SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Why do we need Firewalls?
 Internet connectivity is a must for most people
and organizations
 especially for me 
 But a convenient Internet connectivity is an
invitation for intruders and hackers
 yet another example of tradeoff between convenience
and security
 Question: What do we mean by “convenient” Internet
connection?
 Firewall basically provides us an option to play
within the spectrum of this tradeoff
What is a Firewall?
 Effective means of protecting local
network of systems from network-based
security threats from outer world
while providing (limited) access to the outside
world (the Internet)
Firewall Basics
 The firewall is inserted between the internal
network and the Internet (a choke point)
 Establish a controlled link and protect the network
from Internet-based attacks
 keeps unauthorized users away,
 imposes restrictions on network services; only authorized
traffic is allowed
 Location for monitoring security-related events
 auditing, alarms can be implemented
 some firewalls supports IPSec, so VPNs can be
implemented firewall-to-firewall
 some firewalls support NAT (not so security
related)
 Open discussion: can’t we put one firewall for
each station within the local network? What
are pros and cons?
Firewall Characteristics - 1
 Design goals:
 All traffic from inside from/to outside must pass
through the firewall
 Only authorized traffic (defined by the local security
policy) will be allowed to pass
 The firewall itself should be immune to penetration
(use of trusted system with a secure operating
system)
Firewall Characteristics - 2
 General techniques for access control
 Service control
 Determines the types of Internet services that can be accessed
 Mostly using TCP/UDP port numbers
 Direction of traffic is important for the decision
 Some services are open for outbound, but not inbound (or vice
versa)
 User control
 Controls access to a service according to which user is
attempting to access it
 need to authenticate users. This is easy for internal users, but
what can be done for external ones?
 Behavior control
 Controls how particular services are used (e.g. filter e-mail for
spam control)
Firewall Limitations
 cannot protect from attacks bypassing it
 typical example: dial-in, dial-out
 cannot protect against internal threats
 e.g. fired sysadmin 
 cannot protect against transfer of all virus
infected programs or files
 because of heavy traffic and huge range of O/S &
file types
Types of Firewalls
 Packet-filtering routers
 Application-level gateways
 Circuit-level gateways (not common, so
skipped)
Packet-filtering Router
 Foundation of any firewall system
 Applies a set of rules to each incoming IP packet and
then forwards or discards the packet (in both
directions)
 The packet filter is typically set up as a list of rules
based on matches to fields in the IP or TCP header
 context is not checked
 Two default policies (discard or forward)
Packet-filtering Router
 Filtering rules are based on
 Source and Destination IP addresses
 Source and destination ports (services) and
transport protocols (TCP or UDP)
 Router’s physical interface
 Rules are listed and a match is tried to be
found starting with the first rule
 Action is either forward or discard
 Generally first matching rule is applied
 If no match, then default policy is used
 Default is either discard or forward
21
21
{our hosts}
Packet Filtering Examples
{our hosts}
{our hosts}
For data traffic in passive mode
Stateful Inspection
 Example E shows that
>1024 ports need to be opened
 not only due to FTP, all services have such a
structure
 <1024 ports are for servers, a client using a service
should use a local port number between 1024 and 16383
 So the firewall should keep track of the
currently opened >1024 ports
 A stateful inspection firewall keeps track of
outbound TCP connection with local port
numbers in a table and allow inbound traffic
for >1024 ports if there is an entry in that
table (see next slide for an example table)
Stateful Inspection
Packet-filtering Router
 Advantages:
 Simplicity
 High speed
 Transparency to users
 Disadvantages
 Difficulty of setting up packet filter rules
 configuration is error-prone
 a port is either open or close; no application layer
flexibility
 IP address spoofing
 attacker uses an internal IP address and hopes that packet
penetrates into the system
 countermeasure: do not accept internal IPs from external
interface
Application-level Gateway
 Application-level Gateway (proxy server)
 Acts as a relay of application-level traffic
 Proxy obtains application specific information from
the user and relays to the server
 Optionally authenticates the users
 Only allowable applications can pass through
 Feature-based processing is possible
 Additional processing overhead on each connection
Bastion Host
 A system identified by the firewall administrator
as a critical strong point in the network security
 Used in various firewall configuration (we’ll see now)
 The bastion host serves as a platform for an
application-level gateway
 i.e. a proxy
 Potentially exposed to "hostile" elements, hence
is secured to withstand this
 Trusted system
 Carefully configured and maintained
Firewall Configurations
 In addition to the use of simple
configuration of a single system (single
packet filtering router or single gateway),
more complex configurations are possible
Screened host firewall system
(dual-homed bastion host)
 Only packets from and to the bastion host are
allowed to pass through the router
 The bastion host performs authentication and
proxy functions
Dual-homed Bastion Host
 Good security because of two reasons:
 This configuration implements both packet-level and
application-level filtering
 An intruder must generally penetrate two separate
systems in order to get to the internal network
 This configuration also has flexibility in providing
direct Internet access to a public information
server, e.g. Web server
 by configuring the router
Screened-subnet Firewall System
 securer
 creates an isolated sub-network between routers
 Internet and private network have access to this subnet
 Traffic across the subnet is blocked
 This subnet is called DMZ (demilitarized zone)
 Internal network is invisible to the Internet
DMZ
Outside packet
filtering router
Inside packet
filtering router
Host-Based Firewalls
 Software module to secure individual hosts
filter packet flows
Available as add-on for many OSs
 Often used on servers
 Advantages:
additional layer of protection to organizational
firewall
tailored filter rules for specific host needs
protection from both internal / external attacks
Personal Firewall
 controls traffic flow to/from PC/workstation
 for both home or corporate use
 software module on PC
or in home cable/ADSL router/gateway
 typically less complex than standalone
firewalls
 primary role to deny unauthorized access
may also monitor/detect/block malware
activity

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Dmz
Dmz Dmz
Dmz
 
Network firewall function & benefits
Network firewall function & benefitsNetwork firewall function & benefits
Network firewall function & benefits
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefits
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Network security
Network security Network security
Network security
 
Firewall
FirewallFirewall
Firewall
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
 
Firewall & types of Firewall
Firewall & types of Firewall Firewall & types of Firewall
Firewall & types of Firewall
 
Firewall
Firewall Firewall
Firewall
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Andere mochten auch

Network Security through IP Packet Filtering
Network Security through IP Packet FilteringNetwork Security through IP Packet Filtering
Network Security through IP Packet Filteringkarim baidar
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
Document security & firewall
Document security & firewallDocument security & firewall
Document security & firewallSanjay Singh
 
session7 Firewalls and VPN
session7 Firewalls and VPNsession7 Firewalls and VPN
session7 Firewalls and VPNMustafa Jarrar
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power pointjessicafay2010
 
HOW TO EARN CISSP CERTIFICATION?
HOW TO EARN CISSP CERTIFICATION?HOW TO EARN CISSP CERTIFICATION?
HOW TO EARN CISSP CERTIFICATION?Terro White
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationFirewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationGopal Sakarkar
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its roleSudeshna Basak
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1Alfred Ouyang
 
computer forensics
computer forensicscomputer forensics
computer forensicsAkhil Kumar
 

Andere mochten auch (20)

8 cyber crimes
8 cyber crimes8 cyber crimes
8 cyber crimes
 
Network Security through IP Packet Filtering
Network Security through IP Packet FilteringNetwork Security through IP Packet Filtering
Network Security through IP Packet Filtering
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Document security & firewall
Document security & firewallDocument security & firewall
Document security & firewall
 
session7 Firewalls and VPN
session7 Firewalls and VPNsession7 Firewalls and VPN
session7 Firewalls and VPN
 
Threats
ThreatsThreats
Threats
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
 
Data encryption
Data encryptionData encryption
Data encryption
 
HOW TO EARN CISSP CERTIFICATION?
HOW TO EARN CISSP CERTIFICATION?HOW TO EARN CISSP CERTIFICATION?
HOW TO EARN CISSP CERTIFICATION?
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationFirewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Computer System Validation
Computer System ValidationComputer System Validation
Computer System Validation
 

Ähnlich wie Firewalls

firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.pptRaj Kumar
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet BawaPuneet Bawa
 
A firewall is a network security device.
A firewall is a network security device.A firewall is a network security device.
A firewall is a network security device.abidhassan225
 
Firewals in Network Security NS10
Firewals in Network Security NS10Firewals in Network Security NS10
Firewals in Network Security NS10koolkampus
 
Lec # 13 Firewall.pptx
Lec # 13 Firewall.pptxLec # 13 Firewall.pptx
Lec # 13 Firewall.pptxskknowledge
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].pptBachaSirata
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Radhika Talaviya
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfatimagull32
 
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...FahmiOlayah
 

Ähnlich wie Firewalls (20)

Firewall Modified
Firewall ModifiedFirewall Modified
Firewall Modified
 
Firewall
FirewallFirewall
Firewall
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
A firewall is a network security device.
A firewall is a network security device.A firewall is a network security device.
A firewall is a network security device.
 
Firewals in Network Security NS10
Firewals in Network Security NS10Firewals in Network Security NS10
Firewals in Network Security NS10
 
Lec # 13 Firewall.pptx
Lec # 13 Firewall.pptxLec # 13 Firewall.pptx
Lec # 13 Firewall.pptx
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
Network security
Network securityNetwork security
Network security
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
 
Net Defender
Net DefenderNet Defender
Net Defender
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptx
 
Firewall
FirewallFirewall
Firewall
 
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
 
Firewalls (6)
Firewalls (6)Firewalls (6)
Firewalls (6)
 

Mehr von University of Central Punjab (7)

3G,4G
3G,4G3G,4G
3G,4G
 
Microsoft windows
Microsoft windowsMicrosoft windows
Microsoft windows
 
Remote desktop and print server
Remote desktop and print serverRemote desktop and print server
Remote desktop and print server
 
Social and ethical issues in commerce
Social and ethical issues in commerceSocial and ethical issues in commerce
Social and ethical issues in commerce
 
Security of information asset
Security of information assetSecurity of information asset
Security of information asset
 
Need for security
Need for securityNeed for security
Need for security
 
VIOP , SKYPE and OOVOO
VIOP , SKYPE and OOVOOVIOP , SKYPE and OOVOO
VIOP , SKYPE and OOVOO
 

Kürzlich hochgeladen

Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 

Kürzlich hochgeladen (20)

Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 

Firewalls

  • 1. Why do we need Firewalls?  Internet connectivity is a must for most people and organizations  especially for me   But a convenient Internet connectivity is an invitation for intruders and hackers  yet another example of tradeoff between convenience and security  Question: What do we mean by “convenient” Internet connection?  Firewall basically provides us an option to play within the spectrum of this tradeoff
  • 2. What is a Firewall?  Effective means of protecting local network of systems from network-based security threats from outer world while providing (limited) access to the outside world (the Internet)
  • 3. Firewall Basics  The firewall is inserted between the internal network and the Internet (a choke point)  Establish a controlled link and protect the network from Internet-based attacks  keeps unauthorized users away,  imposes restrictions on network services; only authorized traffic is allowed  Location for monitoring security-related events  auditing, alarms can be implemented  some firewalls supports IPSec, so VPNs can be implemented firewall-to-firewall  some firewalls support NAT (not so security related)  Open discussion: can’t we put one firewall for each station within the local network? What are pros and cons?
  • 4. Firewall Characteristics - 1  Design goals:  All traffic from inside from/to outside must pass through the firewall  Only authorized traffic (defined by the local security policy) will be allowed to pass  The firewall itself should be immune to penetration (use of trusted system with a secure operating system)
  • 5. Firewall Characteristics - 2  General techniques for access control  Service control  Determines the types of Internet services that can be accessed  Mostly using TCP/UDP port numbers  Direction of traffic is important for the decision  Some services are open for outbound, but not inbound (or vice versa)  User control  Controls access to a service according to which user is attempting to access it  need to authenticate users. This is easy for internal users, but what can be done for external ones?  Behavior control  Controls how particular services are used (e.g. filter e-mail for spam control)
  • 6. Firewall Limitations  cannot protect from attacks bypassing it  typical example: dial-in, dial-out  cannot protect against internal threats  e.g. fired sysadmin   cannot protect against transfer of all virus infected programs or files  because of heavy traffic and huge range of O/S & file types
  • 7. Types of Firewalls  Packet-filtering routers  Application-level gateways  Circuit-level gateways (not common, so skipped)
  • 8. Packet-filtering Router  Foundation of any firewall system  Applies a set of rules to each incoming IP packet and then forwards or discards the packet (in both directions)  The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header  context is not checked  Two default policies (discard or forward)
  • 9. Packet-filtering Router  Filtering rules are based on  Source and Destination IP addresses  Source and destination ports (services) and transport protocols (TCP or UDP)  Router’s physical interface  Rules are listed and a match is tried to be found starting with the first rule  Action is either forward or discard  Generally first matching rule is applied  If no match, then default policy is used  Default is either discard or forward
  • 10. 21 21 {our hosts} Packet Filtering Examples {our hosts} {our hosts} For data traffic in passive mode
  • 11. Stateful Inspection  Example E shows that >1024 ports need to be opened  not only due to FTP, all services have such a structure  <1024 ports are for servers, a client using a service should use a local port number between 1024 and 16383  So the firewall should keep track of the currently opened >1024 ports  A stateful inspection firewall keeps track of outbound TCP connection with local port numbers in a table and allow inbound traffic for >1024 ports if there is an entry in that table (see next slide for an example table)
  • 13. Packet-filtering Router  Advantages:  Simplicity  High speed  Transparency to users  Disadvantages  Difficulty of setting up packet filter rules  configuration is error-prone  a port is either open or close; no application layer flexibility  IP address spoofing  attacker uses an internal IP address and hopes that packet penetrates into the system  countermeasure: do not accept internal IPs from external interface
  • 14. Application-level Gateway  Application-level Gateway (proxy server)  Acts as a relay of application-level traffic  Proxy obtains application specific information from the user and relays to the server  Optionally authenticates the users  Only allowable applications can pass through  Feature-based processing is possible  Additional processing overhead on each connection
  • 15. Bastion Host  A system identified by the firewall administrator as a critical strong point in the network security  Used in various firewall configuration (we’ll see now)  The bastion host serves as a platform for an application-level gateway  i.e. a proxy  Potentially exposed to "hostile" elements, hence is secured to withstand this  Trusted system  Carefully configured and maintained
  • 16. Firewall Configurations  In addition to the use of simple configuration of a single system (single packet filtering router or single gateway), more complex configurations are possible
  • 17. Screened host firewall system (dual-homed bastion host)  Only packets from and to the bastion host are allowed to pass through the router  The bastion host performs authentication and proxy functions
  • 18. Dual-homed Bastion Host  Good security because of two reasons:  This configuration implements both packet-level and application-level filtering  An intruder must generally penetrate two separate systems in order to get to the internal network  This configuration also has flexibility in providing direct Internet access to a public information server, e.g. Web server  by configuring the router
  • 19. Screened-subnet Firewall System  securer  creates an isolated sub-network between routers  Internet and private network have access to this subnet  Traffic across the subnet is blocked  This subnet is called DMZ (demilitarized zone)  Internal network is invisible to the Internet DMZ Outside packet filtering router Inside packet filtering router
  • 20. Host-Based Firewalls  Software module to secure individual hosts filter packet flows Available as add-on for many OSs  Often used on servers  Advantages: additional layer of protection to organizational firewall tailored filter rules for specific host needs protection from both internal / external attacks
  • 21. Personal Firewall  controls traffic flow to/from PC/workstation  for both home or corporate use  software module on PC or in home cable/ADSL router/gateway  typically less complex than standalone firewalls  primary role to deny unauthorized access may also monitor/detect/block malware activity

Hinweis der Redaktion

  1. A host-based firewall is a software module used to secure an individual host. Such modules are available in many operating systems or can be provided as an add-on package. Like conventional standalone firewalls, host-resident firewalls filter and restrict the flow of packets. A common location for such firewalls is a server. There are several advantages to the use of a server-based or workstation-based firewall: • Filtering rules can be tailored to the host environment. Specific corporate security policies for servers can be implemented, with different filters for servers used for different application. • Protection is provided independent of topology. Thus both internal and external attacks must pass through the firewall. • Used in conjunction with standalone firewalls, the host-based firewall provides an additional layer of protection. A new type of server can be added to the network, with its own firewall, without the necessity of altering the network firewall configuration.
  2. A personal firewall controls the traffic between a personal computer or workstation on one side, and the Internet or enterprise network on the other side. Personal firewall functionality can be used in the home environment and on corporate intranets. Typically, the personal firewall is a software module on the personal computer. In a home environment with multiple computers connected to the Internet, firewall functionality can also be housed in a router that connects all of the home computers to a DSL, cable modem, or other Internet interface. Personal firewalls are typically much less complex than either server-based firewalls or standalone firewalls. The primary role of the personal firewall is to deny unauthorized remote access to the computer. The firewall can also monitor outgoing activity in an attempt to detect and block worms and other malware. An example of a personal firewall is the capability built in to the Mac OS X. When the user enables the personal firewall in Mac OS X, all inbound connections are denied except for those the user explicitly permits. For increased protection, advanced firewall features may be available, such as: Stealth mode hides the Mac on the Internet by dropping unsolicited communication packets, making it appear as though no Mac is present. UDP packets can be blocked, restricting network traffic to TCP packets only for open ports. The firewall may also supports logging, an important tool for checking on unwanted activity.