Lecture 11 - Firewalls
Lecture 11 - Firewalls
Computers and
Information Security
Fall 2023/2024
Lecture # 11
Firewalls
1
Contents
1. The Need for Firewalls
3. Types of Firewalls
4. Firewall Positioning
10.2
Learning Objectives
➢ Enterprise-wide network
❑ IP Address and Protocol Values: Controls access based on the source or destination
addresses and port numbers, direction of flow being inbound or outbound, and other
network and transport layer characteristics.
❑ Application Protocol: Controls access on the basis of authorized application protocol
data.
❑ User Identity: Controls access based on the user’s identity, typically for inside users
who identify themselves using some form of secure authentication technology, such as
IPSec.
❑ Network Activity: Controls access based on considerations such as the time or request.
What to expect from a firewall?
4. A firewall can serve as the platform for IPSec. Using the tunnel mode
capability, the firewall can be used to implement virtual private networks.
Limitations of Firewalls
❑The firewall cannot protect against attacks that bypass the firewall.
❑The firewall may not protect fully against internal threats, such as a
disgruntled employee or an employee who unwittingly cooperates with an
external attacker.
❑An improperly secured wireless LAN may be accessed from outside the
organization. An internal firewall that separates portions of an enterprise
network cannot guard against wireless communications between local
systems on different sides of the internal firewall.
❑A laptop, PDA, or portable storage device may be used and infected
outside the corporate network and then attached and used internally.
Types of Firewalls
❑ A firewall can monitor network traffic at a number of levels, from low-level
network packets, either individually or as part of a flow, to all traffic within a
transport connection, up to inspecting details of application protocols.
❑ A firewall can operate as a positive filter, allowing to pass only packets that meet
specific criteria, or as a negative filter, rejecting any packet that meets certain
criteria.
❑ Depending on the type of firewall, it may examine one or more protocol headers
in each packet, the payload of each packet, or the pattern generated by a sequence
of packets.
Packet-Filtering Firewall
❑ A packet filtering firewall applies a set of rules to each incoming and outgoing IP packet
and then forwards or discards the packet.
❑ The firewall is typically configured to filter packets going in both directions (from and
to the internal network). Filtering rules are based on information contained in a network
packet:
▪ Source IP address
▪ Destination IP address
▪ Source and destination transport-level address
▪ IP protocol field
▪ Interface
Packet-Filtering Firewall
❑ The packet filter is typically set up as a list of rules based on matches to fields in
the IP or TCP header.
❑ If there is a match to one of the rules, that rule is invoked to determine whether to
forward or discard the packet.
❑ If there is no match to any rule, then a default action is taken. Two default policies
are possible:
▪ Default = discard: That which is not expressly permitted is prohibited.
▪ Default = forward: That which is not expressly prohibited is permitted.
Packet-Filtering Firewall