SlideShare a Scribd company logo
1 of 31
Download to read offline
Prepared by:
     Khalid El-Darymli
    Matric. no.: G0327887

     Faculty of Engineering
International Islamic University
           Malaysia



     URL: eng.iiu.edu.my
C hapt er O n e                                                                               In tro d u cti o n
CHAPTER ONE------------------------------------------------------------------------------------------------------ 1
INTRODUCTION ------------------------------------------------------------------------------------------------------ 1
   1-1 DATA TRANSMISSION IN TCP/IP NETWORKS: --------------------------------------------------------------- 1
   1-2 WHAT ARE FIREWALLS? ----------------------------------------------------------------------------------------- 2
   1-3 WHAT CAN FIREWALLS PROTECT AGAINST, AND WHAT THEY CANNOT?---------------------------------- 3
CHAPTER TWO ----------------------------------------------------------------------------------------------------- 5
         TECHNOLOGY------------------------------------------------------------------------------------------ 5
FIREWALL TECHNOLOGY
   2-1 FIREWALL ARCHITECTURES: ----------------------------------------------------------------------------------- 5
      2-1-1 Packet Filters: ------------------------------------------------------------------------------------------ 5
         2-1-1-1 How Packet filtering works:--------------------------------------------------------------------------------- 6
         2-1-1-2 Advantages and disadvantages: ---------------------------------------------------------------------------- 8
      2-1-2 Application Gateways:--------------------------------------------------------------------------------- 9
         2-1-2-1 How it works: -------------------------------------------------------------------------------------------------- 9
         2-1-2-2 Advantages and Disadvantages of Application Gateways ------------------------------------------ 10
      2-1-3 Circuit Level Gateways: ------------------------------------------------------------------------------ 10
         2-1-3-1 How Circuit Gateways Work: ---------------------------------------------------------------------------- 11
         2-1-3-2 Disadvantages: ----------------------------------------------------------------------------------------------- 11
      2-1-3 Bastion Host: ------------------------------------------------------------------------------------------ 11
      2-1-4 Stateful Packet Inspection: -------------------------------------------------------------------------- 12
         2-1-4-1 How SPI firewall works: ----------------------------------------------------------------------------------- 13
         2-1-4-2 Security Advantages of SPI: ------------------------------------------------------------------------------ 14
         2-1-4-3 Disadvantages: ----------------------------------------------------------------------------------------------- 14
   2-2 FIREWALL CONFIGURATIONS: ---------------------------------------------------------------------------------14
      2-2-1 Screened Network (Packet Filtering Only):------------------------------------------------------- 14
         2-2-1-1 Benefits of the Screened Network: ----------------------------------------------------------------------- 15
         2-2-1-2 Disadvantages of the Screened Network:--------------------------------------------------------------- 15
      2-2-2 Dual-Homed Gateway: ------------------------------------------------------------------------------- 15
         2-2-2-1 Benefits of a Dual-homed Gateway: --------------------------------------------------------------------- 16
         2-2-2-2 Disadvantages of a Dual-homed Gateway: ------------------------------------------------------------- 16
      2-2-3 Screened Host:----------------------------------------------------------------------------------------- 16
         2-2-3-1 Benefits of a screened-host Firewall: -------------------------------------------------------------------- 17
         2-2-3-2 Disadvantages of a Screened-host firewall: ------------------------------------------------------------ 17
      2-2-4 Screened Subnet:-------------------------------------------------------------------------------------- 17
         2-2-4-1 Benefits of the Screened-subnet Firewall: -------------------------------------------------------------- 18
         2-2-4-2 Disadvantages of the screened host firewall: ---------------------------------------------------------- 18
CHAPTER THREE ------------------------------------------------------------------------------------------------- 19
PRACTICAL FIREWALL IMPLEMENTATION ------------------------------------------------------------------ 19
PRACTICAL          IMPLEMENTATION
   3-1 SECURITY ISSUE: DEFINING THE INTERNET CONNECTION----------------------------------------------20
   3-2 SECURITY ISSUE: DETERMINING WHO NEED ACCESS: ----------------------------------------------------20
   3-3 SECURITY ISSUE: IDENTIFYING WEAK SPOTS IN INFORMATION FLOW:--------------------------------22
   3-4 SECURITY ISSUE: MANAGING REMOTE ACCESS: -----------------------------------------------------------22
   3-5 SECURITY ISSUE: GETTING INFORMATION TO REMOTE SITES -------------------------------------------24
   3-6 SECURITY ISSUE: MANAGING INTERNAL ACCESS TO SENSITIVE INFORMATION ----------------------24
   3-7 SECURITY ISSUE: VIRUS DETECTION & REMOVAL ---------------------------------------------------------26
   3-8 ACME'S FUTURE: ------------------------------------------------------------------------------------------------26
F ire w a l ls

                                     Chapter One
                                   Introduction
        The internet has arguably become the most diverse virtual entity ever developed
by humankind. The sheer numbers of users by the hundreds of thousands from all parts
of the world on a regular basis, with no end in sight. The internet is the virtual common
place where everyone is welcome to do business, communicate, research information or
simply enjoy surfing the net. The vastness of the internet, along with the differences
among its visitors, creates a most unique melting pot. However it also contains a great
potential for misuse, abuse and criminal activity. A number of organizations have been
attacked or probed by intruders, resulting in heavy production losses and
embarrassment. Cases have been reported wherein organizations were forced to
disconnect temporarily from the internet and correct problem with their systems and
network configurations. Even sites that observe good security practices have to
constantly protect themselves from new vulnerabilities and persistent intruders. As
examples of those attacks, on 1996 the US Department of Defense announced that its
computer systems were attacked 250,000 times in the preceding year and most of these
attacks went undetected.[2] An other example is the web site of the United States
Information Agency which was broken by internet vandals.[3] A significant risk exists
for some sites, which ignore attacks by intruders. Such sites may themselves not be
attacked, but may be used as a staging ground for intruder attacks on other networks.
But all is not lost: while there are numerous tools available to protect systems, the
firewall still stands as the biggest and the best weapon for keeping the evil forces
lurking along the miles of the information superhighway at bay.

1-1 Data Transmission in TCP/IP Networks:
        TCP/IP are the standard network protocols. The purpose of TCP/IP is to provide
computers with a method of transmitting data from one computer to another. TCP/IP
provides the means for applications to send data onto network and for network to
deliver that data to application on other computers or hosts.
        To illustrate how networks and TCP/IP work, we use a railroad as an analogy,
as shown in figure (1-1).




                  Figure (1-1). The internet is like a railroad, sort of.
C hapt er O n e                                                  In tro d u cti o n
The first thing is the “Tracks” for the rail road, which the rails can physically move
along. For network, things are moved by a way of wire, fiber optic cable, satellite
link…etc.
When you ship freight on a railroad, it’s carried in a freight car.
On a network data is carried in a packet.
As for the railroad, there’s a dispatcher who figure out what route each freight car
should take to get it to its destination. Note also the dispatcher doesn’t care what’s
inside the fright cars.
On network the dispatcher’s rule is handled by the Internet Protocol. It receives freight-
data- from TCP in the form of datagrams. IP’s job is to find the best route for the
datagram. IP doesn’t give a hoot what’s in the datagram.
IP passes the datagram on to the network, where it’s placed inside a packet and sent on
its way.
Finally, our railroad has agents who take care of the shipping and receiving freight. At
the shipping end the agent loads the freight, puts a shipping label on the container,
makes careful records of what needs to go to whom, and then checks to make sure that
it gets there undamaged. On receiving end another agent checks the freight cars as they
arrive, unloads the freight, and notifies the shipper that the shipment arrived.
         TCP does a similar work on the network. It breaks the sender’s message down
into datagrams, numbers them, sticks an address label on them and gives them to IP for
shipment. On the receiving end, TCP checks the datagrams as they arrive to make sure
that they haven’t been corrupted, notifies the sender if damaged datagrams needs to be
re-sent, and assembles the datagrams in the right order to recreate the original
message.[2]
         The official network model is the seven layers OSI reference Model, defined by
the International Organization for Standardization, depicted in figure (1-2).




                 Figure (1-2). TCP/IP and the OSI reference mode.[1]
1-2 What Are firewalls?
      If you have been using the Internet for any length of time, and especially if you
work at a larger company and browse the Web while you are at work, you have
F ire w a l ls
probably heard the term firewall used. For example, you often hear people in
companies say things like, quot;I can't use that site because they won't let it through the
firewall.quot;
If you have a fast Internet connection into your home (either a DSL connection or a
cable modem), you may have found yourself hearing about firewalls for your home
network as well. It turns out that a small home network has many of the same security
issues that a large corporate network does. You can use a firewall to protect your home
network and family from offensive web sites and potential hackers. [5]




                                        Figure (1-3), a firewall.
        Basically, a firewall is a system (either software or hardware or both) that
enforces an access control policy between two networks.[1] In fact, that's why its
called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading
from one area to the next. Buildings have firewalls made of brick walls completely
dividing sections of the building. In a car a firewall is the metal wall separating the
engine and passenger compartments. Internet firewalls are intended to keep the flames
of Internet hell out of your private LAN. Or, to keep the members of your LAN pure
and chaste by denying them access the all the evil Internet temptations.

1-3 What can firewalls protect against, and what they cannot?
    Firewall is just one piece of overall security architecture, what the firewalls can do
include the following:
    - Firewalls are excellent at enforcing the corporate security policy. They should
        be figured to restrict communications to what management has determined to be
        acceptable.
    - Firewalls are used to restrict access to specific services. For example, the
        firewall permits public access to the web server but prevents access to the
        Telnet and other nonpublic daemons. The majority of firewalls can even
        provide selective access via authentication functionally.
    - Firewalls are singular in purpose. Therefore compromises do not need to be
        made between security and usability.
    - Firewalls are excellent auditors. Given plenty of disk space remote logging
        capabilities, a firewall can log any and all traffic that passes through it.
    - Firewalls are very good at alerting appropriate people of events.

What the firewalls cannot do include the following:
  - Firewalls cannot protect against what is authorized. Firewalls protect
      applications and permit the normal communications traffic to those
C hapt er O n e                                               In tro d u cti o n
      applications. However, if the application themselves have flaws, a firewall will
      not stop the attack because, to the firewall, the communication is authorized.
  -   Firewalls are only as effective as the rules they are configured to enforce. An
      overly permissive rule set will diminish the effectiveness of the firewall.
  -   Firewalls cannot stop social engineers or an authorized user intentionally using
      their access malicious purposes.
  -   Firewalls cannot fix poor administrative practices or poorly designed security
      policy.
  -   Firewalls cannot stop attacks in which traffic does not pass through them.[1]
F ire w a l ls
                                     Chapter Two
                             Firewall Technology
        Firewall technology generally falls into one of two categories: network level or
application level. Nowadays, most firewall products contain features of both categories.
Network level technology guards the entire network from unauthorized intrusion. An
example of network technology is packet filtering, which simply reviews all
information coming into a network and rejects the data that does not meet a predefined
set of criteria. Another technique employed in network level firewalls is the use of an
authorization server that checks the authenticity of the user’s login.
        Application level technology controls access on an application by application
basis. For example, proxy servers can be set up to permit access to some applications,
such at HTTP, while blocking access to others, such as FTP.

2-1 Firewall Architectures:
         The way that a firewall protects the trusted network depends on the firewall
itself, and the policy rules that are enforced.
Firewalls primarily functions using four fundamental methods:
    - Packet Filters.
    - Application gateways.
    - Circuit-level gateways.
    - Stateful packet inspection. [1]
2-1-1 Packet Filters:
         A packet is unit of information that moves a cross a network.. A document for,
    example, is a broken up into a series of packets for transmission from one computer
    to an other. When the packets arrive at their destination, the data in them is
    assembled to recreate the document.




                              Figure (2-1), A packet is like a letter.
   Each packet has two parts: The data that is part of the document and a header. If the
   packet is an envelope, then the data is the letter inside of the envelope and the
   header is the address information on the outside.[2]
C hapt er T w o                                            F ire w a ll T e c h n o lo g y
    Just as the post office sorts mail by the address information, a packet filter (also
    called a screening router) can sort (filter) packets by the information in the header.
    Figure (2-2) shows the packet structure.[1]




                                 Figure (2-2) TCP/IP packet Structure
    Packet Filtering system relies on the existing architecture of data transfer, which
    uses packets that contain headers with Internet protocol (IP) addresses and protocol
    ports to send them across networks to their intended locations. The packet filter
    examines the header of each packet it encounters and then decides to pass the
    packet to the next hop along the network path or denies that forwarding, either by
    dropping the packet or by rejecting it. The decision process is made based on a set
    of rules defined by the firewall administrator.
    The rules can be based on information such as the following:
    - The source IP address, or a range of IP addresses that the packet originated
        from.
    - The destination IP address where the packet is heading.
    - The network protocol involved (e.g., TCP, UDP, or ICMP).
    - The port number being used. This also typically identifies the type of traffic
        (e.g. port 80 for HTTP, which is web traffic).
2-1-1-1 How Packet filtering works:
        Essentially, a packet filter has a dirty port, a set of rules, and a clean port. The
dirty port is exposed to the internet and is where all traffic enters. The traffic that enters
the dirty port is processed according to a set of rules or polices configured for the
firewall. Based on the determined action derived from the rules set, the firewall will
either let the packet enter through the clean port into the trusted network or deny it
from entering.
        In the example that follows, the network perimeter contains two DNS servers,
an HTTP server, and a secure shell server. Figure (2-3) depicts the trusted and
untrusted network along with the firewall.




                  Figure (2-3), Network topology for the packet filtering example.
F ire w a l ls
Creating a Rule Set:
In order to provide an example of packet filtering we need to create a rule set. The rule
set contains the following criteria:
-Type of protocol.
-Source address.
-Destination address.
-Source port.
-Destination port.
-The action the firewall should take when the rule set is matched.

The table below presents the set of rules that will act as the policy (or guideline) that
the firewall will utilize to determine whether a packet is allowed to enter into the
trusted network.




                          Table2-1. Sample packet filtering rule set.



Rule 1:
This rule permits inbound access from a single IP subnet on the internet to a single host
in the network for secure Shell (SSH).
Rule 2:
This rule allows inbound access on port 80, which is typically used for HTTP traffic.
The host is 129.1.5.154 is the web server for the domain. The organization can not
predict who will want to access its web site, so there is no restriction on the source IP
address.
Rule 3:
This rule allows inbound SMTP traffic. Within a Domain Name System (DNS) the
company will have one or more records that indicate its SMTP mail servers. These
records are called MX records. In the example network perimeter, the organization’s
DNS MX record resolves to the IP address 129.1.5.150. Any host on the internet that
wishes to send e-mail to a host in this domain will attempt an SMTP connection to this
IP address. Because any host on the internet can conceivably attempt a connection, the
source IP address for the transaction must be “any” IP address. If a subnet of IP
addresses were listed here. Some network on the internet would not be able to send
mail to users in this domain.
Rules 4 and 5:
The two servers IP addresses 129.1.5.152 and 129.1.5.153 are the Domain Name
Service servers for this domain. In every case, only UDP is required for proper DNS
services. The two cases in which TCP is required are when support is needed for a DNS
C hapt er T w o                                          F ire w a ll T e c h n o lo g y
zone transfer and when the reply is so large that it can not fit inside of a single UDP
packet.

Rule 6:
This rule explicitly blocks all packets that have not matched any of the criteria in the
previous rules. Figure (2-4) depicts the overall packet filtering for our example.




                     Figure (2-4). The flow of the packet filtering example.



2-1-1-2 Advantages and disadvantages:
Advantages:
    - It creates a little overhead, so the performance of the screening device is less
       impacted.
    - It’s relatively inexpensive or even free.
    - It provides good traffic management.
Disadvantages:
    - It allows direct connections to internal host from external clients.
    - It leaves many holes in the network perimeter. That’s because it can only
       examine the traffic at the transport layer (TCP or UDP) or at the network layer
       (ICMP or IP protocol type).
    - It’s difficult to manage and scale in complex environments. Because in
       multilayered security environment, all packet filters in both network traffic
       directions must be synchronized.
    - It’s vulnerable to attacks that “spoof “source addresses that match internal IP
       addressing schemes, unless it’s especially configured to prevent this issue.
    - It offers no user authentication.

Static packet filtering is still in use as a security measure today by some organizations
primarily due to its convenience or to accommodate legacy installations.
In general Static Packet filters provide minimum security.[1]
F ire w a l ls
2-1-2 Application Gateways:
        The term application gateway is synonymous with proxy gateway, and proxy
server. These terms describe the same method of perimeter protection.
        An application gateway performs a similar service to that of an operator back in
the time for the earliest phone systems. At those days, a telephone call was placed to an
operator who subsequently plugged in the correct lines to make the connection for the
two parties. What the caller may or may not have known back then was that the
operator more often than not listened to the call between the two parties. Operators
were often the most informed people in the community and had the best stories to tell
back then-for good reason.




                           Figure (2-5). Application level gateway [4]
2-1-2-1 How it works:
The application level gateway acts as a relay of application level traffic as depicted in
Figure (2-5). The user contacts the gate way using TCP/IP application, such as Telnet
or FTP, and the gateway asks the user for the name of the remote host to be accessed.
When the user responds and provides a valid user ID and authentication information,
the gateway contacts the application on the remote host and relays TCP segments
containing the application data between the two endpoints. If the gateway does not
implement the proxy code for a specific application, the service is not supported and
cannot be forwarded across the firewall. Further the gate way can be configured to
support only specific features of an application that the network administrator considers
acceptable while denying all other features.
Figure (2-6) depicts the flow that make up the end to end connection between client and
destination Telnet server.




                Figure(2-6). Overview of application gateway virtual connections.
C hapt er T w o                                     F ire w a ll T e c h n o lo g y
The process that occurs for connecting to the specific host occurs like this:
1- A user telnets to the application gateway over port 23. The screening device checks
the source IP address against a list of permitted sources. If connections are allowed
from the source IP address, the connection proceeds to the next step. If not the
connection is dropped. The application daemon running on the application gateway is a
hardened application, which makes it much more difficult to compromise, and provides
a single location that requires updating as new vulnerabilities are discovered.
2- The user is prompted for authentication. There are several advantages to
authenticating a user at this step. Authentication on the gateway device allows for a
centralized location for authentication.
3-If authenticated, the user is given a prompt or a menu of systems that he or she is
allowed to connect to. These IP addresses are not directly accessible from the internet;
they only accept connection from the gateway. Upstream filtering devices block direct
access to these host IP addresses.
4- The use selects the system to connect to. This selection initiates a new TCP
connection to the destination host, from the application gateway.
5-The user is prompted for additional authentication information if applicable.

2-1-2-2 Advantages and Disadvantages of Application Gateways
Advantages:
Application level gateways tend to be more secure than packet filters. Rather than
trying to deal with the numerous possible combinations that are to be allowed and
forbidden at the TCP and IP level, he application level gateway need only scrutinize a
few allowable applications. In addition it’s easy to log and audit all incoming traffic at
the application level.

Disadvantages:
Prime disadvantage of the application level gateway is the additional processing
overhead on each connection. In effect there are two spliced connection between the
end users, with the gate way at the splice point, and the gateway must examine and
forward all traffic in both directions. [1]

2-1-3 Circuit Level Gateways:
Circuit level gateways operate in a method that is similar to application gateways but
typically are oriented more forward non-interactive applications. Beyond an initial
authentication step, performed to ensure that the user is allowed to access the service
through the gateway, the gateway simply relays the connection to the final destination.
Proxy servers and SOCKS servers are typical examples of circuit gateway. Circuit
gateways operate by relaying TCP connections from the trusted network to the
untrusted network. In the process of relaying, the source IP address is translated to
appear as if the connection is originating from the gateway.
Most proxy applications require modification to the client application. One of the more
common examples is a web proxy server. The client application (web browser) must be
configured with the proxy server information. This consists of the IP address of the
trusted interface of the proxy server and the TCP port the service is listening on.
F ire w a l ls




                           Figure(2-7). Circuit-Level gateway. [4]

2-1-3-1 How Circuit Gateways Work:

The following steps indicate the flow of connection through a circuit level gateway:
(Note as mentioned earlier, specific configuration is required when circuit gateways are
used).
   1- The user attempts a connection to a destination URL
   (http://www.companyname.com).
   2- The client application, instead of sending a DNS request for this URL, sends the
       request to the resolved address for the inside interface of the proxy server.
   3- If the authentication is required, the user is prompted for authentication.
   4- If the user passes authentication, the proxy server performs any additional tasks
       (such as comparing the URL to a list of explicitly permitted or denied URLs),
       sends a DNS request for the URL and then sends a connection to the destination
       IP address with the source IP address of the proxy server.
   5- The proxy server forwards the reply from the web server to the client.

   2-1-3-2 Disadvantages:
   Most circuit level gateways are configurable on a TCP port basis. This does have
   disadvantage in that the circuit level gateway may not examine each packet at the
   application layer. This allows applications to utilize TCP ports that were opened fro
   other, legitimate applications, several peer to peer applications can be configured to
   run on arbitrary ports, such as TCP 80 and TCP 443 (commonly opened for web
   browsing). This opens the possibility for misuse and exposes potential
   vulnerabilities inherent in these applications.
   There are several other disadvantages to using circuit level gateway as a sole
   meaning of protecting a network. Inbound connection, are in general, not allowed,
   unless the functionality is built into the gateway as a separate application. Some
   client applications cannot be modified to support SOCKS or proxying. This would
   prevent them from accessing external resources through a gateway. [1]

   2-1-3 Bastion Host:
    A bastion host is a system identified by the firewall administrator as a critical
   strong point in the network’s security. Typically, the bastion host serves as a
   platform for an application level or circuit level gateway. Common characteristics
   of bastion host are as follows:
C hapt er T w o                                    F ire w a ll T e c h n o lo g y
  - The bastion host hardware platform executes secure version of its operating
  system, making it a trusted system.
  - Only the services that the network administrator considers essential are installed
  on the bastion host. These include proxy applications such as Telnet, DNS, FTP,
  SMTP, and user authentication.
  - The bastion host may require additional authentication before a user is allowed
  access to the proxy services. In addition, each proxy service may require its own
  authentication before granting user access.
  - Each proxy is configured to support only a subnet of the standard application’s
  command set.
  - Each proxy is configured to allow access only to the specific host systems. This
  means that the limited command/feature set may be applied only to a subnet of
  systems on the protected network.
  - Each proxy maintains detailed audit information by logging all traffic, each
  connection and the duration of each connection. The audit log is an essential tool
  for discovering and terminating intruder attacks.
  - Each proxy module is a very small software package specifically designed for
  network security. Because of its relative simplicity, it’s easier to check such
  modules for security flaws. For example typical UNIX mail application may
  contain fewer than 1000.
  -Each proxy is independent of other proxies on the bastion host. If there is a
  problem with the operation of any proxy, or if a future vulnerability is discovered, it
  can be uninstalled without affecting the operation of the other proxy applications.
  Also, if the user population requires support for a new service, the network
  administrator can easily install the required proxy on he bastion host.
  - A proxy generally performs no disk access other than to read the initial
  configuration file. This makes it difficult for an intruder to install any dangerous
  files on the bastion host (e.g. Trojan horse sniffers).
  -Each proxy runs as a non-privileged user in a private and secured directory on the
  bastion host. [4]

  2-1-4 Stateful Packet Inspection:
  SPI-based firewalls combine the speed and the flexibility of packet filters with the
  application level security of application proxies. This merging results in a
  compromise between the two firewall types: an SPI firewall is not as fast as a
  packet filtering firewall and does not have the same degree of application awareness
  as an application protocol. This compromise, however, has proven to be very
  effective in providing a strong network perimeter policy enforcement.
  SPI firewall operates by examining each packet as it passes through the firewall and
  permitting or denying the packet based on whether it is part of an existing
  conversation that has previously passed through the firewall or based on a set of
  rules very similar to packet filtering rules. This, on the surface, appears to be very
  similar to the operation of a packet filtering. The difference is the implementation
  of the packet examination. Figure (2-8) depicts the logic flow through a stateful
  packet inspection firewall.
F ire w a l ls




                     Figure (2-8). T he logic flow of stateful packet inspection.

   2-1-4-1 How SPI firewall works:
   When packet arrives on an interface, several things happen within the inspection
   engine:
   1-The packet is inspected to determine whether it’s part of an existing, established
   communication flow. A packet filtering firewall can only search for signs that a
   packet is part of an existing TCP conversation by looking at the state of the SYN bit
   (either set or cleared).
   2- Depending on the protocol the packet may be inspected further. It will then make
   forwarding decisions based on the contents of the data.
   3- If the packet does not have corresponding entry in the connection table, the
   firewall will inspect the packet against its configured rule set. The rule set for most
   SPI firewall is similar to a packet filtering firewall’s rule set: source IP address and
   port, destination IP address and port, and protocol. The packet filtering rule set can
   then be optionally extended to include the examination of the data as indicated
   earlier.
   4- If the packet is permitted based on source, destination, protocol and packet
   content, the firewall will forward the packet toward its final destination and build or
   update connection entry in its connection table for the conversation.
   5- The firewall typically use timers and inspection of a TCP packet with the FIN bit
   set as a way of determining when to remove the connection entry from the
   connection table.
C hapt er T w o                                          F ire w a ll T e c h n o lo g y
  2-1-4-2 Security Advantages of SPI:
      SPI has two primary advantages over packet filtering technologies. The
  connection table greatly reduces the chance that a packet will be spoofed to appear
  as it were part of an existing connection. Because packet filtering firewall do not
  maintain a record of the pending communications, they must rely on the format of
  the packet-specifically, the status of the SYN bit in a TCP packet- to determine
  whether the packet is part of the previously approved conversation. This opens the
  possibility of packet spoofing of TCP packets and does not provide any method of
  determining the status of UDP or ICMP packets. By maintaining a connection table,
  the firewall has much more information to use when determining whether to permit
  a packet to pass.
      The second advantage to SPI firewalls over packet filtering firewalls is their
  ability to look into the data of certain packet types. This has become a very valuable
  feature due to a number of well known and well publicized vulnerabilities in
  common protocols. Two examples of this are the FTP and SMTP protocols. Both
  FTP servers and clients have a number of vulnerabilities, many of which are based
  on the incorrectly formatted request or command. The inspection feature of SPI
  firewalls allows a firewall to examine the data of a packet to determine the validity
  of the command.
  2-1-4-3 Disadvantages:
  A SPI firewalls does not protect the internal hosts to the same degree as an
  application layer firewall, because it simply looks for specific strings within the
  data portion of the packet. In addition it does not act as proxy or setup a separate
  connection on behalf of the source. [1]

  2-2 Firewall Configurations:
  Using the aforementioned components but arranging them in different
  configurations, we can come up with different kinds of firewalls that have different
  strengths and weakness.
  2-2-1 Screened Network (Packet Filtering Only):
  The simplest kind of firewall uses only packet filtering software running on a
  screening router to let the good guys in and keep the bad guys out. This
  configuration is shown in figure (2-9).




                                                                                  .
                  Figure (2-9). A simple firewall that uses a screening router.
F ire w a l ls
   All traffic into and out of the intranet must pass through the screening router, where
   rules determine what traffic will be allowed through.

   2-2-1-1 Benefits of the Screened Network:
   Packet filtering is easy to employ for small, uncomplicated sites. If there is already
   a single router between your network and the outside world, you may be able to
   simply add packet filtering software to it. In one step you have added protection for
   your entire network.
       Packet filtering doesn’t require any changes to applications your users are
   running, and it does not require users to learn any new tricks. Users won’t even
   know the screening server I there unless they try to do something that’s against the
   rules.

   2-2-1-2 Disadvantages of the Screened Network:
   Screening routers have a number of shortcomings:
   - They have little or no logging capability, so the network administrator cannot
       easily determine if the system is or has been under attack.
   - The table of rules can quickly become very large and complex and the rules are
       difficult to test. As the table grows in size and complexity, the likelihood of
       having holes in the rule structure increases.
   - The biggest disadvantage is that you are relying on a single component for
       protection. If that component fails, it could leave the door to your network wide
       open, and you might not even know it.

2-2-2 Dual-Homed Gateway:
Using a single proxy server by itself, you can set up dual homed gateway, as shown in
Figure (2-10).




                    Figure (2-10). A dual homed host has two IP addresses.
C hapt er T w o                                     F ire w a ll T e c h n o lo g y
        A dual-homed host is a computer with two Network Interface Card (NIFs), each
with its own IP address. If a computer on one network wants to communicate with a
computer on the other, it must connect with the IP address that it can “see” on the dual-
homed host. The proxy server software checks its rules to see if the connection is
permissible. If it is, the proxy server software initiates the connection to the other
network through the second NIC. An example of a dual homed host is the SmartWall
gateway.
   2-2-2-1 Benefits of a Dual-homed Gateway:
   A dual homed gateway has some attractive features:
   - The main advantage is that the gateway provides a complete separation of the
   protected network from the outside world.
   - Proxy servers provide logging that can help in detecting attacks.
   Because it’s a host computer, it can be used for services such as authentication
   servers as well as proxy servers.
   DNS information does not pass from the protected network to the outside world, so
   names and IP addresses of site systems are hidden from Internet systems.
   2-2-2-2 Disadvantages of a Dual-homed Gateway:
   - The proxy server needs to be designed specifically for each service that needs to
    use it. (That used to mean a separate proxy server for each service. Newer proxy
    servers, such as the AltaVista Firewall, can handle several services but not just any
    service that comes along). If you want to add a service that the proxy server doesn’t
    handle, you have a problem.
    - If IP forwarding becomes enabled in some way (as could happen if the operating
    system is reinstalled and some one forgets to turn off routing), all security is lost.
    - The dual-homed gateway is the only component of the firewall; you have a single
    point of failure that could jeopardize your security.

   2-2-3 Screened Host:
   A screened host firewall uses both a screening router and an application gateway to
   achieve a higher level of security that you could get with either one by itself. This
   configuration is shown in figure (2-11).




                      Figure (2-11). The screened-host configuration.
F ire w a l ls
   In screened host firewall, all traffic from the internet is directed to the screening
   router which filtering traffic according to the rules it has been given. All traffic that
   satisfies the rules is forwarded to the application gateway. In most cases, all traffic
   that is addressed to any machine other than the gateway is rejected.
        In this case the application gate way has only one network interface card (that
   is, it is not a dual homed gateway). The proxy server software on the gateway
   applies its own rules and passes permissible traffic on to the protected network.
   2-2-3-1 Benefits of a screened-host Firewall:
   - The configuration is more flexible than a dual-homed gateway firewall. It can
        be set up so that the screening router passes some traffic directly to sites on the
        internet instead of to the application gateway. You might want to do that if, for
        example, you have an HTTP server set up as sacrificial lamb that does not
        require protection.
   - The rules for packet filter can be less a complex than for a screened network
        configuration because most or all the traffic will be directed to the application
        gateway.
   - If either component fails in an “open” condition, so that it no longer blocks
        anything, the other component still affords some measure of protection.
   2-2-3-2 Disadvantages of a Screened-host firewall:
   - The two components of the firewall need to be configured carefully to work
        together correctly. For example, the route has top be set up to route all traffic to
        the proxy server. Even though the rules for the packet filter may be less
        complex, the overall job of configuring the firewall may be more complex.
   - The flexibility of the system can lead to the temptation to take shortcuts that can
        subvert security. For example, users might try to set up connections directly to
        the router to avoid the proxy server. Administrating need to be more diligent in
        adhering to security policy.
   2-2-4 Screened Subnet:
        The screened-subnet firewall adds another screening router to the screened host
   configuration to create a subnet that is sometimes called the demilitarized zone. A
   screened subnet firewall is shown in figure (2-12).




                          Figure(2-12). The screened-host configuration.
C hapt er T w o                                    F ire w a ll T e c h n o lo g y
  The demilitarized zone is the gray shaded area in the illustration. In addition to the
  application gateway shown, this subnet could also be used for information servers,
  modem pools and other systems that require carefully controlled access.
       The exterior screening router and the application gateway function as they do in
  a screened-host firewall. The interior screening router provides additional
  protection between the application gateway and the protected network. Think of the
  interior router as a fall back defense in case an attacker gets through the exterior
  router and application gateway.
  2-2-4-1 Benefits of the Screened-subnet Firewall:
  The chief benefit of the screened subnet firewall is an other layer of protection. To
  gain access to the protected network, an attacker would have to go through two
  routers and the application gateway-not impossible, but more difficult than with a
  screened-host firewall.
  2-2-4-2 Disadvantages of the screened host firewall:
  -It’s the most expensive configuration (of those described here) because it requires
  the greatest number of machines and software modules.
  - With three machines. Including two routers with their rule tables, configuration of
  the overall system can become quite complicated.
  Other firewall Configuration:
  You can come up with variations of the configurations described here to suit your
  security policy. You might want to use more bastion hosts to separate traffic for
  different services. You could add more layers of screened subnets to deal with
  traffic to and from networks with varying degrees of trustworthiness.

             The point is that there are no hard and fast rules for how a fire wall
  should be set up. Just remember a couple of guidelines:
  - First and foremost, keep your security policy in mind and make sure your
     firewall faithfully implements it.
  - Avoid the temptation to take shortcuts around more burdensome aspects of the
     security policy. Effective security sometimes means inconvenience.
  - Keep it as simple as possible. More is not necessarily better, especially if adding
     more elements to you firewall makes it impossibly complex to set up and
     administer, or so difficult to use that users resort to an authorized shortcuts. [2]
F ire w a l ls
                                      Chapter Three
                    Practical
                    Practical Firewall Implementation
       Now that we have reviewed the concepts and theories behind firewalls, we
   discuss how they can be put into practice in the real world.
   In this chapter we create a hypothetical corporation with the original name Acme,
   Inc. Using Acme as our example we will show how and where firewalls can be
   used in a company’s intranet to enhance overall security.
   Our purpose here is not to explain in technical detail how each item discussed
   would be accomplished, but to show approaches that this hypothetical company
   might use to solve common problems.
   Our sample corporation: Acme, Inc.
   Acme, Inc. is small manufacturing company that produces a single product--the
   ever popular widget. These products are sold wholesale only to a fairly large base
   of retailers throughout the country.
   Figure (3-1) depicts the company’s organizational chart.




     Figure (3-1). Acme’s organizational chart shows a simple management structure with function
           consolidated in three main departments: production, sales/marketing, and finance.

       Acme’s corporate headquarters are in Dallas, Texas. The main management
   function takes place there.
       The main production facility is located in New Orleans, with distribution points
   in New York, Chicago, and Los Angles. Located with the shipping centers are the
   regional sales offices.
       These sales offices manage the salesmen in their respective regions, but report
   to Dallas for overall management functions.
       All significant financial functions occur in Dallas and that the data for those
   functions also is stored primarily in Dallas. Moreover, all of the functions in a
   particular city (for example, Chicago) are physically located in the same building.
       Acme’s daily operations involve sales persons soliciting and taking orders from
   customers and passing those orders to their regional offices, and the regional offices
   passing the orders to both the shipping facilities and the home office (for
   accounting purposes).
       The shipping facilities fill and ship orders, notifying the production facility in
   New Orleans on a daily basis as to activity so that production can be adjusted to
   meet anticipated demand.
Chapter Three                     Practical Firewall Implementation
  Here we are going to concentrate primarily on areas of computer security, includes
  areas in which firewall will help the company meet its security needs.
  We will set out security issues and then we will provide sample solutions to those
  issues.
  3-1 Security Issue: Defining the internet connection
  As a first step toward expanding customer accessibility and upgrading the
  company’s image, Acme management decides that a presence on the World Wide
  Web (WWW) is essential. To accomplish this goal, the company considers two
  general approaches, with a security primary concern.
  First, the company could purchase, install, and run its own web server system.
  Acme is a widget company; however, after considering all factors, including long-
  range cost, start-up time, security risks, and so on, the company opts for an other
  approach: hiring an outside company to create and manage the corporate Web page.
  Solutions:
  Thus, Acme retains the services of professional Web server provider. This company
  consults with Acme, determines its goals, target markets, and potential for
  expanding business via the Web, and then designs an attractive Web homepage for
  Acme, Inc. The page is up and running in a matter of few days.
      Initially, only information about Acme products is available, at shortly
  thereafter, Web users will have the ability to send Email messages to any of Acme’s
  regional sales offices, generating a call back from the appropriate salesperson.
  The system could be created so that no information flows out of Acme via the
  channel-for example, incoming mail would be passed through the office of the
  professional web server onto Acme’s central SMTP (Simplified Mail Transfer
  Protocol) system, and outgoing mail would be filtered by a firewall. This system
  could be protected with a firewall product (such as a packet filter) that allows only
  the one way passage of SMTP (or other Email protocol) data.
      Other data that the Web provider might need for the home page, such as
  announcements of new products, updates on product availability, special
  promotions, and so on, could likewise be transferred via some secure method - e.g.,
  a one way email service on the company’s intranet-such that no files need to be
  transferred via the internet for this service.
  3-2 Security Issue: Determining Who Need Access:
  To protect computer data, the first step is determining who needs data and who does
  not. Further, in any computer network, including Acme’s, a conscious effort must
  be made to decide which users in the organization need to communicate with other
  users and who those other users are.
  Solutions:
  Accordingly, Acme determines to organize the intranet by establishing internal
  servers for each major department. Each server will serve as the host for the data
  generated by the department. For example, the production department server will
  host product design data, production figures, and shipping records. The
  sales/marketing department will host sales order, invoices, and product sales
  information. The finance department server will host financial data such as
  customer account information, budgets, payroll, and so on. Acme next determines
  that, where possible, data will be available only to individual users on an “as-
  needed” basis; in particular, users will not normally have access to data outside
  their own department. Employees at higher levels in the organization, however, as
F ire w a l ls
   appropriate for their function. For example, the vice president for finance will have
   access to almost all data anywhere on the intranet, except for highly sensitive
   engineering data, which he or she will not likely need very often. (The president,
   who authorizes the funds for the system, will, of course, have access to any thing
   the president wants.)
   Table (3-1) provides a partial list of the data that Acme identifies, along with the
   people who need access and the intranet server where the data will reside.




  Table (3-1). This table shows where various information inside Acme is created and how it’s shared.

In figure (3-2) we can see how Acme begins the process of setting up its intranet.




         Figure (3-2). The beginnings of the Acme intranet with a server for each department.
Chapter Three                        Practical Firewall Implementation
3-3 Security Issue: Identifying Weak Spots in Information Flow:
Before actual implementation, Acme’s carefully consider all security issues. Among
those issues most important to Acme are the following:
    - Limiting access to servers with remote (that is, dial up) access capabilities.
    - Securing sensitive design data.
    - Preventing employees who should not have access to certain information from
        getting that information.

   In order to careful consider security issues, we walk through the steps that show
   how various types of information are generated and used. Along the way, we
   examine how and where firewalls can help Acme ensure the integrity of its intranet.

3-4 Security Issue: Managing Remote Access:
The heart of Acme’s operations is getting and filling orders from customers. Thus, it’s
vitally important that sales representatives’ orders are processed quickly and efficiently
on the new intranet. It’s equally important, however, that the process by which those
orders will now be transmitted (that’s through the company’s intranet) be secure.
         First, sales reps take the orders from the customers and input the information
into computer order forms on their notebook computers, which they never leave home
without. At the end of the day, they compile the orders into single data files for transfer
to the regional sales office.
         Next, sales representatives begin the process of uploading the sales onto the
company’s FTP (File Transfer Protocol) order sites, located at each of the regional
sales offices. This is accomplished by using communications software on the notebook
computer to dial into the regional office’s “modem center” via a cellular phone built
into the notebook computer.
Solutions
As noted previously, anywhere an organization uses a standard telephone line for
remote access; a danger exists that the number, and thus the line, may be attacked by a
hacker. Anywhere that a hacker finds a modem answering the phone, a variety of
attacks may begin on the system. For example, computerized hacking programs that
repetitively dial modem numbers and attempt to intercept password data, or programs
that dial the modem and attempt to download a virus file, are common. Acme
recognizes this danger and takes steps to protect this doorway into its system.
Because this remote accessibility is a potential security risk point. Acme decides to use
a two-stage firewall at this point in its system. This decision is made for two reasons.
First, Acme wants an extra quot;layerquot; of protection for the modem system due to the
potential security risk inherent with dial-up type systems. Second, whatever system
protects the modems will not sufficiently prevent unauthorized access from within the
corporation. That is, there may be employees inside the organization with legitimate
need and access through the remote access system who do not have access to all data
inside that firewall. For example, Bob Smith, the new salesperson, will need to have
remote access to the sales server, but, once inside, he does not need the same access as
the regional sales manager, who may have access to sensitive information, such as the
evaluation of Bob's request for a raise.
In addition, the Sales server must be protected from those users who do not access the
server through the remote access system at all, but rather have access through internal
channels. Again, Bob may have a desktop PC with access to this server, but he does not
F ire w a l ls
need access to sensitive, managerial-type data.
To carry out this two-stage firewall protection, Acme decides to use the Modem
Security Enforcer, that requires users to call in, and pass a two-step password test, then
hangs up the system and calls the user back at a pre-established telephone number (thus
the necessity of the built-in cellular telephone in the notebook computer).
After the salesperson successfully passes through the modem security, the salesperson
encounters the second firewall located on the Sales/Marketing Web server. For this
firewall, Acme chooses a product that works by using more traditional firewall
protection, such as a proxy server. In this case, Acme uses Borderware Firewall
Server, which accepts the data from the salesperson's notebook-generated order file and
passes it through to the FTP site on the intranet.
Any data that comes back to the notebook during this process is protected by means of
a Network Address Translation (also provided by Borderware's Firewall Server),
which changes the actual internal addressing on information sent out to the remote
computer. Therefore, even if a hacker should manage to intercept some of the outgoing
data, the addressing has been changed by the firewall server, and quot;spoofingquot; of this
address will not allow the hacker back into the system.
The order is then combined with the other sales representatives' orders collected at the
internal FTP site and downloaded by the regional sales offices for forwarding via
internal (that is, inside the firewall) systems to the regional sales manager for that
manager's records.
Figure (3-3) shows what the Sales/Marketing portion of the Acme intranet looks like.




Figure (3-3). Here is the Sales/Marketing part of the Acme intranet with the firewalls added.



A process similar to that described here is used for transferring the data from the three
sales offices to the main office. That is, the sales orders are combined into a single,
larger format order and transferred to the various offices and the appropriate shipping
points. Here, however, no public telephone lines are used. Rather, dedicated quot;Tlquot;
telephone lines are used to move the data from the sales offices to the shipping point
and main office internal FTP sites, respectively.

Figure (3-4) shows a simple diagram depicting the flow of the information.
Chapter Three                              Practical Firewall Implementation




    Figure (3-4). This diagram shows a typical sales order as it travels from the point of sale to the
                                  production and shipping facilities.

3-5 Security Issue: Getting Information to Remote Sites
In addition to receiving sales orders, the regional (and central) sales offices must make
available to the sales force the latest information concerning changes to product lines,
pricing information, shipping delays, and so on. As with previous tasks, Acme is not
only concerned that this information be made available but also that the process of
making it available be as secure as possible.
Also, as noted previously in Table 3-1, all offices (sales, marketing, and finance) must
be able to access production figures and shipping times from the main production
facility.
Solutions
These tasks can be accomplished using a secure e-mail system. Thus, the Acme intranet
design team decides that, due to the need to pass queries and other short messages
among various employees, the primary intranet system will be supplemented with a
dedicated mail server system to handle only internal e-mail.

3-6 Security Issue: Managing Internal Access to Sensitive Information
Acme's Finance Department presents some unique challenges in that all of the other
departments must have access to some of the data (for example, budgeting information)
but should not be allowed access to other data (for example, the president's expense
account) in that department.
Solutions
To accomplish these tasks, Acme decides to use a unique arrangement called a Tri-
homed gateway, using a product that allows Acme to segregate the server, allowing
outside access to only a portion of the data while restricting access to the sensitive data.
One such product is Borderware's Secure Server Net system. By using this three-
pronged approach, Acme can essentially create an intranet within an intranet, thus
allowing quot;outsidersquot; (such as the folks in Sales and Production) access to a quot;publicquot;
(yet secure) server in the department where appropriate data can be stored.
Meanwhile, both the public portion of the Finance Department's network and the rest of
F ire w a l ls
the Acme intranet are separated by the firewall from the sensitive portions of the
financial data.
Figure (3-5) shows how the Finance Department can effectively be segregated into two
quot;subnetsquot; using the Secure Server Net concept.
A similar approach could be used in any department that has both information that
should be available company-wide and data that should be used within that department
only.
For example, Acme closely guards its production process, which it believes gives it a
competitive advantage over its chief rival, Beta Company. Therefore, Acme restricts
access to that information to those in the company who really need to know the
information, such as engineers and the production managers. For that reason, another
Secure Server Net (that is, a tri-homed gateway) might be used to allow intranet-wide
access to shipping and production output data, while restricting access to sensitive
production engineering data to those within the department.




   Figure (3-5). Acme's Secure Server Net approach to controlling data in the Finance Department.

In addition to the firewall placement matters mentioned here, Acme will also employ
other, more traditional, computer security measures. For example, all users will have
unique user names and passwords, providing an additional level of security inside the
firewalls. These passwords will have relatively short expiration dates and will be
changed approximately every 60 days to help limit damage from compromised
passwords.
By using these passwords, Acme can control the information available to specific
individuals within departments. Again referring to a portion of Table 5-1, note in the
following Table (3-2), for example, the people who need access to quot;sales ordersquot;
information.
Chapter Three                             Practical Firewall Implementation




    Table (3-2). This portion of table (3-1) shows the people who need access to sales information.

In this case, the entire Sales Department is given access to the sales order data. In the
Production Department, however, only the managers need access. Thus, a user with a
Production Department address will be allowed through any security (including a
firewall) that protects the Sales/Marketing server. Once inside that firewall, however,
the actual sales order data will be password-protected, and only those users with the
appropriate password will be allowed to access this information.
Acme will also implement some systems administrator-level measures to help guard
against unauthorized access. For example, audit trails will be established on particularly
sensitive data or directories (such as payroll records and files containing sensitive
design data) so that the administrator can routinely examine which users are accessing
the data. Unusually high numbers of unsuccessful login attempts, both internally and
externally (via remote-access gateways), will generate messages to the administrator.
These login attempts will be traced to the stations attempting to log in to ascertain
whether an employee has a problem typing his or her password, or whether the
employee is trying to go somewhere he or she shouldn't go.
These audit trails will be implemented as part of the firewall protection for the
particular server in question. In our example, the Finance Department will already be
using BorderWare Firewall Server (due to the need to create the Secure Server Net,
described previously), and, therefore, that product's auditing/ reporting features will be
set up to perform the audit trail functions described.

3-7 Security Issue: Virus Detection & Removal
Virus detection and removal software will be used on all Acme computers (desktop and
notebooks), and employees will be instructed that no floppy disks should enter the
company facilities without being checked for viruses by the designated computer
person in that office.

3-8 Acme's Future:
With the firewalls and other security measures described in this chapter, Acme will
begin to automate the flow of essential data around the company. At the same time, the
company will ensure with each new phase of automation that sensitive and proprietary
information is protected and, as important, that the company's intranet is guarded from
outside attacks by unscrupulous hackers.
In the meantime, Figure (3-6) shows what our completed Acme intranet system looks
like. [2]
F ire w a l ls




    Figure (3-6). The completed Acme intranet, included the firewalls described in the chapter.
References:
[1] Firewalls: The complete reference, by: Keith Strassberg, Richard Gondek, and
Gary Rollie. McGraw-Hill/Osborne, ©2002.
[2] Intranet Firewalls, by:Scott Fuller & Kevin Pagan. Ventana Communications
group Inc. ©1997.
[3] Firewalls and Encryption. Asset International. Tata McGraw-Hill, ©2000.
[4] Cryptography and Network Security, third edition, by: William Stallings,
©2003 by Pearson Education Inc.
[5] www.howstuffworks.com

More Related Content

What's hot

Bsspar1 s14 chapter 01_introductionto_parameterplanning_v1.1
Bsspar1 s14 chapter 01_introductionto_parameterplanning_v1.1Bsspar1 s14 chapter 01_introductionto_parameterplanning_v1.1
Bsspar1 s14 chapter 01_introductionto_parameterplanning_v1.1Simon Aja
 
project on OSPF
project on OSPFproject on OSPF
project on OSPFOm Prakash
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069William Lee
 
Implementation of MAC-level sleep-scheduling
Implementation of MAC-level sleep-schedulingImplementation of MAC-level sleep-scheduling
Implementation of MAC-level sleep-schedulingOlivier Cervello
 
Analysis of Open-Source Drivers for IEEE 802.11 WLANs
Analysis of Open-Source Drivers for IEEE 802.11 WLANsAnalysis of Open-Source Drivers for IEEE 802.11 WLANs
Analysis of Open-Source Drivers for IEEE 802.11 WLANsDanh Nguyen
 
Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01Sachin Morya
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame RelayDsunte Wilson
 
Tems discovery 4.0.8 release note
Tems discovery 4.0.8 release noteTems discovery 4.0.8 release note
Tems discovery 4.0.8 release noteFahd Salim Abbas
 
LI Bank Network Infrastructure cursory review
LI Bank Network Infrastructure cursory reviewLI Bank Network Infrastructure cursory review
LI Bank Network Infrastructure cursory reviewJeffrey Sicuranza
 
Networking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Training
 
Ap&ac system development 2014
Ap&ac system development 2014Ap&ac system development 2014
Ap&ac system development 2014TOM LIU
 
Motorola BSC Overview
Motorola BSC OverviewMotorola BSC Overview
Motorola BSC OverviewFarhan Ahmed
 
Chapter 2 LAN redundancy
Chapter 2   LAN  redundancyChapter 2   LAN  redundancy
Chapter 2 LAN redundancyJosue Wuezo
 
Ccvp plus module 1
Ccvp plus module 1Ccvp plus module 1
Ccvp plus module 1Le Ngoc Viet
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationAbdelkhalik Mosa
 
Guide line tems discovery 3.1 hasp licese
Guide line   tems discovery 3.1 hasp liceseGuide line   tems discovery 3.1 hasp licese
Guide line tems discovery 3.1 hasp liceseTran Trung
 

What's hot (20)

Bsspar1 s14 chapter 01_introductionto_parameterplanning_v1.1
Bsspar1 s14 chapter 01_introductionto_parameterplanning_v1.1Bsspar1 s14 chapter 01_introductionto_parameterplanning_v1.1
Bsspar1 s14 chapter 01_introductionto_parameterplanning_v1.1
 
project on OSPF
project on OSPFproject on OSPF
project on OSPF
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069
 
Implementation of MAC-level sleep-scheduling
Implementation of MAC-level sleep-schedulingImplementation of MAC-level sleep-scheduling
Implementation of MAC-level sleep-scheduling
 
Analysis of Open-Source Drivers for IEEE 802.11 WLANs
Analysis of Open-Source Drivers for IEEE 802.11 WLANsAnalysis of Open-Source Drivers for IEEE 802.11 WLANs
Analysis of Open-Source Drivers for IEEE 802.11 WLANs
 
Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 
MX960 Router
MX960 RouterMX960 Router
MX960 Router
 
Tems discovery 4.0.8 release note
Tems discovery 4.0.8 release noteTems discovery 4.0.8 release note
Tems discovery 4.0.8 release note
 
Call flow umts
Call flow umtsCall flow umts
Call flow umts
 
Ccna day4
Ccna day4Ccna day4
Ccna day4
 
LI Bank Network Infrastructure cursory review
LI Bank Network Infrastructure cursory reviewLI Bank Network Infrastructure cursory review
LI Bank Network Infrastructure cursory review
 
Mcserviceguard2
Mcserviceguard2Mcserviceguard2
Mcserviceguard2
 
Networking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training Institute
 
Ap&ac system development 2014
Ap&ac system development 2014Ap&ac system development 2014
Ap&ac system development 2014
 
Motorola BSC Overview
Motorola BSC OverviewMotorola BSC Overview
Motorola BSC Overview
 
Chapter 2 LAN redundancy
Chapter 2   LAN  redundancyChapter 2   LAN  redundancy
Chapter 2 LAN redundancy
 
Ccvp plus module 1
Ccvp plus module 1Ccvp plus module 1
Ccvp plus module 1
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
 
Guide line tems discovery 3.1 hasp licese
Guide line   tems discovery 3.1 hasp liceseGuide line   tems discovery 3.1 hasp licese
Guide line tems discovery 3.1 hasp licese
 

Viewers also liked

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Operating System Fingerprinting Prevention
Operating System Fingerprinting PreventionOperating System Fingerprinting Prevention
Operating System Fingerprinting Preventiondcalhoun1984
 
Student packet tracer manual v1.1
Student packet tracer manual v1.1Student packet tracer manual v1.1
Student packet tracer manual v1.1milkux
 
Iptables Configuration
Iptables ConfigurationIptables Configuration
Iptables Configurationstom123
 
Kingston University Thesis - Design and Implementation of a Secure Web Applic...
Kingston University Thesis - Design and Implementation of a Secure Web Applic...Kingston University Thesis - Design and Implementation of a Secure Web Applic...
Kingston University Thesis - Design and Implementation of a Secure Web Applic...PROBOTEK
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurationsStudent
 
Assignment (2)
Assignment (2)Assignment (2)
Assignment (2)aroosa12
 
Firewall Penetration Testing
Firewall Penetration TestingFirewall Penetration Testing
Firewall Penetration TestingChirag Jain
 
WRITTEN ASSIGNMENT FORMAT - LA 2.0 COMPUTER SYSTEM
WRITTEN ASSIGNMENT FORMAT - LA 2.0 COMPUTER SYSTEMWRITTEN ASSIGNMENT FORMAT - LA 2.0 COMPUTER SYSTEM
WRITTEN ASSIGNMENT FORMAT - LA 2.0 COMPUTER SYSTEMsalwahanim
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkEng. Mohammed Ahmed Siddiqui
 
computer network designing- final year project
computer network designing- final year projectcomputer network designing- final year project
computer network designing- final year projectAboubacar Mchangama
 
Smart Hospital Blueprint Sanitized
Smart Hospital Blueprint SanitizedSmart Hospital Blueprint Sanitized
Smart Hospital Blueprint Sanitizedssoliani
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slidesrahul kundu
 
Student information-system-project-outline
Student information-system-project-outlineStudent information-system-project-outline
Student information-system-project-outlineAmit Panwar
 

Viewers also liked (19)

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
Firewall Firewall
Firewall
 
Operating System Fingerprinting Prevention
Operating System Fingerprinting PreventionOperating System Fingerprinting Prevention
Operating System Fingerprinting Prevention
 
Student packet tracer manual v1.1
Student packet tracer manual v1.1Student packet tracer manual v1.1
Student packet tracer manual v1.1
 
Iptables Configuration
Iptables ConfigurationIptables Configuration
Iptables Configuration
 
Kingston University Thesis - Design and Implementation of a Secure Web Applic...
Kingston University Thesis - Design and Implementation of a Secure Web Applic...Kingston University Thesis - Design and Implementation of a Secure Web Applic...
Kingston University Thesis - Design and Implementation of a Secure Web Applic...
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
Assignment (2)
Assignment (2)Assignment (2)
Assignment (2)
 
Firewall Penetration Testing
Firewall Penetration TestingFirewall Penetration Testing
Firewall Penetration Testing
 
WRITTEN ASSIGNMENT FORMAT - LA 2.0 COMPUTER SYSTEM
WRITTEN ASSIGNMENT FORMAT - LA 2.0 COMPUTER SYSTEMWRITTEN ASSIGNMENT FORMAT - LA 2.0 COMPUTER SYSTEM
WRITTEN ASSIGNMENT FORMAT - LA 2.0 COMPUTER SYSTEM
 
Networking Projects
Networking ProjectsNetworking Projects
Networking Projects
 
Introduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for networkIntroduction to Intrusion detection and prevention system for network
Introduction to Intrusion detection and prevention system for network
 
Android Firewall project
Android Firewall projectAndroid Firewall project
Android Firewall project
 
computer network designing- final year project
computer network designing- final year projectcomputer network designing- final year project
computer network designing- final year project
 
Smart Hospital Blueprint Sanitized
Smart Hospital Blueprint SanitizedSmart Hospital Blueprint Sanitized
Smart Hospital Blueprint Sanitized
 
Original assignment
Original assignmentOriginal assignment
Original assignment
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 
Student information-system-project-outline
Student information-system-project-outlineStudent information-system-project-outline
Student information-system-project-outline
 

Similar to Microsoft Word Project, Firewalls

IRJET - Improving TCP Performance in Wireless Networks
IRJET -  	  Improving TCP Performance in Wireless NetworksIRJET -  	  Improving TCP Performance in Wireless Networks
IRJET - Improving TCP Performance in Wireless NetworksIRJET Journal
 
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure VanetIRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure VanetIRJET Journal
 
IRJET- Oil Tank Prototype based on Wireless Communication-Controller System u...
IRJET- Oil Tank Prototype based on Wireless Communication-Controller System u...IRJET- Oil Tank Prototype based on Wireless Communication-Controller System u...
IRJET- Oil Tank Prototype based on Wireless Communication-Controller System u...IRJET Journal
 
NTC 409 RANK Introduction Education--ntc409rank.com
NTC 409 RANK Introduction Education--ntc409rank.comNTC 409 RANK Introduction Education--ntc409rank.com
NTC 409 RANK Introduction Education--ntc409rank.comGVlaxmi16
 
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)Byres Security Inc.
 
NTC 409 RANK Become Exceptional--ntc409rank.com
NTC 409 RANK Become Exceptional--ntc409rank.comNTC 409 RANK Become Exceptional--ntc409rank.com
NTC 409 RANK Become Exceptional--ntc409rank.comshanaabe69
 
GSM_SYstem overview(opened).pdf
GSM_SYstem  overview(opened).pdfGSM_SYstem  overview(opened).pdf
GSM_SYstem overview(opened).pdfVahidZibakalam3
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rulesFreddy Buenaño
 
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET Journal
 
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...IRJET Journal
 
IRJET- IoT Enabled Smart Parking System
IRJET-  	  IoT Enabled Smart Parking SystemIRJET-  	  IoT Enabled Smart Parking System
IRJET- IoT Enabled Smart Parking SystemIRJET Journal
 
Comparative Analysis of Different Denial of Service Attacks
Comparative Analysis of Different Denial of Service AttacksComparative Analysis of Different Denial of Service Attacks
Comparative Analysis of Different Denial of Service Attackstheijes
 
Laporan Praktikum Keamanan Siber - Tugas 4 -Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 4 -Kelas C - Kelompok 3.pdfLaporan Praktikum Keamanan Siber - Tugas 4 -Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 4 -Kelas C - Kelompok 3.pdfIGedeArieYogantaraSu
 
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...Eswar Publications
 
Microsoft Word Mobile Multi Media Applications
Microsoft Word   Mobile Multi Media ApplicationsMicrosoft Word   Mobile Multi Media Applications
Microsoft Word Mobile Multi Media Applicationskkkseld
 
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New RenoIRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New RenoIRJET Journal
 

Similar to Microsoft Word Project, Firewalls (20)

IRJET - Improving TCP Performance in Wireless Networks
IRJET -  	  Improving TCP Performance in Wireless NetworksIRJET -  	  Improving TCP Performance in Wireless Networks
IRJET - Improving TCP Performance in Wireless Networks
 
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure VanetIRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
 
IRJET- Oil Tank Prototype based on Wireless Communication-Controller System u...
IRJET- Oil Tank Prototype based on Wireless Communication-Controller System u...IRJET- Oil Tank Prototype based on Wireless Communication-Controller System u...
IRJET- Oil Tank Prototype based on Wireless Communication-Controller System u...
 
NTC 409 RANK Introduction Education--ntc409rank.com
NTC 409 RANK Introduction Education--ntc409rank.comNTC 409 RANK Introduction Education--ntc409rank.com
NTC 409 RANK Introduction Education--ntc409rank.com
 
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
 
NTC 409 RANK Become Exceptional--ntc409rank.com
NTC 409 RANK Become Exceptional--ntc409rank.comNTC 409 RANK Become Exceptional--ntc409rank.com
NTC 409 RANK Become Exceptional--ntc409rank.com
 
GSM_SYstem overview(opened).pdf
GSM_SYstem  overview(opened).pdfGSM_SYstem  overview(opened).pdf
GSM_SYstem overview(opened).pdf
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
 
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
 
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
 
Project report1
Project report1Project report1
Project report1
 
IRJET- IoT Enabled Smart Parking System
IRJET-  	  IoT Enabled Smart Parking SystemIRJET-  	  IoT Enabled Smart Parking System
IRJET- IoT Enabled Smart Parking System
 
Comparative Analysis of Different Denial of Service Attacks
Comparative Analysis of Different Denial of Service AttacksComparative Analysis of Different Denial of Service Attacks
Comparative Analysis of Different Denial of Service Attacks
 
Laporan Praktikum Keamanan Siber - Tugas 4 -Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 4 -Kelas C - Kelompok 3.pdfLaporan Praktikum Keamanan Siber - Tugas 4 -Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 4 -Kelas C - Kelompok 3.pdf
 
Cisco Activity
Cisco ActivityCisco Activity
Cisco Activity
 
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...
Enhancing the Efficiency of Routing Protocols in VANETS by defending Dos Atta...
 
DevCon 5 (July 2013) - WebSockets
DevCon 5 (July 2013) - WebSocketsDevCon 5 (July 2013) - WebSockets
DevCon 5 (July 2013) - WebSockets
 
Hafeez saad m_eng_2016
Hafeez saad m_eng_2016Hafeez saad m_eng_2016
Hafeez saad m_eng_2016
 
Microsoft Word Mobile Multi Media Applications
Microsoft Word   Mobile Multi Media ApplicationsMicrosoft Word   Mobile Multi Media Applications
Microsoft Word Mobile Multi Media Applications
 
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New RenoIRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
 

More from kkkseld

H E A D S C A R F D E A D L O C K I N T U R K E Y A S A C A S E S T U D Y
H E A D S C A R F  D E A D L O C K  I N  T U R K E Y  A S  A  C A S E  S T U D YH E A D S C A R F  D E A D L O C K  I N  T U R K E Y  A S  A  C A S E  S T U D Y
H E A D S C A R F D E A D L O C K I N T U R K E Y A S A C A S E S T U D Ykkkseld
 
Microsoft Word Hw#2
Microsoft Word   Hw#2Microsoft Word   Hw#2
Microsoft Word Hw#2kkkseld
 
Microsoft Word Hw#3
Microsoft Word   Hw#3Microsoft Word   Hw#3
Microsoft Word Hw#3kkkseld
 
Microsoft Word Hw#1
Microsoft Word   Hw#1Microsoft Word   Hw#1
Microsoft Word Hw#1kkkseld
 
Microsoft Word The Project, Islam And Science
Microsoft Word   The Project, Islam And ScienceMicrosoft Word   The Project, Islam And Science
Microsoft Word The Project, Islam And Sciencekkkseld
 
Speech To Sign Language Interpreter System
Speech To Sign Language Interpreter SystemSpeech To Sign Language Interpreter System
Speech To Sign Language Interpreter Systemkkkseld
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Mobile Multi Media Applications
Mobile Multi Media ApplicationsMobile Multi Media Applications
Mobile Multi Media Applicationskkkseld
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Kerie2006 Poster Template 01
Kerie2006 Poster Template 01Kerie2006 Poster Template 01
Kerie2006 Poster Template 01kkkseld
 

More from kkkseld (13)

H E A D S C A R F D E A D L O C K I N T U R K E Y A S A C A S E S T U D Y
H E A D S C A R F  D E A D L O C K  I N  T U R K E Y  A S  A  C A S E  S T U D YH E A D S C A R F  D E A D L O C K  I N  T U R K E Y  A S  A  C A S E  S T U D Y
H E A D S C A R F D E A D L O C K I N T U R K E Y A S A C A S E S T U D Y
 
Microsoft Word Hw#2
Microsoft Word   Hw#2Microsoft Word   Hw#2
Microsoft Word Hw#2
 
Microsoft Word Hw#3
Microsoft Word   Hw#3Microsoft Word   Hw#3
Microsoft Word Hw#3
 
Microsoft Word Hw#1
Microsoft Word   Hw#1Microsoft Word   Hw#1
Microsoft Word Hw#1
 
Asr
AsrAsr
Asr
 
Microsoft Word The Project, Islam And Science
Microsoft Word   The Project, Islam And ScienceMicrosoft Word   The Project, Islam And Science
Microsoft Word The Project, Islam And Science
 
Speech To Sign Language Interpreter System
Speech To Sign Language Interpreter SystemSpeech To Sign Language Interpreter System
Speech To Sign Language Interpreter System
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Sslis
SslisSslis
Sslis
 
Mobile Multi Media Applications
Mobile Multi Media ApplicationsMobile Multi Media Applications
Mobile Multi Media Applications
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Kerie2006 Poster Template 01
Kerie2006 Poster Template 01Kerie2006 Poster Template 01
Kerie2006 Poster Template 01
 
Asr
AsrAsr
Asr
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Microsoft Word Project, Firewalls

  • 1. Prepared by: Khalid El-Darymli Matric. no.: G0327887 Faculty of Engineering International Islamic University Malaysia URL: eng.iiu.edu.my
  • 2. C hapt er O n e In tro d u cti o n CHAPTER ONE------------------------------------------------------------------------------------------------------ 1 INTRODUCTION ------------------------------------------------------------------------------------------------------ 1 1-1 DATA TRANSMISSION IN TCP/IP NETWORKS: --------------------------------------------------------------- 1 1-2 WHAT ARE FIREWALLS? ----------------------------------------------------------------------------------------- 2 1-3 WHAT CAN FIREWALLS PROTECT AGAINST, AND WHAT THEY CANNOT?---------------------------------- 3 CHAPTER TWO ----------------------------------------------------------------------------------------------------- 5 TECHNOLOGY------------------------------------------------------------------------------------------ 5 FIREWALL TECHNOLOGY 2-1 FIREWALL ARCHITECTURES: ----------------------------------------------------------------------------------- 5 2-1-1 Packet Filters: ------------------------------------------------------------------------------------------ 5 2-1-1-1 How Packet filtering works:--------------------------------------------------------------------------------- 6 2-1-1-2 Advantages and disadvantages: ---------------------------------------------------------------------------- 8 2-1-2 Application Gateways:--------------------------------------------------------------------------------- 9 2-1-2-1 How it works: -------------------------------------------------------------------------------------------------- 9 2-1-2-2 Advantages and Disadvantages of Application Gateways ------------------------------------------ 10 2-1-3 Circuit Level Gateways: ------------------------------------------------------------------------------ 10 2-1-3-1 How Circuit Gateways Work: ---------------------------------------------------------------------------- 11 2-1-3-2 Disadvantages: ----------------------------------------------------------------------------------------------- 11 2-1-3 Bastion Host: ------------------------------------------------------------------------------------------ 11 2-1-4 Stateful Packet Inspection: -------------------------------------------------------------------------- 12 2-1-4-1 How SPI firewall works: ----------------------------------------------------------------------------------- 13 2-1-4-2 Security Advantages of SPI: ------------------------------------------------------------------------------ 14 2-1-4-3 Disadvantages: ----------------------------------------------------------------------------------------------- 14 2-2 FIREWALL CONFIGURATIONS: ---------------------------------------------------------------------------------14 2-2-1 Screened Network (Packet Filtering Only):------------------------------------------------------- 14 2-2-1-1 Benefits of the Screened Network: ----------------------------------------------------------------------- 15 2-2-1-2 Disadvantages of the Screened Network:--------------------------------------------------------------- 15 2-2-2 Dual-Homed Gateway: ------------------------------------------------------------------------------- 15 2-2-2-1 Benefits of a Dual-homed Gateway: --------------------------------------------------------------------- 16 2-2-2-2 Disadvantages of a Dual-homed Gateway: ------------------------------------------------------------- 16 2-2-3 Screened Host:----------------------------------------------------------------------------------------- 16 2-2-3-1 Benefits of a screened-host Firewall: -------------------------------------------------------------------- 17 2-2-3-2 Disadvantages of a Screened-host firewall: ------------------------------------------------------------ 17 2-2-4 Screened Subnet:-------------------------------------------------------------------------------------- 17 2-2-4-1 Benefits of the Screened-subnet Firewall: -------------------------------------------------------------- 18 2-2-4-2 Disadvantages of the screened host firewall: ---------------------------------------------------------- 18 CHAPTER THREE ------------------------------------------------------------------------------------------------- 19 PRACTICAL FIREWALL IMPLEMENTATION ------------------------------------------------------------------ 19 PRACTICAL IMPLEMENTATION 3-1 SECURITY ISSUE: DEFINING THE INTERNET CONNECTION----------------------------------------------20 3-2 SECURITY ISSUE: DETERMINING WHO NEED ACCESS: ----------------------------------------------------20 3-3 SECURITY ISSUE: IDENTIFYING WEAK SPOTS IN INFORMATION FLOW:--------------------------------22 3-4 SECURITY ISSUE: MANAGING REMOTE ACCESS: -----------------------------------------------------------22 3-5 SECURITY ISSUE: GETTING INFORMATION TO REMOTE SITES -------------------------------------------24 3-6 SECURITY ISSUE: MANAGING INTERNAL ACCESS TO SENSITIVE INFORMATION ----------------------24 3-7 SECURITY ISSUE: VIRUS DETECTION & REMOVAL ---------------------------------------------------------26 3-8 ACME'S FUTURE: ------------------------------------------------------------------------------------------------26
  • 3. F ire w a l ls Chapter One Introduction The internet has arguably become the most diverse virtual entity ever developed by humankind. The sheer numbers of users by the hundreds of thousands from all parts of the world on a regular basis, with no end in sight. The internet is the virtual common place where everyone is welcome to do business, communicate, research information or simply enjoy surfing the net. The vastness of the internet, along with the differences among its visitors, creates a most unique melting pot. However it also contains a great potential for misuse, abuse and criminal activity. A number of organizations have been attacked or probed by intruders, resulting in heavy production losses and embarrassment. Cases have been reported wherein organizations were forced to disconnect temporarily from the internet and correct problem with their systems and network configurations. Even sites that observe good security practices have to constantly protect themselves from new vulnerabilities and persistent intruders. As examples of those attacks, on 1996 the US Department of Defense announced that its computer systems were attacked 250,000 times in the preceding year and most of these attacks went undetected.[2] An other example is the web site of the United States Information Agency which was broken by internet vandals.[3] A significant risk exists for some sites, which ignore attacks by intruders. Such sites may themselves not be attacked, but may be used as a staging ground for intruder attacks on other networks. But all is not lost: while there are numerous tools available to protect systems, the firewall still stands as the biggest and the best weapon for keeping the evil forces lurking along the miles of the information superhighway at bay. 1-1 Data Transmission in TCP/IP Networks: TCP/IP are the standard network protocols. The purpose of TCP/IP is to provide computers with a method of transmitting data from one computer to another. TCP/IP provides the means for applications to send data onto network and for network to deliver that data to application on other computers or hosts. To illustrate how networks and TCP/IP work, we use a railroad as an analogy, as shown in figure (1-1). Figure (1-1). The internet is like a railroad, sort of.
  • 4. C hapt er O n e In tro d u cti o n The first thing is the “Tracks” for the rail road, which the rails can physically move along. For network, things are moved by a way of wire, fiber optic cable, satellite link…etc. When you ship freight on a railroad, it’s carried in a freight car. On a network data is carried in a packet. As for the railroad, there’s a dispatcher who figure out what route each freight car should take to get it to its destination. Note also the dispatcher doesn’t care what’s inside the fright cars. On network the dispatcher’s rule is handled by the Internet Protocol. It receives freight- data- from TCP in the form of datagrams. IP’s job is to find the best route for the datagram. IP doesn’t give a hoot what’s in the datagram. IP passes the datagram on to the network, where it’s placed inside a packet and sent on its way. Finally, our railroad has agents who take care of the shipping and receiving freight. At the shipping end the agent loads the freight, puts a shipping label on the container, makes careful records of what needs to go to whom, and then checks to make sure that it gets there undamaged. On receiving end another agent checks the freight cars as they arrive, unloads the freight, and notifies the shipper that the shipment arrived. TCP does a similar work on the network. It breaks the sender’s message down into datagrams, numbers them, sticks an address label on them and gives them to IP for shipment. On the receiving end, TCP checks the datagrams as they arrive to make sure that they haven’t been corrupted, notifies the sender if damaged datagrams needs to be re-sent, and assembles the datagrams in the right order to recreate the original message.[2] The official network model is the seven layers OSI reference Model, defined by the International Organization for Standardization, depicted in figure (1-2). Figure (1-2). TCP/IP and the OSI reference mode.[1] 1-2 What Are firewalls? If you have been using the Internet for any length of time, and especially if you work at a larger company and browse the Web while you are at work, you have
  • 5. F ire w a l ls probably heard the term firewall used. For example, you often hear people in companies say things like, quot;I can't use that site because they won't let it through the firewall.quot; If you have a fast Internet connection into your home (either a DSL connection or a cable modem), you may have found yourself hearing about firewalls for your home network as well. It turns out that a small home network has many of the same security issues that a large corporate network does. You can use a firewall to protect your home network and family from offensive web sites and potential hackers. [5] Figure (1-3), a firewall. Basically, a firewall is a system (either software or hardware or both) that enforces an access control policy between two networks.[1] In fact, that's why its called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next. Buildings have firewalls made of brick walls completely dividing sections of the building. In a car a firewall is the metal wall separating the engine and passenger compartments. Internet firewalls are intended to keep the flames of Internet hell out of your private LAN. Or, to keep the members of your LAN pure and chaste by denying them access the all the evil Internet temptations. 1-3 What can firewalls protect against, and what they cannot? Firewall is just one piece of overall security architecture, what the firewalls can do include the following: - Firewalls are excellent at enforcing the corporate security policy. They should be figured to restrict communications to what management has determined to be acceptable. - Firewalls are used to restrict access to specific services. For example, the firewall permits public access to the web server but prevents access to the Telnet and other nonpublic daemons. The majority of firewalls can even provide selective access via authentication functionally. - Firewalls are singular in purpose. Therefore compromises do not need to be made between security and usability. - Firewalls are excellent auditors. Given plenty of disk space remote logging capabilities, a firewall can log any and all traffic that passes through it. - Firewalls are very good at alerting appropriate people of events. What the firewalls cannot do include the following: - Firewalls cannot protect against what is authorized. Firewalls protect applications and permit the normal communications traffic to those
  • 6. C hapt er O n e In tro d u cti o n applications. However, if the application themselves have flaws, a firewall will not stop the attack because, to the firewall, the communication is authorized. - Firewalls are only as effective as the rules they are configured to enforce. An overly permissive rule set will diminish the effectiveness of the firewall. - Firewalls cannot stop social engineers or an authorized user intentionally using their access malicious purposes. - Firewalls cannot fix poor administrative practices or poorly designed security policy. - Firewalls cannot stop attacks in which traffic does not pass through them.[1]
  • 7. F ire w a l ls Chapter Two Firewall Technology Firewall technology generally falls into one of two categories: network level or application level. Nowadays, most firewall products contain features of both categories. Network level technology guards the entire network from unauthorized intrusion. An example of network technology is packet filtering, which simply reviews all information coming into a network and rejects the data that does not meet a predefined set of criteria. Another technique employed in network level firewalls is the use of an authorization server that checks the authenticity of the user’s login. Application level technology controls access on an application by application basis. For example, proxy servers can be set up to permit access to some applications, such at HTTP, while blocking access to others, such as FTP. 2-1 Firewall Architectures: The way that a firewall protects the trusted network depends on the firewall itself, and the policy rules that are enforced. Firewalls primarily functions using four fundamental methods: - Packet Filters. - Application gateways. - Circuit-level gateways. - Stateful packet inspection. [1] 2-1-1 Packet Filters: A packet is unit of information that moves a cross a network.. A document for, example, is a broken up into a series of packets for transmission from one computer to an other. When the packets arrive at their destination, the data in them is assembled to recreate the document. Figure (2-1), A packet is like a letter. Each packet has two parts: The data that is part of the document and a header. If the packet is an envelope, then the data is the letter inside of the envelope and the header is the address information on the outside.[2]
  • 8. C hapt er T w o F ire w a ll T e c h n o lo g y Just as the post office sorts mail by the address information, a packet filter (also called a screening router) can sort (filter) packets by the information in the header. Figure (2-2) shows the packet structure.[1] Figure (2-2) TCP/IP packet Structure Packet Filtering system relies on the existing architecture of data transfer, which uses packets that contain headers with Internet protocol (IP) addresses and protocol ports to send them across networks to their intended locations. The packet filter examines the header of each packet it encounters and then decides to pass the packet to the next hop along the network path or denies that forwarding, either by dropping the packet or by rejecting it. The decision process is made based on a set of rules defined by the firewall administrator. The rules can be based on information such as the following: - The source IP address, or a range of IP addresses that the packet originated from. - The destination IP address where the packet is heading. - The network protocol involved (e.g., TCP, UDP, or ICMP). - The port number being used. This also typically identifies the type of traffic (e.g. port 80 for HTTP, which is web traffic). 2-1-1-1 How Packet filtering works: Essentially, a packet filter has a dirty port, a set of rules, and a clean port. The dirty port is exposed to the internet and is where all traffic enters. The traffic that enters the dirty port is processed according to a set of rules or polices configured for the firewall. Based on the determined action derived from the rules set, the firewall will either let the packet enter through the clean port into the trusted network or deny it from entering. In the example that follows, the network perimeter contains two DNS servers, an HTTP server, and a secure shell server. Figure (2-3) depicts the trusted and untrusted network along with the firewall. Figure (2-3), Network topology for the packet filtering example.
  • 9. F ire w a l ls Creating a Rule Set: In order to provide an example of packet filtering we need to create a rule set. The rule set contains the following criteria: -Type of protocol. -Source address. -Destination address. -Source port. -Destination port. -The action the firewall should take when the rule set is matched. The table below presents the set of rules that will act as the policy (or guideline) that the firewall will utilize to determine whether a packet is allowed to enter into the trusted network. Table2-1. Sample packet filtering rule set. Rule 1: This rule permits inbound access from a single IP subnet on the internet to a single host in the network for secure Shell (SSH). Rule 2: This rule allows inbound access on port 80, which is typically used for HTTP traffic. The host is 129.1.5.154 is the web server for the domain. The organization can not predict who will want to access its web site, so there is no restriction on the source IP address. Rule 3: This rule allows inbound SMTP traffic. Within a Domain Name System (DNS) the company will have one or more records that indicate its SMTP mail servers. These records are called MX records. In the example network perimeter, the organization’s DNS MX record resolves to the IP address 129.1.5.150. Any host on the internet that wishes to send e-mail to a host in this domain will attempt an SMTP connection to this IP address. Because any host on the internet can conceivably attempt a connection, the source IP address for the transaction must be “any” IP address. If a subnet of IP addresses were listed here. Some network on the internet would not be able to send mail to users in this domain. Rules 4 and 5: The two servers IP addresses 129.1.5.152 and 129.1.5.153 are the Domain Name Service servers for this domain. In every case, only UDP is required for proper DNS services. The two cases in which TCP is required are when support is needed for a DNS
  • 10. C hapt er T w o F ire w a ll T e c h n o lo g y zone transfer and when the reply is so large that it can not fit inside of a single UDP packet. Rule 6: This rule explicitly blocks all packets that have not matched any of the criteria in the previous rules. Figure (2-4) depicts the overall packet filtering for our example. Figure (2-4). The flow of the packet filtering example. 2-1-1-2 Advantages and disadvantages: Advantages: - It creates a little overhead, so the performance of the screening device is less impacted. - It’s relatively inexpensive or even free. - It provides good traffic management. Disadvantages: - It allows direct connections to internal host from external clients. - It leaves many holes in the network perimeter. That’s because it can only examine the traffic at the transport layer (TCP or UDP) or at the network layer (ICMP or IP protocol type). - It’s difficult to manage and scale in complex environments. Because in multilayered security environment, all packet filters in both network traffic directions must be synchronized. - It’s vulnerable to attacks that “spoof “source addresses that match internal IP addressing schemes, unless it’s especially configured to prevent this issue. - It offers no user authentication. Static packet filtering is still in use as a security measure today by some organizations primarily due to its convenience or to accommodate legacy installations. In general Static Packet filters provide minimum security.[1]
  • 11. F ire w a l ls 2-1-2 Application Gateways: The term application gateway is synonymous with proxy gateway, and proxy server. These terms describe the same method of perimeter protection. An application gateway performs a similar service to that of an operator back in the time for the earliest phone systems. At those days, a telephone call was placed to an operator who subsequently plugged in the correct lines to make the connection for the two parties. What the caller may or may not have known back then was that the operator more often than not listened to the call between the two parties. Operators were often the most informed people in the community and had the best stories to tell back then-for good reason. Figure (2-5). Application level gateway [4] 2-1-2-1 How it works: The application level gateway acts as a relay of application level traffic as depicted in Figure (2-5). The user contacts the gate way using TCP/IP application, such as Telnet or FTP, and the gateway asks the user for the name of the remote host to be accessed. When the user responds and provides a valid user ID and authentication information, the gateway contacts the application on the remote host and relays TCP segments containing the application data between the two endpoints. If the gateway does not implement the proxy code for a specific application, the service is not supported and cannot be forwarded across the firewall. Further the gate way can be configured to support only specific features of an application that the network administrator considers acceptable while denying all other features. Figure (2-6) depicts the flow that make up the end to end connection between client and destination Telnet server. Figure(2-6). Overview of application gateway virtual connections.
  • 12. C hapt er T w o F ire w a ll T e c h n o lo g y The process that occurs for connecting to the specific host occurs like this: 1- A user telnets to the application gateway over port 23. The screening device checks the source IP address against a list of permitted sources. If connections are allowed from the source IP address, the connection proceeds to the next step. If not the connection is dropped. The application daemon running on the application gateway is a hardened application, which makes it much more difficult to compromise, and provides a single location that requires updating as new vulnerabilities are discovered. 2- The user is prompted for authentication. There are several advantages to authenticating a user at this step. Authentication on the gateway device allows for a centralized location for authentication. 3-If authenticated, the user is given a prompt or a menu of systems that he or she is allowed to connect to. These IP addresses are not directly accessible from the internet; they only accept connection from the gateway. Upstream filtering devices block direct access to these host IP addresses. 4- The use selects the system to connect to. This selection initiates a new TCP connection to the destination host, from the application gateway. 5-The user is prompted for additional authentication information if applicable. 2-1-2-2 Advantages and Disadvantages of Application Gateways Advantages: Application level gateways tend to be more secure than packet filters. Rather than trying to deal with the numerous possible combinations that are to be allowed and forbidden at the TCP and IP level, he application level gateway need only scrutinize a few allowable applications. In addition it’s easy to log and audit all incoming traffic at the application level. Disadvantages: Prime disadvantage of the application level gateway is the additional processing overhead on each connection. In effect there are two spliced connection between the end users, with the gate way at the splice point, and the gateway must examine and forward all traffic in both directions. [1] 2-1-3 Circuit Level Gateways: Circuit level gateways operate in a method that is similar to application gateways but typically are oriented more forward non-interactive applications. Beyond an initial authentication step, performed to ensure that the user is allowed to access the service through the gateway, the gateway simply relays the connection to the final destination. Proxy servers and SOCKS servers are typical examples of circuit gateway. Circuit gateways operate by relaying TCP connections from the trusted network to the untrusted network. In the process of relaying, the source IP address is translated to appear as if the connection is originating from the gateway. Most proxy applications require modification to the client application. One of the more common examples is a web proxy server. The client application (web browser) must be configured with the proxy server information. This consists of the IP address of the trusted interface of the proxy server and the TCP port the service is listening on.
  • 13. F ire w a l ls Figure(2-7). Circuit-Level gateway. [4] 2-1-3-1 How Circuit Gateways Work: The following steps indicate the flow of connection through a circuit level gateway: (Note as mentioned earlier, specific configuration is required when circuit gateways are used). 1- The user attempts a connection to a destination URL (http://www.companyname.com). 2- The client application, instead of sending a DNS request for this URL, sends the request to the resolved address for the inside interface of the proxy server. 3- If the authentication is required, the user is prompted for authentication. 4- If the user passes authentication, the proxy server performs any additional tasks (such as comparing the URL to a list of explicitly permitted or denied URLs), sends a DNS request for the URL and then sends a connection to the destination IP address with the source IP address of the proxy server. 5- The proxy server forwards the reply from the web server to the client. 2-1-3-2 Disadvantages: Most circuit level gateways are configurable on a TCP port basis. This does have disadvantage in that the circuit level gateway may not examine each packet at the application layer. This allows applications to utilize TCP ports that were opened fro other, legitimate applications, several peer to peer applications can be configured to run on arbitrary ports, such as TCP 80 and TCP 443 (commonly opened for web browsing). This opens the possibility for misuse and exposes potential vulnerabilities inherent in these applications. There are several other disadvantages to using circuit level gateway as a sole meaning of protecting a network. Inbound connection, are in general, not allowed, unless the functionality is built into the gateway as a separate application. Some client applications cannot be modified to support SOCKS or proxying. This would prevent them from accessing external resources through a gateway. [1] 2-1-3 Bastion Host: A bastion host is a system identified by the firewall administrator as a critical strong point in the network’s security. Typically, the bastion host serves as a platform for an application level or circuit level gateway. Common characteristics of bastion host are as follows:
  • 14. C hapt er T w o F ire w a ll T e c h n o lo g y - The bastion host hardware platform executes secure version of its operating system, making it a trusted system. - Only the services that the network administrator considers essential are installed on the bastion host. These include proxy applications such as Telnet, DNS, FTP, SMTP, and user authentication. - The bastion host may require additional authentication before a user is allowed access to the proxy services. In addition, each proxy service may require its own authentication before granting user access. - Each proxy is configured to support only a subnet of the standard application’s command set. - Each proxy is configured to allow access only to the specific host systems. This means that the limited command/feature set may be applied only to a subnet of systems on the protected network. - Each proxy maintains detailed audit information by logging all traffic, each connection and the duration of each connection. The audit log is an essential tool for discovering and terminating intruder attacks. - Each proxy module is a very small software package specifically designed for network security. Because of its relative simplicity, it’s easier to check such modules for security flaws. For example typical UNIX mail application may contain fewer than 1000. -Each proxy is independent of other proxies on the bastion host. If there is a problem with the operation of any proxy, or if a future vulnerability is discovered, it can be uninstalled without affecting the operation of the other proxy applications. Also, if the user population requires support for a new service, the network administrator can easily install the required proxy on he bastion host. - A proxy generally performs no disk access other than to read the initial configuration file. This makes it difficult for an intruder to install any dangerous files on the bastion host (e.g. Trojan horse sniffers). -Each proxy runs as a non-privileged user in a private and secured directory on the bastion host. [4] 2-1-4 Stateful Packet Inspection: SPI-based firewalls combine the speed and the flexibility of packet filters with the application level security of application proxies. This merging results in a compromise between the two firewall types: an SPI firewall is not as fast as a packet filtering firewall and does not have the same degree of application awareness as an application protocol. This compromise, however, has proven to be very effective in providing a strong network perimeter policy enforcement. SPI firewall operates by examining each packet as it passes through the firewall and permitting or denying the packet based on whether it is part of an existing conversation that has previously passed through the firewall or based on a set of rules very similar to packet filtering rules. This, on the surface, appears to be very similar to the operation of a packet filtering. The difference is the implementation of the packet examination. Figure (2-8) depicts the logic flow through a stateful packet inspection firewall.
  • 15. F ire w a l ls Figure (2-8). T he logic flow of stateful packet inspection. 2-1-4-1 How SPI firewall works: When packet arrives on an interface, several things happen within the inspection engine: 1-The packet is inspected to determine whether it’s part of an existing, established communication flow. A packet filtering firewall can only search for signs that a packet is part of an existing TCP conversation by looking at the state of the SYN bit (either set or cleared). 2- Depending on the protocol the packet may be inspected further. It will then make forwarding decisions based on the contents of the data. 3- If the packet does not have corresponding entry in the connection table, the firewall will inspect the packet against its configured rule set. The rule set for most SPI firewall is similar to a packet filtering firewall’s rule set: source IP address and port, destination IP address and port, and protocol. The packet filtering rule set can then be optionally extended to include the examination of the data as indicated earlier. 4- If the packet is permitted based on source, destination, protocol and packet content, the firewall will forward the packet toward its final destination and build or update connection entry in its connection table for the conversation. 5- The firewall typically use timers and inspection of a TCP packet with the FIN bit set as a way of determining when to remove the connection entry from the connection table.
  • 16. C hapt er T w o F ire w a ll T e c h n o lo g y 2-1-4-2 Security Advantages of SPI: SPI has two primary advantages over packet filtering technologies. The connection table greatly reduces the chance that a packet will be spoofed to appear as it were part of an existing connection. Because packet filtering firewall do not maintain a record of the pending communications, they must rely on the format of the packet-specifically, the status of the SYN bit in a TCP packet- to determine whether the packet is part of the previously approved conversation. This opens the possibility of packet spoofing of TCP packets and does not provide any method of determining the status of UDP or ICMP packets. By maintaining a connection table, the firewall has much more information to use when determining whether to permit a packet to pass. The second advantage to SPI firewalls over packet filtering firewalls is their ability to look into the data of certain packet types. This has become a very valuable feature due to a number of well known and well publicized vulnerabilities in common protocols. Two examples of this are the FTP and SMTP protocols. Both FTP servers and clients have a number of vulnerabilities, many of which are based on the incorrectly formatted request or command. The inspection feature of SPI firewalls allows a firewall to examine the data of a packet to determine the validity of the command. 2-1-4-3 Disadvantages: A SPI firewalls does not protect the internal hosts to the same degree as an application layer firewall, because it simply looks for specific strings within the data portion of the packet. In addition it does not act as proxy or setup a separate connection on behalf of the source. [1] 2-2 Firewall Configurations: Using the aforementioned components but arranging them in different configurations, we can come up with different kinds of firewalls that have different strengths and weakness. 2-2-1 Screened Network (Packet Filtering Only): The simplest kind of firewall uses only packet filtering software running on a screening router to let the good guys in and keep the bad guys out. This configuration is shown in figure (2-9). . Figure (2-9). A simple firewall that uses a screening router.
  • 17. F ire w a l ls All traffic into and out of the intranet must pass through the screening router, where rules determine what traffic will be allowed through. 2-2-1-1 Benefits of the Screened Network: Packet filtering is easy to employ for small, uncomplicated sites. If there is already a single router between your network and the outside world, you may be able to simply add packet filtering software to it. In one step you have added protection for your entire network. Packet filtering doesn’t require any changes to applications your users are running, and it does not require users to learn any new tricks. Users won’t even know the screening server I there unless they try to do something that’s against the rules. 2-2-1-2 Disadvantages of the Screened Network: Screening routers have a number of shortcomings: - They have little or no logging capability, so the network administrator cannot easily determine if the system is or has been under attack. - The table of rules can quickly become very large and complex and the rules are difficult to test. As the table grows in size and complexity, the likelihood of having holes in the rule structure increases. - The biggest disadvantage is that you are relying on a single component for protection. If that component fails, it could leave the door to your network wide open, and you might not even know it. 2-2-2 Dual-Homed Gateway: Using a single proxy server by itself, you can set up dual homed gateway, as shown in Figure (2-10). Figure (2-10). A dual homed host has two IP addresses.
  • 18. C hapt er T w o F ire w a ll T e c h n o lo g y A dual-homed host is a computer with two Network Interface Card (NIFs), each with its own IP address. If a computer on one network wants to communicate with a computer on the other, it must connect with the IP address that it can “see” on the dual- homed host. The proxy server software checks its rules to see if the connection is permissible. If it is, the proxy server software initiates the connection to the other network through the second NIC. An example of a dual homed host is the SmartWall gateway. 2-2-2-1 Benefits of a Dual-homed Gateway: A dual homed gateway has some attractive features: - The main advantage is that the gateway provides a complete separation of the protected network from the outside world. - Proxy servers provide logging that can help in detecting attacks. Because it’s a host computer, it can be used for services such as authentication servers as well as proxy servers. DNS information does not pass from the protected network to the outside world, so names and IP addresses of site systems are hidden from Internet systems. 2-2-2-2 Disadvantages of a Dual-homed Gateway: - The proxy server needs to be designed specifically for each service that needs to use it. (That used to mean a separate proxy server for each service. Newer proxy servers, such as the AltaVista Firewall, can handle several services but not just any service that comes along). If you want to add a service that the proxy server doesn’t handle, you have a problem. - If IP forwarding becomes enabled in some way (as could happen if the operating system is reinstalled and some one forgets to turn off routing), all security is lost. - The dual-homed gateway is the only component of the firewall; you have a single point of failure that could jeopardize your security. 2-2-3 Screened Host: A screened host firewall uses both a screening router and an application gateway to achieve a higher level of security that you could get with either one by itself. This configuration is shown in figure (2-11). Figure (2-11). The screened-host configuration.
  • 19. F ire w a l ls In screened host firewall, all traffic from the internet is directed to the screening router which filtering traffic according to the rules it has been given. All traffic that satisfies the rules is forwarded to the application gateway. In most cases, all traffic that is addressed to any machine other than the gateway is rejected. In this case the application gate way has only one network interface card (that is, it is not a dual homed gateway). The proxy server software on the gateway applies its own rules and passes permissible traffic on to the protected network. 2-2-3-1 Benefits of a screened-host Firewall: - The configuration is more flexible than a dual-homed gateway firewall. It can be set up so that the screening router passes some traffic directly to sites on the internet instead of to the application gateway. You might want to do that if, for example, you have an HTTP server set up as sacrificial lamb that does not require protection. - The rules for packet filter can be less a complex than for a screened network configuration because most or all the traffic will be directed to the application gateway. - If either component fails in an “open” condition, so that it no longer blocks anything, the other component still affords some measure of protection. 2-2-3-2 Disadvantages of a Screened-host firewall: - The two components of the firewall need to be configured carefully to work together correctly. For example, the route has top be set up to route all traffic to the proxy server. Even though the rules for the packet filter may be less complex, the overall job of configuring the firewall may be more complex. - The flexibility of the system can lead to the temptation to take shortcuts that can subvert security. For example, users might try to set up connections directly to the router to avoid the proxy server. Administrating need to be more diligent in adhering to security policy. 2-2-4 Screened Subnet: The screened-subnet firewall adds another screening router to the screened host configuration to create a subnet that is sometimes called the demilitarized zone. A screened subnet firewall is shown in figure (2-12). Figure(2-12). The screened-host configuration.
  • 20. C hapt er T w o F ire w a ll T e c h n o lo g y The demilitarized zone is the gray shaded area in the illustration. In addition to the application gateway shown, this subnet could also be used for information servers, modem pools and other systems that require carefully controlled access. The exterior screening router and the application gateway function as they do in a screened-host firewall. The interior screening router provides additional protection between the application gateway and the protected network. Think of the interior router as a fall back defense in case an attacker gets through the exterior router and application gateway. 2-2-4-1 Benefits of the Screened-subnet Firewall: The chief benefit of the screened subnet firewall is an other layer of protection. To gain access to the protected network, an attacker would have to go through two routers and the application gateway-not impossible, but more difficult than with a screened-host firewall. 2-2-4-2 Disadvantages of the screened host firewall: -It’s the most expensive configuration (of those described here) because it requires the greatest number of machines and software modules. - With three machines. Including two routers with their rule tables, configuration of the overall system can become quite complicated. Other firewall Configuration: You can come up with variations of the configurations described here to suit your security policy. You might want to use more bastion hosts to separate traffic for different services. You could add more layers of screened subnets to deal with traffic to and from networks with varying degrees of trustworthiness. The point is that there are no hard and fast rules for how a fire wall should be set up. Just remember a couple of guidelines: - First and foremost, keep your security policy in mind and make sure your firewall faithfully implements it. - Avoid the temptation to take shortcuts around more burdensome aspects of the security policy. Effective security sometimes means inconvenience. - Keep it as simple as possible. More is not necessarily better, especially if adding more elements to you firewall makes it impossibly complex to set up and administer, or so difficult to use that users resort to an authorized shortcuts. [2]
  • 21. F ire w a l ls Chapter Three Practical Practical Firewall Implementation Now that we have reviewed the concepts and theories behind firewalls, we discuss how they can be put into practice in the real world. In this chapter we create a hypothetical corporation with the original name Acme, Inc. Using Acme as our example we will show how and where firewalls can be used in a company’s intranet to enhance overall security. Our purpose here is not to explain in technical detail how each item discussed would be accomplished, but to show approaches that this hypothetical company might use to solve common problems. Our sample corporation: Acme, Inc. Acme, Inc. is small manufacturing company that produces a single product--the ever popular widget. These products are sold wholesale only to a fairly large base of retailers throughout the country. Figure (3-1) depicts the company’s organizational chart. Figure (3-1). Acme’s organizational chart shows a simple management structure with function consolidated in three main departments: production, sales/marketing, and finance. Acme’s corporate headquarters are in Dallas, Texas. The main management function takes place there. The main production facility is located in New Orleans, with distribution points in New York, Chicago, and Los Angles. Located with the shipping centers are the regional sales offices. These sales offices manage the salesmen in their respective regions, but report to Dallas for overall management functions. All significant financial functions occur in Dallas and that the data for those functions also is stored primarily in Dallas. Moreover, all of the functions in a particular city (for example, Chicago) are physically located in the same building. Acme’s daily operations involve sales persons soliciting and taking orders from customers and passing those orders to their regional offices, and the regional offices passing the orders to both the shipping facilities and the home office (for accounting purposes). The shipping facilities fill and ship orders, notifying the production facility in New Orleans on a daily basis as to activity so that production can be adjusted to meet anticipated demand.
  • 22. Chapter Three Practical Firewall Implementation Here we are going to concentrate primarily on areas of computer security, includes areas in which firewall will help the company meet its security needs. We will set out security issues and then we will provide sample solutions to those issues. 3-1 Security Issue: Defining the internet connection As a first step toward expanding customer accessibility and upgrading the company’s image, Acme management decides that a presence on the World Wide Web (WWW) is essential. To accomplish this goal, the company considers two general approaches, with a security primary concern. First, the company could purchase, install, and run its own web server system. Acme is a widget company; however, after considering all factors, including long- range cost, start-up time, security risks, and so on, the company opts for an other approach: hiring an outside company to create and manage the corporate Web page. Solutions: Thus, Acme retains the services of professional Web server provider. This company consults with Acme, determines its goals, target markets, and potential for expanding business via the Web, and then designs an attractive Web homepage for Acme, Inc. The page is up and running in a matter of few days. Initially, only information about Acme products is available, at shortly thereafter, Web users will have the ability to send Email messages to any of Acme’s regional sales offices, generating a call back from the appropriate salesperson. The system could be created so that no information flows out of Acme via the channel-for example, incoming mail would be passed through the office of the professional web server onto Acme’s central SMTP (Simplified Mail Transfer Protocol) system, and outgoing mail would be filtered by a firewall. This system could be protected with a firewall product (such as a packet filter) that allows only the one way passage of SMTP (or other Email protocol) data. Other data that the Web provider might need for the home page, such as announcements of new products, updates on product availability, special promotions, and so on, could likewise be transferred via some secure method - e.g., a one way email service on the company’s intranet-such that no files need to be transferred via the internet for this service. 3-2 Security Issue: Determining Who Need Access: To protect computer data, the first step is determining who needs data and who does not. Further, in any computer network, including Acme’s, a conscious effort must be made to decide which users in the organization need to communicate with other users and who those other users are. Solutions: Accordingly, Acme determines to organize the intranet by establishing internal servers for each major department. Each server will serve as the host for the data generated by the department. For example, the production department server will host product design data, production figures, and shipping records. The sales/marketing department will host sales order, invoices, and product sales information. The finance department server will host financial data such as customer account information, budgets, payroll, and so on. Acme next determines that, where possible, data will be available only to individual users on an “as- needed” basis; in particular, users will not normally have access to data outside their own department. Employees at higher levels in the organization, however, as
  • 23. F ire w a l ls appropriate for their function. For example, the vice president for finance will have access to almost all data anywhere on the intranet, except for highly sensitive engineering data, which he or she will not likely need very often. (The president, who authorizes the funds for the system, will, of course, have access to any thing the president wants.) Table (3-1) provides a partial list of the data that Acme identifies, along with the people who need access and the intranet server where the data will reside. Table (3-1). This table shows where various information inside Acme is created and how it’s shared. In figure (3-2) we can see how Acme begins the process of setting up its intranet. Figure (3-2). The beginnings of the Acme intranet with a server for each department.
  • 24. Chapter Three Practical Firewall Implementation 3-3 Security Issue: Identifying Weak Spots in Information Flow: Before actual implementation, Acme’s carefully consider all security issues. Among those issues most important to Acme are the following: - Limiting access to servers with remote (that is, dial up) access capabilities. - Securing sensitive design data. - Preventing employees who should not have access to certain information from getting that information. In order to careful consider security issues, we walk through the steps that show how various types of information are generated and used. Along the way, we examine how and where firewalls can help Acme ensure the integrity of its intranet. 3-4 Security Issue: Managing Remote Access: The heart of Acme’s operations is getting and filling orders from customers. Thus, it’s vitally important that sales representatives’ orders are processed quickly and efficiently on the new intranet. It’s equally important, however, that the process by which those orders will now be transmitted (that’s through the company’s intranet) be secure. First, sales reps take the orders from the customers and input the information into computer order forms on their notebook computers, which they never leave home without. At the end of the day, they compile the orders into single data files for transfer to the regional sales office. Next, sales representatives begin the process of uploading the sales onto the company’s FTP (File Transfer Protocol) order sites, located at each of the regional sales offices. This is accomplished by using communications software on the notebook computer to dial into the regional office’s “modem center” via a cellular phone built into the notebook computer. Solutions As noted previously, anywhere an organization uses a standard telephone line for remote access; a danger exists that the number, and thus the line, may be attacked by a hacker. Anywhere that a hacker finds a modem answering the phone, a variety of attacks may begin on the system. For example, computerized hacking programs that repetitively dial modem numbers and attempt to intercept password data, or programs that dial the modem and attempt to download a virus file, are common. Acme recognizes this danger and takes steps to protect this doorway into its system. Because this remote accessibility is a potential security risk point. Acme decides to use a two-stage firewall at this point in its system. This decision is made for two reasons. First, Acme wants an extra quot;layerquot; of protection for the modem system due to the potential security risk inherent with dial-up type systems. Second, whatever system protects the modems will not sufficiently prevent unauthorized access from within the corporation. That is, there may be employees inside the organization with legitimate need and access through the remote access system who do not have access to all data inside that firewall. For example, Bob Smith, the new salesperson, will need to have remote access to the sales server, but, once inside, he does not need the same access as the regional sales manager, who may have access to sensitive information, such as the evaluation of Bob's request for a raise. In addition, the Sales server must be protected from those users who do not access the server through the remote access system at all, but rather have access through internal channels. Again, Bob may have a desktop PC with access to this server, but he does not
  • 25. F ire w a l ls need access to sensitive, managerial-type data. To carry out this two-stage firewall protection, Acme decides to use the Modem Security Enforcer, that requires users to call in, and pass a two-step password test, then hangs up the system and calls the user back at a pre-established telephone number (thus the necessity of the built-in cellular telephone in the notebook computer). After the salesperson successfully passes through the modem security, the salesperson encounters the second firewall located on the Sales/Marketing Web server. For this firewall, Acme chooses a product that works by using more traditional firewall protection, such as a proxy server. In this case, Acme uses Borderware Firewall Server, which accepts the data from the salesperson's notebook-generated order file and passes it through to the FTP site on the intranet. Any data that comes back to the notebook during this process is protected by means of a Network Address Translation (also provided by Borderware's Firewall Server), which changes the actual internal addressing on information sent out to the remote computer. Therefore, even if a hacker should manage to intercept some of the outgoing data, the addressing has been changed by the firewall server, and quot;spoofingquot; of this address will not allow the hacker back into the system. The order is then combined with the other sales representatives' orders collected at the internal FTP site and downloaded by the regional sales offices for forwarding via internal (that is, inside the firewall) systems to the regional sales manager for that manager's records. Figure (3-3) shows what the Sales/Marketing portion of the Acme intranet looks like. Figure (3-3). Here is the Sales/Marketing part of the Acme intranet with the firewalls added. A process similar to that described here is used for transferring the data from the three sales offices to the main office. That is, the sales orders are combined into a single, larger format order and transferred to the various offices and the appropriate shipping points. Here, however, no public telephone lines are used. Rather, dedicated quot;Tlquot; telephone lines are used to move the data from the sales offices to the shipping point and main office internal FTP sites, respectively. Figure (3-4) shows a simple diagram depicting the flow of the information.
  • 26. Chapter Three Practical Firewall Implementation Figure (3-4). This diagram shows a typical sales order as it travels from the point of sale to the production and shipping facilities. 3-5 Security Issue: Getting Information to Remote Sites In addition to receiving sales orders, the regional (and central) sales offices must make available to the sales force the latest information concerning changes to product lines, pricing information, shipping delays, and so on. As with previous tasks, Acme is not only concerned that this information be made available but also that the process of making it available be as secure as possible. Also, as noted previously in Table 3-1, all offices (sales, marketing, and finance) must be able to access production figures and shipping times from the main production facility. Solutions These tasks can be accomplished using a secure e-mail system. Thus, the Acme intranet design team decides that, due to the need to pass queries and other short messages among various employees, the primary intranet system will be supplemented with a dedicated mail server system to handle only internal e-mail. 3-6 Security Issue: Managing Internal Access to Sensitive Information Acme's Finance Department presents some unique challenges in that all of the other departments must have access to some of the data (for example, budgeting information) but should not be allowed access to other data (for example, the president's expense account) in that department. Solutions To accomplish these tasks, Acme decides to use a unique arrangement called a Tri- homed gateway, using a product that allows Acme to segregate the server, allowing outside access to only a portion of the data while restricting access to the sensitive data. One such product is Borderware's Secure Server Net system. By using this three- pronged approach, Acme can essentially create an intranet within an intranet, thus allowing quot;outsidersquot; (such as the folks in Sales and Production) access to a quot;publicquot; (yet secure) server in the department where appropriate data can be stored. Meanwhile, both the public portion of the Finance Department's network and the rest of
  • 27. F ire w a l ls the Acme intranet are separated by the firewall from the sensitive portions of the financial data. Figure (3-5) shows how the Finance Department can effectively be segregated into two quot;subnetsquot; using the Secure Server Net concept. A similar approach could be used in any department that has both information that should be available company-wide and data that should be used within that department only. For example, Acme closely guards its production process, which it believes gives it a competitive advantage over its chief rival, Beta Company. Therefore, Acme restricts access to that information to those in the company who really need to know the information, such as engineers and the production managers. For that reason, another Secure Server Net (that is, a tri-homed gateway) might be used to allow intranet-wide access to shipping and production output data, while restricting access to sensitive production engineering data to those within the department. Figure (3-5). Acme's Secure Server Net approach to controlling data in the Finance Department. In addition to the firewall placement matters mentioned here, Acme will also employ other, more traditional, computer security measures. For example, all users will have unique user names and passwords, providing an additional level of security inside the firewalls. These passwords will have relatively short expiration dates and will be changed approximately every 60 days to help limit damage from compromised passwords. By using these passwords, Acme can control the information available to specific individuals within departments. Again referring to a portion of Table 5-1, note in the following Table (3-2), for example, the people who need access to quot;sales ordersquot; information.
  • 28. Chapter Three Practical Firewall Implementation Table (3-2). This portion of table (3-1) shows the people who need access to sales information. In this case, the entire Sales Department is given access to the sales order data. In the Production Department, however, only the managers need access. Thus, a user with a Production Department address will be allowed through any security (including a firewall) that protects the Sales/Marketing server. Once inside that firewall, however, the actual sales order data will be password-protected, and only those users with the appropriate password will be allowed to access this information. Acme will also implement some systems administrator-level measures to help guard against unauthorized access. For example, audit trails will be established on particularly sensitive data or directories (such as payroll records and files containing sensitive design data) so that the administrator can routinely examine which users are accessing the data. Unusually high numbers of unsuccessful login attempts, both internally and externally (via remote-access gateways), will generate messages to the administrator. These login attempts will be traced to the stations attempting to log in to ascertain whether an employee has a problem typing his or her password, or whether the employee is trying to go somewhere he or she shouldn't go. These audit trails will be implemented as part of the firewall protection for the particular server in question. In our example, the Finance Department will already be using BorderWare Firewall Server (due to the need to create the Secure Server Net, described previously), and, therefore, that product's auditing/ reporting features will be set up to perform the audit trail functions described. 3-7 Security Issue: Virus Detection & Removal Virus detection and removal software will be used on all Acme computers (desktop and notebooks), and employees will be instructed that no floppy disks should enter the company facilities without being checked for viruses by the designated computer person in that office. 3-8 Acme's Future: With the firewalls and other security measures described in this chapter, Acme will begin to automate the flow of essential data around the company. At the same time, the company will ensure with each new phase of automation that sensitive and proprietary information is protected and, as important, that the company's intranet is guarded from outside attacks by unscrupulous hackers. In the meantime, Figure (3-6) shows what our completed Acme intranet system looks like. [2]
  • 29. F ire w a l ls Figure (3-6). The completed Acme intranet, included the firewalls described in the chapter.
  • 30.
  • 31. References: [1] Firewalls: The complete reference, by: Keith Strassberg, Richard Gondek, and Gary Rollie. McGraw-Hill/Osborne, ©2002. [2] Intranet Firewalls, by:Scott Fuller & Kevin Pagan. Ventana Communications group Inc. ©1997. [3] Firewalls and Encryption. Asset International. Tata McGraw-Hill, ©2000. [4] Cryptography and Network Security, third edition, by: William Stallings, ©2003 by Pearson Education Inc. [5] www.howstuffworks.com