- Cisco Networking Academy

advertisement
Chapter 3
Firewall Configuration Strategies
LECTURE NOTES
Establishing Rules and Restrictions for Your Firewall
The firewall rules and the definitions you set up tell the firewall what types of traffic to
allow into and out of your network. Note that all firewalls have a rules file which is the
most important configuration file on your firewall.
The Role of the Rules File
The specific packet-filtering rules that you set up for a firewall actually implement the
security approach specified in your security policy. A restrictive approach will be reflected
in a set of rules that blocks all access by default, then permits only specific types of
traffic to pass through. A connectivity-based approach will have fewer rules because its
primary orientation is to let all traffic through and then block specific types of traffic.
Restrictive Firewalls
If the primary goal of your planned firewall is to block unauthorized access, the emphasis
needs to be on restricting rather than enabling connectivity. The table below describes
some primarily restrictive approaches:
Approach
Deny-All
In Order
(sometimes
called “first
fit”)
Best Fit
What It Does
Blocks all packets
except those
specifically allowed
Processes firewall
rules in top-tobottom order
Advantage
More secure;
requires fewer rules
Disadvantage
May result in user
complaints
Good security
Incorrect order
can cause chaos
The firewall
determines the order
in which the rules
are processed –
usually it starts with
the most specific
rules and goes to the
most general
Easy to manage;
reduces risk of
operator error
Lack of control
Instructor: Prof. Michael P. Harris
ITSC 2401 – Firewalls and Network Security
Chapter 3
Firewall Configuration Strategies
Connectivity-Based Firewalls
The following table lists the advantages and disadvantages of whether your firewall
should enforce a restrictive policy or one that emphasizes connectivity:
Approach
Allow-All
Port 80/
Except Video
What It Does
Allows all packet to
pass through except
those specifically
identified to be
blocked
Allows Web surfing
without restrictions,
except for video files
Advantage
Easy to implement
Disadvantage
Provides minimal
security;
Requires complex
rules
Lets users surf the
Web
Opens network to
Web vulnerabilities
Firewall Configuration Strategies: The 10,000-Ft Overview
A firewall needs to adapt to the changing needs of the organization whose network it
protects. Therefore, it you should provide for the firewall’s growth by recommending a
periodic review and upgrading software and hardware as needed.
Productivity
Two important features of the firewall are the processing and memory resources
available to the bastion host. A bastion host, though it may not be the only hardware
component in a firewall architecture, is of central importance to the operation of the
firewall software that it hosts. If the host machine runs too slowly or does not have
enough memory to handle the large number of packet-filtering decisions, proxy service
requests, and other traffic, the productivity of the entire organization can be adversely
affected. That is because the bastion host resides on the perimeter of the network and,
unless other bastion hosts and firewalls have been set up to provide the network with
load balancing, the bastion host is the only gateway through which inbound and
outbound traffic can pass.
Dealing with IP Address Issues
The more complex a network becomes, the more IP-addressing complications arise. It is
important to plan out the installation, including IP addressing, before you start
purchasing or installing firewalls.
IP forwarding enables a packet to get from one network’s OSI stack of interfaces to
another. Most operating systems are set up to perform IP forwarding. Proxy servers that
handle the movement of data from one external network to another perform the same
function; however, if a proxy server is working, IP forwarding should be disabled on
routers and other devices that lie between the networks.
2
Greg Holden, GUIDE TO Firewalls and Network Security
Thompson/Course Technology ©2004 ISBN: 0-619-13039-3
Page 2
Instructor: Prof. Michael P. Harris
ITSC 2401 – Firewalls and Network Security
Chapter 3
Firewall Configuration Strategies
Different Firewall Configuration Strategies You Can Use
The following table describes a variety of firewall configurations:
Name
Screening router
Description
Packet-filtering router sits between client computers and
the Internet.
Dual-homed host
A client computer that is connected to the Internet hosts
firewall software.
Screened host
A host dedicated to security functions hosts the firewall
software.
Two routers with
one firewall
Routers are positioned on the external and internal
interfaces of the firewall and perform packet filtering.
DMZ screened
subnet
A network of publicly accessible servers (the DMZ) is
connected to the firewall but is outside the internal
network being protected.
Multi-firewall DMZ
A DMZ is enclosed by two firewalls for added security.
Reverse firewalls
A firewall that monitors outbound rather than inbound
traffic.
Specialty firewalls
Firewalls designed to protect specific types of
communications, such as e-mail.
Screening Router
1. One of the simplest types of protection is a router that sits between the client
computer(s) and the Internet and that is set up to do packet filtering. Such a
screening router filters traffic to individual computers within the internal network.
You should only choose this very simple, minimally secure setup in a situation such
as a subnet within a network that is already protected by a firewall.
2. A router has two interfaces: the external interface is the one that connects to the
outside network while the internal interface connects to the internal network that is
being protected. Note that each interface has its own unique IP address.
3
Greg Holden, GUIDE TO Firewalls and Network Security
Thompson/Course Technology ©2004 ISBN: 0-619-13039-3
Page 3
Instructor: Prof. Michael P. Harris
ITSC 2401 – Firewalls and Network Security
Chapter 3
Firewall Configuration Strategies
Dual-Homed Host
Dual-homed host is a fancy-sounding term for a computer that has two network
interfaces (and correspondingly, two network interface cards). Typically, one interface
card is assigned to the Internet and the other to a local area network. By default, the
host’s ability to forward IP packets from one network to the other is completely disabled.
Rules are then established by the end user to enable traffic to flow through the firewall as
needed. You might choose this setup in situations such as securing a single standalone
workstation and securing a small home network.3
Screened Host
A screened host is sometimes also called a dual-homed gateway or bastion host. A
bastion host is a screened host, but one that has been hardened through the addition of
all available security patches and service packs. In addition, the bastion host has had all
but the necessary services and TCP and UDP ports disabled, and all of its security-related
events are extensively logged.
Two Routers, One Firewall
A common configuration is to put a router on either side of the screened host that serves
as a firewall. The router positioned on the outside can perform initial, static packet
filtering. The router positioned just inside the network can route traffic to the appropriate
computers in the LAN being protected. You might choose this setup in situations where
you truly need Defense in Depth, such as a government office network or a financial
institution.
DMZ Screened Subnet
1. A DMZ is a network that sits outside the internal network but is connected to the
firewall. Note that the firewall in a DMZ screened subnet setup is sometimes
described as three pronged (sometimes also called tri-homed). The firewall connects
to three separate networks and thus requires a separate network interface card for
each. The three networks are as follows:
Networks
:
a. The external network - the Internet or a branch office
b. The DMZ screened subnet
c. The LAN being protected
4
Greg Holden, GUIDE TO Firewalls and Network Security
Thompson/Course Technology ©2004 ISBN: 0-619-13039-3
Page 4
Instructor: Prof. Michael P. Harris
ITSC 2401 – Firewalls and Network Security
Chapter 3
Firewall Configuration Strategies
2. Three-pronged firewalls that use only a single firewall have advantages and
disadvantages, which are summarized as follows:
Advantages
&
Disadvantag
es:
Simplification: Only one set of rules to be configured.
Complexity: Rules need to control both outbound and inbound
traffic.
Lower cost: Only one firewall needs to be licensed.
Vulnerability: The firewall and DMZ provide a single point of
protection that, if breached, opens the entire local network and
DMZ to the hacker.
Performance: The firewall and DMZ can become a bottleneck
Multiple-Firewall DMZs
Firewall security is a tradeoff between enabling access from the protected network to the
Internet, while providing the maximum security possible to the private network. For many
large corporations, having two or more firewalls is a necessity rather than a luxury. They
develop security policies that mandate the use of more than one firewall to protect the LAN
from the Internet and the added security offsets any slowdown in performance that the two
firewalls will bring. Note that end users may have to wait a few seconds before connecting
to a Web site or downloading a file, but the added security makes it worthwhile.
Two Firewalls, One DMZ
You can set up a three-pronged network with a DMZ using two (or even more) firewalls
for a number of different reasons:


One firewall can control traffic between the DMZ and the Internet, while the
other can control traffic between the protected LAN and the DMZ.
The second firewall can serve as a failover firewall. It provides a backup that
can be configured to switch on if the first one fails, thus providing
uninterrupted service for the organization.
Two Firewalls, Two DMZs
A company that commits to using multiple firewalls makes its security setup more
complex, but it gains flexibility as well. The company can set up separate DMZs for
different parts of the organization. This is advantageous because it helps balance the
traffic load between parts of the organization.
5
Greg Holden, GUIDE TO Firewalls and Network Security
Thompson/Course Technology ©2004 ISBN: 0-619-13039-3
Page 5
Instructor: Prof. Michael P. Harris
ITSC 2401 – Firewalls and Network Security
Chapter 3
Firewall Configuration Strategies
Approaches that Add Functionality to Your Firewall
A router or firewall that performs NAT converts publicly accessible IP addresses to private
ones and vice versa, thus shielding the IP addresses of computers on the protected
network from those on the outside.
Encryption
A firewall or router that includes Secure Sockets Layer (SSL) or some other type of
encryption, takes a request, turns it into gibberish using a private key, and exchanges
the public key with the recipient firewall or router. The recipient then decrypts the
message and presents it to the end user in understandable form.
Application Proxies
An application proxy is software that acts on behalf of a host, receiving requests,
rebuilding them completely from scratch, and forwarding them to the intended location
as though the request originated with it (the proxy). It can be set up with either a dual
homed host or a screened host system. In a dual-homed host setup, the host that
contains the firewall or proxy server software has two interfaces, one to the Internet and
one to the internal network being protected.
VPNs
Many companies use the Internet to provide them with a VPN that connects internal
hosts with specific clients in other organizations. The advantage to a VPN over a
conventional Internet-based connection is that VPN connections are encrypted and
limited only to machines with specific IP addresses.
Intrusion Detection Systems
An external router with an intrusion detection system (IDS) can notify you of intrusion
attempts from the Internet. An internal router with IDS can notify you when a host on
the internal network attempts to access the Internet through a suspicious port or using
an unusual service, which may be a sign of a Trojan horse that has entered the system.
An IDS might also be configured to look for a large number of TCP connection requests
(SYN) to many different ports on a target machine, thus discovering if someone is
attempting a TCP port scan. The IDS sends the alert so an administrator can either
prevent it or cut the attack short before too much damage occurs.
6
Greg Holden, GUIDE TO Firewalls and Network Security
Thompson/Course Technology ©2004 ISBN: 0-619-13039-3
Page 6
Instructor: Prof. Michael P. Harris
ITSC 2401 – Firewalls and Network Security
Chapter 3
Firewall Configuration Strategies
Reverse Firewalls
Some forward-thinking companies have installed a reverse firewall, a device that
monitors information going out of a network rather than trying to block what is coming
in. In a Denial of Service attack, information will be flooding out of the network from the
infected computer(s), thus overloading the network. A reverse firewall, such as the
hardware device sold by Los Angeles-based company Cs3, inspects outgoing packets and
tracks where they are coming from within the network. If a high number of “unexpected”
packets is detected leaving the network, the firewall notifies the network administrator.
Class Discussion Topics
1. Discuss the role played by a rules file in the firewall’s operation.
2. Discuss various firewall configuration strategies.
3. Discuss approaches that add specific functionality to a firewall.
Additional Case Projects
1. Ask students to try and identify some specialty firewalls that are widely used.
2. Ask students to draw the layouts for different firewall configurations.
Further Readings or Resources
1. For a description of VPN technologies, see: http://www.vpnc.org/vpntechnologies.pdf
2. For product comparisons, see:
http://www.remainsecure.com/whitepapers/firewalls/fwswcomp.htm
7
Greg Holden, GUIDE TO Firewalls and Network Security
Thompson/Course Technology ©2004 ISBN: 0-619-13039-3
Page 7
Download