Firewalls [electronic resource] : a complete guide / Marcus Gonçalves

advertisement
Student Name : AVNEESH DATTA
Title of Project : Firewall Design for Internet Security
Goal of the Project
To discuss some firewall definitions, the Firewall Design outlining the basic
components and major architectures used in constructing firewalls: dual-homed hosts,
screened hosts, screened subnets, and variations on these basic architectures. Also a
brief discussion on Internal Firewalls and what future holds.
Brief discussion of how my goal will be achieved
Firewalls are a very effective way to protect a system from most Internet security
threats and are a critical component of today's computer networks. Firewalls in
networks keep damage on one part of the network from spreading to the rest of the
network. Without firewalls, network security problems can rage out of control,
dragging more and more systems down.
In this project I plan to discuss how to build firewalls on the Internet providing stepby-step explanations of how to design and install firewalls, and how to configure
Internet services to work with a firewall. I would describe a variety of firewall
technologies (packet filtering, proxying, network address translation, virtual private
networks) and architectures (e.g., screening routers, dual-homed hosts, screened
hosts, screened subnets, perimeter networks, internal firewalls). And also describe
issues involved in a variety of new Internet services and protocols through a
firewall.
Designing the firewall system
Designing a firewall requires that you understand and identify the boundaries between
security domains in your network. The most common boundary where firewalls are
applied today is between an organization’s internal networks and the Internet. When
establishing an Internet firewall, the first thing one must decide is its basic
architecture. In this context, architecture refers to the inventory of components
(hardware and software), and the connectivity and distribution of functions among
them. There are two classes of firewall architectures, which we refer to as the single
layer and the multiple layer architectures.
In a single layer architecture, one network host is allocated all firewall functions and
is connected to each network for which it is to control access.
In a multiple layer architecture, the firewall functions are distributed among a small
number of hosts, typically connected in series, with DMZ networks between them.
Having chosen the basic architecture (i.e., the number of hosts, the method in which
they are connected, the tasks that each will perform), the next step is to select the
firewall functions to be implemented in these hosts. The two most basic categories of
firewall function are packet filtering and application proxies. These functions can be
used separately or jointly and can be implemented on the same or on different firewall
hosts.
How to do it ?
 Document the environment
The generation and use of diagrams are extremely important while designing
your architecture.
 Select firewall functions
Firewall functions available in today's products include packet filtering,
application proxies, and state-full inspection filtering. Each of these functions implies
a certain range of possible choices for deployment platforms. A firewall deployment
platform is the combination of the particular hardware and operating system on which
the desired firewall functions execute. The following sections lists each of these
functions and the platform choices available.
 Packet filtering
Since routers are commonly deployed where networks with differing
security requirements and policy meet, it makes sense to employ packet filtering
on routers to allow only authorized network traffic to the extent possible.
 Application proxies
An application proxy is an application program that runs on a firewall
system between two networks.
 Stateful inspection or dynamic packet filtering
We use the terms stateful inspection or dynamic packet filtering to refer to
a more capable set of filtering functions on routers.
 Select the firewall topology
While the firewall functions described above can be deployed in a wide
variety of ways, there are a small number of commonly deployed architectures. They
are presented in order of increasing effectiveness.
1. Basic border firewall
2. Untrustworthy host
3. DMZ network
4. Dual firewall
 Perform architectural trade-off analysis
Firewalls are typically thought of in their restrictive or protective sense. That
is, they protect your network from the Internet or they restrict access to your network
from the Internet. In today’s Internet-enabled organizations, firewalls are more
frequently thought of as safely empowering the organization to interact with the
Internet. As such, firewalls are very much part of an organization’s mission-critical
infrastructure and they need to be designed accordingly.
As a result, you must make the same architectural tradeoffs in designing your firewall
that are commonly made in other mission-critical systems. Architectural
characteristics that must be considered include : Performance, availability, reliability,
security, cost, manageability, configurability and function.
References (Not the complete list) :
 www.itworld.com
 www.cert.org/security-improvement
 http://www.interhack.net/pubs/fwfaq/
 Firewalls: a complete guide / Marcus Gonçalves.

Building Internet firewalls / D. Brent Chapman and Elizabeth D. Zwicky
GOOD. I HAVE UNDERLINED WHAT I CONSIDER TO BE WHERE YOUR
FOCUS SHOULD BE. A DETAILED TECHNICAL PRESENTATION IS
EXPECTED.
Download