Chapter 5 Firewall and Proxy Server
Chapter 5 Firewall and Proxy Server
Chapter 5 Firewall and Proxy Server
1
Outline
• Firewall
• Proxy Server
• Types of Firewalls
• Packet Filtering Firewalls
• Application level gateway
• Circuit level gateway
• Firewall configuration/topology
• Proxy server
• How Proxy Servers Work
• Proxy Servers and Packet Filters
• Goals of Proxy Servers
2
Overview of Firewall
• Firewall is a router or other communications device
which filters access to a protected network.
• Firewall is also a program that screens all incoming
traffic and protects the network from unwelcome
intruders.
• It is a means of protection a local system or network of
systems from network-based security threats,
– while affording access to the outside world via WANs or the
Internet
3
Firewall features
• General Firewall Features
- Port Control
- Network Address Translation
- Application Monitoring
- Packet Filtering
- Access control
• Additional features
- Data encryption
- Authentication
- Connection relay (hide internal network)
- reporting/logging
- e-mail virus protection
4
Types of Firewalls
5
Packet Filtering Firewalls/Routers
• Packet Filtering router applies a set of rules to each incoming and
outgoing IP packet and then forwards or discards the packet.
– A filtering firewall works at the network level.
8
Bastion Host
• Is a special purpose computer on a network specifically
designed and configured to withstand attacks.
• The Bastion host serves as a platform for an application-level
gateway.
• A system identified by the firewall administrator as critical
strong point in the networks security.
• The bastion host hardware platform executes a secure version
of its operating system, making it a trusted system.
• Only the services that the network administrator considers
essential are installed on the bastion host.
– These include proxy applications such as Telnet, DNS, FTP,
SMTP, and user authentication.
9
Bastion Host
• Three common configurations:
10
Screened host firewall system
• Also called single homed bastion host
Configuration:
• The firewall consists of two systems:
1. Packet filtering router: The router is configured so that:
a. For traffic from the Internet, only IP packets destined for the bastion host are
allowed in.
b. For traffic from the internal network, only IP packets from the bastion host are
allowed out.
2. Bastion Host
- performs authentication and Proxy functions.
11
Screened host firewall system…
• This configuration has greater security than simply a packet-
filtering router or an application-level gateway alone, for two
reasons.
– This configuration implements both packet-level and application-level
filtering.
– An intruder must generally penetrate two separate systems before
the security of the internal network is compromised.
13
Screened Subnet Firewall System
• Most secured configuration of all the three known techniques in
the bastion host.
• Two packet filtering routers are used.
• Creation of an isolated sub-network.
14
Screened Subnet Firewall System…
• Advantages:
- Three levels of defense to prevent intruders.
- The outside router advertises only the existence of the
screened sub-net to the internet
• Internal network is invisible to the internet.
15
Overview of Proxy Server
• Proxy Server is a computer program that acts as an
intermediary between a web browser and a web server.
– To give users rapid access to popular web destinations.
• Go by many names
– Proxy services
– Application-level gateways
– Application proxies
17
How Proxy Servers Work
• Function as a software , forwarding data between
internal and external hosts
• Focus on the port each service uses
– Screen all traffic into and out of each port
– Decide whether to block or allow traffic based on rules
19
Proxy Servers and Packet Filters
• Are used together in a firewall to provide multiple
layers of security
20
How Proxy Servers Differ from Packet Filters
21
Dual-Homed Host Proxy Server Configuration
22
Screened Host Proxy Server Configuration
23
Goals of Proxy Servers
• Conceal internal clients
• Block URLs
• Block and filter content
• Protect e-mail proxy
• Improve performance
• Ensure security
• Provide user authentication
• Redirect URLs
24
Concealing Internal Clients
• Network appears as a single machine
• If external users cannot detect hosts on your internal
network, they cannot initiate an attack against these
hosts
• Proxy server receives requests as though it were the
destination server,
– then completely regenerates a new request, which is sent
to its destination
25
Concealing Internal Clients
Demilitarized zone
• A DMZ is part of a
network on which you
place servers that must
be accessible by
sources both
outside and inside your A proxy server
makes all
network. communication
• However, the DMZ is come from a
not connected directly single gateway
to
either network, and it must
always be accessed
through the firewall.
• By using a DMZ, you
can create an
additional
step that makes it more
26
difficult for an
intruder to
Goals of Proxy Servers
• Conceal internal clients
• Block URLs
• Block and filter content
• Protect e-mail proxy
• Improve performance
• Ensure security
• Provide user authentication
• Redirect URLs
27
Blocking URLs
• An attempt to keep
employees from
visiting unsuitable
Web sites
• An unreliable
practice;
– users can use the IP
address that
corresponds to the
URL
29
Blocking and Filtering Content
• Can block and strip out Java applets or ActiveX controls
• Can delete executable files attached to
e-mail messages
• Can filter out content based on rules that contain a
variety of parameters (eg, time, IP address, port
number)
30
Goals of Proxy Servers
• Conceal internal clients
• Block URLs
• Block and filter content
• Protect e-mail proxy
• Improve performance
• Ensure security
• Provide user authentication
• Redirect URLs
31
E-Mail Proxy Protection
• External e-mail users never interact directly with internal hosts
33
Goals of Proxy Servers
• Conceal internal clients
• Block URLs
• Block and filter content
• Protect e-mail proxy
• Improve performance
• Ensure security
• Provide user authentication
• Redirect URLs
34
Ensuring Security with Log Files
• Log file
– Text file set up to
store information
about access to
networked resources
– Can ensure
effectiveness of
firewall
• Detect intrusions
• Uncover weaknesses
• Provide
documentation
36
Providing User Authentication
• Enhances security
• Most proxy servers can request users for
username and password
37
Goals of Proxy Servers
• Conceal internal clients
• Block URLs
• Block and filter content
• Protect e-mail proxy
• Improve performance
• Ensure security
• Provide user authentication
• Redirect URLs
38
Creating Filter Rules
• Allow certain hosts to bypass the proxy
• Filter out URLs
• Enable internal users to send outbound requests only
at certain times
• Govern length of time a session can last
39
Proxy Server Configuration
Considerations
• Scalability issues
– Add multiple proxy servers to the same network connection
• Need to configure each piece of client software that
will use the proxy server
• Need to have a separate proxy service available for
each network protocol (HTTP,TELNET,SMTP,…)
• Need to create packet filter rules
• Security vulnerabilities
– Single point of failure
– Buffer overflow
40
Working with Client Configurations
Each client on the network must be configured to access the proxy server 41
Working with Service Configurations
43
Proxy Server-Based Firewalls
• Firewalls based on proxy servers:
– TIS
– T.REX
– Squid
– SOCKS
– WinGate
– Symantec Enterprise Firewall
– Microsoft Internet Security & Acceleration Server
• Choice depends on your platform and the number of
hosts and services you need to protect
44
END of CLASS
END of COURSE