Lecture Computer Networks Prof. Dr. Hans Peter Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau | Sommersemester 2012 | Institut für Organisation und Management von Informationssystemen Security / Firewall Page 2 Computer Networks | Security | Sommersemester 2012 Types of Attacks • General Intrusion • Compromise reputation • Denial of service • Information theft • Corruption of data, deletion of files Page 3 Computer Networks | Security | Sommersemester 2012 Security Steps • No security • Security through obscurity • Host security • Network security Page 4 Computer Networks | Security | Sommersemester 2012 The Zone of Risk I • All hosts on the LAN are directly accessible through the Internet • Every host on the Internet can attack every host on the LAN Intranet Internet Page 5 Computer Networks | Security | Sommersemester 2012 The Zone of Risk II All hosts on the LAN are only indirectly accessible through the Internet via the Firewall system Intranet Firewall Internet An Internet Firewall • Forces people to enter at a controlled point • Prevents attackers from getting in contact with all hosts • Forces people to leave at a controlled point Page 6 Computer Networks | Security | Sommersemester 2012 Types of Firewalls Proxy Server 7. Application 6. Presentation 5. Session Packet Filter Application 4. Transport TCP or UDP TCP or UDP 3. Network IP IP 2. Data Link Data Link Data Link 1. Physical Physical Physical Page 7 Computer Networks | Security | Sommersemester 2012 Packet Filter TCP / UDP IP Data Link filter rules can be based on incoming and outgoing interfaces IP Addresses Layer 4 Protocols Port Numbers Physical packets Page 8 Computer Networks | Security | Sommersemester 2012 Proxy Server Proxy Server filter rules can be based on incoming and outgoing interfaces IP Addresses Layer 4 Protocols Port Numbers User-Permissions TCP or UDP IP Data Link Physical traffic Page 9 Computer Networks | Security | Sommersemester 2012 Types of Proxy Servers • circuit-level proxy Check if new connection request meets filter rules requirements Proxy Server TCP or UDP when connection is permitted Application TCP or UDP IP IP Data Link Data Link Physical Physical new connection request Page 10 Computer Networks | Security | Sommersemester 2012 Types of Proxy Servers II • application-level proxy Application Protocol TCP or UDP IP Data Link Physical whole connection Page 11 Computer Networks | Security | Sommersemester 2012 Firewall Architectures I • Packet Filter Architecture Screening Router Firewall Internet Page 12 Computer Networks | Security | Sommersemester 2012 Firewall Architectures II • Dual-homed Host Architecture Dual-homed Host Internet Firewall Page 13 Computer Networks | Security | Sommersemester 2012 Firewall Architectures III • Screened Host Architecture Bastion Host Screening Router Firewall Internet Page 14 Computer Networks | Security | Sommersemester 2012 Firewall Architectures IV • Screened Subnet Architecture Bastion Host Interior Router Exterior Router Firewall Internet Page 15 Computer Networks | Security | Sommersemester 2012 What a Firewall cannot do A firewall cannot protect an intranet against • insiders • connections that do not go through it (e.g. dial-up modem connections) • completely new threats • viruses