Firewall Locations and Configurations
Firewall Locations and Configurations
Firewall Locations and Configurations
and configurations
1 25/11/2018
Firewall Configurations
2 25/11/2018
Screened host firewall - single homed bastion host
Inbound traffic:
only IP packets destined to the bastion hosts are allowed
in
Outbound traffic:
only IP packets from bastion hosts are allowed out.
3 25/11/2018
Screened host firewall - single homed bastion
host
Firewall consists of two systems:
1. A packet-filtering router
2. A bastion host
4 25/11/2018
Screened host firewall - single homed
bastion host
Configuration for the packet-filtering router:
Only packets from and to the bastion host are allowed to pass
through the router
5 25/11/2018
Screened host firewall - single homed
bastion host
Greater security than single configurations because of
two reasons:
1. This configuration implements both packet-level and
application-level filtering (allowing for flexibility in
defining security policy)
2. An intruder must generally penetrate two separate
systems
6 25/11/2018
Screened host firewall - single homed
bastion host
This configuration also affords flexibility in providing direct
Internet access (public information server, e.g. Web server)
7 25/11/2018
Screened host firewall - single homed bastion
host
8 25/11/2018
A screened host
dual-home bastion
prevents such
security breach
9 25/11/2018
Firewall Configurations
10 25/11/2018
Firewall Configurations
11 25/11/2018
Firewall Configurations
Internal firewalls =
3 objectives
14 25/11/2018
Virtual Private Network
15 25/11/2018
Virtual Private Network
16 25/11/2018
Virtual Private Networks
17 25/11/2018
Example
Firewall
Configuration
Virtual Private Networks (VPNs)
Example
Distributed
Firewall
Configuration
Firewall Topologies
• includes personal firewall software and firewall software on
host-resident firewall servers
advantages
• the various tools work closely together
• threat prevention is more comprehensive
• management is easier
Malicious behavior
Modification of system resources: Rootkits, Trojan horses,
and backdoors, operate by changing system resources,
such as libraries, directories, registry settings, and user
accounts.
Privilege-escalation exploits: attempt to give ordinary
users root access.
Buffer-overflow exploits
Access to e-mail contact list: Many worms spread by
mailing a copy of themselves to addresses in the local
system’s e-mail address book.
Directory traversal: A directory traversal vulnerability in a
Web server allows the hacker to access files outside the
range of what a server application user would normally
need to access.
Malicious behavior
Attacks such as these result in behaviors that can be
analyzed by a HIPS. The HIPS capability can be
tailored to the specific platform.
A set of general-purpose tools may be used for a
desktop or server system.
Some HIPS packages are designed to protect
specific types of servers, such as Web servers and
database servers.
In this case, the HIPS looks for particular application
attacks.
Malicious behavior
In addition to signature and anomaly-detection
techniques, a HIPS can use a sandbox approach.
Sandboxes are especially suited to mobile code,
such as Java applets and scripting languages.
The HIPS quarantines such code in an isolated
system area, then runs the code and monitors its
behavior.
If the code violates predefined policies or matches
predefined behavior signatures, it is halted and
prevented from executing in the normal system
environment.
Malicious behavior
System calls:
The kernel controls access to system resources such as memory, I/O
devices, and processor.
To use these resources, user applications invoke system calls to the
kernel.
Any exploit code will execute at least one system call.
The HIPS can be configured to examine each system call for malicious
characteristics.
input/output:
I/O communications, whether local or network based, can
propagate exploit code and malware.
The HIPS can examine and enforce proper client interaction with
the network and its interaction with other devices.
Network-Based IPS
(NIPS)
inline NIDS with the authority to discard packets and tear
down TCP connections
uses signature and anomaly detection
Sidewinder G2
Security
Appliance
Attack
Protections
Summary -
Transport Level
Examples
Table 9.4
Sidewinder G2
Security Appliance
Attack Protections
Summary -
Application Level
Examples (page 1 of 2)
Table 9.4
Sidewinder G2
Security Appliance
Attack Protections
Summary -
Application Level
Examples (page 2 of 2)
Summary
firewalls firewall location and
need for configurations
characteristics of DMZ networks
techniques
virtual private networks
capabilities/limitations
distributed firewalls
types of firewalls
intrusion prevention systems
packet filtering firewall (IPS)
stateful inspection firewalls host-based IPS (HIPS)
application proxy firewall network-based IPS (NIPS)
circuit level proxy firewall Snort Inline
bastion host UTM products
host-based firewall
personal firewall