SlideShare a Scribd company logo
Firewalls
What is a Firewall? A firewall is a hardware or software (or a combination of hardware and software) that monitors the transmission of packets of digital information that attempt to pass through the perimeter of a network. It is an effective means of protecting a local system or n/w from n/w related security threats
Firewall design goals All traffic from inside or outside must pass through the firewall Only authorized traffic as defined by the local security policy, will be allowed to pass The firewall itself is immune to penetration
Type of controls Service control Direction control User control Behavior control
Firewall capabilities FW defines a single choke point  Provides a location for monitoring security-related events Handles network related events Serves as a platform for IPSec
Firewall Limitations cannot protect from attacks bypassing it cannot protect against internal threats eg disgruntled employee cannot protect against transfer of all virus infected programs or files because of huge range of O/S & file types
Types of Firewalls Packet Filters Application-Level Gateways Circuit-Level Gateways
Packet Filters
Packet Filters A packet filtering router applies a set of rules to each incoming IP packet and then forwards or discards the packet.  The router is typically configured to filter packets going in both directions (from and to the internal network).  possible default policies Discard Forward
Packet-Filtering Examples Connection to our SMTP port * * 25 OUR-GW Allow We don’t trust these people * SPIGOT * * Block comment Port  Theirhost Port Ourhost Action
default * * * * Block comment Port  Theirhost Port Ourhost Action Connection to their SMTP 25 * * * Allow comment Port  Theirhost Port Ourhost Action
Attacks on Packet Filters IP address spoofing fake source address (internal) add filters on router to block (external interface) source routing attacks attacker sets a route other than default block source routed packets tiny fragment attacks split header info over several tiny packets either discard or reassemble before check
Advantages Simple Transparent to users Very fast Disadvantages Rule generation is difficult Lack of authentication
Application Level  Gateway (Proxy  server) Internal host (private n/w) Application level GW Inside connection External host (part of internet) Outside connection User’s illusion (HTTP,FTP,TELNET,SMTP)
Purpose - monitor every connection - provide end-to-end connection Advantage - more secure than packet filter Disadvantage Additional processing overhead on each connections
Circuit Level Gateway out out out in in in Inside host  Inside connection  Outside host  Outside connection  Circuit-level gateway
Circuit Level Gateway Relays two TCP connections Imposes security by limiting which such connections are allowed Once created usually relays traffic without examining contents Typically used when trust internal users by allowing general outbound connections Example: SOCKS package
Bastian Host It is a critical strong point in the network security A Bastian host is a system which contains either application-level or circuit-level GW or both  Only the services that the n/w administrator considers essential are installed on the bastion host. These include proxies such as Telnet, DNS, FTP, SMTP and user authentication. It executes secure version of it OS
Characteristics Most secured OS is included Essential services are included Requires additional authentication of user Configured to support a subset of applications Maintains detailed audit log Allow access only to specific host system Each proxy module is a very small s/w pkg sepcifically designed for n/w security Each proxy is independent of other proxies on the bastion hosts
Firewall Configurations
Screened host firewall, single-homed bastion configuration Firewall consists of two systems: A packet-filtering router A bastion host Configuration for the packet-filtering router: Only packets from and to the bastion host are allowed to pass through the router The bastion host performs authentication and proxy functions
Greater security than single configurations because of two reasons: This configuration implements both packet-level and application-level filtering (allowing for flexibility in defining security policy) An intruder must generally penetrate two separate systems This configuration also affords flexibility in providing direct Internet access (public information server, e.g. Web server)
 
Screened host firewall, dual-homed bastion configuration If the packet filtering router is compromised, traffic can’t flow directly through the router between Internet and other hosts on the private network. Traffic between the Internet and other hosts on the private network has to flow through the bastion host
 
Screened subnet firewall configuration Most secure configuration of the three Two packet-filtering routers are used Creation of an isolated sub-network
Advantages The outside router advertises only the existence of the screened subnet to the internet The inside router advertises only the existence of the screened subnet to the internal network
Trusted Systems One way to enhance the ability of a system to defend against intruders and malicious programs is to implement trusted system technology
Data Access Control Through the user access control procedure (log on), a user can be identified to the system Associated with each user, there can be a profile that specifies permissible operations and file accesses The operation system can enforce rules based on the user profile
General models of access control: Access matrix Access control list Capability list
Access Control Matrix
Access Matrix: Basic elements of the model Subject:  An entity capable of accessing objects (process) Object:  Anything to which access is controlled (e.g. files, programs) Access right:  The way in which an object is accessed by a subject (e.g. read, write, execute)
Access control list Decomposition of the matrix by columns Access control list for  Segment B: Process2(Read) Access control list for  Segment A: Process1(Read,Write) Access control list for  program1: Process1(Read,Executre)
Access Control List An access control list lists users and their permitted access right
Capability list Decomposition of the matrix by rows Capability list for  process2: Segment B (Read)  Capability list for  process1: Program1(Read,Executre) Segment A (Read, Write)
Capability list A capability ticket specifies authorized objects and operations for a user. Each user have a number of tickets

More Related Content

PPT
Firewals in Network Security NS10
PPTX
Cyber Security - Firewall and Packet Filters
PPT
Introduction to firewalls
PPTX
Firewall Design and Implementation
PPTX
Firewall and its Types
PPTX
Firewall
PPTX
Firewalls
PDF
E firewalls
Firewals in Network Security NS10
Cyber Security - Firewall and Packet Filters
Introduction to firewalls
Firewall Design and Implementation
Firewall and its Types
Firewall
Firewalls
E firewalls

What's hot (19)

PPTX
Firewall and It's Types
PPT
firewalls
PPTX
Firewall
PPT
Intoduction to Network Security NS1
PPT
Firewalls
PPTX
Firewall in Network Security
PPTX
Trusted systems1
PPTX
Dealing with legacy code
PPTX
Firewall and its types and function
PPTX
PPTX
A walk through Windows firewall and Netsh commands
PPT
Firewall Management: What Is It?
PDF
Ch 13: Network Protection Systems
PPTX
Web application security part 01
DOCX
PPT
PPT
Firewall
PDF
Ch 6: Enumeration
PPS
Internetworking With Pix Firewall
Firewall and It's Types
firewalls
Firewall
Intoduction to Network Security NS1
Firewalls
Firewall in Network Security
Trusted systems1
Dealing with legacy code
Firewall and its types and function
A walk through Windows firewall and Netsh commands
Firewall Management: What Is It?
Ch 13: Network Protection Systems
Web application security part 01
Firewall
Ch 6: Enumeration
Internetworking With Pix Firewall
Ad

Viewers also liked (6)

DOCX
Resume - Amogh
PPTX
Manish Birthday
DOCX
HITENDRA AHIR_BA
PPT
Anvesh
PPTX
Does Grey Matter? (Prelims)
PPTX
Resume - Amogh
Manish Birthday
HITENDRA AHIR_BA
Anvesh
Does Grey Matter? (Prelims)
Ad

Similar to Firewall Modified (20)

PPT
Firewalls
PPTX
CN. Presentation for submitting project term pptx
PPTX
Firewall presentation
PDF
[9] Firewall.pdf
PPTX
PPT
Unit II Chapter 6 firewalls.ppt
PPTX
Firewalls by Puneet Bawa
PPTX
firewall
PPT
firewalls.ppt
PPTX
Firewall basics - types,architecture ,defination
PPTX
Lec # 13 Firewall.pptx
PDF
PPTX
PPT
Firewall
PPT
Firewalls (1056778990099000000000000).ppt
PPTX
firrewall and intrusion prevention system.pptx
PPT
Ch05 Network Defenses
PPT
Introduction to Firewalls and functions.ppt
Firewalls
CN. Presentation for submitting project term pptx
Firewall presentation
[9] Firewall.pdf
Unit II Chapter 6 firewalls.ppt
Firewalls by Puneet Bawa
firewall
firewalls.ppt
Firewall basics - types,architecture ,defination
Lec # 13 Firewall.pptx
Firewall
Firewalls (1056778990099000000000000).ppt
firrewall and intrusion prevention system.pptx
Ch05 Network Defenses
Introduction to Firewalls and functions.ppt

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PPT
Teaching material agriculture food technology
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Machine Learning_overview_presentation.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Approach and Philosophy of On baking technology
PPTX
MYSQL Presentation for SQL database connectivity
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Spectroscopy.pptx food analysis technology
Machine learning based COVID-19 study performance prediction
Teaching material agriculture food technology
Spectral efficient network and resource selection model in 5G networks
Machine Learning_overview_presentation.pptx
A comparative analysis of optical character recognition models for extracting...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
A Presentation on Artificial Intelligence
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation_ Review paper, used for researhc scholars
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Network Security Unit 5.pdf for BCA BBA.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Approach and Philosophy of On baking technology
MYSQL Presentation for SQL database connectivity
“AI and Expert System Decision Support & Business Intelligence Systems”
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Spectroscopy.pptx food analysis technology

Firewall Modified

  • 2. What is a Firewall? A firewall is a hardware or software (or a combination of hardware and software) that monitors the transmission of packets of digital information that attempt to pass through the perimeter of a network. It is an effective means of protecting a local system or n/w from n/w related security threats
  • 3. Firewall design goals All traffic from inside or outside must pass through the firewall Only authorized traffic as defined by the local security policy, will be allowed to pass The firewall itself is immune to penetration
  • 4. Type of controls Service control Direction control User control Behavior control
  • 5. Firewall capabilities FW defines a single choke point Provides a location for monitoring security-related events Handles network related events Serves as a platform for IPSec
  • 6. Firewall Limitations cannot protect from attacks bypassing it cannot protect against internal threats eg disgruntled employee cannot protect against transfer of all virus infected programs or files because of huge range of O/S & file types
  • 7. Types of Firewalls Packet Filters Application-Level Gateways Circuit-Level Gateways
  • 9. Packet Filters A packet filtering router applies a set of rules to each incoming IP packet and then forwards or discards the packet. The router is typically configured to filter packets going in both directions (from and to the internal network). possible default policies Discard Forward
  • 10. Packet-Filtering Examples Connection to our SMTP port * * 25 OUR-GW Allow We don’t trust these people * SPIGOT * * Block comment Port Theirhost Port Ourhost Action
  • 11. default * * * * Block comment Port Theirhost Port Ourhost Action Connection to their SMTP 25 * * * Allow comment Port Theirhost Port Ourhost Action
  • 12. Attacks on Packet Filters IP address spoofing fake source address (internal) add filters on router to block (external interface) source routing attacks attacker sets a route other than default block source routed packets tiny fragment attacks split header info over several tiny packets either discard or reassemble before check
  • 13. Advantages Simple Transparent to users Very fast Disadvantages Rule generation is difficult Lack of authentication
  • 14. Application Level Gateway (Proxy server) Internal host (private n/w) Application level GW Inside connection External host (part of internet) Outside connection User’s illusion (HTTP,FTP,TELNET,SMTP)
  • 15. Purpose - monitor every connection - provide end-to-end connection Advantage - more secure than packet filter Disadvantage Additional processing overhead on each connections
  • 16. Circuit Level Gateway out out out in in in Inside host Inside connection Outside host Outside connection Circuit-level gateway
  • 17. Circuit Level Gateway Relays two TCP connections Imposes security by limiting which such connections are allowed Once created usually relays traffic without examining contents Typically used when trust internal users by allowing general outbound connections Example: SOCKS package
  • 18. Bastian Host It is a critical strong point in the network security A Bastian host is a system which contains either application-level or circuit-level GW or both Only the services that the n/w administrator considers essential are installed on the bastion host. These include proxies such as Telnet, DNS, FTP, SMTP and user authentication. It executes secure version of it OS
  • 19. Characteristics Most secured OS is included Essential services are included Requires additional authentication of user Configured to support a subset of applications Maintains detailed audit log Allow access only to specific host system Each proxy module is a very small s/w pkg sepcifically designed for n/w security Each proxy is independent of other proxies on the bastion hosts
  • 21. Screened host firewall, single-homed bastion configuration Firewall consists of two systems: A packet-filtering router A bastion host Configuration for the packet-filtering router: Only packets from and to the bastion host are allowed to pass through the router The bastion host performs authentication and proxy functions
  • 22. Greater security than single configurations because of two reasons: This configuration implements both packet-level and application-level filtering (allowing for flexibility in defining security policy) An intruder must generally penetrate two separate systems This configuration also affords flexibility in providing direct Internet access (public information server, e.g. Web server)
  • 23.  
  • 24. Screened host firewall, dual-homed bastion configuration If the packet filtering router is compromised, traffic can’t flow directly through the router between Internet and other hosts on the private network. Traffic between the Internet and other hosts on the private network has to flow through the bastion host
  • 25.  
  • 26. Screened subnet firewall configuration Most secure configuration of the three Two packet-filtering routers are used Creation of an isolated sub-network
  • 27. Advantages The outside router advertises only the existence of the screened subnet to the internet The inside router advertises only the existence of the screened subnet to the internal network
  • 28. Trusted Systems One way to enhance the ability of a system to defend against intruders and malicious programs is to implement trusted system technology
  • 29. Data Access Control Through the user access control procedure (log on), a user can be identified to the system Associated with each user, there can be a profile that specifies permissible operations and file accesses The operation system can enforce rules based on the user profile
  • 30. General models of access control: Access matrix Access control list Capability list
  • 32. Access Matrix: Basic elements of the model Subject: An entity capable of accessing objects (process) Object: Anything to which access is controlled (e.g. files, programs) Access right: The way in which an object is accessed by a subject (e.g. read, write, execute)
  • 33. Access control list Decomposition of the matrix by columns Access control list for Segment B: Process2(Read) Access control list for Segment A: Process1(Read,Write) Access control list for program1: Process1(Read,Executre)
  • 34. Access Control List An access control list lists users and their permitted access right
  • 35. Capability list Decomposition of the matrix by rows Capability list for process2: Segment B (Read) Capability list for process1: Program1(Read,Executre) Segment A (Read, Write)
  • 36. Capability list A capability ticket specifies authorized objects and operations for a user. Each user have a number of tickets

Editor's Notes

  • #21: Stallings Fig 20-2.
  • #24: Stallings Fig 20-2.
  • #26: Stallings Fig 20-2.
  • #32: Stallings Fig 20-3.