Firewalls and VPN
Firewalls and VPN
Firewalls and VPN
Session Outline:
• Session ILO’s.
• Firewalls
• VPNs
1
Session : Firewalls and VPN
• B: Intellectual Skills
• b3: Design end-to-end secure and available systems.
• b4: Design integral and confidentiality services.
2
Information Security
Session: Firewalls and VPN
Session Outline:
• Session 7 ILO’s.
• Firewalls
• VPNs
3
Firewalls
5
Firewall Design Principles
• Design goals:
– All traffic from inside to outside must pass
through the firewall (physically blocking all access
to the local network except via the firewall)
– Only authorized traffic (defined by the local
security policy) will be allowed to pass
– The firewall itself is immune to penetration (use of
trusted system with a secure operating system)
7
Firewall Characteristics
8
Firewall Characteristics
• User control
– Controls which user(s) can have access to which
services.
• Behavior control
– Controls how particular services are used (e.g.
filter e-mail)
9
Types of Firewalls
10
Types of Firewalls
11
Types of Firewalls
12
Packet-Filtering Router (1)
13
Packet-filtering Router (2)
14
Packet-filtering Router (3)
• Advantages:
– Simplicity
– Transparency to users
– High speed
• Disadvantages:
– Difficulty of setting up packet filter rules
– Lack of Authentication
• Possible attacks and appropriate countermeasures
– IP address spoofing
– Source routing attacks
– Tiny fragment attacks
15
Application / Content Filtering -
level Gateway (1)
16
Application-level Gateway (2)
• Application-level Gateway
– Also called proxy server
– Acts as a relay of application-level traffic
– Can work as content filtering FW.
• Advantages:
– Higher security than packet filters
– Only need to scrutinize a few allowable applications
– Easy to log and audit all incoming traffic
• Disadvantages:
– Additional processing overhead on each connection (gateway as
splice point)
17
Circuit-level Gateway (1)
18
Circuit-level Gateway (2)
– Stand-alone system or
– Specialized function performed by an Application-
level Gateway
– Sets up two TCP connections
– The gateway typically relays TCP segments from
one connection to the other without examining the
contents
19
Circuit-level Gateway (3)
20
Types of Firewalls
• Bastion Host
– A system identified by the firewall administrator as
a critical strong point in the network´s security
– The bastion host serves as a platform for an
application-level or circuit-level gateway
21
Firewall Basing
22
Firewall Locations
23
Firewall Configurations
24
Distributed Firewalls
25
Firewall Configurations
26
Firewall Configurations
PALGOV © 2011 27
Firewall Configurations
PALGOV © 2011 28
Unified Threat Management Products
PALGOV © 2011 29
Tutorial: Information
Security
Session Outline:
• Session ILO’s.
• Firewalls
• SOCKS Protocols
• VPN
PALGOV © 2011 30
Socks Protocols
Socks proxy
2. connect()
33
Comparing SOCKS4 and SOCKS5
34
Firewall Examples
• MS Windows firewalls
• Cisco firewalls
• Other firewalls….
35
Windows Firewall
Session Outline:
• Session ILO’s.
• Firewalls
• SOCKS Protocols
• VPN
38
Virtual Private Networks (VPN)
• VPNs are most commonly used today for telecommuting and linking
branch offices via secure WANs.
• IPSEC VPN (refer to session 5)
• MS VPN
40
VPN Protocols for Secure Network
Communications
42
IPSec problems
• Slow progress resulted in a splintering of
efforts during the mid-90s
• SSL was one such offshoot, developed to
provide application-level security rather than
network level security.
• Traditional IPSec implementations required a
great deal of kernel code, complicating cross-
platform porting efforts.
• IPSec is a complex production with a relatively
steep learning curve for new users.
• See session 5 for more details
43
VPN using (L2TP)
44
VPN using (L2TP)
48