Principles of Information Security, Fifth Edition: Security Technology: Firewalls and Vpns
Principles of Information Security, Fifth Edition: Security Technology: Firewalls and Vpns
Principles of Information Security, Fifth Edition: Security Technology: Firewalls and Vpns
Fifth Edition
Chapter 6
Security Technology: Firewalls and
VPNs
If you think technology can solve your security problems,
then you don’t understand the problems and you don’t
understand the technology.
BRUCE SCHNEIER, AMERICAN CRYPTOGRAPHER,
COMPUTER SECURITY SPECIALIST, AND WRITER
Learning Objectives
• Hybrid firewalls
– Combine elements of other types of firewalls, that is,
elements of packet filtering and proxy services, or of
packet filtering and circuit gateways
– Alternately, may consist of two separate firewall
devices; each a separate firewall system, but
connected to work in tandem
– Enables an organization to make security
improvement without completely replacing existing
firewalls
• Packet-filtering routers
– Most organizations with Internet connection have a
router at the boundary between internal networks
and external service provider.
– Many of these routers can be configured to reject
packets that the organization does not allow into its
network.
– Drawbacks include a lack of auditing and strong
authentication.
• Bastion hosts
– Commonly referred to as sacrificial host, as it stands
as sole defender on the network perimeter
– Contains two network interface cards (NICs): one
connected to external network, one connected to
internal network
– Implementation of this architecture often makes use
of network address translation (NAT), creating
another barrier to intrusion from external attackers.
• SOCKS servers
– SOCKS is the protocol for handling TCP traffic via a
proxy server.
– A proprietary circuit-level proxy server that places
special SOCKS client-side agents on each
workstation
– A SOCKS system can require support and
management resources beyond those of traditional
firewalls.
• Kerberos
– Provides secure third-party authentication
– Uses symmetric key encryption to validate individual
user to various network resources
– Keeps database containing private keys of
clients/servers
– Consists of three interacting services:
• Authentication server (AS)
• Key Distribution Center (KDC)
• Kerberos ticket granting service (TGS)
• SESAME
– Secure European System for Applications in a
Multivendor Environment (SESAME) is similar to
Kerberos.
• User is first authenticated to authentication server and
receives token.
• Token is then presented to a privilege attribute server
as proof of identity to gain privilege attribute certificate.
• Uses public key encryption; adds sophisticated access
control features; more scalable encryption systems;
improved manageability; auditing features; and options
for delegation of responsibility for allowing access
Principles of Information Security, Fifth Edition 58
Virtual Private Networks (VPNs)
• Firewall technology
• Various approaches to remote and dial-up access
protection
• Content filtering technology
• Virtual private networks