Firewalling Basics

advertisement

Firewalling Basics

Josh Ballard

Network Security

Analyst

Outline

 Firewall Types

 Default Deny vs. Default Allow

 Campus Offerings

 The Importance of Scope

Firewall Types - Filtering

 Firewall Technology has come a long way

 The basic types are:

 Linear ACLs (“packet filter”)

 Stateful Firewall

 Stateful “Packet Inspection”

 Bridging vs. Routing

Firewall Types -

Packet Filters

 Evaluates traffic packet by packet according to a singular ruleset.

 Filters based on only IP address, IP protocols, ports, and in some cases things like TCP flags.

 Can not filter based on “direction,” but simply whether the packet matches the ACL or not.

Firewall Types -

Stateful Firewall

 Tracks state of connections for protocols such as TCP, UDP, ICMP.

 Evaluates rules only on the first packet of a session.

 As such, can be configured to do

“directional” protection.

 Filters illegal packet types and nonestablished connections.

Firewall Types - Stateful w/ Packet Inspection

 Works similarly to a stateful firewall, except that it contains

“connection fixups.”

 Some protocols won’t work properly without a fixup, e.g. FTP,

RTSP, etc.

 Requires more overhead, but breaks fewer things in a default deny world.

Firewall Types -

Bridging vs Routing

 A bridge operates as a transparent entity between two layer 2 networks.

 A routing firewall operates at the layer 3 boundaries to networks.

 Each has advantages and disadvantages, though we choose by default to do routed firewalls.

Default Deny vs.

Default Allow

 It is just how it sounds. This is the default posture for what the fate of a non-matched packet in the ACL.

 Default deny is obviously a stronger posture, but requires more initial investment to achieve, and can potentially cause more problems.

Campus Offerings

 For approximately the past year, we have been developing and offering firewall services.

 Based on the Cisco

PIX/ASA/FWSM platform.

Campus Offerings

 We are in the process of deploying

FWSM-based firewalls “virtually” in front of all data center systems.

 This allows for differing policy levels for each group of systems in the data center.

 We can also deploy FWSM technology to buildings or departments as applicable and requested.

Campus Offerings

 With our licensing of Trend Micro, we also have access to host-based firewalls, as well as the Windows firewall.

 Both of these are controllable by you as the admin with appropriate knowledge of your services and their scopes.

The Importance of

Scope

 AKA: Why is firewalling important?

 Consider this example:

 Windows Server 2003 System

 Running IIS and Exchange

 Running RDP for Adminstrative

Control

 Why is scoping important in this example?

The Importance of

Scope (2)

 Another example - multi-tiered

 UNIX system running Apache and other web software that ties to a database backend.

 UNIX system running Oracle database software

 Both systems running SSH

 Why is scoping important in this example?

The Importance of

Scoping (3)

 So the questions to answer to write a policy are:

 What should we explicitly not allow?

 What services are running on the systems in questions?

 Who needs to access those services?

 What should happen to a packet that isn’t explicitly matched?

Conclusion

 Firewalling is an important piece of any security infrastructure, both networkbased and host-based.

 It is by no means an end-all be-all solution, but can limit your exposure greatly.

Questions?

Download