Topic 9 – Firewalls Network Security and Cryptography
Network Security and
Cryptography
Topic 9:
Firewalls
V2.0 © NCC Education Limited
Network Security and
Cryptography
Topic 9 – Lecture 1:
Firewall Operation
V2.0 © NCC Education Limited
Firewalls Topic 9 - 9.3
Scope and Coverage
This topic will cover:
• Firewall architectures and their limitations
• The DMZ firewall and its limitations
V2.0 © NCC Education Limited
V1.0 Visuals Handout - Page 1
Topic 9 – Firewalls Network Security and Cryptography
Firewalls Topic 9 - 9.4
Learning Outcomes
By the end of this topic students will be able to:
• Describe the components of a firewall
• Configure a DMZ firewall
• Evaluate the limitations of firewalls
V2.0 © NCC Education Limited
Firewalls Topic 9 - 9.5
Network Firewall
• A firewall is the first line of defence for your network
• The purpose of a firewall is to keep intruders from
gaining access to your network
V2.0 © NCC Education Limited
Firewalls Topic 9 - 9.6
Network Firewall (cont.)
• Usually placed at the perimeter of network to act as
a gatekeeper for incoming and outgoing traffic
• It protects your computer from Internet threats by
erecting a virtual barrier between your network or
computer and the Internet
V2.0 © NCC Education Limited
V1.0 Visuals Handout - Page 2
Topic 9 – Firewalls Network Security and Cryptography
Firewalls Topic 9 - 9.7
Firewall Functional Requirement
• Ensure proper filter of 2-way traffic
• Identify application regardless of ports, protocol,
evasive technique or encryption
• Provide visibility of and granular, policy-based
control over applications including individual
functions
• Accurately identify users and subsequently use
identity information as an attribute for policy
control
V2.0 © NCC Education Limited
Firewalls Topic 9 - 9.8
Firewall Functional Requirement
(cont)
• Integrate, not just combine, traditional firewall
and NIDS/NIPS capabilities
• Support high speed transmission with negligible
performance degradation
V2.0 © NCC Education Limited
Firewalls Topic 9 - 9.9
How Does a Firewall Work?
• Examines the traffic sent between two networks
- e.g. examines the traffic being sent between your
network and the Internet
• Data is examined to see if it appears legitimate:
- if so the data is allowed to pass through
- If not, the data is blocked
• A firewall allows you to establish certain rules to
determine what traffic should be allowed in or out of
your private network
V2.0 © NCC Education Limited
V1.0 Visuals Handout - Page 3
Topic 9 – Firewalls Network Security and Cryptography
Firewalls Topic 9 - 9.10
Creating Rules
• Traffic blocking rules can be based upon:
- Words or phrases
- Domain names
- IP addresses
- Ports
- Protocols (e.g. FTP)
• While firewalls are essential, they can block
legitimate transmission of data and programs
V2.0 © NCC Education Limited
10
Firewalls Topic 9 - 9.11
Common Firewall Types
• In general there are software firewalls
and hardware firewalls
- Even in home networks
• Hardware firewalls are typically found in routers,
which distribute incoming traffic from an Internet
connection to computers
• Software firewalls reside in individual computers
• Ideally a network has both
V2.0 © NCC Education Limited
11
Firewalls Topic 9 - 9.12
Software Firewall
• Protect only the computer on which they are
installed
• Provide excellent protection against threats
(viruses, worms, etc.)
• Have a user-friendly interface
• Have flexible configuration
V2.0 © NCC Education Limited
12
V1.0 Visuals Handout - Page 4
Topic 9 – Firewalls Network Security and Cryptography
Firewalls Topic 9 - 9.13
Router Firewall
• Protect your entire network or part of a network
• Located on your router
• Protect network hardware which cannot have a
software firewall installed on it
• Allows the creation of network-wide rules that
govern all computers on the network
V2.0 © NCC Education Limited
13
Firewalls Topic 9 - 9.14
Firewall Operation
• Can be divided into three main methods:
- Packet filters (see last topic)
- Application gateways
- Packet inspection
• Individual vendors of firewalls may provide
additional features
- You should look at their products for details
V2.0 © NCC Education Limited
14
Firewalls Topic 9 - 9.15
Application Gateways
• Also known as application proxy. The firewall runs
a sets of proxy programs that filter incoming and
outgoing packets based on the policy embedded in
the proxy programs
• Need separate proxies for each service, E.g.
- Telnet: Remote computer access
- SMTP: E-Mail
- FTP: File Transfer
V2.0 © NCC Education Limited
15
V1.0 Visuals Handout - Page 5
Topic 9 – Firewalls Network Security and Cryptography
Firewalls Topic 9 - 9.16
Application Gateways (cont)
• Application-layer firewalls can understand the traffic
flowing through them and allow or deny traffic
based on the content
• Host-based firewalls designed to block
objectionable Web content based on keywords are
a form of application-layer firewall
• Application-layer firewalls can inspect packets
bound for an internal Web server to ensure the
request isn’t really an attack in disguise
V2.0 © NCC Education Limited
16
Firewalls Topic 9 - 9.17
Advantages of Application
Gateways
• Provide a buffer from port scans and application
attacks
- if an attacker finds a vulnerability in an application, the
attacker would have to compromise the application/proxy
firewall before attacking devices behind the firewall
• Can be patched quickly in the event of a
vulnerability being discovered
- This may not be true for patching all the internal devices
V2.0 © NCC Education Limited
17
Firewalls Topic 9 - 9.18
Disadvantages
• Needs to know how to handle traffic to and from
your specific application
- If you have an application that's unique, your application
layer firewall may not be able to support it without making
some significant modifications
• Application firewalls are generally much slower than
packet-filtering or packet-inspection firewalls
- They run applications, maintain state for both the client
and server, and also perform inspection of traffic
V2.0 © NCC Education Limited
18
V1.0 Visuals Handout - Page 6
Topic 9 – Firewalls Network Security and Cryptography
Firewalls Topic 9 - 9.19
Packet Inspection Firewalls
• Examine the session information between devices:
- Protocol
- New or existing connection
- Source IP address
- Destination IP address
- Port numbers
- IP checksum
- Sequence numbers
- Application-specific information
V2.0 © NCC Education Limited
19
Firewalls Topic 9 - 9.20
Outbound Internet Traffic
• Client initiates connection to IP address of the web
server destined for port 80 (HTTP)
• Firewall determines whether that packet is allowed
through the firewall based on the current rule-set
• Firewall looks into the data portion of the IP packet
and determine whether it is legitimate HTTP traffic
• If all the requirements are met, a flow entry is
created in the firewall based on the session
information, and that packet is allowed to pass
V2.0 © NCC Education Limited
20
Firewalls Topic 9 - 9.21
Inbound Internet Traffic
• Web server receives the packet and responds
• Return traffic is received by the firewall
• Firewall determines if return traffic is allowed by
comparing the session information with the
information contained in the local translation table
• If return traffic matches the previous requirements,
payload is inspected to validate appropriate HTTP
• Then it is forwarded to the client
V2.0 © NCC Education Limited
21
V1.0 Visuals Handout - Page 7
Topic 9 – Firewalls Network Security and Cryptography
Firewalls Topic 9 - 9.22
Advantages
• Generally much faster than application firewalls
- They are not required to host client applications
• Most of the packet-inspection firewalls today also
offer deep-packet inspection
- The firewall can dig into the data portion of the
packet and also:
• Match on protocol compliance
• Scan for viruses
• Still operate very quickly
V2.0 © NCC Education Limited
22
Firewalls Topic 9 - 9.23
Disadvantages
• Open to certain denial-of-service attacks
• These can be used to fill the connection tables with
illegitimate connections
V2.0 © NCC Education Limited
23
Network Security and
Cryptography
Topic 9 – Lecture 2:
Firewall Architecture
V2.0 © NCC Education Limited
24
V1.0 Visuals Handout - Page 8
Topic 9 – Firewalls Network Security and Cryptography
Firewalls Topic 9 - 9.25
Firewall Architecture
• Firewalls are used to protect the perimeter of a
network and the perimeter of sections of networks
• A key question for a network administrator is where
firewalls should be located
• The positioning of firewalls in relation to other
network elements is the firewall architecture
• We will only look at the position of firewalls and the
consequences of this
- Other security devices should also be used
V2.0 © NCC Education Limited
25
Firewalls Topic 9 - 9.26
Firewall Architecture
• The following are common firewall architectures:
- Screening router
- Screened host
- Dual homed host
- Screened subnet
- Screened subnet with multiple DMZs
- Dual firewall
V2.0 © NCC Education Limited
26
Firewalls Topic 9 - 9.27
Screening Router
• Simplest of firewall architectures
• Traffic is screened by a router
- Packet filtering
- Using ACLs
• Traffic is screened according to:
- Source or destination IP address
- Transport layer protocol
- Services requested
V2.0 © NCC Education Limited
27
V1.0 Visuals Handout - Page 9
Topic 9 – Firewalls Network Security and Cryptography
Firewalls Topic 9 - 9.28
Screening Router
• Usually deployed at the perimeter of the network
• May be used to control access to a Demilitarized
Zone (DMZ) – see later
• More often used in conjunction with other firewall
technologies
V2.0 © NCC Education Limited
28
Firewalls Topic 9 - 9.29
Advantages & Disadvantages
• Advantages
- Simple
- Cheap
• Disadvantages
- No logging
- No user authentication
- Difficult to hide internal network structure
V2.0 © NCC Education Limited
29
Firewalls Topic 9 - 9.30
Demilitarised Zones (DMZ)
• A DMZ is part of the internal network but separated
from the rest of the internal network
• Traffic moving between the DMZ and other
interfaces on the protected side of the firewall still
goes through the firewall
• This traffic has firewall protection policies applied
• Common to put public-facing servers on the DMZ:
- Web servers
- Email servers
V2.0 © NCC Education Limited
30
V1.0 Visuals Handout - Page 10
Topic 9 – Firewalls Network Security and Cryptography
Firewalls Topic 9 - 9.31
Demilitarised Zones (DMZ)
V2.0 © NCC Education Limited
31
Firewalls Topic 9 - 9.32
Screened Host Firewall
• Adds an extra layer of protection in comparison to a
screening router
• Has a Bastion Host/Firewall between networks
• Bastion Host/Firewall has two NICs
• Bastion Host/Firewall connects the trusted network
to the untrusted network
- Stateful and proxy technologies are used to filter
traffic up to the application layer
V2.0 © NCC Education Limited
32
Firewalls Topic 9 - 9.33
Bastion Host
• A special purpose computer specifically designed
and configured to withstand attacks
• The router is the first line of defence
- packet filtering/access control is carried out at the router
• The bastion host is the server that connects to the
unsecure network through the router
V2.0 © NCC Education Limited
33
V1.0 Visuals Handout - Page 11
Topic 9 – Firewalls Network Security and Cryptography
Firewalls Topic 9 - 9.34
Advantages & Disadvantages
• Advantages
- Security is distributed between two points
- Greater security than screening router
- Transparent outbound access/restricted inbound
access
• Disadvantages
- Difficult to hide internal structure
- There is a single point of failure in the network
V2.0 © NCC Education Limited
34
Firewalls Topic 9 - 9.35
Dual-Homed Host
• A Bastion Host/Firewall is surrounded with packet
filtering routers
- Dual-homed - outside world and protected network
- Multi-homed - outside world and multiple protected
networks
• Routers filter traffic to the Bastion Host
• Bastion Host adds additional filtering capabilities
• Bastion Host has no routing capabilities
V2.0 © NCC Education Limited
35
Firewalls Topic 9 - 9.36
Advantages & Disadvantages
• Advantages
- Hides internal network structure
• Disadvantages
- Requires users to log onto bastion host or the use of
proxy servers
V2.0 © NCC Education Limited
36
V1.0 Visuals Handout - Page 12
Topic 9 – Firewalls Network Security and Cryptography
Firewalls Topic 9 - 9.37
Screened Subnet DMZ
• Bastion Host is surrounded with packet filtering
routers
• These control traffic into and out of the trusted and
untrusted network sections
• Has an extra layer of functionality with a DMZ
• Traffic from DMZ to trusted network must go
through Bastion Host and packet filtering router
V2.0 © NCC Education Limited
37
Firewalls Topic 9 - 9.38
Advantages & Disadvantages
• Advantages
- Provides services to outside without compromising inside
- Internal network hidden
• Disadvantages
- Single point of failure
V2.0 © NCC Education Limited
38
Firewalls Topic 9 - 9.39
Screened Subnet Multiple DMZs
• Allows configuration of varying levels of security
between:
- DMZs and the untrusted network
- Different DMZs
- DMZs and the trusted network
V2.0 © NCC Education Limited
39
V1.0 Visuals Handout - Page 13
Topic 9 – Firewalls Network Security and Cryptography
Firewalls Topic 9 - 9.40
Dual Firewall Architecture
• Using two or more firewalls enhances security
• Can be used to create DMZs
• Using technology from multiple vendors can
enhance security
V2.0 © NCC Education Limited
40
Firewalls Topic 9 - 9.41
Firewall By Pass
• Despite the best firewall, there are ways to by-
pass it.
• Common approach include the use of VPN and
proxies
V2.0 © NCC Education Limited
41
Firewalls Topic 9 - 9.42
References
• Scambrey, J., McClure, S. and Kurtz, J. (2001).
Hacking Exposed: Network Security Secrets &
Solutions, 2nd Edition. McGraw Hill.
• Zwicky, E.D. (2000). Building Internet Firewalls, 2nd
Edition. O’Reilly Media.
V2.0 © NCC Education Limited
42
V1.0 Visuals Handout - Page 14
Topic 9 – Firewalls Network Security and Cryptography
Firewalls Topic 9 - 9.43
Topic 9 – Firewalls
Any Questions?
V2.0 © NCC Education Limited
43
V1.0 Visuals Handout - Page 15