Firewalls VPNs
Firewalls VPNs
Firewalls VPNs
Upon completion of this material, you should be able to: Explain the role of physical design in the implementation of a comprehensive security program
Describe firewall technology and the various approaches to firewall implementation
Identify the various approaches to remote and dial-up access protectionthat is, how these connection methods can be controlled to assure confidentiality of information, and the authentication and authorization of users Explain content filtering technology Describe the technology that enables the use of virtual private networks
2
Introduction
Technical controls are essential in enforcing policy for many IT functions that do not involve direct human control Technical control solutions improve an organizations ability to balance making information readily available against increasing informations levels of confidentiality and integrity
Physical Design
The physical design process:
Selects technologies to support information security blueprint Identifies complete technical solutions based on these technologies, including deployment, operations, and maintenance elements, to improve security of environment
Designs physical security measures to support technical solution Prepares project plans for implementation phase that follows
4
Firewalls
Prevent specific types of information from moving between the outside world (untrusted network) and the inside world (trusted network) May be separate computer system; a software service running on existing router or server; or a separate network containing supporting devices
Packet Filtering
Packet filtering firewalls examine header information of data packets
Most often based on combination of:
Internet Protocol (IP) source and destination address Direction (inbound or outbound) Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) source and destination port requests
Simple firewall models enforce rules designed to prohibit packets with certain addresses or partial addresses
10
Application Gateways
Frequently installed on a dedicated computer; also known as a proxy server
Since proxy server is often placed in unsecured area of the network (e.g., DMZ), it is exposed to higher levels of risk from less trusted networks
Additional filtering routers can be implemented behind the proxy server, further protecting internal systems
11
Circuit Gateways
Circuit gateway firewall operates at transport layer Like filtering firewalls, do not usually look at data traffic flowing between two networks, but prevent direct connections between one network and another Accomplished by creating tunnels connecting specific processes or systems on each side of the firewall, and allow only authorized traffic in the tunnels
12
MAC addresses of specific host computers are linked to access control list (ACL) entries that identify specific types of packets that can be sent to each host; all other traffic is blocked
13
14
Hybrid Firewalls
Combine elements of other types of firewalls; i.e., elements of packet filtering and proxy services, or of packet filtering and circuit gateways Alternately, may consist of two separate firewall devices; each a separate firewall system, but connected to work in tandem
15
Small office/home office (SOHO) or residential-grade firewalls, aka broadband gateways or DSL/cable modem routers, connect users local area network or a specific computer system to Internetworking device
Residential-grade firewall software is installed directly on the users system
17
18
19
Firewall Architectures
Firewall devices can be configured in a number of network connection architectures
Four common architectural implementations of firewalls: packet filtering routers, screened host firewalls, dual-homed firewalls, screened subnet firewalls
20
21
22
Separate host is often referred to as bastion host; can be rich target for external attacks and should be very thoroughly secured
23
24
25
26
28
29
Ease of setup and configuration? How accessible are staff technicians who can configure the firewall?
Can firewall adapt to organizations growing network?
When security rules conflict with the performance of business, security often loses
31
Telnet access to internal servers should be blocked When Web services offered outside firewall, HTTP traffic should be denied from reaching internal networks
32
Firewall Rules
Operate by examining data packets and performing comparison with predetermined logical rules
Logic based on set of guidelines most commonly referred to as firewall rules, rule base, or firewall logic Most firewalls use packet header information to determine whether specific packet should be allowed or denied
33
34
35
Content Filters
Software filternot a firewallthat allows administrators to restrict content access from within network
Essentially a set of scripts or programs restricting user access to certain networking protocols/Internet locations Primary focus to restrict internal access to external material
Most common content filters restrict users from accessing non-business Web sites or deny incoming span
36
37
Remote Access
Unsecured, dial-up connection points represent a substantial exposure to attack
Attacker can use device called a war dialer to locate connection points
War dialer: automatic phone-dialing program that dials every number in a configured range and records number if modem picks up Some technologies (RADIUS systems; TACACS; CHAP password systems) have improved authentication process
38
Terminal Access Controller Access Control System (TACACS): validates users credentials at centralized server (like RADIUS); based on client/server configuration
39
40
41
42
43
Sesame
Secure European System for Applications in a Multivendor Environment (SESAME); similar to Kerberos in that user is first authenticated to authentication server and receives token
Token then presented to privilege attribute server (instead of ticket granting service as in Kerberos) as proof of identity to gain privilege attribute certificate (PAC) Uses public key encryption; adds additional and more sophisticated access control features; more scalable encryption systems; improved manageability; auditing features; delegation of responsibility for allowing access
44
46
Transport Mode
47
48
Tunnel Mode
Organization establishes two perimeter tunnel servers These servers act as encryption points, encrypting all traffic that will traverse unsecured network Primary benefit to this model is that an intercepted packet reveals nothing about true destination system Example of tunnel mode VPN: Microsofts Internet Security and Acceleration (ISA) Server
49
50
51
Summary
Firewall technology Various approaches to remote and dial-up access protection Content filtering technology
Virtual private networks
52