36
1 Internet Internet Firewalls Firewalls What it is all What it is all about about Concurrency System Lab, EE, National Taiwan University http://cobra.ee.ntu.edu.tw R355

1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University R355

Embed Size (px)

Citation preview

Page 1: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

1

Internet Internet FirewallsFirewallsInternet Internet FirewallsFirewalls

What it is all aboutWhat it is all about

Concurrency System Lab, EE, National Taiwan University

http://cobra.ee.ntu.edu.tw

R355

Page 2: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

2

OutlineOutline• Firewall Design Principles• Firewall Characteristics• Components of Firewalls• Firewall Configurations

Page 3: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

3

FirewallsFirewalls

• Protecting a local network from security threats while affording access to the Internet

Page 4: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

4

Firewall DesignFirewall DesignPrinciplesPrinciples

• The firewall is inserted between the private network and the Internet

• Aims:– Establish a controlled link– Protect the local network from

Internet-based attacks– Provide a single choke point

Page 5: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

5

Firewall Firewall CharacteristicsCharacteristics

• Design goals for a firewall– All traffic (in or out) must pass

through the firewall– Only authorized traffic will be allowed

to pass– The firewall itself is immune to

penetration

Page 6: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

6

Firewall Firewall CharacteristicsCharacteristics

• Four general techniques:– Service control

• The type of Internet services that can be accessed

– Direction control• Inbound or outbound

– User control• Which user is attempting to access the service

– Behavior control• e.g., Filter email to eliminate spam

Page 7: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

7

Components of Components of FirewallsFirewalls

• Three common components of Firewalls:– Packet-filtering routers– Application-level gateways– Circuit-level gateways– (Bastion host)

Page 8: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

8

Components of Components of FirewallsFirewalls

(I)(I)• Packet-filtering Router

Page 9: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

9

Packet-filtering Router

• Packet-filtering Router– Applies a set of rules to each incoming IP

packet and then forwards or discards the packet

– Filter packets going in both directions– The packet filter is typically set up as a

list of rules based on matches to fields in the IP or TCP header

– Two default policies (discard or forward)

Page 10: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

10

TCP/IP header

Page 11: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

11

Packet-filtering Router

• Advantages:– Simplicity– Transparency to users– High speed

• Disadvantages:– Difficulty of setting up packet filter

rules– Lack of Authentication

Page 12: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

12

Packet-filtering Router

• Open-source under UNIX:– IP firewall– IPFilter– IPchain

Page 13: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

13

Components of Components of FirewallsFirewalls

(II)(II)• Application-level Gateway

Page 14: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

14

Application-level Gateway

• Application-level Gateway– Also called proxy server– Acts as a relay of application-level

traffic

Page 15: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

15

Application-level Gateway

• Advantages:– Higher security than packet filters– Only need to check a few allowable

applications– Easy to log and audit all incoming traffic

• Disadvantages:– Additional processing overhead on each

connection (gateway as splice point)

Page 16: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

16

Application-level Gateway

• Open-source under UNIX:– squid (WWW),– delegate (general purpose),– osrtspproxy (RTSP),– smtpproxy (SMTP),– …

Page 17: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

17

Components of Components of FirewallsFirewalls

(III)(III)• Circuit-level Gateway

Page 18: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

18

Circuit-level Gateway

• Similar to Application-level Gateway• However

– it typically relays TCP segments from one connection to the other without examining the contents

– Determines only which connections will be allowed

– Typical usage is a situation in which the system administrator trusts the internal users

Page 19: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

19

In other words

• Korean custom– Circuit-level gateway only checks

your nationality– Application-level gateway checks

your baggage content in addition to your nationality

Page 20: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

20

Components of Components of FirewallsFirewalls

• Open-source under UNIX– SOCKS– dante

Page 21: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

21

Components of Components of FirewallsFirewalls(II) U (III)(II) U (III)

• Bastion Host– serves as

• application-level gateway• circuit-level gateway• both

Page 22: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

22

Firewall Firewall ConfigurationsConfigurations

• In addition to the use of simple configuration of a single system (single packet filtering router or single gateway), more complex configurations are possible

• Three common configurations

Page 23: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

23

ConfigurationsConfigurations(I)(I)

• Screened host firewall system (single-homed bastion host)

Page 24: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

24

ConfigurationsConfigurations(I)(I)

• Consists of two systems:– A packet-filtering router & a bastion

host• Only packets from and to the

bastion host are allowed to pass through the router

• The bastion host performs authentication and proxy functions

Page 25: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

25

More secureMore secure

• More secure than each single component because :– offers both packet-level and

application-level filtering

Page 26: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

26

Firewall Firewall ConfigurationsConfigurations

• This configuration also affords flexibility in providing direct Internet access (public information server, e.g. Web server)

Page 27: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

27

ConfigurationsConfigurations(II)(II)

• Screened host firewall system (dual-homed bastion host)

Page 28: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

28

ConfigurationsConfigurations(II)(II)

• Consists of two systems just as config (I) does.

• However, the bastion host separates the network into two subnets.

Page 29: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

29

Even more secure

• An intruder must generally penetrate two separate systems

Page 30: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

30

ConfigurationsConfigurations(III)(III)

• Screened-subnet firewall system

Page 31: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

31

ConfigurationsConfigurations(III)(III)

• Three-level defense– Most secure– Two packet-filtering routers are used– Creates an isolated sub-network

• Private network is invisible to the Internet

• Computers inside the private network cannot construct direct routes to the Internet

Page 32: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

32

DemoDemoDemoDemo

Page 33: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

33

ConclusiConclusionon

ConclusiConclusionon

Page 34: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

34

Capabilities of firewall

• Defines a single choke point at which security features are applied– Security management is simplified

• Provides a location for monitoring, audits and alarms

• A convenient platform for several non-security-related Internet functions– e.g., NAT, network management

• Can serve as the platform for IPSec– Implement VPN with tunnel mode capability

Page 35: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

35

What firewalls cannot protect against

• Attacks that bypass the firewall– e.g., dial-in or dial-out capabilities that

internal systems provide

• Internal threats– e.g., disgruntled employee or employee

who cooperates with external attackers

• The transfer of virus-infected programs or files

Page 36: 1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University  R355

36

Recommended Recommended ReadingReading

• Chapman, D., and Zwicky, E. Building Internet Firewalls. O’Reilly, 1995

• Cheswick, W., and Bellovin, S. Firewalls and Internet Security: Repelling the Wily Hacker. Addison-Wesley, 2000

• Gasser, M. Building a Secure Computer System. Reinhold, 1988

• Pfleeger, C. Security in Computing. Prentice Hall, 1997