Data Security in Local Network Using Distributed Firewall
Data Security in Local Network Using Distributed Firewall
Guided by:
Presented by:
Mohammad Under Supervision:
Raashid Azam Prof. Mirza Salim Beg
11-LECM-042
1 GD 1210
Abstract
2
.Contd
3
Contents
4
Firewalls
5
Security Policy
6
Firewall Example
Internet
7
Firewall Drawbacks
8
.contd
1.Restricted topology
9
.contd
10
.contd
11
.Data security Threats
IP Spoofing or IP masquerading
A B
10.10.10.1 134.117.1.60
B
spoofed
11.11.11.1 134.117.1.60 Any (>1024) 80
Src_IP dst_IP Src_port dst_port
12
.cont IP spoofing
impersonation
sender
partner
Oh, my partner
sent me a packet.
I’ll process this. victim
13
.contd
Session hijacking
14
contd
Denial of service(DOS)
15
Distributed Firewall Concept
16
.contd
17
18
Architecture of Distributed
Firewalls
The whole distributed firewall system consists of four
main parts:
I. The management center
19
.contd
20
PBNA System
21
Standard Firewall Example
Intranet
W e b s e rve r
External Internal Webserver (company
priva te)
Corporate
Internet Firewall
Corporate Network
Internal
External Internal
Host
Host Host
2
1
(untrusted)
22
Standard Firewall Example
Connection to web server
Intranet
W e b s e rve r
External Internal Webserver (company
priva te)
Corporate
Internet Firewall
Corporate Network
Internal
External Internal
Host
Host Host
2
1
(untrusted)
23
Standard Firewall Example
Connection to intranet
Intranet
W e b s e rve r
External Internal Webserver
(company
p r i v a te )
blocked by
firewall connection
a llo w e d ,
b u t s h o u ld
not be
Corporate
Internet Firewall
Corporate Network
External Internal
Internal
Host Host Host
1 2
(untrusted)
24
Distributed Firewall Example
In t e r n e t Corporate Network
External Internal
Internal
Host Host
Host
2
1
(untrusted)
25
Distributed Firewall Example to
web server
In t e r n e t Corporate Network
External Internal
Internal
Host Host
Host
2
1
(untrusted)
26
Distributed Firewall Example to
intranet
Internal Host Intranet
(telecommuting) W e b s e rve r
External Internal Webserver (company
priva te)
Internal
External Internal
Host
Host Host
2
1
(untrusted)
27
Components of Distributed
Firewalls
A Distributed Firewall is a mechanism to enforce a network domain
security policy through the use of the following:
Policy Language
Certificates
28
.contd
Policy language
The Policy language is used to create policies for each firewall.
These policies are the collection of rules, which guides the firewall
for evaluating the network traffic. It also defines which
inbound and outbound connections on any component
of the network policy domain are allowed.
29
.contd
30
.contd
Certificates
There may be the chance of using IP address for the
host identification by the distributed firewalls.
31
Advantages
32
Disadvantage
33
Conclusions
42
Future Work
Policy updating
43
References
44
45