Firewall
Firewall
They will handle many more users, have faster throughput, and have advanced
features.
Basic Types of Firewall
3. Hardware Firewall:
Hardware firewalls are usually routers with a
built in Ethernet card and hub.
Your computer or computers on your
network connect to this router and access
the web.
Hardware firewalls can be purchased as a
stand-alone product but more recently
hardware firewalls are typically found in
broadband routers, and should be
considered an important part of your system
and network set-up.
A hardware firewall uses packet filtering to
examine the header of a packet to
determine its source and destination.
This information is compared to a set of
predefined or user-created rules that
determine whether the packet is to be
forwarded or dropped.
Basic Types of Firewall
3. Hardware Firewall (continue…):
Hardware firewalls can be effective with little or no configuration,
and they can protect every machine on a local network.
Most hardware firewalls will have a minimum of four network ports
to connect other computers, but for larger networks, business
networking firewall solutions are available.
To ensure that your hardware firewall is configured for optimal security and
protection, consumers will need to learn the specific features of their hardware
firewall, how to enable them, and how to test the firewall to ensure it is doing a
good job of protecting your network.
Hardware firewalls include Cisco PIX, SonicWall, NetScreen, Watchguard, and
Symantec’s 5400 series appliances (which run their Enterprise Firewall
software).
4. Software Firewall:
For individual home users, the most popular firewall choice is a software firewall.
Software firewalls are installed on your computer (like any software) and you can
customize it; allowing you some control over its function and protection features.
A software firewall will protect your computer from outside attempts to control or
gain access your computer, and, depending on your choice of software firewall, it
could also provide protection against the most common Trojan programs or e-mail
worms.
Many software firewalls have user defined controls for setting up safe file and
printer sharing and to block unsafe applications from running on your system.
Additionally, software firewalls may also incorporate privacy controls, web filtering
and more.
The downside to software firewalls is that they will only protect the computer they
are installed on, not a network, so each computer will need to have a software
firewall installed on it.
4. Software Firewall (continue…):
Like hardware firewalls, there is a vast number of software firewalls to
choose from.
Because your software firewall will always be running on your
computer, you should make note of the system resources it will require
to run and any incompatibilities with your operating system.
A good software firewall will run in the background on your system and
use only a small amount of system resources.
It is important to monitor a software firewall once installed and to
download any updates available from the developer.
Software firewalls include Microsoft ISA Server, CheckPoint FW-1, and
Symantec Enterprise Firewall, as well as most personal firewalls.
Firewall Techniques
A firewall is considered a first line of defense in protecting
private information. For greater security, data can be
encrypted.
There are several types of firewall techniques listed below.
❖ In practice, many firewalls use two or more of the techniques in concert for
better security.
1. Bastion host
2. Dual-homed Firewall
3. Screened host
4. Screened Subnet
Bastion Firewall
• A bastion firewall refers to a specialized and highly
secured system designed to act as a primary
defense line between an external network (like the
internet) and an internal network.
• It acts as a gateway for external users (e.g., remote
workers, partners) to access internal resources
securely.
• It implements strict policies for allowing or denying
traffic based on predefined rules, such as IP
addresses or ports.
• As the first point of contact, it is often the target of
attacks, such as port scanning or denial-of-service
(DoS).
• Its design ensures these attacks do not compromise
the internal network.
Dual-Homed Firewall
Architecture
• A “dual-homed” device has two network interface
cards (NICs)
• Multi-homed devices have multiple NICs.
• Packet comes to the external NIC from an untrusted
network and is forwarded up through the firewall
software and if not dropped forwarded to the internal
NIC.
• Without redundancy, if this goes down the
dual-homed firewall becomes a single point of failure.
• One layer of protection lacks “defense in depth”
• If an attacker compromises one firewall they
can gain direct access to the organizations
network resources
Screened Host Firewall Architecture
• This communicates directly with a perimeter router and
the internal network
1. Traffic from the Internet first passes through a
packet filtering router applying ACL rules which filters
out (i.e. drops) junk packets
2. Traffic that makes it past this phase is sent to the
screen-host firewall which applies more rules to the
traffic and drops the denied packets
3. Remaining traffic moves to the internal network
Router provides network-level packet filtering
• Security level is higher than a bastion dual-homed firewall
because attacker would need to compromise 2 systems
to succeed
Screened Subnet Architecture
• Adds another layer of depth to the security of the
screened-host architecture
• The external firewall screens traffic entering the
screened sub-network, instead of firewall
redirecting traffic to the internal network
• The second interior firewall also filters the traffic –
this creates a screened subnet (i.e. DMZ)
• Creates a DMZ between 2 firewalls which functions
as a small network isolated between trusted
internal and untrusted external network
• 3-devices working together provides more
protection than a stand-alone firewall or a
screened-host firewall.
• All 3 need to be compromised by an attacker to
gain access to the internal network
Demilitarized Zone (DMZ)
• Firewalls are installed to construct DMZ areas which is
Network segments that are located between protected
and unprotected networks.
• DMZ area provides a buffer zone between the dangerous
Internet and valuable assets the organization seeks to
protect
• Usually 2 firewalls are installed to form a DMZ
• May contain mail, file, and DNS (Domain Name
System)
• Servers.
• Usually contain an Intrusion Detection System
sensor which listens for suspicious and malicious
behavior
• Servers in DMZ must be hardened to serve as the
first line of protection against attacks coming from
the internet
How DMZ Works
• Incoming requests from the internet (e.g., accessing a website) are
directed to servers within the DMZ.
• The external firewall blocks unauthorized traffic while allowing
legitimate traffic to reach the DMZ servers.
• If DMZ services (e.g., a web server) need to interact with internal
network resources (e.g., a database server), strict rules are applied
to control and monitor the connection through the internal firewall.
• Servers in the DMZ are isolated from the internal network. Any
compromise within the DMZ does not immediately impact sensitive
internal systems.
• Intrusion detection systems (IDS) and logging tools monitor DMZ
activity for potential threats.
Firewall Rules
• Good firewall behavior: default action is to deny any packets explicitly not allowed
• If no rule in the ACL explicitly implies on an incoming packet can come in, it is dropped
• Any packet coming in from the Internet containing the source address of an internal host should be
dropped
• Spoofing or masquerading attack reflected in a modified packet header having the source address of a
host inside the target network
• No packet should be permitted to leave that does not contain a source address of an internal host – this
is how DDoS zombies work
• Many companies deny packets with source routing information in the headers which may
circumnavigate internal routers and firewalls.
• Firewalls not effective “out of the box”
• Need to understand internal default rules which may negate user provided rules
• Can create bottlenecks
• Need to effectively distribute them throughout the network to control network access points and provide
appropriate “defense in depth”
• Do not protect against malware, complex attack types, sniffers, rogue access points
Common Firewall Rules
• Stealth rule:
• Disallow unauthorized systems from accessing to firewall software
• Silent rule
• Identify and drop “noisy” traffic without logging it to reduce log sizes by not responding to unimportant
packets
• Cleanup rule
• A firewall cleanup rule is a specific rule, typically configured at the bottom of a firewall's rule
set, to handle any network traffic that doesn't explicitly match any of the preceding rules. Its
primary purpose is to ensure that all unhandled traffic is dealt with appropriately, either by being
explicitly denied or logged and reviewed.
• Negate rule
• A firewall negate rule is a type of rule that uses a negative condition to filter traffic. Instead
of specifying what traffic to allow or deny directly, a negate rule defines what traffic should not
match a specific condition.
• A rule might say, "Allow all traffic except traffic from IP range X."
INTRUSION DETECTION
SOFTWARE (IDS)
Introduction
Packet Analysis:
•Captures packets and examines headers, payloads, and protocols.
•Matches packet content against threat databases or uses behavioral models to detect
anomalies.
Alert Generation:
•When suspicious activity is detected, the NIDS generates alerts and logs details for further
analysis.
Types of IDS
• NIDS and HIDS can be one of the following types:
1. Signature-based:
• Pattern matching, similar to antivirus software
• Signatures must be continuously updated
• Cannot identify new attacks
• 2 types
• Pattern matching: Compares individual packets to signatures
• Stateful matching: Compares patterns among packets
Types of IDS (Cont..)
2. Anomaly-based (a.k.a. Heuristic-based or Behavior-based):
• Behavioral-based system able to learn from “normal activities”
• Can detect new attacks
• 3 Types:
• Statistical anomaly-based – creates a normal profile used to compare sensed
activities
• Protocol anomaly-based – Identifies incorrect uses that violate protocols (e.g.
TCP 3-way handshake)
• Traffic anomaly-based – Identifies unusual activity in network traffic
Types of IDS (Cont..)
3. Rule-based
• Uses artificial intelligence expert systems that process rules in the form of “If
situation then action” statements to identify combinations of activities within
the data of the packets
• e.g. “IF a root user creates FileA AND FileB IN same directory and there is a
call to Administrative ToolK THEN trigger alert”
• Cannot detect new attacks
• The more complex the rules, the greater the need for processing power to
support the software and hardware requirements so the IDS
• does not become a bottleneck and performance problem
INTRUSION
PREVENTION SYSTEM
(IPS)
• IPS – Detect something bad may be taking place and block traffic from gaining access to target
• Preventive and proactive response
• IPS can be host-based or network-based (like IDS)
• Can be content-based (looking deep into packets), conduct protocol analysis or be signature matching
• Also can use rate-based metrics to identify suspicious increases in volumes of traffic
• E.g. DoS – flood attack
• Traffic flow anomalies – “slow and low” stealth attack attempting to be undetected
IDS vs IPS
• Possible responses to a
triggered event:
• Disconnect communications
and block transmission of
traffic
• Block a user from accessing a
resource
• Send alerts of an event
trigger to other hosts, IDS
monitors and administrators