SlideShare ist ein Scribd-Unternehmen logo
1 von 123
Firewall Essentials By Sylvain Maret / Datelec Networks SA March 2000
Welcome to Introduction to Firewall Essentials This course is intended to provide you with an understanding of key concepts and theories associated with firewalls, security policies and attacks directed toward your network.
Course Objectives ,[object Object],[object Object]
Course Objectives (cont.) ,[object Object],[object Object]
Course Map ,[object Object],[object Object],[object Object],[object Object],[object Object]
Course Map ,[object Object],[object Object],[object Object],[object Object]
Course Map ,[object Object],[object Object],[object Object],[object Object],[object Object]
Unit I - Chapter 1 What is a Firewall? Firewall Essentials
Securing a Network Firewall Visiting Packets
[object Object],[object Object],[object Object],[object Object],Firewall Location
Company intranet Firewall Router Restricted Network Corporate Data Center Firewall Internet Firewall Location Firewall
[object Object],[object Object],Communicating Across a Network
[object Object],[object Object],[object Object],Network Packet
IP Packet  Components U. S. Mail Address Components Comments Destination IP address Street address and zip code Each host on an IP Internet or intranet must have a unique IP address Protocol Organization name The standard protocols  above IP are TCP and UDP Destination port number Recipient name Identifies the network application to receive the  packet Source IP address Sender’s return address So the application knows  where to send replies Source port number Sender’s name To identify the application of the sending host for  return packets Comparing IP Packet  with a Letter Address
[object Object],[object Object],Division of IP Address
LAN LAN To: 204.32.38.102  204.32.38.102 204.32.38.103 204.32.38.104 204.32.38.105 192.38.1.1 192.38.1.2 192.38.1.3 192.38.1.4 “ Mailing” a Letter
[object Object],[object Object],Network Session
[object Object],[object Object],[object Object],[object Object],Standard Firewall Services
[object Object],[object Object],[object Object],Access Control
[object Object],[object Object],Authentication
[object Object],[object Object],Activity Logging
[object Object],[object Object],[object Object],[object Object],Other Firewall Services
[object Object],[object Object],[object Object],[object Object],Firewall Administration Interfaces
[object Object],[object Object],[object Object],Text-File Based  Administration
[object Object],[object Object],[object Object],Text-Menu Based  Administration
[object Object],[object Object],[object Object],GUI-Based Administration
[object Object],[object Object],Actual Security Provided
Unit I - Chapter 2 Types of Firewalls Firewall Essentials
[object Object],[object Object],[object Object],Three Basic Types of Firewalls
[object Object],[object Object],[object Object],Packet Filter Firewall
[object Object],Packet Filter Firewall  (cont.)
Packet Filter Application Level Kernel Level Filter Route DROP PASS Packets Network 1 Network 2 Network 3 Packet Filtering Firewall
[object Object],[object Object],Application-level Gateway Firewall
[object Object],[object Object],[object Object],[object Object],[object Object],Application-level Gateway Firewall (cont.)
Application-Level Gateway Application Level Kernel Level Route Packets Network 1 Network 2 Network 3 Proxy Proxy Application-level Gateway Firewall
[object Object],[object Object],[object Object],[object Object],[object Object],Stateful Packet Filtering
[object Object],[object Object],Stateful Inspection
[object Object],[object Object],Stateful Inspection
[object Object],[object Object],Stateful Inspection
[object Object],[object Object],[object Object],[object Object],[object Object],Stateful Inspection
Inspect  Engine Dynamic State Tables Application Presentation Session Transport Network DataLink Physical Application Presentation Session Transport DataLink Physical Network Application Presentation Session Transport Network DataLink Physical Check Point’s FireWall-1 Stateful Inspection
Comparison of Firewall Architecture
Unit I - Chapter 3 How Firewalls Work Firewall Essentials
[object Object],[object Object],[object Object],[object Object],[object Object],How Firewalls Work:  Objectives
[object Object],[object Object],[object Object],[object Object],[object Object],Packet Processing  Locations
Application Kernel Network Cards Proxy Application Level Kernel Level Network Card Level Possible Firewall Processing Locations - Packet Processing Locations Within a Firewall
[object Object],[object Object],[object Object],Packet Filtering
Field Purpose Source IP address Destination IP address Upper level protocol TCP source port number TCP destination port number Host address of sender Host address of service provider Different protocols offer different services A random number greater than 1024 Indicates service such as Telnet or HTTP Fields of Interest for Packet Filtering
HTTP Filtering Router HTTP Packet + FTP Packet X Pass Drop X X X
Rule Number 1 Source Address Destination Address Protocol Source Port Number Action 2 3 4 5 10.56.2.99 10.56. * 10.122. * * * * 10.122. * 10.56. * 10.56. * * * TCP TCP TCP * * * 23 * * Drop Pass Pass Pass Drop Example Rule List
Match Rule # 10.56.2.98 Source Address Destination Address Protocol Source Port Number Action Taken 10.56.2.99 10.56.2.98 10.122.34.9 10.122.23.1 10.122.6.11 10.122.6.11 10.122.6.11 10.56.2.5 TCP TCP other TCP TCP 23567 6723 23568 23 1543 23 (Telnet) 23 (Telnet) 23 (Telnet) 98455 25 (mail) Pass Drop Drop Pass Pass Destination Port Number 10.56.2.98 2 1 5 3 4 Example Packets and Resulting Actions
[object Object],[object Object],Limitations of Packet  Filtering
[object Object],Proxy Applications
Application-level Gateway Application Level Kernel Level 2 Authorization Database Proxy 2 1 3 4 User Destination Host Connection Process Using an Application-level Gateway
[object Object],[object Object],Connection Process
[object Object],Connection Process (cont.)
[object Object],Connection Process (cont.)
[object Object],[object Object],Proxy Challenges
[object Object],[object Object],[object Object],Proxy Connections
[object Object],[object Object],[object Object],[object Object],[object Object],Direct Connection
[object Object],[object Object],[object Object],Modified Client
[object Object],[object Object],[object Object],Invisible Proxy
[object Object],Proxy Limitations
[object Object],[object Object],[object Object],[object Object],User Authentication
[object Object],[object Object],[object Object],[object Object],[object Object],Activity Logging
[object Object],[object Object],[object Object],[object Object],[object Object],Activity Logging (cont.)
[object Object],[object Object],[object Object],[object Object],[object Object],Audit Information
Unit II - Chapter 1 The Need for a Firewall Firewall Essentials
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Firewall need (discussion)
Lab 1 What Firewall is Best?
Discussion Lab Company intranet Restricted Network Corporate Data Center Internet Place firewall(s) in this network.
Discussion lab ,[object Object],[object Object],[object Object],[object Object],[object Object]
Company intranet Firewall Restricted Network Corporate Data Center Internet Discussion Lab Possible solution. Firewall
Unit II - Chapter 2 Security Hazards Firewall Essentials
[object Object],[object Object],[object Object],[object Object],Security Hazards:  Objectives
[object Object],[object Object],[object Object],[object Object],Open Systems  Internetworking
Isolated “Islands” of Phone Connectivity
Phone Connectivity No Longer Isolated
[object Object],[object Object],Open Systems Threat
[object Object],[object Object],[object Object],Internet Attacks Simplified
Denial of Service
[object Object],Denial-of-Service Attack
Attacker Mail Server Target Mailbox Flood of E-mail to Target Denial of Service Mail Attack
[object Object],[object Object],Network Packet Sniffing
Attacker Network TCP Packet Copies Original TCP Packet Original TCP Packet Network Packet Sniffing Attack
[object Object],[object Object],IP Spoof Attack
External 10.35.25.6 Internal 10.12.1.1 Internal 10.12.1.5 Packet Filter Reports source address to be 10.12.1.1 Filter assumes packet is from trusted source, and allows data into the network IP Spoof Attack
Unit III - Chapter 1 Firewall Features Firewall Essentials
[object Object],[object Object],Basic Access Control
[object Object],[object Object],[object Object],[object Object],Access Rules and Lists
[object Object],[object Object],[object Object],Host Spoofing Controls
[object Object],[object Object],[object Object],Supported Services
[object Object],[object Object],Supported Services (cont.)
[object Object],[object Object],[object Object],Supported Services (cont.)
[object Object],[object Object],[object Object],Supported Services (cont.)
[object Object],[object Object],[object Object],Supported Services (cont.)
[object Object],[object Object],[object Object],[object Object],[object Object],Supported Services (cont.)
[object Object],[object Object],Supported Services (cont.)
[object Object],[object Object],[object Object],Supported Services (cont.)
[object Object],[object Object],[object Object],Supported Services (cont.)
[object Object],User Authentication
[object Object],[object Object],Remote/Central  Administration
[object Object],[object Object],[object Object],[object Object],Actions Taken From Alarms
[object Object],[object Object],Actions Taken From Alarms (cont.)
[object Object],[object Object],[object Object],[object Object],Firewall Integrity
[object Object],[object Object],Firewall Integrity (cont.)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Special Features
[object Object],[object Object],Address Mapping
LAN 192.168.1.3 192.168.1.4 192.168.1.1 192.168.1.2 Illegal  IP address 192.168.1.2 Legal  IP address 204.32.38.1 Internal External Address Mapping
[object Object],Day and Time Restrictions
Day and Time Restrictions x FTP  allowed FTP  disallowed
[object Object],[object Object],Load Control
Limiting the number of simultaneous connections x Load Control
[object Object],[object Object],Virtual Private Networks  (VPN)
Company intranet 1 Company intranet 2 Internet Firewall Firewall Not encrypted PRIVATE Not encrypted PRIVATE Encrypted PUBLIC Virtual Private Networks (VPNs)
[object Object],[object Object],Hacker Traps
Unit III - Chapter 2 Security Policies Firewall Essentials
[object Object],[object Object],[object Object],[object Object],[object Object],Security Policy  Philosophies
[object Object],[object Object],[object Object],[object Object],[object Object],Security Policy  Philosophies (cont.)
[object Object],[object Object],[object Object],[object Object],Security Policy  Philosophies (cont.)
[object Object],[object Object],[object Object],Security Policy  Philosophies (cont.)
[object Object],[object Object],[object Object],Security Policy  Philosophies (cont.)
[object Object],[object Object],[object Object],Security Policy  Philosophies (cont.)

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
sweta dargad
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
kkkseld
 
Firewals in Network Security NS10
Firewals in Network Security NS10Firewals in Network Security NS10
Firewals in Network Security NS10
koolkampus
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
kkkseld
 

Was ist angesagt? (20)

Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
 
Linux and firewall
Linux and firewallLinux and firewall
Linux and firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilities
 
Firewall
FirewallFirewall
Firewall
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeley
 
Firewall management introduction
Firewall management introductionFirewall management introduction
Firewall management introduction
 
Firewall & its Services
Firewall & its ServicesFirewall & its Services
Firewall & its Services
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall notes
Firewall notesFirewall notes
Firewall notes
 
Firewall ( Cyber Security)
Firewall ( Cyber Security)Firewall ( Cyber Security)
Firewall ( Cyber Security)
 
Firewall
FirewallFirewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
Firewals in Network Security NS10
Firewals in Network Security NS10Firewals in Network Security NS10
Firewals in Network Security NS10
 
Linux Firewall - NullCon Chennai Presentation
Linux Firewall - NullCon Chennai PresentationLinux Firewall - NullCon Chennai Presentation
Linux Firewall - NullCon Chennai Presentation
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Firewall
FirewallFirewall
Firewall
 

Andere mochten auch

Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
Thang Man
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
rahul kundu
 
Basic of ip subnet and addressing
Basic of ip subnet and addressingBasic of ip subnet and addressing
Basic of ip subnet and addressing
rahul_cuet
 
Overview of Linux
Overview of LinuxOverview of Linux
Overview of Linux
Thang Man
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
devalnaik
 

Andere mochten auch (20)

Firewall
Firewall Firewall
Firewall
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Basic of ip subnet and addressing
Basic of ip subnet and addressingBasic of ip subnet and addressing
Basic of ip subnet and addressing
 
Sony nextep
Sony nextepSony nextep
Sony nextep
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Watchguard Firewall overview and implemetation
Watchguard  Firewall overview and implemetationWatchguard  Firewall overview and implemetation
Watchguard Firewall overview and implemetation
 
Overview of Linux
Overview of LinuxOverview of Linux
Overview of Linux
 
Firewall Rule Review and Modelling
Firewall Rule Review and ModellingFirewall Rule Review and Modelling
Firewall Rule Review and Modelling
 
2014 nat test_admin_guidelines
2014 nat test_admin_guidelines2014 nat test_admin_guidelines
2014 nat test_admin_guidelines
 
Instalación Firewall Checkpoint R70
Instalación Firewall Checkpoint R70Instalación Firewall Checkpoint R70
Instalación Firewall Checkpoint R70
 
An introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for DummiesAn introduction to Unified Threat Management (UTM), for Dummies
An introduction to Unified Threat Management (UTM), for Dummies
 
Checkpoint ccsa r76
Checkpoint ccsa r76Checkpoint ccsa r76
Checkpoint ccsa r76
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
 
Mikrotik® MPLS/VPN Lab Part 1
Mikrotik® MPLS/VPN Lab Part 1Mikrotik® MPLS/VPN Lab Part 1
Mikrotik® MPLS/VPN Lab Part 1
 
tcpip
tcpiptcpip
tcpip
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
SSL
SSLSSL
SSL
 

Ähnlich wie Firewall Essentials

Firewall
FirewallFirewall
Firewall
Muuluu
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
githe26200
 
ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3
John Mathias
 

Ähnlich wie Firewall Essentials (20)

firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 
Firewalls (6)
Firewalls (6)Firewalls (6)
Firewalls (6)
 
Firewalls
FirewallsFirewalls
Firewalls
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 
Firewall
FirewallFirewall
Firewall
 
КЛМ_Урок 2
КЛМ_Урок 2КЛМ_Урок 2
КЛМ_Урок 2
 
КЛМ_Урок 1
КЛМ_Урок 1КЛМ_Урок 1
КЛМ_Урок 1
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Unit II Chapter 6 firewalls.ppt
Unit II Chapter 6 firewalls.pptUnit II Chapter 6 firewalls.ppt
Unit II Chapter 6 firewalls.ppt
 
Firewall
FirewallFirewall
Firewall
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 
ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3
 
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Network Layer by-adeel
Network Layer by-adeelNetwork Layer by-adeel
Network Layer by-adeel
 
Ip security
Ip security Ip security
Ip security
 
Chapter4
Chapter4Chapter4
Chapter4
 

Mehr von Sylvain Maret

Air Navigation Service Providers - Unsecurity on Voice over IP Radion
Air Navigation Service Providers - Unsecurity on Voice over IP RadionAir Navigation Service Providers - Unsecurity on Voice over IP Radion
Air Navigation Service Providers - Unsecurity on Voice over IP Radion
Sylvain Maret
 
factsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vlfactsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vl
Sylvain Maret
 
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
Sylvain Maret
 
Strong Authentication State of the Art 2012 / Sarajevo CSO
Strong Authentication State of the Art 2012 / Sarajevo CSOStrong Authentication State of the Art 2012 / Sarajevo CSO
Strong Authentication State of the Art 2012 / Sarajevo CSO
Sylvain Maret
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Sylvain Maret
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Sylvain Maret
 

Mehr von Sylvain Maret (20)

Air Navigation Service Providers - Unsecurity on Voice over IP Radion
Air Navigation Service Providers - Unsecurity on Voice over IP RadionAir Navigation Service Providers - Unsecurity on Voice over IP Radion
Air Navigation Service Providers - Unsecurity on Voice over IP Radion
 
factsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vlfactsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vl
 
INA Volume 1/3 Version 1.02 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.02 Released / Digital Identity and AuthenticationINA Volume 1/3 Version 1.02 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.02 Released / Digital Identity and Authentication
 
INA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 Released / Digital Identity and AuthenticationINA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
 
INA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 RC / Digital Identity and AuthenticationINA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
 
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
 
Strong Authentication State of the Art 2012 / Sarajevo CSO
Strong Authentication State of the Art 2012 / Sarajevo CSOStrong Authentication State of the Art 2012 / Sarajevo CSO
Strong Authentication State of the Art 2012 / Sarajevo CSO
 
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain Maret
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain MaretASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain Maret
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain Maret
 
Threat Modeling / iPad
Threat Modeling / iPadThreat Modeling / iPad
Threat Modeling / iPad
 
Strong Authentication in Web Application #SCS III
Strong Authentication in Web Application #SCS IIIStrong Authentication in Web Application #SCS III
Strong Authentication in Web Application #SCS III
 
Strong Authentication in Web Applications: State of the Art 2011
Strong Authentication in Web Applications: State of the Art 2011Strong Authentication in Web Applications: State of the Art 2011
Strong Authentication in Web Applications: State of the Art 2011
 
Strong Authentication in Web Application / ConFoo.ca 2011
Strong Authentication in Web Application / ConFoo.ca 2011Strong Authentication in Web Application / ConFoo.ca 2011
Strong Authentication in Web Application / ConFoo.ca 2011
 
Authentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationAuthentication and strong authentication for Web Application
Authentication and strong authentication for Web Application
 
Geneva Application Security Forum 2010
Geneva Application Security Forum 2010Geneva Application Security Forum 2010
Geneva Application Security Forum 2010
 
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...
 
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...
 
Digital identity trust & confidence
Digital identity trust & confidenceDigital identity trust & confidence
Digital identity trust & confidence
 
Implementation of a Biometric Solution Providing Strong Authentication To Gai...
Implementation of a Biometric Solution Providing Strong Authentication To Gai...Implementation of a Biometric Solution Providing Strong Authentication To Gai...
Implementation of a Biometric Solution Providing Strong Authentication To Gai...
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Firewall Essentials

  • 1. Firewall Essentials By Sylvain Maret / Datelec Networks SA March 2000
  • 2. Welcome to Introduction to Firewall Essentials This course is intended to provide you with an understanding of key concepts and theories associated with firewalls, security policies and attacks directed toward your network.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Unit I - Chapter 1 What is a Firewall? Firewall Essentials
  • 9. Securing a Network Firewall Visiting Packets
  • 10.
  • 11. Company intranet Firewall Router Restricted Network Corporate Data Center Firewall Internet Firewall Location Firewall
  • 12.
  • 13.
  • 14. IP Packet Components U. S. Mail Address Components Comments Destination IP address Street address and zip code Each host on an IP Internet or intranet must have a unique IP address Protocol Organization name The standard protocols above IP are TCP and UDP Destination port number Recipient name Identifies the network application to receive the packet Source IP address Sender’s return address So the application knows where to send replies Source port number Sender’s name To identify the application of the sending host for return packets Comparing IP Packet with a Letter Address
  • 15.
  • 16. LAN LAN To: 204.32.38.102 204.32.38.102 204.32.38.103 204.32.38.104 204.32.38.105 192.38.1.1 192.38.1.2 192.38.1.3 192.38.1.4 “ Mailing” a Letter
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. Unit I - Chapter 2 Types of Firewalls Firewall Essentials
  • 29.
  • 30.
  • 31.
  • 32. Packet Filter Application Level Kernel Level Filter Route DROP PASS Packets Network 1 Network 2 Network 3 Packet Filtering Firewall
  • 33.
  • 34.
  • 35. Application-Level Gateway Application Level Kernel Level Route Packets Network 1 Network 2 Network 3 Proxy Proxy Application-level Gateway Firewall
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41. Inspect Engine Dynamic State Tables Application Presentation Session Transport Network DataLink Physical Application Presentation Session Transport DataLink Physical Network Application Presentation Session Transport Network DataLink Physical Check Point’s FireWall-1 Stateful Inspection
  • 42. Comparison of Firewall Architecture
  • 43. Unit I - Chapter 3 How Firewalls Work Firewall Essentials
  • 44.
  • 45.
  • 46. Application Kernel Network Cards Proxy Application Level Kernel Level Network Card Level Possible Firewall Processing Locations - Packet Processing Locations Within a Firewall
  • 47.
  • 48. Field Purpose Source IP address Destination IP address Upper level protocol TCP source port number TCP destination port number Host address of sender Host address of service provider Different protocols offer different services A random number greater than 1024 Indicates service such as Telnet or HTTP Fields of Interest for Packet Filtering
  • 49. HTTP Filtering Router HTTP Packet + FTP Packet X Pass Drop X X X
  • 50. Rule Number 1 Source Address Destination Address Protocol Source Port Number Action 2 3 4 5 10.56.2.99 10.56. * 10.122. * * * * 10.122. * 10.56. * 10.56. * * * TCP TCP TCP * * * 23 * * Drop Pass Pass Pass Drop Example Rule List
  • 51. Match Rule # 10.56.2.98 Source Address Destination Address Protocol Source Port Number Action Taken 10.56.2.99 10.56.2.98 10.122.34.9 10.122.23.1 10.122.6.11 10.122.6.11 10.122.6.11 10.56.2.5 TCP TCP other TCP TCP 23567 6723 23568 23 1543 23 (Telnet) 23 (Telnet) 23 (Telnet) 98455 25 (mail) Pass Drop Drop Pass Pass Destination Port Number 10.56.2.98 2 1 5 3 4 Example Packets and Resulting Actions
  • 52.
  • 53.
  • 54. Application-level Gateway Application Level Kernel Level 2 Authorization Database Proxy 2 1 3 4 User Destination Host Connection Process Using an Application-level Gateway
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68. Unit II - Chapter 1 The Need for a Firewall Firewall Essentials
  • 69.
  • 70. Lab 1 What Firewall is Best?
  • 71. Discussion Lab Company intranet Restricted Network Corporate Data Center Internet Place firewall(s) in this network.
  • 72.
  • 73. Company intranet Firewall Restricted Network Corporate Data Center Internet Discussion Lab Possible solution. Firewall
  • 74. Unit II - Chapter 2 Security Hazards Firewall Essentials
  • 75.
  • 76.
  • 77. Isolated “Islands” of Phone Connectivity
  • 78. Phone Connectivity No Longer Isolated
  • 79.
  • 80.
  • 82.
  • 83. Attacker Mail Server Target Mailbox Flood of E-mail to Target Denial of Service Mail Attack
  • 84.
  • 85. Attacker Network TCP Packet Copies Original TCP Packet Original TCP Packet Network Packet Sniffing Attack
  • 86.
  • 87. External 10.35.25.6 Internal 10.12.1.1 Internal 10.12.1.5 Packet Filter Reports source address to be 10.12.1.1 Filter assumes packet is from trusted source, and allows data into the network IP Spoof Attack
  • 88. Unit III - Chapter 1 Firewall Features Firewall Essentials
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105.
  • 106.
  • 107.
  • 108.
  • 109. LAN 192.168.1.3 192.168.1.4 192.168.1.1 192.168.1.2 Illegal IP address 192.168.1.2 Legal IP address 204.32.38.1 Internal External Address Mapping
  • 110.
  • 111. Day and Time Restrictions x FTP allowed FTP disallowed
  • 112.
  • 113. Limiting the number of simultaneous connections x Load Control
  • 114.
  • 115. Company intranet 1 Company intranet 2 Internet Firewall Firewall Not encrypted PRIVATE Not encrypted PRIVATE Encrypted PUBLIC Virtual Private Networks (VPNs)
  • 116.
  • 117. Unit III - Chapter 2 Security Policies Firewall Essentials
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.