How Firewall Works
How Firewall Works
How Firewall Works
Network Security
William Crespo
Vincent Lauria
Michael Theriault
12/08/21
SC 546 1
Synopsis of Presentation
• Security Issues Today
• Firewalls:
– How do they work?
– What can they do?
Widespread
DDoS
Packet
spoofing
Auto. probe
scanning
1990 2000
Results from a Carnegie Mellon University Study
Who are the intruders?
• Criminals
• “Curious” Intruders
• Insiders
• Corporate Spies
Motives:
• Money
• Access to additional resources
• Competitive advantages
• Curiosity and Mischief
Possible Attacks:
• Compromises and Vulnerabilities
• DDoS (Distributed Denial of Service)
• “Sniffing”
• Port Scanning
• Malicious code
Compromises and Vulnerabilivties
• Unauthorized access to a machine
• Usually due to:
– No current patches
– Misconfiguration
Example of Smurf DoS attack:
Intruder
Target
Example of Smurf DoS attack:
Target
Sniffing
• Examines traffic on same physical
network
• Intruder must have physical access to
network
• Used to gather usernames and
passwords
Port Scanning
• Wide array of tools to scan open many
open ports quickly
• Can find out a lot about a network
(including OS) by looking at open ports
• Also allows intruders to find unprotected
Windows shares
Malicious Code
• Includes Viruses and Trojan Horses
– Ex. Melissa, I Love you Virus
US Senate – ‘99
} Zones
DNS
DNS
Telnet
Telnet
Web
Web
How do Firewalls work?
• Most firewalls function through packet
filtering
– Filter based upon port or address
Courtesy http://www.vicomsoft.com/knowledge/reference/firewalls1.html
Filtering based on Port
• Filtering based on port occurs by
examining the Transport layer
• Deny-all
– Reject all packets except to required services
Courtesy http://www.vicomsoft.com/knowledge/reference/firewalls1.html
Filtering Based on Address
• The incoming and outgoing address can
be examined to see if the computer is
allowed access to the network
• However, this can be circumvented by an
attacker who fakes the incoming address,
making it look as if they are allowed
How firewalls prevent
• Lets look over some of the common
attacks we spoke about
Preventing Compromises and
Vulnerabilities
• By hiding internal network information, a
firewall can protect internal servers
• Web serves still need to be patched, but
we can hide information about them
– i.e. Services and OS running
Other Prevention:
• Preventing DDoS:
– Turn off ping except to trusted IP’s