2. Characteristics
Design Goals Techniques used in Firewall
All traffic must pass through the firewall.
Only authorised traffic will be allowed to pass.
The firewall itself immune to penetration.
1. Service control.
2. Direction Control.
3. User Control.
4. Behaviour Control.
3. Characteristics
Capabilities of the Firewall
Keeps unauthorised users out of the protected network.
Simplify security mechanism due to single choke point.
Provides a location to monitor security related events.
Can serve as the platform for IPSec.
4. Characteristics
Limitations of the Firewall
Cannot protects against the attacks that bypass the firewall.
It does not protects against internal threats.
Cannot protects against the transfer of virus-infected programs or files.
8. Packet Filtering Router
Applies a set of rules to each packet
Rules are based on
Source IP address
Destination IP address
Source and destination transport level address
IP protocol field
Interface
Default= discard
That which is not expressly
permitted is prohibited.
Default= forward
That which is not expressly
prohibited is permitted.
9. Packet Filtering Router
Allows all packets whose destination is port 1414
ACTION-ALLOW PORT-1414
Allows all packets from the 9.117.249.0 network
ACTION-ALLOW FROM-9.117.249.0/24
Denies all ICMP packets that are type 8, except those from the 9.117.249.0 network
ACTION-DENY PROTO-ICMP ICMPTYPE-8
Rejects all other packets.
DEFAULT-REJECT
10. Packet Filtering Router
Weaknesses of Packet Filtering Firewall
Do not examine upper layer data.
Logging functionality is limited.(source/dest address, traffic type).
Do not support advanced user authentication scheme.
Vulnerable to “network layer spoofing” attack
12. Application Level Gateway
• have application specific gateway / proxy
• has full access to protocol
• user requests service from proxy
• proxy validates request as legal
• then actions request and returns result to user
• can log / audit traffic at application level
• need separate proxies for each service
• some services naturally support proxying
• others are more problematic
13. Circuit Level Gateway
• relays two TCP connections
• imposes security by limiting what such connections are allowed
• once created usually relays traffic without examining contents
• typically used when trust internal users by allowing general outbound
connections
18. Data Access Control
Access Matrix:
Subject: An entity capable of accessing objects.
Object: Anything to which the access is controlled.
Access Right: The way in which an object is accessed by subject.
20. Concept of Trusted Systems
It is required to protect data or resources on the basis of level of security.
Multilevel Security:
Subject at a higher level may not convey information to a subject at
lower layer.
No Read Up
(Simple Security Property)
A subject can only read an
object of less of equal
security level
No Write Down
(* - Property)
A subject can only write into
an object of greater or
equal security level
21. Concept of Trusted Systems
Reference Monitor
It is an controlling element in the hardware and operating system of a
computer that regulates the access of subjects to objects on the basis of
security parameters of subjects and objects.
Complete Mediation
The security rules are
enforced on every access.
Isolation
The reference monitor and database are
protected from unauthorized modification
Verifiability
The reference monitor’s correctness must be provable.
Properties