firewall 2 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Firewall 2 PowerPoint Presentation
Download Presentation
Firewall 2

Loading in 2 Seconds...

play fullscreen
1 / 14

Firewall 2 - PowerPoint PPT Presentation


  • 249 Views
  • Uploaded on

Firewall 2. * Essential Network Security Book Slides. . Firewall Basing . It is common to base a firewall on a stand-alone machine running a common operating system, such as UNIX or Linux. Or be implemented as a software module in a router or LAN switch .

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Firewall 2' - cale


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
firewall 2

Firewall 2

* Essential Network Security Book Slides.

IT352 | Network Security |Najwa AlGhamdi

firewall basing
Firewall Basing
  • It is common to base a firewall on a
  • stand-alone machine running a common operating system, such as UNIX or Linux.
  • Or be implemented as a software module in a router or LAN switch.
  • Based on basing considerations we have 3 kind of firewalls
  • Bastion Host.
  • Host-Based Firewall
  • Personal Firewall
bastion host
Bastion Host
  • It’s a special purpose computer on a network specifically designed and configured to withstand attacks
  • It’s identified by the firewall admin as a critical strong point in the network’s security
  • the firewalls ( application –level or circuit –level gateways) and routers can be considered bastion hosts.
  • Other types of bastion hosts include web, mail, DNS, and FTP servers.
securing bastion host
Securing Bastion Host
  • Each bastion host fulfills a specific role, all unnecessary services, protocols, programs, and network ports are disabled or removed.
  • Bastion hosts do not share authentication services with trusted hosts within the network so that if a bastion is compromised the intruder will still not have 'the keys to the castle.'
  • A bastion host is hardened to limit potential methods of attack. The specific steps to harden a particular bastion host depend upon the intended role of that host as well as the operating system and software that it will be running.
  • all unnecessary TCP and UDP ports will be disabled;
  • all non-critical services will be removed;

IT352 | Network Security |Najwa AlGhamdi

securing bastion host1
Securing Bastion Host
  • as many utilities and system configuration tools as is practical will also be removed.
  • All appropriate service packs, hot fixes, and patches should be installed.
  • Logging of all security related events need to be enabled and steps need to be taken to ensure the integrity of the logs so that a successful intruder is unable to erase evidence of their visit.
  • Any local user account and password databases should be encrypted if possible.

IT352 | Network Security |Najwa AlGhamdi

host based firewalls
Host-Based Firewalls
  • A host-based firewall is a software module used to secure a server.
  • Such modules are available in many operating systems or can be provided as an add-on package.
  • It filters and restricts the flow of packets.
  • Advantages of using this firewalls
  • Filtering rules can be tailored to the host environment.
    • Specific corporate security policies for servers can be implemented, with different filters for servers used for different application.
host based firewalls1
Host-Based Firewalls

2. Protection is provided independent of topology. Thus both internal and external attacks must pass through the firewall.

3. Used in conjunction with stand-alone firewalls(bastion host).

  • the host-based firewall provides an additional layer of protection. A new type of server can be added to the network, with its own firewall, without the necessity of altering the network firewall configuration.
personal firewall
Personal Firewall
  • controls traffic between PC/workstation and Internet or enterprise network
  • a software module on personal computer
  • or in home/office DSL/cable/ISP router
  • typically much less complex than other firewall types
  • primary role to deny unauthorized remote access to the computer
  • and monitor outgoing activity for malware
  • Example : Windows 7 Firewall.
firewall location and configuration
Firewall Location and Configuration
  • a firewall is positioned to provide a protective barrier between an external, potentially untrusted source of traffic and an internal network.
  • With that general principle in mind, a security administrator must decide on the location and on the number of firewalls needed.

IT352 | Network Security |Najwa AlGhamdi

dmz network
DMZ Network
  • Systems that are externally accessible but needs some protection al located in DMZ networks

access control and protection for the DMZ systems

basic level of protection for the remainder of the enterprise network

adds more stringent filtering capability to protect enterprise servers and workstations from external attack

it protects the remainder of the network from attacks launched from DMZ systems, and protects DMZ systems from attack by internal hosts.

vpn network
VPN Network
  • If IPSec is implemented the firewall, then VPN traffic passing through the firewall in both directions is encrypted.
  • In this case, the firewall is unable to perform its filtering function or other security functions, such as access control, logging, or scanning for viruses.
  • IPSec could be implemented in the boundary router, outside the firewall. However, this device is likely to be less secure than the firewall and thus less desirable as an IPSec platform
distributed firewalls
Distributed Firewalls

A distributed firewall configuration involves

stand-alone firewall devices

host-based firewalls

summery of firewall locations and topologies
Summery of Firewall locations and Topologies
  • Host-resident firewall: personal firewall software and firewall software on servers, used alone or as part of an in-depth firewall deployment.
  • Screening router: A single router between internal and external networks with full packet filtering. Typical for small office/home office (SOHO) use.
  • Single bastion inline: A single firewall device between an internal and external router. The firewall may implement filters and/or application proxies. This is the typical firewall appliance configuration for small to medium-sized organizations.
summery of firewall locations and topologies1
Summery of Firewall locations and Topologies
  • Single bastion T: Similar to single bastion inline but has a third network interface on bastion to a DMZ where externally visible servers are placed.
  • Double bastion inline: slide 10 illustrates this configuration, where the DMZ is sandwiched between bastion firewalls. This configuration is common for large businesses and government organizations.
  • Distributed firewall configuration: Illustrated in slide 12. This configuration is used by some large businesses and government organizations.