BY- NIKHIL TRIPATHI 12MCMB10. What is a FIREWALL? Can & Can’t in Firewall perspective ...

29
FIREWALLS FOR BANKS’ NETWORKS BY- NIKHIL TRIPATHI 12MCMB10

Transcript of BY- NIKHIL TRIPATHI 12MCMB10. What is a FIREWALL? Can & Can’t in Firewall perspective ...

FIREWALLS FOR BANKS’

NETWORKS

BY-NIKHIL TRIPATHI

12MCMB10

CONTENTS

What is a FIREWALL? Can & Can’t in Firewall perspective Development of Firewalls Firewall Architectures Some Generalization Selecting the right Firewall References

FIREWALLSoAny device that prevents specific type of informations from moving between two networks

-Between the outside (untrusted network: e.g., the Internet), and the inside (trusted network)

oMay be -a separate computer system-a service running on an existing router, server-separate network of supporting devices

FIREWALLS

CanoLimit access

-Separate different parts of a network-Dynamically change permissions

oEnforce security policyoMonitor/log activity

FIREWALLS

CannotoProtect against malicious insidersoProtect against connections not passing through it (e.g. direct dialup).oLimited use against viruses

THE DEVELOPMENT OF FIREWALLS

Packet filtering firewallsoFirst generation firewallsoSimple networking devices that filter packets by examining every incoming and outgoing packet headeroSelectively filter packets based on values in the packet headeroCan be configured to filter based on IP address, type of packet, port request, and/or other elements present in the packet

THE DEVELOPMENT OF FIREWALLS (CONT’D.)

Typically use filtering rules based on IP addresses,Direction, port numbers.

DEVELOPMENT OF FIREWALLS - CONTD

oApplication-level firewalls-Second generation firewalls-dedicated computers kept separate from the first filtering router (edge router)

--The proxy server, rather than the Web server, is exposed to the outside world from within a network segment called the demilitarized zone (DMZ), an intermediate area between a trusted network and an untrusted network

DEVELOPMENT OF FIREWALLS - CONTDoStateless vs stateful inspectionoStateless: simple, memoryless, obliviousoStateful inspection firewalls

-Third generation firewalls-Keeps track of each network connection established between internal and external systems using a state table

-State tables track the state and context of each packet.

DEVELOPMENT OF FIREWALLS - CONTD

oStateful inspection firewalls (cont’d.)-Can restrict incoming packets by allowing access only to packets that constitute responses to requests from internal hosts

PACKET-FILTERING FIREWALLS: NOTES

oDoes not examine packet contents, only headersoApplication level firewalls examine packet contents

APPLICATION GATEWAY

APPLICATION GATEWAY (PROXY)

oApplication awareoclient and the server connect to these proxies instead of connecting directly to each other ocan look in to individual sessionso can drop a packet based on information in the application protocol headers or in the application payload.

APPLICATION GATEWAY: USES

oIP address hiding/translationoHeader modificationoContent-based filtering (prevent sensitive data from being emailed out)oURL filteringoMIME filtering

APPLICATION GATEWAY: DRAWBACKS

oEnd-to-end semantics lostoSlower processing, lower throughputoNot all applications amenable to this strategy

FIREWALL ARCHITECTURES

oEach firewall generation can be implemented in several architectural configurationsoCommon architectural implementations

-Packet filtering routers-Screened-host firewalls-Dual-homed host firewalls-Screened-subnet firewalls

PACKET FILTERING ROUTERS

oMost organizations with an Internet connection use some form of router between their internal networks and the external service provider

-Many can be configured to block packets that the organization does not allow into the network-Such an architecture lacks auditing and strong authentication-The complexity of the access control lists used to filter the packets can grow to a point that degrades network performance

PACKET FILTERING ROUTERS (CONT’D.)

SCREENED-HOST FIREWALL SYSTEMS

oCombine the packet filtering router with a separate, dedicated firewall such as an application proxy serveroAllows the router to screen packets

-Minimizes network traffic and load on the internal proxy

oThe application proxy examines an application layer protocol, such as HTTP, and performs the proxy servicesoBastion host

-A single, rich target for external attacks-Should be very thoroughly secured

SCREENED-HOST FIREWALL

SYSTEMS(CONT’D.)

DUAL-HOMED HOST FIREWALLS

oThe bastion host contains two network interfaces

-One is connected to the external network-One is connected to the internal network-Requires all traffic to travel through the firewall to move between the internal and external networks

oNetwork-address translation (NAT) is often implemented with this architecture, which converts external IP addresses to special ranges of internal IP addressesoThese special, nonroutable addresses consist of three different ranges:

-10.x.x.x: greater than 16.5 million usable addresses-192.168.x.x: greater than 65,500 addresses-172.16.x.x - 172.31.x.x: greater than 1 million addresses

GENERALIZE THIS IDEA TO…

oA host firewall (not router) with 2 NICs placed between external and internal router.oMore isolation, higher cost, slower processing, single point of failure

DUAL-HOMED HOST FIREWALLS – CONTD.

SCREENED-SUBNET FIREWALLS

oConsists of one or more internal bastion hosts located behind a packet filtering router, with each host protecting the trusted networkoThe first general model uses two filtering routers, with one or more dual-homed bastion hosts between themoThe second general model shows connections routed as follows:

-Connections from the untrusted network are routed through an external filtering router-Connections from the untrusted network are routed into—and then out of—a routing firewall to the separate network segment known as the DMZ-Second general model (cont’d.)

--Connections into the trusted internal network are allowed only from the DMZ bastion host servers

SCREENED-SUBNET FIREWALLS(CONTD)

SELECTING THE RIGHT FIREWALL

oFirewall technology:-What type offers the right balance between protection and cost for the organization’s needs?

oCost:-What features are included in the base price? At extra cost? Are all cost factors known?

oMaintenance:-How easy is it to set up and configure the firewall? -How accessible are the staff technicians who can competently configure the firewall?

oFuture growth: Can the candidate firewall adapt to the growing network in the target organization?

REFERENCES

http://www.firewall.com Cryptography and Network

Security by William Stallings Computer Networks by Andrew S.

Tanenbaum http://www.wikipedia.org

QUERIES ?

<THANK YOU>