SlideShare una empresa de Scribd logo
1 de 45
Firewall Planning and Design

Chapter 1
Learning Objectives
  Understand the misconceptions about firewalls
  Realize that a firewall is dependent on an effective
  security policy
  Understand what a firewall does
  Describe the types of firewall protection
  Understand the limitations of firewalls
  Determine the best hardware and software
  selections for your firewall
Misconceptions about Firewalls

  Misconception
     Designed to prevent all hackers, viruses, and
      would-be intruders from entering
  Reality
     Enable authorized traffic to pass through
     Block unauthorized traffic



                                                  continued
Misconceptions about Firewalls

  Misconception
     Once deployed, firewalls operate on their own
  Reality
     Work best when part of Defense in Depth
      (DiD) security
     Need constant maintenance
Misconceptions about Firewalls
What Is a Security Policy?

  Set of rules and procedures developed by
  management in conjunction with security
  professionals
      Acceptable/unacceptable use of network
      What resources need to be protected
      How the company will respond to breaches of
       security
Components of a Security Policy
  List of physical, logical, and network assets to be
  protected
  Specifications on how communications across the
  firewall will be audited
  Acceptable Use Policy that tells employees what
  constitutes acceptable use of company resources
  Description of organization’s approach to security
  and how it affects the firewall
What Is a Firewall?

  Hardware or software that monitors
  transmission of packets of digital
  information that attempt to pass the
  perimeter of a network
  Performs two basics security functions
      Packet filtering
      Application proxy gateways
Firewalls Provide Security
Features
  Log unauthorized accesses into/out of a network
  Provide a VPN link to another network
  Authenticate users
  Shield hosts inside the network from hackers
  Cache data
  Filter content that is considered inappropriate or
  dangerous
Firewalls Provide Protection for
Individual Users

  Keep viruses from infecting files
  Prevent Trojan horses from entering the
  system through back doors
Firewalls Provide Protection for
Individual Users
Firewalls Provide Perimeter
Security for Networks
Firewalls Provide Perimeter
Security for Networks
Firewalls Consist of Multiple
Components
  Packet filter
  Proxy server
  Authentication system
  Software that performs Network Address
  Translation (NAT)
  Some firewalls:
      Can encrypt traffic
      Help establish VPNs
      Come packaged in a hardware device that also
       functions as a router
      Make use of a bastion host
A Network with a Bastion Host
and Service Network (DMZ)
Firewalls Confront Threats and
Perform Security Tasks

  Restrict access from outside network by
  using packet filtering




                                        continued
Firewalls Confront Threats and
Perform Security Tasks

  Restrict unauthorized access from inside
  network (eg, social engineering)
  Give clients limited access to external hosts
  by acting as a proxy server




                                          continued
Firewalls Confront Threats and
Perform Security Tasks
  Protect critical resources against attacks (eg,
  worms, viruses, Trojan horses, and DDoS
  attacks)
  Protect against hacking, which can affect:
     Loss of data
     Loss of time
     Staff resources
     Confidentiality

                                           continued
Firewalls Confront Threats and
Perform Security Tasks

  Provide centralization
  Enable documentation to:
     Identify weak points in the security system so
      they can be strengthened
     Identify intruders so they can be apprehended
  Provide for authentication
  Contribute to a VPN
Types of Firewall Protection

  Multilayer firewall protection
  Packet filtering
      Stateful
      Stateless
  NAT
  Application proxy gateways
Multilayer Firewall Protection
Packet Filtering
  Key function of any firewall
  Packets contain two kinds of information:
      Header
      Data
  Packet filters
      Effective element in any perimeter security setup
      Do not take up bandwidth
      Use packet headers to decide whether to block the
       packet or allow it to pass
Stateless Packet Filtering

  Firewall inspects packet headers without
  paying attention to the state of connection
  between server and client computer
  Packet is blocked based on information in
  the header
  Also called stateless inspection
Stateful Packet Filtering
  Examines data contained in the packet; superior to
  stateless inspection
  Keeps memory of the state of connection between
  client and server in disk cache
  Detects and drops packets that overload the server
  Blocks packets sent by a host that is not connected
  to the server
  Also called stateful inspection
Packet Filtering Rules
  Any outbound packet:
      Must have a source address in your internal network
      Must not have a destination address in your internal
       network
  Any inbound packet:
      Must not have a source address in your internal
       network
      Must have a destination address in your internal
       network

                                                          continued
Packet Filtering Rules
  Any packet that enters/leaves your network must
  have a source/destination address that falls within
  the range of addresses in your network
  Include the use of:
      Internet Control Message Protocol (ICMP)
      User Datagram Program (UDP)
      TCP filtering
      IP filtering
Using Multiple Packet Filters in a
DMZ

     Fig 1-8
NAT

 Hides TCP/IP information of hosts in the
 network being protected
     Prevents hackers from getting address of actual
      host
 Functions as a network-level proxy;
 converts IP addresses of internal hosts to IP
 address of the firewall
NAT
Application Layer Gateways
  Control how applications inside the network
  access the outside world by setting up proxy
  services
  Act as a substitute for the client; shield individual
  users from directly connecting with the Internet
  Provide a valuable security benefit
     Understand contents of requested data
     Can be configured to allow or deny specific content
  Also called a proxy server
Application-Level Security
Techniques

  Load balancing
  IP address mapping
  Content filtering
  URL filtering
Limitations of Firewalls

  Should be part of an overall security plan,
  not the only form of protection for a
  network
  Should be used in conjunction with other
  forms of protection (eg, ID cards,
  passwords, employee rules of conduct)
Evaluating Firewall Packages

  They all do the core functions:
     Filtering
     Proxying
     Logging
  Some add caching and address translation
  Price should not rule your decision
Firewall Hardware

  Routers
     Many come equipped with packet-filtering
      capabilities; others come with full-fledged
      firewalls
  Appliances (ie, firewall products)
     Perform same basic tasks (packet filtering,
      application-level gateways, and logging)
     Some have low profile and sleek design
Advantages of Firewall Hardware
over Software-Only Products

  Self-contained
      Not affected by OS problems of a network host
       (eg, bugs or slow speed)
  Installation is generally easy if firewall
  software needs to be patched or updated
Software-Only Packages
  Free firewall tools on the Internet
     Most also run on a free operating system
  Personal/small business firewalls
     Located between Ethernet adapter driver of machine on
      which they are installed and the TCP/IP stack, where
      they inspect traffic between the driver and the stack
     Considered lightweight protection
  Enterprise firewall systems
     Full-featured, full-powered packages
Free Firewall Tools on the
Internet
  Advantages
      Convenient, simple, and inexpensive
  Drawbacks
      Logging capabilities not as robust as commercial
       products
      Can be difficult to configure
      Usually no way to monitor firewall in real-time
  Examples
      Pretty Good Privacy (PGP)
      Netfilter
Personal/Small Business
Firewalls
  Advantages
     Some let you establish rules as needed
  Drawbacks
     Most guard only against IP threats
     Some don’t do outbound connection blocking
     Some are inconvenient to configure
  Examples
     Norton Internet Security
     ZoneAlarm
     BlackICE Defender
     Symantec Personal Firewall
Examples of Enterprise Firewall
Systems

  Check Point FireWall-1
  Cisco PIX
  Microsoft Internet Security & Acceleration
  Server
  NAI Gauntlet
Check Point FireWall-1
  Considered the product of choice
  Among the first to use stateful packet inspection to
  monitor network traffic
  Full array of security tools (authentication, virus
  checking, intrusion detection, packet filtering)
  Only firewall compliant with OPSEC security
  standard
  Good choice for large networks
  High availability feature
Cisco PIX
  A series of secure, self-contained hardware
  devices that contain full-featured firewalls
  Competitive pricing
  Extensive online documentation
  Highly regarded customer support
  Reliable
  Feature-rich
     High availability
     Intrusion detection system
     Protection against DoS attacks
Microsoft Internet Security &
Acceleration Server
  Authentication through integration with Active
  Directory
  Virus scanning (through integrated third-party
  products)
  Data-aware filtering capabilities
  IP packet-filtering functionality
  Supports Cache Array Routing Protocol (CARP);
  can be scaled to fit larger traffic requirements
NAI Gauntlet

  One of longest-established firewall products
  available
  Flexible
     Supports application proxies and packet
      filtering
     Able to adjust speed of the firewall as needed
  Integrated by McAfee’s anti-virus software
Chapter Summary

  Issues involved in planning and designing
  firewalls
  What a firewall is not
  Security policies
  Rules and procedures that govern how a
  firewall works
  Types of firewall protection

                                        continued
Chapter Summary

  Limitations of firewalls
  How hardware is used to create firewalls
  Evaluations of firewall software packages

Más contenido relacionado

La actualidad más candente

Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationgaurav96raj
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture Yovan Chandel
 
FIREWALL
FIREWALL FIREWALL
FIREWALL Akash R
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsüremin_oz
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer networkpoorvavyas4
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurationsStudent
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
FireWall
FireWallFireWall
FireWallrubal_9
 
Firewall
FirewallFirewall
FirewallApo
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentalsThang Man
 

La actualidad más candente (19)

Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
Firewall security in computer network
Firewall security in computer networkFirewall security in computer network
Firewall security in computer network
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
FireWall
FireWallFireWall
FireWall
 
Firewall
FirewallFirewall
Firewall
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
 

Destacado (9)

Firewall
Firewall Firewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall diapositivas (Stephanie Hernández ) ( Tercer grado de Secundaria)
Firewall diapositivas (Stephanie Hernández ) ( Tercer grado de Secundaria)Firewall diapositivas (Stephanie Hernández ) ( Tercer grado de Secundaria)
Firewall diapositivas (Stephanie Hernández ) ( Tercer grado de Secundaria)
 
Data Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTData Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoT
 

Similar a Firewall

CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
CSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptxCSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptx
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptxVivekTripathi684438
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter newKarnav Rana
 
What is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptxWhat is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptxAneenaBinoy2
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxShreyaBanerjee52
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdfImXaib
 
Unit II Chapter 6 firewalls.ppt
Unit II Chapter 6 firewalls.pptUnit II Chapter 6 firewalls.ppt
Unit II Chapter 6 firewalls.pptAkshitRana31
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL PANKAJKUMAR2519
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewallsDivya Jyoti
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2sweta dargad
 

Similar a Firewall (20)

Chapter 03
Chapter 03Chapter 03
Chapter 03
 
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
CSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptxCSS (KNC-301)  4. Packet Filtering Firewall By Vivek Tripathi.pptx
CSS (KNC-301) 4. Packet Filtering Firewall By Vivek Tripathi.pptx
 
Day4
Day4Day4
Day4
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
What is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptxWhat is a Firewall_ The Different Firewall Types.pptx
What is a Firewall_ The Different Firewall Types.pptx
 
Firewalls
FirewallsFirewalls
Firewalls
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
firewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptxfirewall as a security measure (1)-1.pptx
firewall as a security measure (1)-1.pptx
 
Firewall.pdf
Firewall.pdfFirewall.pdf
Firewall.pdf
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 
Unit II Chapter 6 firewalls.ppt
Unit II Chapter 6 firewalls.pptUnit II Chapter 6 firewalls.ppt
Unit II Chapter 6 firewalls.ppt
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 

Último

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Firewall

  • 1. Firewall Planning and Design Chapter 1
  • 2. Learning Objectives Understand the misconceptions about firewalls Realize that a firewall is dependent on an effective security policy Understand what a firewall does Describe the types of firewall protection Understand the limitations of firewalls Determine the best hardware and software selections for your firewall
  • 3. Misconceptions about Firewalls Misconception  Designed to prevent all hackers, viruses, and would-be intruders from entering Reality  Enable authorized traffic to pass through  Block unauthorized traffic continued
  • 4. Misconceptions about Firewalls Misconception  Once deployed, firewalls operate on their own Reality  Work best when part of Defense in Depth (DiD) security  Need constant maintenance
  • 6. What Is a Security Policy? Set of rules and procedures developed by management in conjunction with security professionals  Acceptable/unacceptable use of network  What resources need to be protected  How the company will respond to breaches of security
  • 7. Components of a Security Policy List of physical, logical, and network assets to be protected Specifications on how communications across the firewall will be audited Acceptable Use Policy that tells employees what constitutes acceptable use of company resources Description of organization’s approach to security and how it affects the firewall
  • 8. What Is a Firewall? Hardware or software that monitors transmission of packets of digital information that attempt to pass the perimeter of a network Performs two basics security functions  Packet filtering  Application proxy gateways
  • 9. Firewalls Provide Security Features Log unauthorized accesses into/out of a network Provide a VPN link to another network Authenticate users Shield hosts inside the network from hackers Cache data Filter content that is considered inappropriate or dangerous
  • 10. Firewalls Provide Protection for Individual Users Keep viruses from infecting files Prevent Trojan horses from entering the system through back doors
  • 11. Firewalls Provide Protection for Individual Users
  • 14. Firewalls Consist of Multiple Components Packet filter Proxy server Authentication system Software that performs Network Address Translation (NAT) Some firewalls:  Can encrypt traffic  Help establish VPNs  Come packaged in a hardware device that also functions as a router  Make use of a bastion host
  • 15. A Network with a Bastion Host and Service Network (DMZ)
  • 16. Firewalls Confront Threats and Perform Security Tasks Restrict access from outside network by using packet filtering continued
  • 17. Firewalls Confront Threats and Perform Security Tasks Restrict unauthorized access from inside network (eg, social engineering) Give clients limited access to external hosts by acting as a proxy server continued
  • 18. Firewalls Confront Threats and Perform Security Tasks Protect critical resources against attacks (eg, worms, viruses, Trojan horses, and DDoS attacks) Protect against hacking, which can affect:  Loss of data  Loss of time  Staff resources  Confidentiality continued
  • 19. Firewalls Confront Threats and Perform Security Tasks Provide centralization Enable documentation to:  Identify weak points in the security system so they can be strengthened  Identify intruders so they can be apprehended Provide for authentication Contribute to a VPN
  • 20. Types of Firewall Protection Multilayer firewall protection Packet filtering  Stateful  Stateless NAT Application proxy gateways
  • 22. Packet Filtering Key function of any firewall Packets contain two kinds of information:  Header  Data Packet filters  Effective element in any perimeter security setup  Do not take up bandwidth  Use packet headers to decide whether to block the packet or allow it to pass
  • 23. Stateless Packet Filtering Firewall inspects packet headers without paying attention to the state of connection between server and client computer Packet is blocked based on information in the header Also called stateless inspection
  • 24. Stateful Packet Filtering Examines data contained in the packet; superior to stateless inspection Keeps memory of the state of connection between client and server in disk cache Detects and drops packets that overload the server Blocks packets sent by a host that is not connected to the server Also called stateful inspection
  • 25. Packet Filtering Rules Any outbound packet:  Must have a source address in your internal network  Must not have a destination address in your internal network Any inbound packet:  Must not have a source address in your internal network  Must have a destination address in your internal network continued
  • 26. Packet Filtering Rules Any packet that enters/leaves your network must have a source/destination address that falls within the range of addresses in your network Include the use of:  Internet Control Message Protocol (ICMP)  User Datagram Program (UDP)  TCP filtering  IP filtering
  • 27. Using Multiple Packet Filters in a DMZ Fig 1-8
  • 28. NAT Hides TCP/IP information of hosts in the network being protected  Prevents hackers from getting address of actual host Functions as a network-level proxy; converts IP addresses of internal hosts to IP address of the firewall
  • 29. NAT
  • 30. Application Layer Gateways Control how applications inside the network access the outside world by setting up proxy services Act as a substitute for the client; shield individual users from directly connecting with the Internet Provide a valuable security benefit  Understand contents of requested data  Can be configured to allow or deny specific content Also called a proxy server
  • 31. Application-Level Security Techniques Load balancing IP address mapping Content filtering URL filtering
  • 32. Limitations of Firewalls Should be part of an overall security plan, not the only form of protection for a network Should be used in conjunction with other forms of protection (eg, ID cards, passwords, employee rules of conduct)
  • 33. Evaluating Firewall Packages They all do the core functions:  Filtering  Proxying  Logging Some add caching and address translation Price should not rule your decision
  • 34. Firewall Hardware Routers  Many come equipped with packet-filtering capabilities; others come with full-fledged firewalls Appliances (ie, firewall products)  Perform same basic tasks (packet filtering, application-level gateways, and logging)  Some have low profile and sleek design
  • 35. Advantages of Firewall Hardware over Software-Only Products Self-contained  Not affected by OS problems of a network host (eg, bugs or slow speed) Installation is generally easy if firewall software needs to be patched or updated
  • 36. Software-Only Packages Free firewall tools on the Internet  Most also run on a free operating system Personal/small business firewalls  Located between Ethernet adapter driver of machine on which they are installed and the TCP/IP stack, where they inspect traffic between the driver and the stack  Considered lightweight protection Enterprise firewall systems  Full-featured, full-powered packages
  • 37. Free Firewall Tools on the Internet Advantages  Convenient, simple, and inexpensive Drawbacks  Logging capabilities not as robust as commercial products  Can be difficult to configure  Usually no way to monitor firewall in real-time Examples  Pretty Good Privacy (PGP)  Netfilter
  • 38. Personal/Small Business Firewalls Advantages  Some let you establish rules as needed Drawbacks  Most guard only against IP threats  Some don’t do outbound connection blocking  Some are inconvenient to configure Examples  Norton Internet Security  ZoneAlarm  BlackICE Defender  Symantec Personal Firewall
  • 39. Examples of Enterprise Firewall Systems Check Point FireWall-1 Cisco PIX Microsoft Internet Security & Acceleration Server NAI Gauntlet
  • 40. Check Point FireWall-1 Considered the product of choice Among the first to use stateful packet inspection to monitor network traffic Full array of security tools (authentication, virus checking, intrusion detection, packet filtering) Only firewall compliant with OPSEC security standard Good choice for large networks High availability feature
  • 41. Cisco PIX A series of secure, self-contained hardware devices that contain full-featured firewalls Competitive pricing Extensive online documentation Highly regarded customer support Reliable Feature-rich  High availability  Intrusion detection system  Protection against DoS attacks
  • 42. Microsoft Internet Security & Acceleration Server Authentication through integration with Active Directory Virus scanning (through integrated third-party products) Data-aware filtering capabilities IP packet-filtering functionality Supports Cache Array Routing Protocol (CARP); can be scaled to fit larger traffic requirements
  • 43. NAI Gauntlet One of longest-established firewall products available Flexible  Supports application proxies and packet filtering  Able to adjust speed of the firewall as needed Integrated by McAfee’s anti-virus software
  • 44. Chapter Summary Issues involved in planning and designing firewalls What a firewall is not Security policies Rules and procedures that govern how a firewall works Types of firewall protection continued
  • 45. Chapter Summary Limitations of firewalls How hardware is used to create firewalls Evaluations of firewall software packages