FIREWALL
FIREWALL
FIREWALL
1
Table of
Contents
2
INTRODUCTION
TYPES OF FIREWALLS
TESTING A FIREWALL
CONFIGURATION
CONCLUSION
REFERENCES
Introduction
3
Hardware Firewalls
Protect an entire network
Implemented on the router level
Usually more expensive, harder to configure
Software Firewalls
Protect a single computer
Usually less expensive, easier to configure
How does a software firewall work?
5
Application level
Gateway
Enable the verification of individual commands and the minimum and maximum length of
appropriate command-line arguments (e.g., The number of characters used in a username).
An AF device cannot detect attacks that meet the generally acceptable procedures of
operation of a specific protocol, such as DoS (denial of service) attacks caused by the
repetition of a large number of acceptable message sequences in a short time interval.
Due to the complexity of the analysis they perform, and the large number of concurrent
sessions they monitor, the main disadvantage of the method of stateful protocol analysis is
the intensive use of AF devices.
Application Firewall
•Two types
- Network based (Web Application Firewall)
- Host based
Web Application Firewall (WAF)
Application Proxy Gateway (APG) devices also perform an analysis of the traffic flow
on the application layer.
Compared to AF devices, APG devices provide a higher level of security for
individual applications since they never allow a direct connection between two hosts,
and they can perform an inspection of the content of application-layer messages.
APG devices contain so-called proxy agents or “intermediaries” in the communication
between two end hosts.
Each successful connection between the end hosts consists of two connections – one
between the client and the proxy server and the other between the proxy server and the
destination device.
Application Proxy Gateway
Based on the filtering rules defined on the APG device, proxy agents decide whether
network traffic will be allowed or not.
Traffic-filtering decisions can also be made based on the information contained in the
header of an application-layer message or even based on the content conveyed by that
message. In addition, proxy agents can require user authentication.
There are also APG devices with the capability of packet decryption, analysis and re-
encryption, before a packet is forwarded to the destination host.
Packets that cannot be decrypted are simply forwarded through the device.
Application Proxy Gateway
APG ( DEFICIENCIES)
Require more memory and greater utilization of processor time for analyzing and
interpreting each packet passing through the device.
As a result, APG devices are not suitable for filtering applications that are more
demanding in terms of bandwidth or applications that are sensitive to time delays.
Application Proxy Gateway
Another deficiency - limitation in the number of services that can be filtered through them.
Each type of traffic passing through the device requires a specific proxy agent that acts as
an intermediary in the communication. Consequently, APG devices do not always support
the filtering of new applications or protocols.
Due to their price, APG devices are commonly used for protecting data centres or other
networks containing publicly available servers that are of high importance to an
organization.
In order to reduce the load on APG devices and achieve greater efficiency, modern
networks more frequently use proxy servers (dedicated proxy servers) that are dedicated to
specific services that are not so sensitive to time delays (e.g., Email or web proxy servers).
Making The Firewall
Fit
12
IP address
Domain names
Protocols
Ports
What It Protects You
From
13
Remote login
Spam
E-mail bombs
Source routing
Security Strategies implemented
14
Default Deny
Prohibit all communication that is not expressly permitted
Default Permit
Permit all communication that is not explicitly prohibited
Least Privilege
reduces the authorization level at which various actions are
performed
Defense in Depth
security approach whereby each system on the network is secured
to the greatest possible degree
Choke Point
forces attackers to use a narrow channel to bypass the network
Testing a Firewall
Configuration
15
Conclusion