Computer Security (Chapter-5)
Computer Security (Chapter-5)
Security Mechanisms
Firewall
The term firewall has been around for
quite some time and originally was
used to define a barrier constructed to
prevent the spread of fire from one
part of a building or structure to
another
A network firewall is a system or group of systems used to control access
between two networks: a trusted network and an untrusted network,
using pre-configured rules or filters
A network firewall provides a barrier between networks that prevents or
denies unwanted or unauthorized traffic
Used to implement and enforce a security policy for communication
between networks
A packet filtering firewall does exactly what its name implies - it filters
packets
As each packet passes through the firewall (in both directions), it is
examined and information contained in the header is compared to a
pre-configured set of rules or filters
An allow or deny decision is made based on the results of the
comparison
Each packet is examined individually regardless of other packets that
are part of the same connectionCompiled by: Naol G. (MSc.)
04/20/2024 8
Untrusted Firewall Trusted
Packet Packet Allow Packet
Network Rule Set Network
Drop
Inward Flow
Drop
Outward Flow
Application
Transport
Packet Filters
Network
Data Link
Physical
Application
Stateful
Transport Inspection
Network
Data Link
Physical
Transport
Network
Data Link
Physical
Advantages
Higher security than packet filters
Only need to scrutinize a few allowable applications
Easy and audit all incoming traffic
Disadvantage
A different application gateway is required for each application
Additional processing overhead on each connection
04/20/2024 Compiled by: Naol G. (MSc.) 24
Adaptive Proxies
Also known as dynamic proxies
Developed as an enhanced form of application gateways/proxies, combining
the merits of both application gateways/proxies and packet filtering
Note that proxies were originally designed to make the WWW faster
Circuit-Level Gateway/Circuit-Level Proxy
It sets up two TCP connections; one between itself and a TCP user on an inner
host and one between itself and a TCP user on an outside host
The gateway typically relays TCP segments from one connection to the other
without examining the contents
The security function consists of determining which connections will be
allowed
Unlike a packet filtering firewall, a circuit-level gateway does not examine
individual packets. Instead, circuit-level gateways monitor TCP or UDP sessions
04/20/2024 Compiled by: Naol G. (MSc.) 25
Once a session has been established, it leaves the port open to allow all
other packets belonging to that session to pass. The port is closed when
the session is terminated
Circuit-level gateways operate at the transport layer (layer 4)
Boundary
Router
DMZ
External
Firewall
Workstations
04/20/2024 Compiled by: Naol G. (MSc.) 30
Example Firewall Configuration
The external firewall provides a measure of access control and protection for
the DMZ systems consistent with their need for external connectivity
The external firewall also provides a basic level of protection for the
remainder of the enterprise network
Internal firewalls serve three purposes
1. The internal firewall adds more stringent filtering capability, compared to
the external firewall, in order to protect enterprise servers and
workstations from external attack
2. The internal firewall provides two-way protection with respect to the
DMZ. First, the internal firewall protects the remainder of the network
from attacks launched from DMZ systems. Such attacks might originate
from worms, bots, or other malware lodged in a DMZ system. Second, an
internal firewall can protect the DMZ systems from attack from the
internal protected network
04/20/2024 Compiled by: Naol G. (MSc.) 31
3. Multiple internal firewalls can be used to protect portions of the
internal network from each other. For example, firewalls can be
configured so that internal servers are protected from internal
workstations and vice versa