Information System Security, Arab Academy for Banking and Financial Sceinces-AABFS Presented to: Dr.Lo’ai Tawalbeh By: Mohammad Ababneh Mohammad Mkhaimer Summer 2006 1. Definition firewall Simply defined as a collection of components placed between two networks to protect a private network from unauthorized intrusion. public Internet administered network firewall Definition ……..cont………. Rules Determine WHO ? WHEN ? WHAT ? HOW ? My PC INTERNE T Firewall Secure Private Network 2. Introduction • firewalls alone do not provide complete protection from Internet-borne problems. • they are just one part of a total information security program. • firewalls and firewall environments are discussed in the context of Internet connectivity and the TCP/IP protocol suite • However, firewalls have applicability in network environments that do not include or require Internet connectivity Introduction…..cont…………… Modern firewalls operate on the following OSI model layers. 3. What is at Risk? - Loss of Data. - Confidential data. - Network Downtime. - Staff time. - Hijacked Computer. - Reputation. 4. Threats Targeted versus untargeted attacks. •Viruses, worms, and trojans. •Malicious content and malware. •Denial-of-service (DoS) attacks. •Zombies. •Compromise of personal information and spyware. •Social engineering. •Insecure/poorly designed applications. 5. What Firewalls do - Protects the resources of an internal network. - Restrict external access. - Log Network activities. -Intrusion detection -DoS - Act as intermediary - Centralized Security Management • Carefully administer one firewall to control internet traffic of many machines. • Internal machines can be administered with less care. 6. Disadvantages • Performance may suffer • Single point of failure. 7. Firewall Products Classification • H/W – Platform -Linux, Solaris, Windows,….system. -Proprietary (Nokia-Box, Cisco PIX) • Software -Checkpoint FireWall 1 (FW-1) -NetGuard Guardian • Perimeter Firwall -Checkpoint -PIX -Sun SPF • Stand Alone Box (Appliance) - Satic Wall - Watch Guard FireBox - Netscreen • Personal FireWall – BlackICE – Zone Alarm 8. Taxonomy Firewalls Personal Firewalls Packet Filter Firewalls Stateful Firewall Network Firewalls Packet Filter Firewalls Stateful Firewall Circuit Level Gateways Application Level Firewalls NAT Firewalls 8.1 Personal firewalls • FW on the Client Machine. • Allows/blocks traffic based on: – Packet types – Local applications • Centralized Configuration • Coupled to Personal Intrusion Detection • Example: ZoneAlarm,BlackICE, PGP FireWall , IDS, Windows XP 8.2 Packet Filter Firewalls • The most basic fundamental type of firewall • Routing devices that include access control functionality for system addresses and communication sessions. • packet filters operate at Layer 3 (Network) of the OSI model. Packet Filtering Should arriving packet be allowed in? Departing packet let out? • Filter traffic based on simple packet criteria. • filters packet-by-packet, decides to Accept/Deny/Discard packet based on certain/configurable criteria – Filter Rulesets. • Typically stateless: do not keep a table of the connection state of the various traffic that flows through them. Packet Filtering (cont.) • Typically deployed within TCP/IP network infrastructures. • Not dynamic enough to be considered true firewalls. • Usually located at the boundary of a network. • Their main strength points: Speed and Flexibility. 8.3 Stateful packet filtering Traditional view: • Content filtering - Based on the content of packets. - Blocking packets with some patterns in the content. • Specific filtering: ICMP inspection is based on what state the conversation between hosts is in(TCP SYN and ACK) OSI Layers Addressed by Stateful Inspection Modern view • Statful firewalls combine aspects of NAT, circuit level firewalls, and proxy firewalls • More complex than their constituent component firewalls • Nearly all modern firewalls in the market today are staful Basic Weaknesses Associated with Packet Filters\ Statful: • They cannot prevent attacks that employ applicationspecific vulnerabilities or functions. • Logging functionality present in packet filter firewalls is limited • Most packet filter firewalls do not support advanced user authentication schemes. • Vulnerable to attacks and exploits that take advantage of problems within the TCP/IP specification and protocol stack, such as network layer address spoofing. • Susceptible to security breaches caused by improper configurations. 8.4 Application / Proxy FireWallgateway-to-remote host telnet session • Filters packets on application data as well as on IP/TCP/UDP fields. • The interaction is controlled at the application layer. host-to-gateway telnet session application gateway router and filter OSI Layers Addressed by Application-Proxy Gateway Firewalls Application/Proxy Servers…cont… • A proxy server is an application that mediates traffic between two network segments. • With the proxy acting as mediator, the source and destination systems never actually “connect”. • Filtering Hostile Code: Proxies can analyze the payload of a packet of data and make decision as to whether this packet should be passed or dropped. How A Proxy Passes Traffic? HTTP Application Data Request Data Request Proxy Server Internal Host Remote Server Application / Proxy Firewall….cont.. Application/proxy Firewalls..cont…. Advantages: •Extensive logging capability • Allow security enforcement of user authentication . • less vulnerable to address spoofing attacks. Typical Proxy Agents Disadvantages: •Complex Configuration. • limited in terms of support for new network applications and protocols. • Speed!!. OSI Layers Addressed by Application-Proxy Gateway Firewalls 8.5 Network Address Translation (NAT) - Existed for a short period of time; now NAT is part of every firewall -Developed in response to two major issues in network engineering and security: • First, network address translation is an effective tool for hiding the network-addressing schema present behind a firewall environment. • Second, the depletion of the IP address space has caused some organizations to use NAT for mapping nonroutable IP addresses to a smaller set of legal addresses. NAT goals – Allow use of internal IP-addresses – Hide internal network structure – Disable direct internet connections NAT-types – Dynamic • For connections from inside to outside • There may be fewer outside addresses than internal addresses – Static • For connections from outside to specific servers inside • One-to-one address mapping (fixed) 8.6 Firewalls - Circuit Level Gateway • relays two TCP connections (session layer) • imposes security by limiting which such connections are allowed • once created usually relays traffic without examining contents • Monitor handshaking between packets to decide whether the traffic is legitimate • typically used when trust internal users by allowing general outbound connections • SOCKS commonly used for this 8.6 Firewalls - Circuit Level Gateway 9. Firewall Standards • International Computer Security Association (ICSA) • Firewall Product Developers Consortium (FWPD) Product Certification Criteria • Common Criteria Evaluation Assurance Level – ApplicationLevel Firewall and Traffic Filter Firewall Protection Profiles • Network Equipment Building Standards (NEBS) Compliance • Internet Protocol Security Protocol Working Group (IPsec) • National Institute of Standards and Technology (NIST) Firewall protection profile 10 Bastion Host • • • • • highly secure host system potentially exposed to "hostile" elements hence is secured to withstand this may support 2 or more net connections may be trusted to enforce trusted separation between network connections • runs circuit / application level gateways • or provides externally accessible services Firewall Configurations Firewall Configurations Firewall Configurations DMZ DNS Mail Web Server Server Server Firewall Internet Outer Firewall/Router Firewall SW Intra1 Inner Firewall/Router SW • The key to security awareness is embedded in the word security SEC- -Y If not you, who? If not now, when?