250 likes | 364 Views
PIS Unit 5- Introduction to Firewalls. Sanjay Rawat Sanjay_r@vnrvjiet.in. Overview. Introduction to Firewall Types of Firewalls Firewall configuration and deployment Trusted Systems –Securing the firewall Common criterion for Information security evaluation. Firewalls.
E N D
PISUnit 5- Introduction to Firewalls Sanjay Rawat Sanjay_r@vnrvjiet.in PIS Unit5 Sanjay Rawat
Overview • Introduction to Firewall • Types of Firewalls • Firewall configuration and deployment • Trusted Systems –Securing the firewall • Common criterion for Information security evaluation. PIS Unit5 Sanjay Rawat
Firewalls • A mechanism used to protect a trusted network from an untrusted network. • A mechanism to enforce access control policy. • Software or Hardware based. • Deployed as gatekeeper. • Examples: Ipchain/Iptable, Cisco PIX, Juniper, MS ISA. PIS Unit5 Sanjay Rawat
Firewall’s (in)capabilities • Provide a focal point for monitoring. • Log Internet activity efficiently. • Limit the damage that a network security problem can do to the overall network. • Protect against malicious insiders. • Protect a connection that doesn’t go through it!! • Protect against completely new threats. • Protect against viruses, Trojansetc. PIS Unit5 Sanjay Rawat
Firewall Deployment • All traffic from inside to outside, and vice versa, must pass through the firewall. • Only authorized traffic, as defined by the local security policy, will be allowed to pass • Ideal Assumption: The firewall itself is immune to penetration. E.g. Cisco iOS vulnerabilities, Juniper Junos vulnerabilities. PIS Unit5 Sanjay Rawat
Typical Deployment All images are taken from doc at http://www.vicomsoft.com/learning-center/firewalls/ PIS Unit5 Sanjay Rawat
Generic Techniques for Enforcing policy • Service control: Determines the types of Internet services that can be accessed. • Direction control: Determines the direction in which particular service requests are allowed. • User control: Controls access to a service according to which user is attempting to access it. IP based filtering or authentication with IPSec. • Behavior control: Controls how particular services are used PIS Unit5 Sanjay Rawat
illustration PIS Unit5 Sanjay Rawat
Types of firewalls • Packet Filtering Firewall • Stateful Inspection Firewall • Application Level Gateway • Circuit-level gateway • Bastion Host PIS Unit5 Sanjay Rawat
Packet filters • Works at most up to transport layer. • Fast processing PIS Unit5 Sanjay Rawat
Example packet filters PIS Unit5 Sanjay Rawat
Flow PIS Unit5 Sanjay Rawat
Problems with Packet filters • Less visibility in the network stack -> less control. • Limited logging • ? PIS Unit5 Sanjay Rawat
Stateful Inspection • Keeps session information • Decision is based on the established connections -> a table of established connection is maintained. • Fast processing of subsequent packets. PIS Unit5 Sanjay Rawat
Application Level Gateway Also called as Proxy PIS Unit5 Sanjay Rawat
Application gateway • Filters traffic at application layer • Specific to applications which are configured. • Works at client-server mode • Not transparent to clients • Offer High level of security • Have significant impact on network performance PIS Unit5 Sanjay Rawat
Circuit Level gateway • Client-server mode. • Always two connections (NAT/PAT). • Hides internal network! • Uses SOCKS protocol for client server connection. • Often used with application gateway. PIS Unit5 Sanjay Rawat
Bastion Host • Most outside system with minimum services • Your public presence on the Internet • Faces most of the traffic -> attacks also. • Pseudo for gateway machine. PIS Unit5 Sanjay Rawat
Firewall configuration • Bastion host works as proxy. • Traffic is only to-n-fro proxy. • If router is compromised, it is open! PIS Unit5 Sanjay Rawat
Firewall configuration • No direct connection between internet and LAN. PIS Unit5 Sanjay Rawat
Firewall configuration • Includes DMZ • More secure as there are multiple zones with variable security level. PIS Unit5 Sanjay Rawat
Our generic design DMZ Internet WAN firewall router Switch LAN PIS Unit5 Sanjay Rawat
Trusted Systems Objects • Access Matrix • Subject: who the doer • Object: on whom • Access right • Capability List (w.r.t. subject) • Access control list (w.r.t object) • Multilevel security requirement • No Read Up • No Write Down • E.g. Non-interferenc model Subjects PIS Unit5 Sanjay Rawat
Reference Monitor • Controller for accessing objects by subjects • Implemented in hardware and OS • Keeps access information in security kernel DB • Properties: • Complete mediation: The security rules are enforced on every access. • Isolation: The reference monitor and database are protected from unauthorized modification. • Verifiability: The reference monitor's correctness must be provable Formally (mathematically). PIS Unit5 Sanjay Rawat
TS conti.. • A system that can provide such a verification is termed as Trusted System. However.. • “….Programs have now got very large and very critical -- well beyond the scale which can be comfortably tackled by formal methods… “ • Thought expressed by Prof. Tony Hoare, which implies it is very difficult to have trusted system. • TS provides security, e.g., against Trojan horse PIS Unit5 Sanjay Rawat