firewall planning and design - 2profs.net2profs.net/steve/cisntwk441/05.pdf · 2018-11-05 ·...

58
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs 2 nd ed Intrusion Detection and VPNs, 2 ed. 5 5 Firewall Planning and Design By Whitman, Mattord & Austin © 2008 Course Technology

Upload: others

Post on 19-Apr-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs 2nd ed Intrusion Detection and VPNs, 2 ed.

55Firewall Planning g

and Design

By Whitman, Mattord & Austin © 2008 Course Technology

Page 2: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Learning Objectivesg j

♦ Identify common misconceptions about firewallsy p♦ Explain why a firewall is dependent on an

effective security policy♦ Discuss what a firewall does♦ Describe the types of firewall protectionyp p♦ Identify the limitations of firewalls♦ Evaluate and recommend suitable hardware♦ Evaluate and recommend suitable hardware

and software for a firewall application

Slide 2Firewalls & Network Security, 2nd ed. - Chapter 5

Page 3: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Introduction

♦ Networks that connect to the Internet for communications or commerce are perceived as being particularly vulnerable

♦ Firewalls and associated technical controls have become fundamental security tool

♦ No security system can ensure with absolute certainty protection of all an organization’s information all the timeinformation all the time

♦ However, firewalls are one of the most effective security tools network administrator has

Firewalls & Network Security, 2nd ed. - Chapter 5 Slide 3

security tools network administrator has

Page 4: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Misconceptions about Firewallsp

♦ Misconception– Designed to prevent all hackers, viruses, and

would-be intruders from enteringR lit♦ Reality– Enable authorized traffic to pass through

Bl k th i d t ffi– Block unauthorized traffic♦ Misconception

O d l d fi ll t th i– Once deployed, firewalls operate on their own♦ Reality

W k b t h t f D f i D th– Work best when part of Defense in Depth– Need constant maintenance

Slide 4Firewalls & Network Security, 2nd ed. - Chapter 5

Page 5: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Firewalls Explainedp

♦ Firewall is anything, hardware or software, that y g, ,monitors transmission of packets of digital information that attempt to pass the perimeter of a network

♦ Firewalls perform two basic security functions:– Packet filtering– Application proxy

Slide 5Firewalls & Network Security, 2nd ed. - Chapter 5

Page 6: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Firewall at the Perimeter

Slide 6Firewalls & Network Security, 2nd ed. - Chapter 5

Page 7: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Firewall Security Featuresy

Some firewall manufacturers add features like:♦ Logging unauthorized accesses into/out of a

network♦ Providing VPN link to another network♦ Authenticating usersg♦ Shielding hosts inside the network from hackers♦ Caching data♦ Caching data♦ Filtering content considered inappropriate or

dangerousg

Slide 7Firewalls & Network Security, 2nd ed. - Chapter 5

Page 8: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Firewall User Protection

♦ Keep viruses from infecting filesp g♦ Prevent Trojan horses from entering system

through back doors

Slide 8Firewalls & Network Security, 2nd ed. - Chapter 5

Page 9: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Firewall Network Perimeter Securityy

♦ Perimeter is a boundary between two zones of ytrust; Common to install firewall at this boundary to inspect and control traffic that flows across it

♦ Extranet can extended network to third party, like business partner; If extranet operates over VPN VPN h ld h it i tVPN, VPN should have its own perimeter firewall

♦ To be really secure a firewall should be♦ To be really secure, a firewall should be installed on partner’s VPN host

Firewalls & Network Security, 2nd ed. - Chapter 5 Slide 9

Page 10: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

VPN Perimeter

Slide 10Firewalls & Network Security, 2nd ed. - Chapter 5

Page 11: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Firewall Componentsp

♦ Packet filter♦ Proxy server♦ Authentication system♦ Software that performs Network Address

Translation (NAT)S fi ll♦ Some firewalls:– Can encrypt traffic

Help establish VPNs– Help establish VPNs– Come packaged in a hardware device that also

functions as a router– Make use of a bastion host

Slide 11Firewalls & Network Security, 2nd ed. - Chapter 5

Page 12: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

DMZ Networks

Slide 12Firewalls & Network Security, 2nd ed. - Chapter 5

Page 13: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Firewall Security Tasksy

♦ Restrict access from outside networks using gpacket filtering– Firewall that does packet filtering protects

networks from port scanning attacks– Port numbers come in two flavors: well known

ports (1023 and belo ) defined for most commonports (1023 and below) defined for most common services and ephemeral ports (1024 through 65535))

– Exposed network services are one of the biggest vulnerabilities that firewalls can protect against

Slide 13Firewalls & Network Security, 2nd ed. - Chapter 5

Page 14: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Firewall Security Tasks (continued)y ( )

♦ Restrict unauthorized access from inside network (eg, social engineering)– Firewalls can help prevent some, but not all,

internal threats– Firewall can be configured to recognize packets

or to pre ent access to protected files fromor to prevent access to protected files from internal as well as external hosts

Slide 14Firewalls & Network Security, 2nd ed. - Chapter 5

Page 15: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Firewall Security Tasks (continued)y ( )

♦ Give clients limited access to external hosts by yacting as proxy server– Firewalls can selectively permit traffic to go from

inside the network to the Internet or other networks to provide more precise control of how employees inside the network use externalemployees inside the network use external resources

– Application proxies can restrict internal users pp pwho want to gain unrestricted access to the Internet

Firewalls & Network Security, 2nd ed. - Chapter 5 Slide 15

Page 16: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Firewall Security Tasks (continued)y ( )

♦ Protecting critical resources against attacks (eg, worms, viruses, Trojan horses, and DDoS attacks)

A li t it lf h i– A worm can replicate itself whereas a virus requires a software environment in order to run on a computer, infect it and then spreado a co pu e , ec a d e sp ead

– Trojan horses contain malicious code that is hidden inside supposedly harmless programs

– Distributed denial of service (DDoS) attacks flood a server with requests coming from many diff t t ll d b tt kdifferent sources controlled by an attacker

Slide 16Firewalls & Network Security, 2nd ed. - Chapter 5

Page 17: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Firewall Security Tasks (continued)y ( )

♦ Protect against hacking, which can affect:– Loss of data– Loss of time– Staff resources– Confidentiality

Firewalls & Network Security, 2nd ed. - Chapter 5 Slide 17

Page 18: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Firewall Security Tasks (continued)y ( )

♦ Provide centralization♦ Enable documentation to:

– Identify weak points in security system so it can y p y ybe strengthened

– Identify intruders so they can be apprehended♦ Provide for authentication♦ Contribute to a VPN

Slide 18Firewalls & Network Security, 2nd ed. - Chapter 5

Page 19: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Types of Firewall Protectionyp

♦ Multilayer firewall protectiony p

Slide 19Firewalls & Network Security, 2nd ed. - Chapter 5

Page 20: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Types of Firewall Protection (continued)(continued)♦ Packet filteringg

– Packet filtering firewalls scan network data packets looking for compliance with, or violation of, rules of firewall’s database

– Restrictions most commonly implemented in packet filtering firewalls are based on:filtering firewalls are based on:

• IP source and destination address• Direction (inbound or outbound)Direction (inbound or outbound)• TCP or UDP source and destination port

Firewalls & Network Security, 2nd ed. - Chapter 5 Slide 20

Page 21: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Packet Filtering Routerg

Firewalls & Network Security, 2nd ed. - Chapter 5 Slide 21

Page 22: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Stateless Packet Filteringg

♦ Firewall inspects packet headers without paying p p p y gattention to state of connection between server and client computer

♦ Packet is blocked based on information in header

♦ Also called stateless inspection

Slide 22Firewalls & Network Security, 2nd ed. - Chapter 5

Page 23: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Stateful Packet Filteringg

♦ Examines data contained in packet; superior to p ; pstateless inspection

♦ Keeps memory of state of connection between client and server in disk cache

♦ Detects and drops packets that overload server♦ Blocks packets sent by host not connected to

server♦ Also called stateful inspection

Slide 23Firewalls & Network Security, 2nd ed. - Chapter 5

Page 24: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

State Table Entries

Slide 24Firewalls & Network Security, 2nd ed. - Chapter 5

Page 25: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Packet Filtering Rulesg

Common Rules include:♦ Any outbound packet:

– Must have source address in internal network– Must not have destination address in internal

network♦ Any inbound packet:

– Must not have source address in internal network– Must have destination address in internal

network

Slide 25Firewalls & Network Security, 2nd ed. - Chapter 5

Page 26: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Packet Filtering Rules (continued)g ( )

♦ Any packet that enters/leaves your network y p ymust have source/destination address that falls within range of addresses in your network

♦ Include the use of:– Internet Control Message Protocol (ICMP)– User Datagram Program (UDP)– TCP filtering– IP filtering

Slide 26Firewalls & Network Security, 2nd ed. - Chapter 5

Page 27: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Using Multiple Packet Filters in a DMZg p

Slide 27Firewalls & Network Security, 2nd ed. - Chapter 5

Page 28: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

PAT and NAT

♦ Function as network-level proxy; converts IP p y;addresses of internal hosts to IP address assigned by firewall– PAT uses one external address for all internal

systems, assigning random and high-order port numbers to each internal computernumbers to each internal computer

– NAT uses pool of valid external IP addresses, assigning one of these actual addresses to eachassigning one of these actual addresses to each internal computer requesting an outside connection

Firewalls & Network Security, 2nd ed. - Chapter 5 Slide 28

Page 29: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

PAT and NAT (continued)( )

♦ Hide TCP/IP information of hosts in the network being protected, preventing hackers from getting address of actual host

Slide 29Firewalls & Network Security, 2nd ed. - Chapter 5

Page 30: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

PAT and NAT (continued)( )

Slide 30Firewalls & Network Security, 2nd ed. - Chapter 5

Page 31: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Application Layer Gatewayspp y y

♦ Can control how applications inside the network access the outside world by setting up proxy services

♦ Act as substitute for the client; shield individual♦ Act as substitute for the client; shield individual users from directly connecting with the Internet

♦ Provide a valuable security benefit:♦ Provide a valuable security benefit:– Understand contents of requested data– Can be configured to allow or deny specific g y p

content♦ Also called a proxy server

Slide 31Firewalls & Network Security, 2nd ed. - Chapter 5

Page 32: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Application-Level Security Techniquespp y q

♦ Load balancingg♦ IP address mapping♦ Content filtering♦ Content filtering♦ URL filtering

Slide 32Firewalls & Network Security, 2nd ed. - Chapter 5

Page 33: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Firewall Categorization Methodsg

♦ Firewalls can be categorized by:g y– processing mode– development erap– intended structure

Slide 33Firewalls & Network Security, 2nd ed. - Chapter 5

Page 34: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Firewall Categories: Processing Modeg g

♦ The processing modes are:p g– Packet filtering– Application gatewayspp g y– Circuit gateways– MAC layer firewalls– Hybrids

Slide 34Firewalls & Network Security, 2nd ed. - Chapter 5

Page 35: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Packet Filteringg

♦ As described earlier, packet filtering firewalls examine header information of data packetsexamine header information of data packets

♦ Three subsets of packet filtering firewalls:– Static Filtering: requires that filtering rules g q g

governing how firewall decides which packets are allowed and which are denied are developed and installedD i Filt i ll fi ll t t t– Dynamic Filtering: allows firewall to react to an emergent event and update or create rules to deal with eventSt t f l I ti k t k f h t k– Stateful Inspection: keeps track of each network connection between internal and external systems using a state table

Slide 35Firewalls & Network Security, 2nd ed. - Chapter 5

Page 36: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Application Gateways pp y

♦ Frequently installed on a dedicated computerq y p♦ Also known as application-level firewall, proxy

server or application firewall

Slide 36Firewalls & Network Security, 2nd ed. - Chapter 5

Page 37: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Circuit Gatewaysy

♦ Operates at the transport layerp p y♦ Connections authorized based on addresses♦ Like filtering firewalls, do not usually look at data♦ Like filtering firewalls, do not usually look at data

traffic flowing between one network and another, but do prevent direct connections between one network and another

♦ Accomplish this by creating tunnels connecting specific processes or systems on each side of firewall, then allow only authorized traffic, such as a specific type of TCP connection for onlyas a specific type of TCP connection for only authorized users, in these tunnels

Slide 37Firewalls & Network Security, 2nd ed. - Chapter 5

Page 38: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

MAC Layer Firewallsy

♦ Designed to operate at the media access g pcontrol layer of the OSI network model

♦ This gives these firewalls the ability to consider specific host computer’s identity in its filtering decisions

♦ Using this approach, MAC addresses of specific host computers are linked to ACL entries that identify specific types of packets that can beidentify specific types of packets that can be sent to each host, and all other traffic is blocked

Slide 38Firewalls & Network Security, 2nd ed. - Chapter 5

Page 39: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Firewalls in the OSI ModelFirewalls in the OSI Model

Slide 39Firewalls & Network Security, 2nd ed. - Chapter 5

Page 40: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Hybrid Firewalls y

♦ Combine elements of other types of firewalls—ypthat is, elements of packet filtering and proxy services, or of packet filtering and circuit gateways

♦ Alternately, hybrid firewall system may actually i t f t t fi ll d i hconsist of two separate firewall devices; each a

separate firewall system, but connected so they work in tandemwork in tandem

Slide 40Firewalls & Network Security, 2nd ed. - Chapter 5

Page 41: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Firewall Categories: Development GenerationGeneration♦ First generation: static packet filtering firewalls g p g♦ Second generation: application-level firewalls or

proxy servers♦ Third generation: stateful inspection firewalls♦ Fourth generation: dynamic packet filtering g y p g

firewalls♦ Fifth generation: kernel proxies

Slide 41Firewalls & Network Security, 2nd ed. - Chapter 5

Page 42: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Firewall Categories: Structureg

♦ Firewall appliances stand-alone, self-contained pp ,systems

♦ Commercial-grade firewall system consists of firewall application software running on a general-purpose computer

♦ SOHO or residential-grade firewall devices connect user’s local area network or a specific computer system to the Internet devicecomputer system to the Internet device

♦ Residential-grade firewall software is installed directly on user’s systemdirectly on user s system

Slide 42Firewalls & Network Security, 2nd ed. - Chapter 5

Page 43: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

SOHO Firewall Devices

Slide 43Firewalls & Network Security, 2nd ed. - Chapter 5

Page 44: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Software vs. Hardware: The SOHO Firewall DebateThe SOHO Firewall Debate♦ Which type of firewall should a residential user yp

implement?♦ Where would you rather defend against a

hacker?♦ With software option, hacker is inside your

computer♦ With hardware device, even if hacker manages

to crash the firewall system, your computer and information are still safely behind the now disabled connectiondisabled connection

Slide 44Firewalls & Network Security, 2nd ed. - Chapter 5

Page 45: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Firewall Architectures

♦ Each of the firewall devices noted earlier can be configured in a number of architectures

♦ Architecture that works best for a particular organization depends on:organization depends on:– objectives of the network– organization’s ability to develop and implement g y p p

the architectures– budget available for the function

Slide 45Firewalls & Network Security, 2nd ed. - Chapter 5

Page 46: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Firewall Architectures (continued)( )

♦ Hundreds of variations exist, but four common architectural implementations of firewalls dominate:– packet filtering routerspacket filtering routers– screened host firewalls– dual-homed firewalls– screened subnet firewalls

Firewalls & Network Security, 2nd ed. - Chapter 5 Slide 46

Page 47: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Packet Filtering Routersg

♦ Most organizations with an Internet connection have a router as the interface to the Internet at the perimeter

♦ Many of these routers can be configured to♦ Many of these routers can be configured to reject packets the organization does not allow into the network

♦ Drawbacks to this type of system include a lack of auditing and strong authentication, and the complexity of the access control lists used tocomplexity of the access control lists used to filter the packets can grow and degrade network performance

Slide 47Firewalls & Network Security, 2nd ed. - Chapter 5

Page 48: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Screened Host Firewalls

♦ Combines packet filtering router with separate, p g p ,dedicated firewall - like application proxy server

♦ Application proxy examines application layer protocol and performs proxy services

♦ This separate host is often referred to as a bastion host or sacrificial host; it can be a rich target for external attacks, and should be very thoroughly securedthoroughly secured

Slide 48Firewalls & Network Security, 2nd ed. - Chapter 5

Page 49: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Screened Host Architecture

Slide 49Firewalls & Network Security, 2nd ed. - Chapter 5

Page 50: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Dual-Homed Host Firewalls

♦ Bastion host contains two NICs: one connected to external network, and one connected to internal network

♦ Implementation of this architecture often makes use of NAT - mapping assigned IP addresses to

i l f t bl i t l IPspecial ranges of non-routable internal IP addresses, creating yet another barrier to intrusion from external attackersintrusion from external attackers

Slide 50Firewalls & Network Security, 2nd ed. - Chapter 5

Page 51: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Dual-Homed Host Architecture

Slide 51Firewalls & Network Security, 2nd ed. - Chapter 5

Page 52: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Screened Subnet Firewalls (with DMZ)( )

♦ Dominant architecture used today♦ Common arrangement consists of two or more

internal bastion hosts behind a packet filtering router, with each host protecting the trusted p gnetwork:– Connections from outside or untrusted network

are routed through an external filtering routerg g– Connections from outside or untrusted network

are routed into—and then out of—a routing firewall to separate network segment known as th DMZthe DMZ

– Connections into trusted internal network are allowed only from the DMZ bastion host servers

Slide 52Firewalls & Network Security, 2nd ed. - Chapter 5

Page 53: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Screened Subnet Firewalls (with DMZ) (continued)(continued)♦ Screened subnet is an entire network segment

that performs two functions:that performs two functions:– protects DMZ systems and information from

outside threats by providing a network of intermediate securityintermediate security

– protects internal networks by limiting how external connections can gain access to internal systemssystems

♦ DMZs can also create extranets - segments of the DMZ where additional authentication and authorization controls are put into place toauthorization controls are put into place to provide services that are not available to the general public

Firewalls & Network Security, 2nd ed. - Chapter 5 Slide 53

Page 54: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Screened Subnet (with DMZ)( )

Slide 54Firewalls & Network Security, 2nd ed. - Chapter 5

Page 55: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Limitations of Firewalls

♦ Should be part of an overall security plan, not p y p ,the only form of protection for a network

♦ Should be used in conjunction with other forms of protection (eg, ID cards, passwords, employee rules of conduct)

Slide 55Firewalls & Network Security, 2nd ed. - Chapter 5

Page 56: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Chapter Summaryp y

♦ Network security is a process that imposes y p pcontrols on network resources to balance risks and rewards from network usage

♦ Firewall: anything that filters data packet transmission as it crosses network boundaries– perform two basic security functions: packet

filtering and/or application proxyingcan contain many components including packet– can contain many components, including packet filter, proxy server, authentication system, and software

– some can encrypt traffic, help establish VPNsSlide 56Firewalls & Network Security, 2nd ed. - Chapter 5

Page 57: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Chapter Summary (continued)p y ( )

♦ Packet-filtering firewall: stateless or statefulg♦ Stateless packet filtering ignores connection

state between internal and external computer♦ Stateful packet filtering examines packet data

with memory of connection state between hosts♦ Port Address Translation (PAT) and Network

Address Translation (NAT) are addressing methods that hide internal network addresses

♦ Application layer gateways (proxy servers) t l h i t l t k li ticontrol how internal network applications access

external networks by setting up proxy servicesFirewalls & Network Security, 2nd ed. - Chapter 5 Slide 57

Page 58: Firewall Planning and Design - 2PROFS.NET2profs.net/steve/CISNTWK441/05.pdf · 2018-11-05 · specific processes or systems on each side of firewall, then allow only authorized traffic,

Chapter Summary (continued)p y ( )

♦ Firewalls can be categorized by:g y– Processing mode: packet filtering, application

gateway, circuit gateway, MAC layer, hybrid– Generation: level of technology; later ones being

more complex and more recently developedSt t id ti l i l d– Structure: residential- or commercial-grade, hardware-, software- or appliance-based

♦ Four common architectural implementations of♦ Four common architectural implementations of firewalls: packet filtering routers, screened host firewalls, dual-homed firewalls, screened subnetfirewalls, dual homed firewalls, screened subnet firewalls

Firewalls & Network Security, 2nd ed. - Chapter 5 Slide 58