Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and...

21
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance

description

© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—1-3 What Is a Firewall? A firewall is a system or group of systems that manages access between two or more networks. Outside Network DMZ Network Inside Network Internet

Transcript of Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and...

Page 1: Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.

Lesson 2a

© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1

Firewall Technologies and the Cisco Security Appliance

Page 2: Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.

Firewall

© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-2

Page 3: Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.

© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—1-3

What Is a Firewall?

A firewall is a system or group of systems that manages access between two or more networks.

Outside Network

DMZ Network

Inside Network

Internet

Page 4: Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.

© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—1-4

Firewall Technologies

Firewall operations are based on one of three technologies:• Packet filtering• Proxy server• Stateful packet filtering

Page 5: Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.

© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—1-5

Packet Filtering

Limits information that is allowed into a network based on the destination and source address

Data A B

Data A C

Internet

DMZ:Server B

Inside:Server CHost A

AB-YesAC-No

Page 6: Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.

© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—1-6

Proxy Server

Requests connections on behalf of a client that is inside the firewall and the Internet

Outside Network

ProxyServer

Inside Network

Internet

Page 7: Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.

© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—1-7

Stateful Packet Filtering

Data HTTP A B

Internet

DMZ:Server B

Inside:Server CHost A

172.16.0.50

10.0.0.11

1026

80

49091

Syn

172.16.0.50

192.168.0.20

49769

Syn

1026

80Source port

Destination addressSource address

Initial sequence #Destination port

FlagAck

State Table

Limits information that is allowed into a network based not only on the destination and source addresses, but also on the packets state table content

Page 8: Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.

Security Appliance Overview

© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-8

Page 9: Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.

© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—1-9

Security Appliances: What Are They?

Cisco security appliances deliver enterprise-class security for small-to-medium-sized business and enterprise networks in a modular, purpose-built appliance. Some features of Cisco security appliances are:• Proprietary operating system• Stateful packet inspection• User-based authentication• Protocol and application inspection• Modular policy• Virtual private networking• Security contexts (virtual firewalls)• Stateful failover capabilities• Transparent firewalls• Web-based management solutions

Page 10: Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.

© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—1-10

Proprietary Operating System

Eliminates the risks associated with general-purpose operating systems

Page 11: Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.

© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—1-11

Stateful Packet Inspection

• The stateful packet inspection algorithm provides stateful connection security:– It tracks source and destination ports and addresses, TCP

sequence numbers, and additional TCP flags.– It randomizes the initial TCP sequence number of each new

connection.• By default, the stateful packet inspection algorithm allows

connections originating from hosts on inside (higher security level) interfaces.

• By default, the stateful packet inspection algorithm drops connection attempts originating from hosts on outside (lower security level) interfaces.

• The stateful packet inspection algorithm supports authentication, authorization, and accounting.

Page 12: Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.

© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—1-12

Cut-Through Proxy Operation

Internal orExternal

User

ISP

1. The user makes a request to an ISP. 2. The security appliance

intercepts the connection.

3. At the application layer, the security appliance prompts the user for a username and password. It then authenticates the user against a RADIUS or TACACS+ server and checks the security policy.

5. The security appliance directly connects theinternal or external user to the ISP via the security appliance. Communication then takes place at a lower level of the OSI model.

4. The security appliance initiates a connection from the security appliance to the

destination ISP.

CiscoSecure

Security ApplianceUsername and Password Required

Enter username for CCO at www.com

User Name:

Password:

OK Cancel

student123@456

3.

Page 13: Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.

© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—1-13

Application-Aware Inspection

• Protocols such as FTP, HTTP, H.323, and SQL*Net need to negotiate connections to dynamically assigned source or destination ports through the firewall.

• The security appliance inspects packets above the network layer.• The security appliance securely opens and closes negotiated ports for

legitimate client-server connections through the firewall.

FTPServer Client

ControlPort2008

DataPort2010

DataPort20

ControlPort21

Data - Port 2010

Port 2010 OK

Data

Page 14: Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.

© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—1-14

Modular Policy

HeadquartersSystem Engineer

Internet

Site B

Executives

Site C

T1

Internet

SEexec

S2S S2S

Construction of flow-based policies:• Identify specific flows.• Apply services to that flow.

Class MapTraffic flow

DefaultInternet

System EngineerExecutivesSite to Site

Policy MapServicesInspect

IPSPolicePriority

Service PolicyInterface/Global

GlobalOutside

Page 15: Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.

© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—1-15

Virtual Private Network

B A N K

B A N K

Site to Site

Remote Access

IPSec VPNSSL VPN

Internet

Page 16: Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.

© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—1-16

Security Context (Virtual Firewall)

Internet Internet

Four Physical Firewalls One Physical FirewallFour Virtual Firewalls

• Ability to create multiple security contexts (virtual firewalls) within a single security appliance

Page 17: Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.

© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—1-17

Failover Capabilities: Active/Standby, Active/Active, and Stateful Failover

• Failover protects the network should the primary go offline.– Active/standby—Only one unit can be actively processing traffic; the other is

hot standby.– Active/Active—Both units can process traffic and serve as backup units.

• Stateful failover maintains operating state during failover.

Primary: Failed Firewall

Internet

Secondary: Active Firewall

Secondary: Active/Active

Primary: Failed/Standby

Failover:Active/Standby

Internet

Failover:Active/Active

2 1 2

Contexts

1

Page 18: Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.

© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—1-18

Transparent Firewall

• Has the ability to deploy a security appliance in a secure bridging mode

• Provides rich Layers 2 through 7 security services as a Layer 2 device

Internet

192.168.1.2

192.168.1.5

Page 19: Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.

© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—1-19

Web-Based Management Solutions

Adaptive Security Device Manager

Page 20: Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.

© 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—1-20

Summary

• There are three firewall technologies: packet filtering, proxy server, and stateful packet filtering.

• Features of the Cisco PIX Firewall Security Appliances and ASA Security Appliances features include the following: proprietary operating system, stateful packet inspection, cut-through proxy, stateful failover, modular policy, VPNs, transparent firewall, security contexts, web-based management, and stateful packet filtering.

Page 21: Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.