Perimeter Security
Perimeter Security
Firewall
• Firewalls are a fundamental component of any perimeter defense
• It is actually a collection of components.
• A firewall is usually placed between two networks to act as a gateway.
Packet filtering
• Packet filtering protects a local network from undesired invasion depending
upon the predefined rules.
• The information passes through a network in the form of small pieces called
packets, which travel independently across IP networks.
• In a packet filtering firewall, the firewall check five packet traits are as follows
• Source IP address
• Source port
• Destination IP address
• Destination port
• IP protocol (TCP or UDP)
Filtering and Firewalls
• Packet Filtering is the simplest, and in some situations, the most effective type
of firewall.
• It is also referred to as stateless filtering
• A packet filtering firewall controls access to packets on the basis of packet
address (source or destination) or specific transport protocol type (such as HTTP
web traffic).
Packet filtering firewall
• Packet filtering controls (allows or drops) packet or data transfer based on the
following standards:
• The address the packet is coming from.
• The address the packet is going to.
• The application protocols or rules set to transfer the data.
• The packets filtering firewall shows how filtration is executed on the firewall.
• The packet filtering firewall checks access control lists (ACLs) to separate
packets depending upon the upper-layer protocol ID, source and destination
port numbers, source and destination IP addresses, and packet transmission
route.
EXAMPLES
• A stateful firewall collects data regarding every connection made through it.
All of these data points form profiles of “safe” connections.
• When a subsequent connection is attempted, it is checked against the list of
attributes collected by the stateful firewall.
• If it has the qualities of a safe connection, it is allowed to occur. If not, the
data packets are discarded.
• Stateful inspection not only verifies IP addresses but actually inspects
incoming packets for hidden threats.
Stateful Inspection Firewalls
• Stateful packet inspection is a technology used by stateful firewalls to
determine which packets to allow through the firewall.
• It works by examining the contents of a data packet and then comparing
them against data pertaining to packets that have previously passed through
the firewall.
• This type of firewall is used as additional security. It enforces more checks
and is safer compared to stateless filters.
• However, unlike stateless/packet filtering, stateful firewalls inspect the actual
data transmitted across multiple packets instead of just the headers Because
of this, they also require more system resources.
Other Firewall Techniques
• Apart from packet filtering and Stateful firewall, other types of firewall
include:
• Circuit level gateway
• Next generation firewall
Circuit-Level Gateways firewall
• A circuit-level gateway monitorsTCP handshaking between packets from
trusted clients or servers to untrusted hosts and vice versa to determine
whether a requested session is legitimate.
• To filter packets in this way, a circuit-level gateway relies on data contained in
the packet headers for the Internet'sTCP session-layer protocol.
• Circuit-level gateway filters packets at the session layer of the OSI model,
• Circuit-level gateways are another simplified type of firewall that can be easily
configured to allow or block traffic without consuming significant computi6ng
resources.
• Circuit-level gateways are designed to ensure that the established sessions are
protected.
Circuit-Level Gateways firewall
• Like packet-filtering firewalls, these firewalls do not check for actual data, although they inspect
information about transactions.
• Therefore, if a data contains malware, but follows the correctTCP connection, it will pass
through the gateway.
• That is why circuit-level gateways are not considered safe enough to protect our systems.
• Additionally, circuit-level gateways are practical, simple to set up, and don’t require a separate
proxy server.
Next-Generation Firewalls (NGFW)
• The next-generation firewall is a security device that combines a number of
functions of other firewalls.
• It incorporates packet, stateful, and deep packet inspection.
• Simply put, NGFW checks the actual payload of the packet instead of focusing solely
on header information.
• Unlike traditional firewalls, the next-gen firewall inspects the entire transaction of
data, including theTCP handshakes, surface-level, and deep packet inspection.
• Using NGFW is adequate protection from malware attacks, external threats, and
intrusion.
• These devices are quite flexible, and there is no clear-cut definition of the
functionalities they offer.Therefore, make sure to explore what each specific option
provides.
Next Generation Firewall (NGFW’s)
• NGFWs build upon traditional firewalls' features and add other critical
security functions like intrusion prevention, VPN, anti-malware, and even
encrypted traffic inspection.
• NGFW’s ability to handle deep packet inspection means that the firewall can unpack
the packet's data to prevent any packets with malicious data from moving forward.
• Free Firewalls: Comondo firewall,Glasswire,AVS firewall.
Ingress filtering
• Egress filtering, which is used to examine outbound traffic and only allows
packets to leave the network if they meet predetermined policies set by an
administrator.
• Egress filtering is used to prevent malicious activity, such as infected
machines attempting to leak data to remote hosts, or to block legitimate
users from accessing prohibited services, such as online gaming sites.
Ingress Filtering Vs Egress filtering
• Most firewalls look outwards and try to keep bad things out (ingress filtering), but a
growing number look inwards and try to stop bad things leaving (egress filtering).
• The pioneers of egress filtering were military mail systems that monitor outgoing
traffic to ensure that nothing classified goes out in the clear.
• Some ISPs started looking at outgoing mail traffic to try to detect spam.
Egress Vs ingress
Firewall Architecture
• A firewall architecture describes various ways firewall components can be put together.
• The bastion host is the system that any outsiders - friends or possible foes - must ordinarily
connect with to access a system or a service that's inside your firewall.
• By design, a bastion host is highly exposed, because its existence is known to the Internet.
• For this reason, firewall builders and managers need to concentrate security efforts on the
bastion host.
• One should pay special attention to the host's security during initial construction and
ongoing operation.
• Because the bastion host is the most exposed host, it also needs to be the most fortified
host.
Firewall Architecture
• There are many different ways to deploy the components that comprise a firewall.
• There is little difference whether the approach employed uses packet filtering or proxies. Many
organizations use a combination of packet filtering and proxies in their firewall configuration.
• The most widely implemented architectures are listed as follows:
• Screening routers;
• Bastion hosts;
• Dual-homed hosts;
• Screened hosts;
• Screened subnets.
Advantages of firewalls