Firewalls
Firewalls
Prepared by
Mr. S. Saravanan,
Asst. Prof, Amrita School of Computing,
Chennai
What is a Firewall?
A choke point of control and monitoring
Interconnects networks with diering trust
Imposes restrictions on network services
only authorized traic is allowed
Auditing and controlling access
can implement alarms for abnormal behavior
Itself immune to penetration
Provides perimeter defence
4 controls provided by
#rewall
Classi#cation of Firewall
Packet ltering
Stateful inspection rewall
Circuit gateways
Application gateways
action is taken.
Default = forward
The default = discard policy is more conservative.
Initially, everything is blocked, and services must
be added on a case-by-case basis. This policy is
more visible to users, who are more likely to see
the rewall as a hindrance. However, this is the
policy likely to be preferred by businesses and
government organizations. Further visibility to
users diminishes as rules are created.
A stateful inspection packet rewall tightens up the rules for TCP traic by
creating a directory of outbound TCP connections, as shown in table in next
slide. There is an entry for each currently established connection. The
packet lter will now allow incoming traic to high-numbered ports only for
those packets that t the prole of one of the entries in this directory.
It keeps track of the state of active connections and makes decisions based
on the context of the entire communication session
it can keep track of the state of active connections. This enhances the
rewall's ability to make intelligent decisions based on the context of
network traic
Stateful Filtering
Proxy, on the other hand, transfers data from the local network
to the internet and receives information from the
database/web server, and delivers it back to the local network.
Accept – this rule accepts the packets to come through the iptables
rewall.
Drop – the dropped packet is not matched against any further chain.
When Linux iptables drop an incoming connection to your server, the
person trying to connect does not receive an error. It appears as if
they are trying to connect to a non-existing machine.
Return – this rule sends the packet back to the originating chain so you
can match it against other rules.
Reject – the iptables rewall rejects a packet and sends an error to the
connecting device.
Firewalls Aren’t Perfect?
Useless against attacks from the inside
Evildoer exists on inside
Malicious code is executed on an internal
machine
Organizations with greater insider threat
Banks and Military
Protection must exist at each layer
Assess risks of threats at every layer
Cannot protect against transfer of all
virus infected programs or les
because of huge range of O/S & le types