SlideShare a Scribd company logo
FIREWALL ARCHITECTURES
The configuration that works best for a particular organization depends on three factors:
The objectives of the network, the organization‘s ability to develop and implement the
architectures, and the budget available for the function.
There are FOUR common architectural implementations of firewalls.These
implementations are packet filtering routers, screened host firewalls, dual-homed
firewalls,a nd screened subnet firewalls.
I. Packet Filtering Routers
Most organizations with a n Internet connections have some form of a router
as the interface to the Internet at the perimeter between the organization‘s
internal networks and the external service provider. Many of these routers can
be configured to reject packets that the organization does not allow into the
network. This is a simple but effective way to lower the organization‘s risk
from external attack. The drawbacks to this type of system include a lack of
auditing and strong authentication. Also, the complexity of the access control
lists used to filter the packets can grow and degrade network performance. Fig
6-4 is an example of this type of architecture.
II.Screened Host Firewalls
This architecture combines the packet filtering router with a separate, dedicated
firewall, such as an application proxy server. This approach allows the router to
pre-screen packets to minimize the network traffic and loads on the internal
proxy.The application proxy examines an application layer protocol, such as
HTTP, and perform the proxy services. This separate host is often referred to as a
bastion host; it can be a rich target for external attacks, and should be very
thoroughly secured.Evn though the bastion host/application proxy actually
contains only cached copies of the internal Web documents, it can still present a
promising target, because compromise of the bastion host can disclose the
configuration of internal networks and possibly provide external sources with
internal information. Since the bastion host stands as a sloe defender on the
network perimeter, it is also commonly referred to as the Sacrificial Host.
To its advantage, this configuration requires the external attack to compromise
two separate systems, before the attack can access internal data. Inthis way, the
bastion host protects the data more fully than the router alone. Fig 6-11 shows a
typical configuration of a screened host architectural approach.
III. Dual-Homed Host Firewalls
The next step up in firewall architectural complexity is the dual-homed host. When this
architectural approach is used, the bastion host contains two NICs (Network Interface
Cards) rather than one, as in the bastion host configuration. One NIC is connected to the
external network, and one is connected to the internal network, providing an additional
layer of protection. With TWO NICs , all traffic must physically go through the firewall
to move between the internal and external networks.
Implementation of this architecture often makes use of NATs. NAT is a method of
mapping real, valid, external IP addresses to special ranges of non-routable internal IP
addresses, thereby creating yet another barrier to intrusion from external attackers.
The internal addresses used by NAT consist of three different ranges. Organizations that
need Class A addresses can use the 10.x.x.x range, which has over 16.5 million usable
addresses. Organization‘s that need Class B addresses can use the 192.168.x.x range,
which has over 65,500 addresses. Finally , organiazations with smaller needs , such as
those needing onlya few Class C addresses, can use the c172.16.0.0 to 172.16.15.0 range,
which hs over 16 Class C addresses or about 4000 usable addresses.
See table 6-4 for a recap of the IP address ranges reseved fro non-public networks.
Messages sent with internal addresses within these three internal use addresses is directly
connected to the external network, and avoids the NAT server, its traffic cannot be routed
on the public network. Taking advantage of this , NAT prevents external attacks from
reaching internal machines with addresses in specified ranges.If the NAT server is a
multi-homed bastion host, it translates between the true, external IP addresses assigned to
the organization by public network naming authorities ansd the internally assigned, non-
routable IP addresses. NAT translates by dynamically assigning addresses to internal
communications and tracking the conversions with sessions to determine which incoming
message is a response to which outgoing traffic. Fig 6-12 shows a typical configuration
of a dual homed host firewall that uses NAT and proxy access to protect the internal
network.
Another benefit of a dual-homed host is its ability to translate between
many different protocols at their respective data link layers, including Ethernet , Token
Ring, Fiber Distributed Data interface (FDDI) , and Asynchronous Transfer Method
(ATM). On the downside, if this dual-homed host is compromised, it can disable the
connection to the external network, and as traffic volume increases, it can become over-
loaded. Compared to more complex solutions, however, this architecture provides strong
overall protection with minimal expense.
IV. Screened Subnet Firewalls (with DMZ)
The dominant architecture used today is the screened subnet firewall. The architecture of
a screened subnet firewall provides a DMZ. The DMZ can be a dedicated port on the
firewall device linking a single bastion host, or it can be connected to a screened subnet,
as shown in Fig 6-13. Until recently , servers providing services through an untrusted
network were commonly placed in the DMZ. Examples of these include Web servers, file
transfer protocol (FTP) servers, and certain database servers. More recent strategies using
proxy servers have provided much more secure solutions.
A common arrangement finds the subnet firewall consisting of two or more internal
bastion hosts behind a packet filtering router, with each host protecting the trusted
network. There are many variants of the screened subnet architecture. The first general
model consists of two filtering routers, with one or more dual-homed bastion hosts
between them. In the second general model, as illustrated in Fig 6-13 , the connections
are routed as follows:
1. Connections from the outside or un trusted network are routed through an
external filtering router.
2. Connections from the outside or un trusted network are routed into-and then
out of – a routing firewall to the separate network segment known as the DMZ.
3. Connections into the trusted internal network are allowed only from the
DMZ bastion host servers.
The screened subnet is an entire network segment that performs two functions: it protects
the DMZs systems and information from outside threats by providing a network of
intermediate security; and it protects the internal networks by limiting how external
connections can gain access to internal systems. Although extremely secure, the screened
subnet can be expensive to implement and complex to configure and manage. The value
of the information it protects must justify the cost.
Another facet of the DMZ is the creation of an area of known as an extranet. AN extranet
is a segment of the DMZ where additional authentication and authorization controls are
put into place to provide services that are not available to the general public. An example
would be an online retailer that allows anyone to browse the product catalog and place
items into a shopping cart, but will require extra authentication and authorization when
the customer is ready to check out and place an order.
Source : http://elearningatria.files.wordpress.com/2013/10/ise-viii-information-and-network-security-06is835-notes.pdf

More Related Content

What's hot

Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
Thang Man
 
Firewall
FirewallFirewall
Firewall
lmbriscoe
 
FireWall
FireWallFireWall
FireWall
rubal_9
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
Sabreen Irfana
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
Nisarg Amin
 
Firewall
FirewallFirewall
Firewall
Apo
 
Firewall
FirewallFirewall
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
emin_oz
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
Student
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
Nutan Kumar Panda
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
Karnav Rana
 
Firewall & its Services
Firewall & its ServicesFirewall & its Services
Firewall & its Services
Navdeep Dhingra
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
Akash R
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
Rohit Phulsunge
 
Firewalls
FirewallsFirewalls
Firewalls
junaid15bsse
 
Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
Subrata Kumer Paul
 
Data Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed FirewallData Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed Firewall
Manish Kumar
 
Windows firewall
Windows firewallWindows firewall
Windows firewall
VC Infotech
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
rajakhurram
 
Firewall
FirewallFirewall
Firewall
nayakslideshare
 

What's hot (20)

Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
 
Firewall
FirewallFirewall
Firewall
 
FireWall
FireWallFireWall
FireWall
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Firewall & its Services
Firewall & its ServicesFirewall & its Services
Firewall & its Services
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
 
Firewalls
FirewallsFirewalls
Firewalls
 
Hardware firewall
Hardware firewallHardware firewall
Hardware firewall
 
Data Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed FirewallData Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed Firewall
 
Windows firewall
Windows firewallWindows firewall
Windows firewall
 
Lecture 4 firewalls
Lecture 4 firewallsLecture 4 firewalls
Lecture 4 firewalls
 
Firewall
FirewallFirewall
Firewall
 

Viewers also liked

ReadytoFlip_Jan2017
ReadytoFlip_Jan2017ReadytoFlip_Jan2017
ReadytoFlip_Jan2017
Jackie Mo
 
Fútbol
FútbolFútbol
Fútbol
larias46
 
resume
resumeresume
resume
Monica Deitz
 
Taller práctico 10 claves tatiana katherine dell tejada
Taller práctico 10 claves tatiana katherine dell tejadaTaller práctico 10 claves tatiana katherine dell tejada
Taller práctico 10 claves tatiana katherine dell tejada
ANGIE ROJAS
 
Noticia Cientìfica Aduna
Noticia Cientìfica AdunaNoticia Cientìfica Aduna
Noticia Cientìfica Aduna
stellamg
 
CV 1-02-2017 Vijay Kumar
CV 1-02-2017 Vijay KumarCV 1-02-2017 Vijay Kumar
CV 1-02-2017 Vijay Kumar
Vijay Kumar Kamboj
 
Burton Resume
Burton ResumeBurton Resume
Burton Resume
Katherine Burton
 
Convergencia
ConvergenciaConvergencia
Convergencia
Flavio Fargas
 
UPSC CAPF 2017 Exam Dates
UPSC CAPF 2017 Exam DatesUPSC CAPF 2017 Exam Dates
UPSC CAPF 2017 Exam Dates
Singh Girish
 
Seminário Memórias de Um Suicida - Terceira Parte - Capítulo VI - O Elemento ...
Seminário Memórias de Um Suicida - Terceira Parte - Capítulo VI - O Elemento ...Seminário Memórias de Um Suicida - Terceira Parte - Capítulo VI - O Elemento ...
Seminário Memórias de Um Suicida - Terceira Parte - Capítulo VI - O Elemento ...
Cynthia Castro
 
Seminário Memórias de Um Suicida - Segunda Parte - Capítulo VI - A Cada Um Se...
Seminário Memórias de Um Suicida - Segunda Parte - Capítulo VI - A Cada Um Se...Seminário Memórias de Um Suicida - Segunda Parte - Capítulo VI - A Cada Um Se...
Seminário Memórias de Um Suicida - Segunda Parte - Capítulo VI - A Cada Um Se...
Cynthia Castro
 
A fab lab for development in rural philippines
A fab lab for development in rural philippinesA fab lab for development in rural philippines
A fab lab for development in rural philippines
Tomoaki Watanabe
 
Parotid surgeries
Parotid surgeriesParotid surgeries
Parotid surgeries
Dr.Nikhil Chaudhari
 
Gel plan accion_2010_v10_con_aplazamiento
Gel plan accion_2010_v10_con_aplazamientoGel plan accion_2010_v10_con_aplazamiento
Gel plan accion_2010_v10_con_aplazamiento
peter223
 

Viewers also liked (14)

ReadytoFlip_Jan2017
ReadytoFlip_Jan2017ReadytoFlip_Jan2017
ReadytoFlip_Jan2017
 
Fútbol
FútbolFútbol
Fútbol
 
resume
resumeresume
resume
 
Taller práctico 10 claves tatiana katherine dell tejada
Taller práctico 10 claves tatiana katherine dell tejadaTaller práctico 10 claves tatiana katherine dell tejada
Taller práctico 10 claves tatiana katherine dell tejada
 
Noticia Cientìfica Aduna
Noticia Cientìfica AdunaNoticia Cientìfica Aduna
Noticia Cientìfica Aduna
 
CV 1-02-2017 Vijay Kumar
CV 1-02-2017 Vijay KumarCV 1-02-2017 Vijay Kumar
CV 1-02-2017 Vijay Kumar
 
Burton Resume
Burton ResumeBurton Resume
Burton Resume
 
Convergencia
ConvergenciaConvergencia
Convergencia
 
UPSC CAPF 2017 Exam Dates
UPSC CAPF 2017 Exam DatesUPSC CAPF 2017 Exam Dates
UPSC CAPF 2017 Exam Dates
 
Seminário Memórias de Um Suicida - Terceira Parte - Capítulo VI - O Elemento ...
Seminário Memórias de Um Suicida - Terceira Parte - Capítulo VI - O Elemento ...Seminário Memórias de Um Suicida - Terceira Parte - Capítulo VI - O Elemento ...
Seminário Memórias de Um Suicida - Terceira Parte - Capítulo VI - O Elemento ...
 
Seminário Memórias de Um Suicida - Segunda Parte - Capítulo VI - A Cada Um Se...
Seminário Memórias de Um Suicida - Segunda Parte - Capítulo VI - A Cada Um Se...Seminário Memórias de Um Suicida - Segunda Parte - Capítulo VI - A Cada Um Se...
Seminário Memórias de Um Suicida - Segunda Parte - Capítulo VI - A Cada Um Se...
 
A fab lab for development in rural philippines
A fab lab for development in rural philippinesA fab lab for development in rural philippines
A fab lab for development in rural philippines
 
Parotid surgeries
Parotid surgeriesParotid surgeries
Parotid surgeries
 
Gel plan accion_2010_v10_con_aplazamiento
Gel plan accion_2010_v10_con_aplazamientoGel plan accion_2010_v10_con_aplazamiento
Gel plan accion_2010_v10_con_aplazamiento
 

Similar to Firewall architectures

Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
ams1ams11
 
Firewalls
FirewallsFirewalls
Firewalls
Deevena Dayaal
 
Ch18 Internet Security
Ch18 Internet SecurityCh18 Internet Security
Ch18 Internet Security
phanleson
 
Ch20 book
Ch20 bookCh20 book
Ch20 book
amitnitttr
 
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
ssuserf7cd2b
 
Firewall
Firewall Firewall
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
Souvik Santra
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
Miftakhul Hijriyah
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
PECB
 
DEFENSE IN DEPTH6IntroductionThe objective of this pap
DEFENSE IN DEPTH6IntroductionThe objective of this papDEFENSE IN DEPTH6IntroductionThe objective of this pap
DEFENSE IN DEPTH6IntroductionThe objective of this pap
LinaCovington707
 
ANS_Ch_04_Handouts.pdf
ANS_Ch_04_Handouts.pdfANS_Ch_04_Handouts.pdf
ANS_Ch_04_Handouts.pdf
MeymunaMohammed1
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
Education
 
Ccna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 AnswersCcna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 Answers
ccna4discovery
 
Lessson 2
Lessson 2Lessson 2
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
kkkseld
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
Joseph Holbrook, Chief Learning Officer (CLO)
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
ericbrooks84875
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
ikirkton
 
LD7007 Network Security.docx
LD7007 Network Security.docxLD7007 Network Security.docx
LD7007 Network Security.docx
stirlingvwriters
 
Evaluation the performanc of dmz
Evaluation the performanc of dmzEvaluation the performanc of dmz
Evaluation the performanc of dmz
Baha Rababah
 

Similar to Firewall architectures (20)

Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [312-342...
 
Firewalls
FirewallsFirewalls
Firewalls
 
Ch18 Internet Security
Ch18 Internet SecurityCh18 Internet Security
Ch18 Internet Security
 
Ch20 book
Ch20 bookCh20 book
Ch20 book
 
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
NZISM-Infrastructure-Network_Design,_Architecture_and_IP_Address_Management-V...
 
Firewall
Firewall Firewall
Firewall
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
 
internet-firewalls
internet-firewallsinternet-firewalls
internet-firewalls
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
 
DEFENSE IN DEPTH6IntroductionThe objective of this pap
DEFENSE IN DEPTH6IntroductionThe objective of this papDEFENSE IN DEPTH6IntroductionThe objective of this pap
DEFENSE IN DEPTH6IntroductionThe objective of this pap
 
ANS_Ch_04_Handouts.pdf
ANS_Ch_04_Handouts.pdfANS_Ch_04_Handouts.pdf
ANS_Ch_04_Handouts.pdf
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Ccna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 AnswersCcna 4 Chapter 1 V4.0 Answers
Ccna 4 Chapter 1 V4.0 Answers
 
Lessson 2
Lessson 2Lessson 2
Lessson 2
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
LD7007 Network Security.docx
LD7007 Network Security.docxLD7007 Network Security.docx
LD7007 Network Security.docx
 
Evaluation the performanc of dmz
Evaluation the performanc of dmzEvaluation the performanc of dmz
Evaluation the performanc of dmz
 

Recently uploaded

BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 

Recently uploaded (20)

BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 

Firewall architectures

  • 1. FIREWALL ARCHITECTURES The configuration that works best for a particular organization depends on three factors: The objectives of the network, the organization‘s ability to develop and implement the architectures, and the budget available for the function. There are FOUR common architectural implementations of firewalls.These implementations are packet filtering routers, screened host firewalls, dual-homed firewalls,a nd screened subnet firewalls. I. Packet Filtering Routers Most organizations with a n Internet connections have some form of a router as the interface to the Internet at the perimeter between the organization‘s internal networks and the external service provider. Many of these routers can be configured to reject packets that the organization does not allow into the network. This is a simple but effective way to lower the organization‘s risk from external attack. The drawbacks to this type of system include a lack of auditing and strong authentication. Also, the complexity of the access control lists used to filter the packets can grow and degrade network performance. Fig
  • 2. 6-4 is an example of this type of architecture. II.Screened Host Firewalls This architecture combines the packet filtering router with a separate, dedicated firewall, such as an application proxy server. This approach allows the router to pre-screen packets to minimize the network traffic and loads on the internal proxy.The application proxy examines an application layer protocol, such as HTTP, and perform the proxy services. This separate host is often referred to as a bastion host; it can be a rich target for external attacks, and should be very thoroughly secured.Evn though the bastion host/application proxy actually contains only cached copies of the internal Web documents, it can still present a promising target, because compromise of the bastion host can disclose the configuration of internal networks and possibly provide external sources with internal information. Since the bastion host stands as a sloe defender on the network perimeter, it is also commonly referred to as the Sacrificial Host. To its advantage, this configuration requires the external attack to compromise two separate systems, before the attack can access internal data. Inthis way, the bastion host protects the data more fully than the router alone. Fig 6-11 shows a typical configuration of a screened host architectural approach.
  • 3. III. Dual-Homed Host Firewalls The next step up in firewall architectural complexity is the dual-homed host. When this architectural approach is used, the bastion host contains two NICs (Network Interface Cards) rather than one, as in the bastion host configuration. One NIC is connected to the external network, and one is connected to the internal network, providing an additional layer of protection. With TWO NICs , all traffic must physically go through the firewall to move between the internal and external networks. Implementation of this architecture often makes use of NATs. NAT is a method of mapping real, valid, external IP addresses to special ranges of non-routable internal IP addresses, thereby creating yet another barrier to intrusion from external attackers. The internal addresses used by NAT consist of three different ranges. Organizations that need Class A addresses can use the 10.x.x.x range, which has over 16.5 million usable addresses. Organization‘s that need Class B addresses can use the 192.168.x.x range, which has over 65,500 addresses. Finally , organiazations with smaller needs , such as those needing onlya few Class C addresses, can use the c172.16.0.0 to 172.16.15.0 range, which hs over 16 Class C addresses or about 4000 usable addresses. See table 6-4 for a recap of the IP address ranges reseved fro non-public networks. Messages sent with internal addresses within these three internal use addresses is directly connected to the external network, and avoids the NAT server, its traffic cannot be routed on the public network. Taking advantage of this , NAT prevents external attacks from reaching internal machines with addresses in specified ranges.If the NAT server is a multi-homed bastion host, it translates between the true, external IP addresses assigned to the organization by public network naming authorities ansd the internally assigned, non- routable IP addresses. NAT translates by dynamically assigning addresses to internal communications and tracking the conversions with sessions to determine which incoming message is a response to which outgoing traffic. Fig 6-12 shows a typical configuration of a dual homed host firewall that uses NAT and proxy access to protect the internal network.
  • 4. Another benefit of a dual-homed host is its ability to translate between many different protocols at their respective data link layers, including Ethernet , Token Ring, Fiber Distributed Data interface (FDDI) , and Asynchronous Transfer Method (ATM). On the downside, if this dual-homed host is compromised, it can disable the connection to the external network, and as traffic volume increases, it can become over- loaded. Compared to more complex solutions, however, this architecture provides strong overall protection with minimal expense. IV. Screened Subnet Firewalls (with DMZ) The dominant architecture used today is the screened subnet firewall. The architecture of a screened subnet firewall provides a DMZ. The DMZ can be a dedicated port on the firewall device linking a single bastion host, or it can be connected to a screened subnet, as shown in Fig 6-13. Until recently , servers providing services through an untrusted network were commonly placed in the DMZ. Examples of these include Web servers, file transfer protocol (FTP) servers, and certain database servers. More recent strategies using proxy servers have provided much more secure solutions.
  • 5. A common arrangement finds the subnet firewall consisting of two or more internal bastion hosts behind a packet filtering router, with each host protecting the trusted network. There are many variants of the screened subnet architecture. The first general model consists of two filtering routers, with one or more dual-homed bastion hosts between them. In the second general model, as illustrated in Fig 6-13 , the connections are routed as follows: 1. Connections from the outside or un trusted network are routed through an external filtering router. 2. Connections from the outside or un trusted network are routed into-and then out of – a routing firewall to the separate network segment known as the DMZ. 3. Connections into the trusted internal network are allowed only from the DMZ bastion host servers.
  • 6. The screened subnet is an entire network segment that performs two functions: it protects the DMZs systems and information from outside threats by providing a network of intermediate security; and it protects the internal networks by limiting how external connections can gain access to internal systems. Although extremely secure, the screened subnet can be expensive to implement and complex to configure and manage. The value of the information it protects must justify the cost. Another facet of the DMZ is the creation of an area of known as an extranet. AN extranet is a segment of the DMZ where additional authentication and authorization controls are put into place to provide services that are not available to the general public. An example would be an online retailer that allows anyone to browse the product catalog and place items into a shopping cart, but will require extra authentication and authorization when the customer is ready to check out and place an order. Source : http://elearningatria.files.wordpress.com/2013/10/ise-viii-information-and-network-security-06is835-notes.pdf