SlideShare a Scribd company logo
1 of 33
FIRE
WALL
+                      =


But does fire + wall =firewall ??? Is this definition
correct??
Well not exactly 
Finally, welcome to last presentation
 of the 8th SEM CSE
FIREWALLS


Presented by-
1) Rohit Phulsunge
2) Satyendra Singh Naruka
3) Saurabh Maheswari
4) Sameer Pathak
5) Sandeep Suryawanshi
So what exaclty is a firewall??
   A firewall is a device or set of devices
    designed to permit or deny network
    transmissions based upon a set of
    rules and is frequently used to protect
    networks from unauthorized access
    while permitting legitimate
    communications to pass.
A diagram showing where a
firewall can be placed.
History
 The term firewall originally referred to
  a wall intended to confine a fire or
  potential fire within a building
 Later uses refer to similar structures,
  such as the metal sheet separating
  the engine compartment of a vehicle
  or aircraft from the passenger
  compartment.
What does firewall do?
 a choke point of control and
  monitoring
 interconnects networks with differing
  trust
 imposes restrictions on network
  services
    ◦ only authorized traffic is allowed
   auditing and controlling access
    ◦ can implement alarms for abnormal
      behavior
   provide NAT & usage monitoring
Firewall Limitations
   cannot protect from attacks bypassing
    it
    ◦ E.g., sneaker net, utility modems, trusted
      organisations, trusted services (eg
      SSL/SSH)
   cannot protect against internal threats
    ◦ eg disgruntled or colluding employees
   cannot protect against transfer of all
    virus infected programs or files
    ◦ because of huge range of O/S & file types
Firewalls – Packet Filters
 simplest, fastest firewall component
 foundation of any firewall system
 examine each IP packet (no context)
  and permit or deny according to rules
 hence restrict access to services
  (ports)
 possible default policies
    ◦ that not expressly permitted is prohibited
    ◦ that not expressly prohibited is permitted
                                                   12
Firewalls – Packet Filters




                             13
Firewalls – Packet Filters




                             14
Attacks on Packet Filters
   IP address spoofing
    ◦ fake source address
    ◦ authenticate
   source routing attacks
    ◦ attacker sets a route other than default
    ◦ block source routed packets
   tiny fragment attacks
    ◦ split header info over several tiny packets
    ◦ either discard or reassemble before check

                                                 15
Firewalls – Stateful Packet
Filters
   traditional packet filters do not examine
    higher layer context
    ◦ i.e., matching return packets with outgoing flow
 stateful packet filters address this need
 they examine each IP packet in context
    ◦ keep track of client-server sessions
    ◦ check each packet validly belongs to one
   they are better able to detect bogus packets
    out of context


                                                         16
TYPES OF FIREWALLS
   Packet filtering Router

   Application level gateway

   Circuit level gateway




                                17
Packet filtering Router
Apply set of rules to IP packet
*Rules for network packet
 Source IP Address
 Destination IP Address
 Source & Destination transport level
  address
 IP protocol field
 Interface

                                         18
Application Level Gateway

 have application specific gateway /
  proxy
 has full access to protocol
    ◦ user requests service from proxy
    ◦ proxy validates request as legal
    ◦ then actions request and returns result to
      user
    ◦ can log / audit traffic at application level


                                                     19
Application Level Gateway




                            20
Firewalls - Circuit Level
Gateway
 relays two TCP connections
 imposes security by limiting what such
  connections are allowed
 once created usually relays traffic
  without examining contents
 typically used when trust internal
  users by allowing general outbound
  connections

                                       21
Firewalls - Circuit Level
Gateway




                            22
Bastion Host
 highly secure host system
 runs circuit / application level
  gateways
 or provides externally accessible
  services
 potentially exposed to "hostile"
  elements
 hence is secured to withstand this
    ◦ hardened O/S, essential services, extra
      auth                                      23
Firewall Configurations




                          24
Firewall Configurations




                          25
Firewall Configurations




                          26
Access Control

 determines what resources users can
  access
 general model is that of access matrix
  with
    ◦ subject - active entity (user, process)
    ◦ object - passive entity (file or resource)
    ◦ access right – way object can be
      accessed
   can decompose by
    ◦ columns as access control lists
    ◦ rows as capability tickets
                                                   27
Access Control Matrix




                        28
Trusted Computer Systems
 information security is increasingly important
 have varying degrees of sensitivity of
  information
    ◦ military info classifications: confidential, secret, etc
 subjects (people or programs) have varying
  rights of access to objects (information)
 known as multilevel security
    ◦ subjects have maximum & current security level
    ◦ objects have a fixed security level classification
   want to consider ways of increasing
    confidence in systems to enforce these                       29
Bell LaPadula (BLP) Model

 has two key policies:
 no read up (simple security property)
    ◦ a subject can only read an object if the current
      security level of the subject dominates (>=) the
      classification of the object
   no write down (*-property)
    ◦ a subject can only append/write to an object if
      the current security level of the subject is
      dominated by (<=) the classification of the object


                                                           30
Reference Monitor




                    31
Summary
   have considered:
    ◦   firewalls
    ◦   types of firewalls
    ◦   configurations
    ◦   access control
    ◦   trusted systems




                             32
Firewall Fundamentals and Concepts

More Related Content

What's hot (20)

Firewall
FirewallFirewall
Firewall
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
Dmz
Dmz Dmz
Dmz
 
Firewalls
FirewallsFirewalls
Firewalls
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Traditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation FirewallTraditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Firewall
FirewallFirewall
Firewall
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Network security
Network securityNetwork security
Network security
 
Firewall
FirewallFirewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Network Security
Network SecurityNetwork Security
Network Security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewall
 
Firewall
Firewall Firewall
Firewall
 

Viewers also liked

Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerCheapSSLUSA
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information securityDevam Shah
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Asad Ali
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewallsrajakhurram
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)amanchaurasia
 
Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Sandeep Gupta
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets LayerNascenia IT
 
Firewall
FirewallFirewall
FirewallApo
 

Viewers also liked (11)

Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets Layer
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information security
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
 
Firewall
FirewallFirewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 

Similar to Firewall Fundamentals and Concepts

Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptgocokir267
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Radhika Talaviya
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filtersMOHIT AGARWAL
 
Firewall protection
Firewall protectionFirewall protection
Firewall protectionVC Infotech
 
Information security
Information securityInformation security
Information securityBhushan Gurav
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Servervinay arora
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfDr. Shivashankar
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's TypesHem Pokhrel
 
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...FahmiOlayah
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?ezoicxcom
 
Improving Firewall Performance by Eliminating Redundancies In Access Control ...
Improving Firewall Performance by Eliminating Redundancies In Access Control ...Improving Firewall Performance by Eliminating Redundancies In Access Control ...
Improving Firewall Performance by Eliminating Redundancies In Access Control ...CSCJournals
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?haq107457
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)Zara Nawaz
 

Similar to Firewall Fundamentals and Concepts (20)

Ch20
Ch20Ch20
Ch20
 
firewall
firewallfirewall
firewall
 
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
 
Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters Cyber Security - Firewall and Packet Filters
Cyber Security - Firewall and Packet Filters
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Information security
Information securityInformation security
Information security
 
Firewalls
FirewallsFirewalls
Firewalls
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Server
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
 
Firewall and It's Types
Firewall and It's TypesFirewall and It's Types
Firewall and It's Types
 
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
 
Divyanshu.pptx
Divyanshu.pptxDivyanshu.pptx
Divyanshu.pptx
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
 
Improving Firewall Performance by Eliminating Redundancies In Access Control ...
Improving Firewall Performance by Eliminating Redundancies In Access Control ...Improving Firewall Performance by Eliminating Redundancies In Access Control ...
Improving Firewall Performance by Eliminating Redundancies In Access Control ...
 
what is firewall in information security?
what is firewall in information security?what is firewall in information security?
what is firewall in information security?
 
Information Security (Firewall)
Information Security (Firewall)Information Security (Firewall)
Information Security (Firewall)
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Firewall Fundamentals and Concepts

  • 1.
  • 4. + = But does fire + wall =firewall ??? Is this definition correct?? Well not exactly 
  • 5. Finally, welcome to last presentation of the 8th SEM CSE
  • 6. FIREWALLS Presented by- 1) Rohit Phulsunge 2) Satyendra Singh Naruka 3) Saurabh Maheswari 4) Sameer Pathak 5) Sandeep Suryawanshi
  • 7. So what exaclty is a firewall??  A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.
  • 8. A diagram showing where a firewall can be placed.
  • 9. History  The term firewall originally referred to a wall intended to confine a fire or potential fire within a building  Later uses refer to similar structures, such as the metal sheet separating the engine compartment of a vehicle or aircraft from the passenger compartment.
  • 10. What does firewall do?  a choke point of control and monitoring  interconnects networks with differing trust  imposes restrictions on network services ◦ only authorized traffic is allowed  auditing and controlling access ◦ can implement alarms for abnormal behavior  provide NAT & usage monitoring
  • 11. Firewall Limitations  cannot protect from attacks bypassing it ◦ E.g., sneaker net, utility modems, trusted organisations, trusted services (eg SSL/SSH)  cannot protect against internal threats ◦ eg disgruntled or colluding employees  cannot protect against transfer of all virus infected programs or files ◦ because of huge range of O/S & file types
  • 12. Firewalls – Packet Filters  simplest, fastest firewall component  foundation of any firewall system  examine each IP packet (no context) and permit or deny according to rules  hence restrict access to services (ports)  possible default policies ◦ that not expressly permitted is prohibited ◦ that not expressly prohibited is permitted 12
  • 13. Firewalls – Packet Filters 13
  • 14. Firewalls – Packet Filters 14
  • 15. Attacks on Packet Filters  IP address spoofing ◦ fake source address ◦ authenticate  source routing attacks ◦ attacker sets a route other than default ◦ block source routed packets  tiny fragment attacks ◦ split header info over several tiny packets ◦ either discard or reassemble before check 15
  • 16. Firewalls – Stateful Packet Filters  traditional packet filters do not examine higher layer context ◦ i.e., matching return packets with outgoing flow  stateful packet filters address this need  they examine each IP packet in context ◦ keep track of client-server sessions ◦ check each packet validly belongs to one  they are better able to detect bogus packets out of context 16
  • 17. TYPES OF FIREWALLS  Packet filtering Router  Application level gateway  Circuit level gateway 17
  • 18. Packet filtering Router Apply set of rules to IP packet *Rules for network packet  Source IP Address  Destination IP Address  Source & Destination transport level address  IP protocol field  Interface 18
  • 19. Application Level Gateway  have application specific gateway / proxy  has full access to protocol ◦ user requests service from proxy ◦ proxy validates request as legal ◦ then actions request and returns result to user ◦ can log / audit traffic at application level 19
  • 21. Firewalls - Circuit Level Gateway  relays two TCP connections  imposes security by limiting what such connections are allowed  once created usually relays traffic without examining contents  typically used when trust internal users by allowing general outbound connections 21
  • 22. Firewalls - Circuit Level Gateway 22
  • 23. Bastion Host  highly secure host system  runs circuit / application level gateways  or provides externally accessible services  potentially exposed to "hostile" elements  hence is secured to withstand this ◦ hardened O/S, essential services, extra auth 23
  • 27. Access Control  determines what resources users can access  general model is that of access matrix with ◦ subject - active entity (user, process) ◦ object - passive entity (file or resource) ◦ access right – way object can be accessed  can decompose by ◦ columns as access control lists ◦ rows as capability tickets 27
  • 29. Trusted Computer Systems  information security is increasingly important  have varying degrees of sensitivity of information ◦ military info classifications: confidential, secret, etc  subjects (people or programs) have varying rights of access to objects (information)  known as multilevel security ◦ subjects have maximum & current security level ◦ objects have a fixed security level classification  want to consider ways of increasing confidence in systems to enforce these 29
  • 30. Bell LaPadula (BLP) Model  has two key policies:  no read up (simple security property) ◦ a subject can only read an object if the current security level of the subject dominates (>=) the classification of the object  no write down (*-property) ◦ a subject can only append/write to an object if the current security level of the subject is dominated by (<=) the classification of the object 30
  • 32. Summary  have considered: ◦ firewalls ◦ types of firewalls ◦ configurations ◦ access control ◦ trusted systems 32