NSC Topic 9 Firewall
NSC Topic 9 Firewall
NSC Topic 9 Firewall
Topic 9:
Firewalls
Topic 9 – Lecture 1:
Firewall Operation
Learning Outcomes
By the end of this topic students will be able to:
• Describe the components of a firewall
• Configure a DMZ firewall
• Evaluate the limitations of firewalls
Network Firewall
• A firewall is the first line of defence for your network
Creating Rules
• Traffic blocking rules can be based upon:
- Words or phrases
- Domain names
- IP addresses
- Ports
- Protocols (e.g. FTP)
10
11
Software Firewall
• Protect only the computer on which they are
installed
12
Router Firewall
• Protect your entire network or part of a network
13
Firewall Operation
• Can be divided into three main methods:
- Packet filters (see last topic)
- Application gateways
- Packet inspection
14
Application Gateways
• Also known as application proxy. The firewall runs
a sets of proxy programs that filter incoming and
outgoing packets based on the policy embedded in
the proxy programs
• Need separate proxies for each service, E.g.
- Telnet: Remote computer access
- SMTP: E-Mail
- FTP: File Transfer
15
16
Advantages of Application
Gateways
• Provide a buffer from port scans and application
attacks
- if an attacker finds a vulnerability in an application, the
attacker would have to compromise the application/proxy
firewall before attacking devices behind the firewall
17
Disadvantages
• Needs to know how to handle traffic to and from
your specific application
- If you have an application that's unique, your application
layer firewall may not be able to support it without making
some significant modifications
18
19
20
21
Advantages
• Generally much faster than application firewalls
- They are not required to host client applications
22
Disadvantages
• Open to certain denial-of-service attacks
23
Topic 9 – Lecture 2:
Firewall Architecture
24
Firewall Architecture
• Firewalls are used to protect the perimeter of a
network and the perimeter of sections of networks
• A key question for a network administrator is where
firewalls should be located
• The positioning of firewalls in relation to other
network elements is the firewall architecture
• We will only look at the position of firewalls and the
consequences of this
- Other security devices should also be used
25
Firewall Architecture
• The following are common firewall architectures:
- Screening router
- Screened host
- Dual homed host
- Screened subnet
- Screened subnet with multiple DMZs
- Dual firewall
26
Screening Router
• Simplest of firewall architectures
• Traffic is screened by a router
- Packet filtering
- Using ACLs
27
Screening Router
• Usually deployed at the perimeter of the network
• May be used to control access to a Demilitarized
Zone (DMZ) – see later
• More often used in conjunction with other firewall
technologies
28
• Disadvantages
- No logging
- No user authentication
- Difficult to hide internal network structure
29
30
31
32
Bastion Host
• A special purpose computer specifically designed
and configured to withstand attacks
33
• Disadvantages
- Difficult to hide internal structure
- There is a single point of failure in the network
34
Dual-Homed Host
• A Bastion Host/Firewall is surrounded with packet
filtering routers
- Dual-homed - outside world and protected network
- Multi-homed - outside world and multiple protected
networks
• Routers filter traffic to the Bastion Host
• Bastion Host adds additional filtering capabilities
• Bastion Host has no routing capabilities
35
• Disadvantages
- Requires users to log onto bastion host or the use of
proxy servers
36
37
• Disadvantages
- Single point of failure
38
39
40
Firewall By Pass
• Despite the best firewall, there are ways to by-
pass it.
• Common approach include the use of VPN and
proxies
41
References
• Scambrey, J., McClure, S. and Kurtz, J. (2001).
Hacking Exposed: Network Security Secrets &
Solutions, 2nd Edition. McGraw Hill.
• Zwicky, E.D. (2000). Building Internet Firewalls, 2nd
Edition. O’Reilly Media.
42
Topic 9 – Firewalls
Any Questions?
43