1 / 50

Firewalls and Border Security: Protecting Networks from Attacks

Learn about TCP, UDP, and IP protocols, their vulnerabilities, and how to secure networks using firewalls and border security. Configure firewall capabilities in operating systems.

lelandd
Download Presentation

Firewalls and Border Security: Protecting Networks from Attacks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 6 Firewalls and Border Security

  2. Objectives • Understand how TCP, UDP, and IP work, and the security vulnerabilities of these protocols • Explain the use of IP addressing on a network and how it is used for security • Explain border and firewall security • Configure the firewall capabilities in operating systems Guide to Operating System Security

  3. Transmission Control Protocol/Internet Protocol • Networking protocol that serves as a universal language of communication for networks and operating systems • Ubiquity makes it a prime target for attackers • Three core component protocols • Transmission Control Protocol (TCP) • User Datagram Protocol (UDP) • Internet Protocol (IP) Guide to Operating System Security

  4. Understanding TCP • Establishes reliable connection-oriented communications between communicating devices on networks • Enables communications to operate in an orderly fashion through use of sequence numbers and acknowledgments Guide to Operating System Security

  5. Fields in a TCP Header Guide to Operating System Security

  6. TCP and UDP Ports in Relation to Port Scanning continued… Guide to Operating System Security

  7. TCP and UDP Ports in Relation to Port Scanning (Continued) Guide to Operating System Security

  8. TCP and UDP Ports in Relation to Port Scanning (Continued) Guide to Operating System Security

  9. Understanding UDP • Connectionless protocol • Can be used instead of TCP • Faster communications when reliability is less of a concern • Performs no flow control, sequencing, or acknowledgment • Port-scanning attacks are less productive against it Guide to Operating System Security

  10. Fields in a UDP Header Guide to Operating System Security

  11. Understanding How IP Works • Enables packet to reach different subnetworks on a LAN and different networks on a WAN • Networks must use transport methods compatible with TCP/IP Guide to Operating System Security

  12. Basic Functions of IP • Data transfer • Packet addressing • Packet routing • Fragmentation • Simple detection of packet errors Guide to Operating System Security

  13. IP as a Connectionless Protocol • Provides network-to-network addressing and routing information • Changes size of packets when size varies from network to network • Leaves reliability of communications in hands of the embedded TCP segment Guide to Operating System Security

  14. TCP/IP Datagram Guide to Operating System Security

  15. Fields in an IP Packet Header Guide to Operating System Security

  16. How IP Addressing Works • Identifies a specific station and the network on which it resides • Each IP address must be unique • Uses dotted decimal addressing • Enables use of network IDs and host IDs for locating networks and specific devices on the network Guide to Operating System Security

  17. IP Address Classes • Fives classes – Class A through Class E – each used with different type of network • Reflect size of network and whether the packet is unicast or multicast Guide to Operating System Security

  18. IP Address Classes Guide to Operating System Security

  19. IP Address Classes (Continued) Guide to Operating System Security

  20. IP Address Classes (Continued) Guide to Operating System Security

  21. Using a Subnet Mask • Required by TCP/IP addresses • Determine how portions of addresses on a network are divided into network ID and host ID • Divide a network into subnetworks to control network traffic Guide to Operating System Security

  22. Creating Subnetworks • Subnet mask contains a subnet ID within network and host IDs • Enables routing devices to ignore traditional class designations • Creates more options for segmenting networks through multiple subnets and additional network addresses • Overcomes four-octet limitation in IPv4 • Newer way to ignore class designation • Classless interdomain routing (CIDR) Guide to Operating System Security

  23. Border and Firewall Security • Firewalls protect internal or private networks • Firewall functions • Packet filtering • Network address translation • Working as application gateways or proxies Guide to Operating System Security

  24. Implementing Border Security Guide to Operating System Security

  25. Packet Filtering • Use characteristics of a packet • Determines whether a packet should be forwarded or blocked • Techniques • Stateless packet filtering • Stateful packet filtering Guide to Operating System Security

  26. Securing a Subnet with a Firewall Guide to Operating System Security

  27. Network Address Translation (NAT) • Discourages attackers; all protected network addresses are seen by outsiders as a single address • Enables a network to use IP addresses on the internal network that are not formally registered for Internet use Guide to Operating System Security

  28. Ways to Perform NAT Translation • Dynamic translation (or IP masquerade) • Static translation • Network redundancy translation • Load balancing Guide to Operating System Security

  29. Proxy • Computer located between a computer on an internal network and a computer on an external network • Acts as a middleman to: • Filter application-level communications • Perform caching • Create virtual circuits with clients for safer communications Guide to Operating System Security

  30. Proxy Configurations • Application-level gateways • Circuit-level gateways Guide to Operating System Security

  31. Proxy Firewall as an Application-Level Gateway Guide to Operating System Security

  32. Proxy Firewall as a Circuit-Level Gateway Guide to Operating System Security

  33. Using Routers for Border Security (Continued) • Often used as firewalls because they can filter packets and protocols • Forward packets and frames to networks using a decision-making process based on: • Routing table data • Discovery of most efficient routes • Preprogrammed information Guide to Operating System Security

  34. Using Routers for Border Security (Continued) • Protocols used by routers in a local system • Routing Information Protocol (RIP) • Uses only hop count as its metric • Open Shortest Path First (OSPF) • Router sends only the link-state routing message • Compact packet format • Shared updated routing table information among routers Guide to Operating System Security

  35. OSPF Border Areas Guide to Operating System Security

  36. Using Firewall Capabilities in Operating Systems • Important when the computer: • On which OS is running is directly connected to the Internet • Is in a demilitarized zone (DMZ) Guide to Operating System Security

  37. Configuring a Firewall in Windows XP Professional • Enable Internet Connection Firewall (ICF) • Monitors source and destination addresses that come in and go out of the computer via Internet • Maintains table of IP addresses allowed into OS • Discards communications from unauthorized IP addresses • Discourages port scanning via an Internet connection Guide to Operating System Security

  38. Configuring a Firewall in Windows XP Professional Guide to Operating System Security

  39. Configuring a Firewall in Windows Server 2003 • Enable ICF, enabling only those services that are needed on the server Guide to Operating System Security

  40. Configuring a Firewall in Windows Server 2003 Guide to Operating System Security

  41. Configuring NAT in Windows Server 2003 • Routing and Remote Access Services (RRAS) • Remote access (dial-up or VPN) • Network address translation (NAT) • Virtual Private Network (VPN) • Secure connection between two private networks • Custom configuration Guide to Operating System Security

  42. Configuring NAT in Windows Server 2003 Guide to Operating System Security

  43. Configuring NAT in Windows Server 2003 Guide to Operating System Security

  44. Configuring NAT in Windows 2000 Server • Set up Windows server as an Internet connection server – with NAT – in Windows 2000 Server Routing and Remote Access tool • Enables multiple computers to share a connection to an external network • Provides address translation services for all computers that share the connection, thus protecting those computers Guide to Operating System Security

  45. Configuring a Firewall inRed Hat Linux 9.x • Use Security Level Configuration tool (High, Medium, No Firewall) • Customize firewall by designating trusted devices • Allow or deny access to WWW (HTTP), FTP, SSH, DHCP, mail (SMTP), or Telnet Guide to Operating System Security

  46. Configuring NAT and a Firewall Using IPTables (Red Hat Linux 9.x) • Configure through a terminal window using iptables command • Enables configuration of packet filter rules through use of tables • Set of rules (chain) is applied to packets containing specific information Guide to Operating System Security

  47. Sample Iptables Parameters Guide to Operating System Security

  48. Configuring NAT and a Firewall Using IPTables (Red Hat Linux 9.x) • Make sure IPChains is turned off • Start IPTables service and ensure that it starts automatically each time OS is booted • Configure firewall to deny incoming, outgoing, and forwarded packets • Make sure all configured options are saved and reused each time computer is booted Guide to Operating System Security

  49. Configuring a Mac OS X Firewall • Use System Preferences via the Sharing icon • Allow or deny network communications through TCP and UDP ports by turning specific services on or off • Turn firewall on or off Guide to Operating System Security

  50. Summary • TCP, UDP, and IP protocols, their security vulnerabilities and how to mitigate them • IP addressing and how it can be used to thwart attacks • How border and firewall security use characteristics of TCP, UDP, and IP to build more secure networks • How to configure firewall capabilities of operating systems Guide to Operating System Security

More Related