewall

Firewall Characteristics

• Four General Technologies:1. Service Control: determines the types of

the internet services that can be accessed, in bounded or out bounded.

2. Direction Control: determines the direction in which particular services requests are allowed to flow.

Page 8: Security Firewall

Firewall Characteristics

3. User Control: controls access to a service according to which user is attempting to access it.

4. Behavior Control: controls how particular service are used (e.g. filter e-mail)

Page 9: Security Firewall

Types of Firewalls

• Three common types of firewalls:1. Packet-filtering-router.2. Application-level-Gateways.3. Circuit-level-Gateways.4. (Bastion Host).

Page 10: Security Firewall

Packet-Filtering-Router

• Packet Filtering Router firewalls.

Internet

Packet Filtering Router

Private Network

Figure ( Packet Filtering Router Firewall).

Page 11: Security Firewall

Packet-Filtering-Router

• Applies a set of rules to each incoming IP packet and then forwards or discards the packet.

• Filter packets going in both directions.• The packet filter is typically set up as a list

of rule based on matches to fields in the IP or TCP header.

• Two default polices( discards or forwards).

Page 12: Security Firewall

Packet-Filtering-Router

• Advantages:1. Simplicity.2. Transparency to users.3. High speed• Disadvantages:1. Difficulty of setting up packet filter walls.2. Lack of Authentication.

Page 13: Security Firewall

Application-Level-Gateway

• Application Level Gateway Firewall.

TELNET

FTP

SMTP

HTTPOutside Connection

Inside Connection

Outside Host

Inside Host

Figure (Application Level Gateway).

Page 14: Security Firewall

Application-Level-Gateway

• Also called (Proxy Server).• Acts as relay of application level traffic.

Page 15: Security Firewall

Application-Level-Gateway

• Advantages:1. Higher security than packet filter2. Only need securitize a few allowable

applications.3. Easy to log and audit all incoming traffic.• Disadvantages:Additional processing overhead on each

connection (Gateway as splice point).

Page 16: Security Firewall

Circuit Level Gateway

• Circuit Level Gateway.

OUT

OUT

OUT

OUT

IN

IN

IN

IN

Outside host & outside

connection

Inside host & inside

connection

Page 17: Security Firewall

Circuit Level Gateway

• Stand-alone system or specialized function performed by Application level gateway.

• Sets up two TCP connections.• The gateway typically relays TCP

segments from one connection to the other without examining the contents.

Page 18: Security Firewall

Circuit Level Gateway

• The security function consists of which connections to be allowed.

• Typically use is a situation in which the system administrators trusts the internal users.

• An example is the SOCKS package.

Page 19: Security Firewall

Bastion Host

• A system identified by the firewall administrator as critical strong point in the networks security.

• The Bastion host serves as a platform for an application-level or circuit-level gateway.

Page 20: Security Firewall

Bastion Host

• In addition to the use of simple configuration of single system ( single packet filtering router or single gateway), more complex configurations are possible.

• Three common configurations

Page 21: Security Firewall

Screened host firewall system

• Also called single homed bastion host

PacketFilteringRouter

Internet

Private NetworkBastion

Host

Information Server

Page 22: Security Firewall

Screened host firewall (1)

• Configuration:- Consists of two systems which are:1. Packet filtering router.-Only packets from and to the bastion host

are allowed to pass through server.2. Bastion Host.- Authentication and Proxy functions.

Page 23: Security Firewall

Screened host firewall (2)

• Greater security that the single configuration because of two reasons:

1. This configuration implements both packet level and application level filtering ( allowing for flexibility in defining security policy).

2. An intruder must generally penetrate two separate systems.

Page 24: Security Firewall

Screened host firewall (3)

• This configuration also affords flexibility in providing direct internet access ( public information server, e.g. web server).

Page 25: Security Firewall

Dual Homed Bastion Host

• Dual Homed Bastion Host.

PacketFilteringRouter

Private NetworkBastion

Host

Information Server

INTERNET

Page 26: Security Firewall

Dual Homed Bastion Host

• The packet filtering router is not completely compromised.

• Traffic between the internet and other hosts on the private network has to flow through the Bastion host.

Page 27: Security Firewall

Screened Subnet Firewall System

• See Figure.

INTERNET PrivateNetwork

PacketFilteringRouter

PacketFilteringRouter

Bastion Host

Modem

Information Server

Page 28: Security Firewall

Screened Subnet Firewall System

• Most secured configuration of all the three known techniques in the bastion host.

• Two packet filtering routers are used.• Creation of an isolated sub-network.

Page 29: Security Firewall

Screened Subnet Firewall System

• Advantages:- Three levels of defense to thwart intruders.- The outside router advertises only the

existence of the screened sub-net to the internet ( Internal network is invisible to the internet).

Page 30: Security Firewall

Screened Subnet Firewall System

• Advantages:- The inside router advertises only the

existence of the screened sub-net to the internal network ( the systems on the inside cannot construct direct routes to the internet.