1 / 27

Firewalls

Firewalls. Paper By: Vandana Bhardwaj. What this paper covers?. Why you need a firewall? What is firewall? How does a network firewall interact with OSI and TCP/IP Network models? Different types of firewall. Different firewall architectures.

nat
Download Presentation

Firewalls

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Firewalls Paper By: Vandana Bhardwaj

  2. What this paper covers? • Why you need a firewall? • What is firewall? • How does a network firewall interact with OSI and TCP/IP Network models? • Different types of firewall. • Different firewall architectures. • What kind of firewall is best for what infrastructure.

  3. Introduction • Benefits of Internet • Better Communication • Remote Access • Immense source of information • Boosting the efficiency of buisnesses • Network security a major concern.

  4. Why you need a firewall? • What happens when you connect to the Internet? • Your network becomes part of Internet. • Possibility of attack by thieves and vandals. • How do you protect confidential information from those who do not explicitly need to access it? • How do you protect your network and its resources from malicious users and accidents that originate outside of your network?

  5. Types of Attacks • Network Packet sniffers • IP Spoofing • Password Attacks • Distribution of sensitive information to external resources. • Man-in-the-middle attacks • Denial of Service Attacks • Application layer attacks

  6. What is Firewall?

  7. Computer with firewall software

  8. Basic Purpose of a Firewall • It blocks incoming data that might contain a hacker attack. • It hides information about the network by making it seem that all outgoing traffic originates from the firewall rather than the network. This is called Network Address Translation (NAT). • It screens outgoing traffic to limit Internet use and/or access to remote sites.

  9. Other Features of Firewall • Content Filtering • Virtual Private Networks • Antivirus Protection • Demilitarized Zone Firewalls

  10. What can't a firewall do? • They cannot provide complete security • They can do nothing to guard against insider threats. • Employee misconduct or carelessness cannot be controlled by firewalls. • Policies involving the use and misuse of passwords and user accounts must be strictly enforced.

  11. How does a network firewall interact withOSI and TCP/IP Network models? • Network Firewalls operate at different layers to use different criteria to restrict traffic. • The lowest layer at which a firewall can work is layer three. • The higher up in the stack layer at which an architecture examines packets, the greater the level of protection the architecture provides, since more information is available upon which to base decisions.

  12. Types of Firewall • Static Packet Filter • Dynamic (stateful) packet filter • Circuit level Gateway • Application level Gateway • Stateful Multilayer Inspection Firewall

  13. Static Packet Filter

  14. Static Packet Filter(contd.) • Advantages • Low cost – now included with many operating systems. • Disadvantages • Filters are difficult to configure • Static packet filter is not state aware. • Static packet filter does notexamine the complete packet.

  15. Dynamic (stateful) packet filter • State awareness • Aware of the difference between a new and an established connection. • Advantage: • State awareness provides measurable performance benefit. • Disadvantage: • Susceptible to IP spoofing. • Only provides for a low level of protection.

  16. Circuit Level Gateway

  17. Circuit Level Gateway(contd.) • Advantages: • Information passed to a remote computer through a circuit level gateway appears to have originated from the gateway. This is useful for hiding information about protected networks. • Higher level of security than a static or dynamic (stateful) packet filter. • Disadvantage: • A circuit level gateway cannot examine the data content of the packets it relays between a trusted network and an untrusted network. The potential exists to slip harmful packets through a circuit level gateway to a server behind the firewall.

  18. Application Level Gateway

  19. Application Level Gateway(contd.) • Advantages: • Filter application specific commands such as http: post and get, etc. • Inspect the complete packet. • Highest level of security. • Disadvantages: • Vendors must keep up with new protocols. A common complaint of application level gateway users is lack of timely vendor support for new protocols. • Must be written securely.

  20. Stateful Multilayer Inspection Firewall

  21. Stateful Multilayer Inspection Firewall(contd.) • Advantages: • Does not break the client server model. • Offer a high level of security. • Disadvantages: • The failure to break the client server model creates an unacceptable security risk as the hacker has a direct connection to the protected server. • They are expensive. • Due to their complexity are potentially less secure than simpler types of firewalls if not administered by highly competent personnel.

  22. Dual-Homed Host Architecture

  23. Screened Host Architecture

  24. Screened Subnet Architecture

  25. Choosing a Firewall • For a small office, a simple packet filter, such as those that come with many DSL or cable routers, is sufficient. • For Medium or large office with "common" needs, just about any firewall that does more than simple static filtering will do. • For large, complex environments, application gateway firewalls should be used.

  26. Conclusion • Keeping your software patched and running updated antivirus software are very important pieces, but having a firewall block incoming connections in the first place is definitely a wise idea as well. • No one security solution will solve everything. • The more lines of defense you have in place, the harder it is for hackers to get in and the safer you will be.

  27. Any Questions?

More Related