Está en la página 1de 12

Firewalls concept in Network Security

V.Ramalinga Raju
Gokaraju Rangaraju Institute of Engineering & Technology
Bachupally, Hyderabad
ramalingarajuv@yahoo.com

Abstract

A firewall is hardware, software, or a Attackers are Leaking Information From


combination of both that is used to Internet To Private Network and Adding
prevent unauthorized programs or Content To Internet From Private
Internet users from accessing a private Network.
network and/or a single computer.

Firewall Is Like Gate man In a Person


House .When Gate Man Check Incoming
Persons He Has Any Doubt Same Way
Firewall Checks All Incoming and
Outgoing Packets .Any Unauthorized
Packets Discarded .Authorized Packets
Only Allowed.

The term "fire wall" originally meant,


and still means, a fireproof wall
intended to prevent the spread of fire
from one room or area of a building to
another. The Internet is a volatile and
unsafe environment when viewed from a
computer-security perspective, therefore
"firewall" is an excellent metaphor for
network security. 1.1 Solutions

1. Why Firewall came Into The Two Problems In Networks Can


be Solved using Two
Existence 1. Encryption
2. Firewall
Network So Many No of Users &  Encryption can’t solve all
Computers. problems the best is Firewall
Communication b/w Computers In The
Network Some problems Arise. Firewall Is Like Gate man In a
1.Leaking of Information Internet To Person House .When Gate Man
Private Network. Check Incoming Persons He Has
2.Adding of Information Private Any Doubt Same Way Firewall
Network To Internet. Checks All Incoming and Outgoing
Packets.

1
2. Introduction To Firewall Firewall Is Like Gate man In a Person
House .When Gate Man Check
Firewall helps protecting your computer Incoming Persons He Has Any Doubt
by preventing unauthorized users from Same Way Firewall Checks All
gaining access to your computer through Incoming and Outgoing Packets .Any
a network or internet. Unauthorized Packets Discarded
.Authorized Packets Only Allowed.
The term "fire wall" originally meant,
and still means, a fireproof wall intended A security system that acts as a
to prevent the spread of fire from one protective boundary between a network
room or area of a building to another. and the outside world.
The Internet is a volatile and unsafe
environment when viewed from a Isolates a computer or network from the
computer-security perspective, therefore “outside” based on a defined set of rules
"firewall" is an excellent metaphor for Inspects each individual "packet" of data
network security. as it arrives at either side of the firewall
Maintains a state table.
In computer networking, the term Determine whether traffic should be
firewall is not merely descriptive of a allowed to pass or be blocked.
general idea. It has come to mean some
very precise things. Firewall b/w the Internet And Private
Network.
All Must pass Through Firewall.
All Incoming from Internet And
Outgoing from Private Network Must
pass Through Firewall.

2.2 Firewall Goals

1.All traffic from outside to inside and


vice-versa passes through the firewall.

2.Only authorized traffic, as defined by


local security policy, will be allowed to
pass.
3.The firewall itself is immune to
penetration

2.1 What Is Firewall 2.3 Firewall Rules

A firewall is hardware, software, or a 1.Allow – traffic that flows


combination of both that is used to automatically because it has been
prevent unauthorized programs or deemed as “safe” (Ex. Meeting Maker,
Internet users from accessing a private Eudora, etc.
network and/or a single computer

2
2.Block – traffic that is blocked because 2. network security relies totally on host
it has been deemed dangerous to your security and all hosts must,in a sense,
computer cooperate to achieve a uniformly high
3.Ask – asks the user whether or not the level of security
traffic is allowed to pass through 3. the larger the subnet, the less
manageable it is to maintain all hosts at
the same level of security

2.4 Firewall Limitations 3. Firewall Types

1.Viruses - not all firewalls offer Two types of firewalls


protection against computer viruses as 1. Hardware Firewall(Router
there are many ways to encode files and Firewall)
transfer them over the Internet. 2. Software Firewall(windows
2. Attacks - firewalls can’t protect Firewall)
against attacks that don’t go through the
firewall. For example, your firewall may
3.1 Hardware vs. Software Firewalls
restrict access from the Internet, but may
not protect your equipment from dial in
access to your computer systems Hardware Firewalls(Router firewall)
3. Architecture - firewalls reflect the  Protect an entire network
overall level of security in the network.  Implemented on the router
An architecture that depends upon one level
method of security or one security  Usually more expensive,
mechanism has a single point of failure harder to configure
and may open the organization to
intruders. Software Firewalls(Windows firewall)
4. Configuration - a firewall can't tell  Protect a single computer
you if it has been incorrectly configured.  Usually less expensive,
Only professionals have the experience easier to configure
to minimize security risks.  Implemented in single
5. Monitoring - firewalls can’t notify System
you if someone has hacked into your
network. Many organizations need 3.2 Hardware Firewall or Router
additional security monitoring tools. Firewall
1.Hardware Firewall implemented In
2.5 Need Of Firewall Entire Network.
2.Hardware Firewall Cost is High.
what Happens if we don’t use firewall: Implementation Can Be Done At Router
Level.
1.subnet system expose themselves to 3.In Hardware Firewall Include Internet
inherently insecure services such as NFS and Private Network.
or NIS to probes and attacks from hosts 4.Firewall b/w the Internet and Private
elsewhere on the network. Network.
5.Authorized Request Must pass
Through Firewall. Un Authorized

3
Request don’t pass Through The 4 . Classification of Firewalls
Firewall.
Classification Is 3 Types

1. Packet filtering
2. Application gateways
3. Circuit gateways

4.1 Packet Filter Firewall

1.Work at the network level.


2.compared to a set of criteria before it is
forwarded.

3.3 Software Firewall or Windows


Firewall
1.Software Firewall Implemented In
Single System.
2.Software Firewall Is Low Cost.
3.Configure Is Very High.
4.Software Firewall Implemented In
AVG antivirus.
5.Software Firewall b/w The Single
System and Internet.

3.Simplest of components
4.Uses transport-layer information only
IP Source Address,
Destination Address
Protocol/Next Header (TCP, UDP,
ICMP, etc)
TCP or UDP source & destination ports
TCP Flags (SYN, ACK, FIN, RST, PSH,
etc)
ICMP message type
5.Examples
DNS uses port 53

4
No incoming port 53 packets except Security & Performance of Packet
known trusted servers Filters

Usage of Packet Filters 1.IP address spoofing.


Fake source address to be trusted
1.Filtering with incoming or outgoing Add filters on router to block
interfaces. 2.Tiny fragment attacks
E.g., Ingress filtering of spoofed IP Split TCP header info over several tiny
addresses packets
Egress filtering Either discard or reassemble before
2.Permits or denies certain services. check
Requires intimate knowledge of TCP 3.Degradation depends on number of
and UDP port utilization on a number of rules applied at any point.
operating systems 4.Order rules so that most common
traffic is dealt with first.
5.Correctness is more important than
How to Configure a Packet Filter speed.

1.Start with a security policy. 4.2 Application Gateway


2.Specify allowable packets in terms of
logical expressions on packet fields. 1.work at the application layer.
3.Rewrite expressions in syntax 2.Incoming or outgoing packets cannot
supported by your vendor. access services for which there is no
4.General rules - least privilege. proxy .
All that is not expressly permitted is 3.filter application specific commands.
prohibited. 4.can also be used to log user activity
If you do not need it, eliminate it. and logins.

Advantages and disadvantages of


traditional packet filters

Advantages
One screening router can protect entire
network.
Can be efficient if filtering rules are kept
simple.
Widely available. Almost any router,
even Linux boxes.

Disadvantages
Can possibly be penetrated.
Cannot enforce some policies. For
example, permit certain users.
Rules can get complicated and difficult
to test. 5.Gateway sits between user on inside
and server on outside. Instead of talking

5
directly, user and server talk through  NTP (Network Time
proxy. Protocol)
 custom services
6.Allows more fine grained and generally not supported
sophisticated control than packet
filtering. For example, ftp server may 4.3 Circuit Gateway
not allow files greater than a set size.
7.A mail server is an example of an 1.work at the session layer.
application gateway. 2.monitor TCP handshaking between
Can’t deposit mail in recipient’s mail packets to determine whether a
server without passing through sender’s requested session is legitimate.
mail server . 3.Information passed to remote
Advantages and disadvantages of computer through a circuit level gateway
proxy gateways appears to have originated from the
gateway.
Advantages
Proxy can log all connections, activity in
connections.
Proxy can provide caching.
Proxy can do intelligent filtering based
on content.
Proxy can perform user-level
authentication.

Disadvantages
Not all services have proxied versions.
May need different proxy server for each
service.
Requires modification of client.
Performance.

Application-Level Filtering

Has full access to protocol


 user requests service from
proxy 4.two TCP connections
 proxy validates request as 5.Imposes security by limiting which
legal such connections are allowed
 then actions request and 6.Once created usually relays traffic
returns result to user without examining contents
Need separate proxies for each service 7.Typically used when trust internal
users by allowing general outbound
 E.g., SMTP (E-Mail)
connections
 NNTP (Net news)
8.SOCKS commonly used for this
 DNS (Domain Name
System)

6
Bastion Host
 Highly secure host system 5.1 Screened Host Firewall
 Potentially exposed to "hostile"
elements
 Hence is secured to withstand
this
 Disable all non-required
services; keep it simple
 Trusted to enforce trusted
separation between network
connections
 Runs circuit / application level
gateways
 Install/modify services
you want
 Or provides externally accessible
services

Advantages and disadvantages of


circuit gateways

Advantages
relatively inexpensive In this Type Of Topology one packet
hiding information about the private Filter Firewall and one Bastion
network Host(Application Gateway).
When Information Coming From
Disadvantages Internet To Private Network First pass
they do not filter individual packets Through Screening Router(Packet
Filter).
Packet Filter applying Some Rules On
5 . Firewall Topology Each Ip Packet.
After Ip Packet Pass Through Bastion
3 Types of Topology in Firewall Host They Can Check Authentication
Finally Pass Through Private Network.
1) Screened Host Firewall One Drawback is Attackers In The
2) Dual Homed Host Firewall Internet can Easily access Private
3) Screened Subnet Firewall Network Because Of No Bastion Host
Between Internet And Private Network
• Provides services from a host
attached to internal network
• Security provided by packet
filtering
– only certain operations
allowed (e.g. deliver
email)

7
– outside connections can Through Bastion Host and Enter Into
only go to bastion host Private Network
• allow internal hosts to originate • Built around dual-homed host
connections over Internet computer
• if bastion host is compromised. • Disable ability to route between
networks
5.2 Dual Homed Host Firewall – packets from Internet are
not routed directly to the
internal network
– services provided by
proxy
– users log into dual-homed
host to access Internet
– user accounts present
security problems

Advantage
Security Is More Then Screened Host
Firewall
Two Bastion Host

5.3 Screened Subnet Firewall

In this Type Of Topology one packet


Filter Firewall and Two Bastion
Host(Application Gateway).
When Information Coming From
Internet To Private Network First pass
Through Screening Router(Packet
Filter).
Packet Filter applying Some Rules On
Each Ip Packet.
After Ip Packet Pass Through Bastion
Host They Can Check Authentication
Finally Pass Through Private Network.
Dual Homed Host Firewall Security is
More then Screened Host Firewall
Because Of They Compulsory Pass

8
– does most of packet
filtering for firewall
– allows selected outbound
services from internal
network
– limit services between
bastion host and internal
network

Advantage
Security Is More.

In this Type Of Topology Two packet


Filter Firewall and one Bastion 6. Conclusion
Host(Application Gateway).
One Packet Filter Firewall Is Between
In conclusion inter net is the dangerous
Internet and Bastion Host. The packet
place..
Filter Firewall Is Known As Exterior
Without firewall not connected to
Router.
internet.
Second Packet Filter Firewall Is
Firewall protect private file from
Between Bastion Host and Private
outsiders.
Network. The Packet Filter Firewall Is
Hacker crackers and viruses and harm
Known As Interior Host.
full for personal data.
Security Is More Then Other Two
Firewall provide necessary security for
Topologies Because of Two Packet
such type of illegal access.
Filter Firewall .
Exterior router (access router)
– protects DMZ and
7. Future Scope
internal network from
Internet
Firewall technology has evolved
Interior router (choke router) significantly since the days of basic
packet filters and network address
– protects internal network
translation. We now have not just
from Internet and DMZ firewalls but “intrusion detection

9
devices”, which do far more complex way through all relevant components of
things to the traffic they see in an this “edge network” before being
attempt to prevent the network from allowed into the corporate network.
being attacked. So where are firewalls Imagine an email arrives in the network.
going? The main problem with today’s The firewall checks that it’s destined for
firewall technology is that it’s doing so the right server, on the right port, and
much work that as the capacity of the verifies that it’s passed the basic entry
average Internet connection grows, the criteria. It then passes it on to an email
firewall becomes a bottleneck. This is decoder for the attachments to be
hardly surprising. Many of today’s extracted. The email decoder knows that
firewalls don’t just filter packets but also before it can do anything with the
do clever stuff like checking whether message, it needs to examine the
incoming Java applets contain dangerous attachments for viruses, so it unbundles
code, or decoding email messages and them and passes them to an AV package.
passing their attachments to an AV The AV package verifies that the files
package for analysis. The other problem are clean, and notifies this fact to the
with doing loads of different functions email decoder, which knows it can now
within a single firewall is that no one pass the original message on to the email
product will manage to be the “best of server for delivery. For each type of
breed”. Generally, you find that a multi- incoming and outgoing traffic, a similar
function device does all things type of workflow arrangement is
averagely, instead of doing any one implemented, with each device in the
function brilliantly. This is addressed by network knowing (a) how to do its own
some firewall manufacturers, who job and (b) what to do with the results
instead of doing advanced work such as should the test it’s performing pass or
AV protection internally, pass the task to fail. Learn from ERP
an external system running a mainstream This kind of workflow implementation is
application with a reputation for commonplace in corporate ERP systems.
excellence in its field. Strangely, though, Since network protection is no longer a
the current penchant for bundling basic filtering exercise but a vast pile of
firewalls as all-in-one “appliances” goes intricate logic with some nasty,
against this idea, and security can only nondeterministic heuristics thrown in for
suffer as a consequence. Sharing the good measure, it’s not unreasonable to
load think that ERP-style workflow
So how do we address these issues of management might be a useful addition.
bottlenecking and fitness for purpose? It Because there’s a large amount of
seems to us that the obvious way is to processing to be done to analyse the
move away from having a firewall traffic, it’s also sensible to think that
device, toward having an “edge there would be several separate
network” of smaller devices. Each of machines sharing the load and passing
these would perform their own particular messages between each other. Some
function under the supervision of a machines would be dedicated to one task
“master” device, possibly the firewall (e.g. AV processing) while others could
itself, but not necessarily relying on the handle two or three lesser tasks. Taking
firewall for intercommunication. the concept to extremes, one can
Transmissions have to negotiate their imagine the “edge network” as

10
comprising a collection of general-
purpose machines that simply do the [5]National Science Foundation, "NSF
jobs they’re asked to do by a central Poses Code of Networking Ethics",
scheduler. So far, we’ve mentioned the Communications of the ACM, Vol. 32,
concept of having (say) an AV machine No. 6, Pg. 688,June 1989. Also appears
that does AV processing on request, and in the minutes of the regular meeting of
an email decoder for extracting the Division Advisory Panel for
attachments, with the data that needs Networking and Communications
processing being passed in by external Research and Infrastructure, Dave
devices. Imagine for a moment that we Farber, Chair, November 29-30 1988.
simply have a cluster of general purpose
machines, with no specific purpose. [6]Massachusetts Institute of
Instead of passing data in for processing, Technology, "Teaching Students About
the external device passes in both the Responsible Use of Computers", MIT,
data and the code it wants to run on the 1985-1986. Also reprinted in the
data. So one minute a machine is Communications of the ACM, Vol. 32,
receiving a message that says: “Here’s No. 6, Pg. 704,
some data to check for viruses and Athena Project, MIT, June 1989.
here’s the code you need to use to do the
check” and the next it’s hearing: “Please [7]Computer Professionals for Social
decode these emails and pull out the Responsibility, "CPSR
attachments – here’s a lump of code you Statement on the Computer Virus",
can use to do it”. CPSR, Communications of the ACM,
Vol. 32, No. 6, Pg. 699, June 1989.

8. References [8]Eisenberg, T., D. Gries, J. Hartmanis,


D. Holcomb, M. Lynn, and T. Santoro,
[1]Allman, E., "Sendmail - An "The Computer Worm", Cornell
Internetwork Mail Router", University of University,6 February 1989.
California, Berkeley, Issued with the [9]Eichin, M., and J. Rochlis, "With
BSD UNIX documentation Microscope and Tweezers: An
set, 1983. Analysis of the Internet Virus of
November 1988", Massachusetts
[2]Postel, J., "Simple Mail Transfer Institute of Technology, February 1989.
Protocol", RFC 821,
USC/InformationSciences Institute, [10]Seeley, D., "A Tour of the Worm",
August 1982. Proceedings of 1989 Winter
USENIX Conference, Usenix
[3]Harrenstien,K., "NAME/FINGER", Association, San Diego, CA, February
RFC 742, SRI, December 1977. 1989.

[4]Internet Activities Board, "Ethics and [11]Spafford, E., "The Internet Worm
the Internet", RFC 1087,IAB, January Program: An Analysis",
1989. Also appears in the ComputerCommunication Review, Vol.
Communications of the ACM, Vol. 32, 19, No. 1, ACM SIGCOM, January
No. 6, Pg. 710, June 1989.

11
1989.Also issued as Purdue CS
Technical Report CSD-TR-823, 28
November 1988.

[12]DCA DDN Defense


Communications System, "DDN
Security Bulletin 03", DDN Security
Coordination Center, 17 October 1989.

12

También podría gustarte