1 / 12

Internet/Intranet f irewall s ecurity – policy, architecture and transaction services

Internet/Intranet f irewall s ecurity – policy, architecture and transaction services. Written by Ray Hun t This presentation will Examines Policies that influence the design, installation and use of a firewall. It also takes a quick look at two different types of firewalls

allayna
Download Presentation

Internet/Intranet f irewall s ecurity – policy, architecture and transaction services

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet/Intranet firewall security – policy, architecture and transaction services Written by Ray Hunt This presentation will Examines Policies that influence the design, installation and use of a firewall. It also takes a quick look at two different types of firewalls Presented by Hosein Derhamy

  2. Content • Introduction • Business policies • Network Service Access Policies • Firewall Design Policies • Firewall Architecture • Packet level firewalls • Application level firewalls • Conclusion • Question

  3. Introduction • We have seen from previous presentations that day by day as the world becomes more interconnected Network Security becomes more important. • A firewall is a method of achieving security between trusted and untrusted networks • The objective of the firewall policy is to minimize the organization’s zone of risk by removing the possibility of attack from an external network

  4. Business Policy • The Network Service Access Policies should extend existing business policies. • The business policies that are of interest are: • Information value – what value does the management place on information • Responsibility - who is responsible for ensuring the protection of the organisation information • Commitment – what is the organisations commitment to protecting its information • Domains – what domains should or should not be protected

  5. Network Service Access Policy(NSAP) • TheNSAP defines which services are to be explicitly allowed or denied between trusted and untrusted networks. • The NSAP must be drafted before the firewall is implemented. It must provide a balance between protecting the trusted network from known risks while providing users with convenient access to the untrusted network.

  6. Firewall Design Policy (FDP) • FDP defines how the firewall implements restricted access and service filtering specified by the NSAP. • It must take into account capabilities and limitations of the particular firewall platform as well as the threats and vulnerabilities associated with TCP/IP. • Permit any service unless it is specifically disallowed • Deny any service unless it is specifically permitted

  7. Firewall Architecture • One Basis for defining a firewall is the OSI 7 layer model Application Layer Application Level Filter Presentation Layer Session Layer Transport Layer Packet level Filter Network Layer Link Layer Physical Layer

  8. Packet - level firewalls • Filtering can be used to block connections to or from specific hosts or networks, as well as to block connections to specific ports • Filtering based upon one of the following criteria are commonly applied • Source IP address • Destination IP address • TCP/UDP source port • TCP/UDP destination port

  9. Example of Packet Level Filtering Permits only certain connections to a network of address 132.181.*.* Telnet Gateway 132.181.19.12 Firewall Internet SMTP Gateway 132.181.19.15 All non telnet and non SMTP traffic blocked

  10. Application – level firewalls • Application level firewalls are more flexible, easier to configure and update. • Advantages of application level firewalls or gateways are: • Information hiding • Robust authentication • Cost – effectiveness • Less - complex

  11. Conclusion • This article has examined policies that effect the design, installation and use of a firewall. The policies can be looked as a top down procedure. First come the Business policies they generate the Network Service Access Policies and then followed by the Firewall Design Policies. • It is the Business Policies that require the security of the firewall.

  12. Question • Is the NSAP dependant on the type of firewall used, Why?

More Related