11 Firewall

download 11 Firewall

of 32

Transcript of 11 Firewall

  • 7/29/2019 11 Firewall

    1/32

    FIREWALL

    Kriptografi & Keamanan Jaringan

  • 7/29/2019 11 Firewall

    2/32

    Introduction to Firewalls

    A firewall is a security mechanism to protect a localnetwork from the threats that the network might face

    while interacting with other networks.

    A firewall can be a hardware component, a software

    component, or a combination of both.

    It prevents the computers within one network domain

    from communicating directly with the computers in

    another network domain.

  • 7/29/2019 11 Firewall

    3/32

    The main purpose of a firewall is to protect thecomputers of an organization from unauthorized

    access.

    It allows the authorized users of the local network full

    access to the Internet.

    The basic functions that are performed by firewalls

    are:

    Security

    Auditing

    User authentication

    Network Address Translation (NAT)

    IP masquerading

    Functions of a Firewall

  • 7/29/2019 11 Firewall

    4/32

    Security Firewalls prevent unwanted data from getting into the local

    network from the Internet or from any other externalnetworks.

    It examines the incoming data packets and allows them toenter the local network only if certain conditions are met.

    Auditing Firewalls can be used to log the network traffic passing

    through it.

    This function is useful to track and filter unwantedinformation from entering the network.

    Functions of a Firewall (Contd.)

  • 7/29/2019 11 Firewall

    5/32

    User authentication In order to provide security to a network, it is essential for a

    firewall system to ensure that the users who access theinternal network are authorized.

    A firewall system can implement user authenticationprocess in various ways such as using the user id and

    password mechanism. Network Address Translation (NAT)

    A firewall can be used for hiding the structure and contentsof a local network from external users.

    NAT protects the internal private network of an organization

    from the Internet by concealing the internal networkaddresses.

    Functions of a Firewall (Contd.)

  • 7/29/2019 11 Firewall

    6/32

    NAT Implementation by a Firewall

    Functions of a Firewall (Contd.)

  • 7/29/2019 11 Firewall

    7/32

    IP masquerading is the feature in which the clientnetwork uses a single network interface to interact

    with the server.

    Implementation of IP Masquerading

    Functions of a Firewall (Contd.)

  • 7/29/2019 11 Firewall

    8/32

    The working of a firewall is based on a filteringmechanism.

    The filtering mechanism of firewalls keeps track ofthe following details:

    The source address of the data The destination address of the data

    The data contents

    The filtering mechanism allows information to bepassed to the Internet from a local network without

    requiring any authentication. It makes sure that the downloading of information

    from the Internet to a local network happens basedonly on a request made by an authorized user.

    Working Principle of Firewalls

  • 7/29/2019 11 Firewall

    9/32

    Firewall in a Local Network

    Working Principle of Firewalls (Contd.)

  • 7/29/2019 11 Firewall

    10/32

    Before using a firewall, the user should know some ofthe following basic terms associated with a firewall:

    Gateway

    Proxy servers

    Screening routers Application-level gateway

    Demilitarized zone

    Bastion host

    Firewall Terminology

  • 7/29/2019 11 Firewall

    11/32

    Gateway The computer that helps to establish a connection between

    two networks is known as a gateway.

    A firewall gateway can be used for exchanging information

    between an internal network and the Internet.

    Proxy servers

    A proxy server masks the networks IP address with the

    proxy servers IP address

    Firewall Terminology (Contd.)

  • 7/29/2019 11 Firewall

    12/32

    Screening routers A screening router is one of the simplest and most effective

    defensive mechanisms used in the creation of a firewall

    system.

    They are a special type of routers with filters, which are used

    along with various firewalls.

    Application-level gateway

    This type of gateway uses a more complex policy than a

    packet filtering technique that involves selectively restricting

    the data that is allowed through the firewall.

    Firewall Terminology (Contd.)

  • 7/29/2019 11 Firewall

    13/32

    Application Gateway Between Destination and Source Host

    Firewall Terminology (Contd.)

  • 7/29/2019 11 Firewall

    14/32

    A demilitarized zone is a subnet between the Internetand the internal network.

    An Application Server in a Demilitarized Zone

    Firewall Terminology (Contd.)

  • 7/29/2019 11 Firewall

    15/32

    Bastion host

    A bastion host is a publicly accessible server that is hosted

    on the DMZ.

    The bastion host is configured to serve a specific role of

    disabling or removing all the protocols, files, and applications

    that are not essential to the system.

    Firewall Terminology (Contd.)

  • 7/29/2019 11 Firewall

    16/32

    Firewall architecture deals with the design of the

    firewall system and its components and is

    implemented in a network.

    The following are the different types of firewallarchitectures:

    Dial-up architecture

    Single router architecture

    Firewall with proxy server

    Firewall Architecture

  • 7/29/2019 11 Firewall

    17/32

    Dial-up architecture It uses a dial-up service, such as an ISDN line.

    A firewall system is used to separate the Internet from thelocal network.

    Dial-up Architecture

    Firewall Architecture (Contd.)

  • 7/29/2019 11 Firewall

    18/32

    Single router architecture You use a router to access the Internet.

    Single Router Architecture

    Firewall Architecture (Contd.)

  • 7/29/2019 11 Firewall

    19/32

    A firewall with a proxy server

    Firewalls with a proxy server are used in a small network.

    Here, the firewall system is integrated with your proxy

    server.

    These Firewalls can be implemented in two ways:

    A firewall with built-in proxy services A firewall with a proxy server product installed separately

    Firewall Architecture (Contd.)

  • 7/29/2019 11 Firewall

    20/32

    Firewall with proxy server

    Firewall with Built-in Proxy Services

    Firewall Architecture (Contd.)

  • 7/29/2019 11 Firewall

    21/32

    Firewall with proxy server

    Firewall with a Proxy Server Product Installed Separately

    Firewall Architecture (Contd.)

  • 7/29/2019 11 Firewall

    22/32

    The type of firewall used might vary from network to

    network.

    The following are the various types of firewalls

    generally used:

    Packet filter firewall

    Circuit-level firewall

    Proxy firewall

    Network Address Translation (NAT) firewall

    Types of Firewalls

  • 7/29/2019 11 Firewall

    23/32

    Packet filter firewall

    Are usually deployed on routers.

    Is the simplest and the primary defensive mechanism used

    in firewall protection.

    Are implemented at the network level to check all incoming

    and outgoing packets of information.

    Types of Firewalls (Contd.)

  • 7/29/2019 11 Firewall

    24/32

    Circuit-level firewall

    Provides more protection than packet filtering firewalls.

    Also known as a stateful inspection firewalls.

    Checks for all the connections made to the local network.

    Types of Firewalls (Contd.)

  • 7/29/2019 11 Firewall

    25/32

    Proxy firewall

    Protects all the client applications running on a network from

    the Internet by using the firewall itself as a gateway.

    Automatically segregates the data packets depending upon

    the protocols used by them.

    Must support various protocols.

    Types of Firewalls (Contd.)

  • 7/29/2019 11 Firewall

    26/32

    Network Address Translation firewall

    Use a single IP address to represent the network.

    All packets going outside the network have their internal IP

    addresses hidden from the outside to increase security.

    Any incoming packets are delivered only to the networks

    public IP address.

    Types of Firewalls (Contd.)

  • 7/29/2019 11 Firewall

    27/32

    A firewall can be used for securing the applications

    running on a local network from the Internet.

    It allows to use Internet services such as e-mail and

    messengers from inside the protected network.

    The idea behind the use of firewalls is to allow only

    secured applications or services to pass through the

    network and stop unsecured applications from

    entering the network.

    Role of Firewalls in Application Security

  • 7/29/2019 11 Firewall

    28/32

    Using Firewalls in VPNs

    VPN guarantees private secured network traffic to

    organizations.

    Firewalls can be used with VPNs to enhance network

    security.

    The following figure shows the implementation of firewallswith VPNs:

    Role of Firewalls in Application Security (Contd.)

  • 7/29/2019 11 Firewall

    29/32

    An organization can use a software firewall or a

    hardware firewall or a mixture of both for network

    security.

    The firewalls solutions are:

    Software firewall

    Hardware firewall

    Firewall Solutions

  • 7/29/2019 11 Firewall

    30/32

    Software firewall Works on a computer system. Software firewalls provide the

    following benefits: They are inexpensive.

    They can be easily configured.

    Has the following disadvantages: The software firewall consumes disk, memory, and CPU

    resources on your computer. Software firewalls may affect the performance of the operating

    system.

    The security threats to an operating system can affect theperformance of the software firewalls.

    Examples include the DoorStop firewall and SINUS.

    Firewall Solutions (Contd.)

  • 7/29/2019 11 Firewall

    31/32

  • 7/29/2019 11 Firewall

    32/32

    Has the following advantages:

    The level of network protection is high.

    They can support more network interfaces than most software

    firewalls.

    The performance of a hardware firewall exceeds software

    firewalls because it does not have any additional overhead

    found in operating systems. Has the following disadvantage:

    Are very expensive compared to software firewalls.

    Example includes SonicWall.

    Firewall Solutions (Contd.)