Week 13 - Firewalls
Week 13 - Firewalls
• Source IP address
• Destination IP address
• Source and destination transport-level address
• IP protocol field
• Interface
9
Packet Filter
Rules
Packet Filter: Advantages And Weaknesses
• advantages
– simplicity
– typically transparent to users and are very fast
• weaknesses
– cannot prevent attacks that employ application
specific vulnerabilities or functions
– limited logging functionality
– do not support advanced user authentication
– vulnerable to attacks on TCP/IP protocol bugs
– improper configuration can lead to breaches
Stateful Inspection Firewall
• tightens rules for TCP traffic by creating a directory of
outbound TCP connections
– there is an entry for each currently established connection
– packet filter allows incoming traffic to high numbered ports
• only for those packets that fit the profile of one of the entries
Destination Connection
Source Address Source Port Destination Port
Address State
192.168.1.100 1030 210.9.88.29 80 Established
192.168.1.102 1031 216.32.42.123 80 Established
192.168.1.101 1033 173.66.32.122 25 Established
192.168.1.106 1035 177.231.32.12 79 Established
223.43.21.231 1990 192.168.1.6 80 Established
219.22.123.32 2112 192.168.1.6 80 Established
210.99.212.18 3321 192.168.1.6 80 Established
24.102.32.23 1025 192.168.1.6 80 Established
223.21.22.12 1046 192.168.1.6 80 Established
Application-Level Gateway
• also called an application proxy
• acts as a relay of application-level traffic
– user contacts gateway using a TCP/IP appl.
– user is authenticated
– gateway contacts application on remote host and relays
TCP segments between server and user
• must have proxy code for each application
– may restrict application features supported
• tend to be more secure than packet filters
• disadvantage is the additional processing overhead
on each connection
Application-Level Gateway
15
Circuit-Level Gateway
• circuit level proxy
– sets up two TCP connections, one between itself and a TCP
user on an inner host and one on an outside host
– relays TCP segments from one connection to the other
without examining contents
– security function consists of determining which
connections will be allowed
• typically used when inside users are trusted
– may use application-level gateway inbound and
circuit-level gateway outbound
– lower overheads
Circuit Level gateway
17
SOCKS Circuit-Level Gateway
• SOCKS v5 defined in RFC1928
• provide a framework for client- components
server applications to conveniently
and securely use the services of a
network firewall
SOCKS-ified SOCKS
• client application contacts SOCKS client
applications server
server, authenticates, sends relay
request
– server evaluates and either SOCKS client
establishes or denies the connection library
Bastion Hosts
• system identified as a critical strong point in the
network’s security
• serves as a platform for an application-level or
circuit-level gateway
• common characteristics:
– runs secure O/S, only essential services
– may require user authentication to access proxy or host
– each proxy can restrict features, hosts accessed
– each proxy is small, simple, checked for security
– each proxy is independent, non-privileged
– limited disk use, hence read-only code
Host-Based Firewalls
• used to secure an individual host
• available in operating systems
– or can be provided as an add-on package
• filter and restrict packet flows
• common location is a server
• advantages:
– filtering rules can be tailored to the host environment
– protection is provided independent of topology
– provides an additional layer of protection
Personal Firewall
• controls traffic between a personal computer or
workstation and the Internet or enterprise network
• typically is a software module
• can be housed in a router that connects all of the
home computers to Internet
– such as a DSL or cable modem
• typically much less complex than server-based or
stand-alone firewalls
• primary role is to deny unauthorized remote access
• may also monitor outgoing traffic to detect and block
worms and malware activity
Personal Firewall Interface
Firewall
Configuration