Chapter 5 Firewall and Proxy Server
Chapter 5 Firewall and Proxy Server
Chapter 5 Firewall and Proxy Server
1
Outline
• Firewall
• Proxy Server
• Types of Firewalls
• Packet Filtering Firewalls
• Application level gateway
• Circuit level gateway
• Firewall configuration/topology
• Proxy server
• How Proxy Servers Work
• Proxy Servers and Packet Filters
• Goals of Proxy Servers
2
Securing Private Networks
• Minimize external access to LAN
3
Overview of Firewall
• Firewall is a router or other communications device
which filters access to a protected network.
• Firewall is also a program that screens all incoming
traffic and protects the network from unwelcome
intruders.
• It is a means of protection a local system or network of
systems from network-based security threats,
– while affording access to the outside world via WANs or the
Internet
4
Overview of Firewall…
Firewall Objectives
Keep intruders,
malicious code and
unwanted traffic or
information out
Private Network
Keep private and
sensitive information in
Private data
security wall
between private External attacks
(protected)
network and External Network
outside word
5
Overview of Firewall…
6
Firewall features
• General Firewall Features
- Port Control
- Network Address Translation
- Application Monitoring
- Packet Filtering
- Access control
• Additional features
- Data encryption
- Authentication
- Connection relay (hide internal network)
- reporting/logging
- e-mail virus protection
- spy ware protection
7
Firewall features…
• Use one or both methods
- Packet filtering
- Proxy service
• It protects from
- Remote logins
- IP spoofing
- Source addressing
- SMTP session hijacking
- Spam
- Denial of service
- E-mail bombs…
8
Types of Firewalls
9
Packet Filtering Firewalls/Routers
• Packet Filtering router applies a set of rules to each incoming and
outgoing IP packet and then forwards or discards the packet.
– A filtering firewall works at the network level.
12
Firewalls - Application Level Gateway
(or Proxy)
–Also called proxy server
–Acts as a relay of application-level traffic
- Proxy Services
Application that mediates traffic between a protected network and the
internet
Able to understand the application protocol being utilized and
implement protocol specific security
Protocols include: FTP, HTTP, Telnet etc
–They decide based on TCP/IP information
• e.g. source and destination ports and IP addresses
–They decide based on content of message
• e.g. do not forward on and message containing VB executable or ActiveX
components
13
Firewalls - Application Level Gateway (or Proxy)
15
Bastion Host
• Is a special purpose computer on a network specifically
designed and configured to withstand attacks.
• The Bastion host serves as a platform for an application-level
gateway.
• A system identified by the firewall administrator as critical
strong point in the networks security.
• The bastion host hardware platform executes a secure version
of its operating system, making it a trusted system.
• Only the services that the network administrator considers
essential are installed on the bastion host.
– These include proxy applications such as Telnet, DNS, FTP,
SMTP, and user authentication.
16
Bastion Host
• Three common configurations:
17
Screened host firewall system
• Also called single homed bastion host
Configuration:
• The firewall consists of two systems:
1. Packet filtering router: The router is configured so that:
a. For traffic from the Internet, only IP packets destined for the bastion host are
allowed in.
b. For traffic from the internal network, only IP packets from the bastion host are
allowed out.
2. Bastion Host
- performs authentication and Proxy functions.
18
Screened host firewall system…
• This configuration has greater security than simply a packet-
filtering router or an application-level gateway alone, for two
reasons.
– This configuration implements both packet-level and application-
level filtering.
– An intruder must generally penetrate two separate systems before
the security of the internal network is compromised.
20
Screened Subnet Firewall System
• Most secured configuration of all the three known techniques in
the bastion host.
• Two packet filtering routers are used.
• Creation of an isolated sub-network.
21
Screened Subnet Firewall System…
• Advantages:
- Three levels of defense to prevent intruders.
- The outside router advertises only the existence of the
screened sub-net to the internet
• Internal network is invisible to the internet.
22
Overview of Proxy Server
• Proxy Server is a computer program that acts as an
intermediary between a web browser and a web
server.
– To give users rapid access to popular web destinations.
• Go by many names
– Proxy services
– Application-level gateways
– Application proxies
24
Web caches (proxy server)
Goal: satisfy client request without involving origin server
client
origin
server
25
More about Web caching
• cache acts as both client and server
• typically cache is installed by ISP (university, company,
residential ISP)
26
Caching scenario
Assumptions origin
• average object size = 1Mb servers
• average request rate from public
institution’s browsers to origin Internet
servers = 15/sec
• delay from the router on the
Internet side of the access link to 1.5 Mbps
any origin server and back is = 2 access link
sec (Internet delay) institutional
network
Consequences 100 Mbps LAN
27
Caching scenario…
origin
servers
possible solution (expensive) public
Internet
• increase bandwidth of access link
to, say, 10 Mbps
Consequence 10 Mbps
• Total delay = Internet delay + access access link
delay + LAN delay institutional
network
= 2 sec + 2 sec + msecs 100 Mbps LAN
28
Caching scenario…
origin
possible solution: install cache servers
• suppose hit rate is 0.5 (up to 0.7) public
Internet
consequence
• 50% requests satisfied almost 1.5 Mbps
immediately access link
33
How Proxy Servers Differ from Packet Filters
34
Dual-Homed Host Proxy Server Configuration
35
Screened Host Proxy Server Configuration
36
Goals of Proxy Servers
• Conceal internal clients
• Block URLs
• Block and filter content
• Protect e-mail proxy
• Improve performance
• Ensure security
• Provide user authentication
• Redirect URLs
37
Concealing Internal Clients
• Network appears as a single machine
• If external users cannot detect hosts on your internal
network, they cannot initiate an attack against these
hosts
• Proxy server receives requests as though it were the
destination server,
– then completely regenerates a new request, which is sent
to its destination
38
Concealing Internal Clients
Demilitarized zone
• A DMZ is part of a
network on which you
place servers that must
be accessible by
sources both
outside and inside your A proxy server
makes all
network. communication
• However, the DMZ is come from a
not connected directly single gateway
to
either network, and it must
always be accessed
through the firewall.
• By using a DMZ, you
can create an
additional
step that makes it more
39
difficult for an
intruder to
Goals of Proxy Servers
• Conceal internal clients
• Block URLs
• Block and filter content
• Protect e-mail proxy
• Improve performance
• Ensure security
• Provide user authentication
• Redirect URLs
40
Blocking URLs
• An attempt to keep
employees from
visiting unsuitable
Web sites
• An unreliable
practice;
– users can use the IP
address that
corresponds to the
URL
42
Blocking and Filtering Content
• Can block and strip out Java applets or ActiveX controls
• Can delete executable files attached to
e-mail messages
• Can filter out content based on rules that contain a
variety of parameters (eg, time, IP address, port
number)
43
Goals of Proxy Servers
• Conceal internal clients
• Block URLs
• Block and filter content
• Protect e-mail proxy
• Improve performance
• Ensure security
• Provide user authentication
• Redirect URLs
44
E-Mail Proxy Protection
• External e-mail users never interact directly with internal hosts
46
Goals of Proxy Servers
• Conceal internal clients
• Block URLs
• Block and filter content
• Protect e-mail proxy
• Improve performance
• Ensure security
• Provide user authentication
• Redirect URLs
47
Ensuring Security with Log Files
• Log file
– Text file set up to
store information
about access to
networked resources
– Can ensure
effectiveness of
firewall
• Detect intrusions
• Uncover weaknesses
• Provide
documentation
49
Providing User Authentication
• Enhances security
• Most proxy servers can request users for
username and password
50
Goals of Proxy Servers
• Conceal internal clients
• Block URLs
• Block and filter content
• Protect e-mail proxy
• Improve performance
• Ensure security
• Provide user authentication
• Redirect URLs
51
Creating Filter Rules
• Allow certain hosts to bypass the proxy
• Filter out URLs
• Enable internal users to send outbound requests only
at certain times
• Govern length of time a session can last
52
Proxy Server Configuration
Considerations
• Scalability issues
– Add multiple proxy servers to the same network connection
• Need to configure each piece of client software that
will use the proxy server
• Need to have a separate proxy service available for
each network protocol (HTTP,TELNET,SMTP,…)
• Need to create packet filter rules
• Security vulnerabilities
– Single point of failure
– Buffer overflow
53
Working with Client Configurations
Each client on the network must be configured to access the proxy server 54
Working with Service Configurations
56
Proxy Server-Based Firewalls
• Firewalls based on proxy servers:
– TIS
– T.REX
– Squid
– SOCKS
– WinGate
– Symantec Enterprise Firewall
– Microsoft Internet Security & Acceleration Server
• Choice depends on your platform and the number of
hosts and services you need to protect
57
END of CLASS
END of COURSE