Lesson 8 - Firewalls
Lesson 8 - Firewalls
Firewall
Outline
1. What is an intrusion?
2. Port security
3. DHCP snooping
4. WiFi Security
6. Types of Firewalls
7. Labs.
What is an intrusion?
● Intrusion can be defined as any set of actions that attempt to
compromise the integrity, confidentiality or availability of resource.
SW(config)#interface Fa0/1
SW(config-if)#switchport mode access
SW(config-if)#switchport port-security
SW(config-if)#switchport port-security maximum 1
SW(config-if)#switchport port-security mac-address H.H.H | Sticky
SW(config-if)#switchport port-security violation shutdown
R1
servers
respond.
servers
○ signal-hiding techniques
○ encryption
● principal approach for preventing such access is the IEEE 802.1X standard
for port-based network access control
○ provides an authentication mechanism for devices wishing to attach to a LAN or wireless
network
● use of 802.1X can prevent rogue access points and other unauthorized
devices from becoming insecure backdoors
Wireless Security Techniques
● Introduced in 2004
● Uses AES
● All the traffic between trust zones should pass through firewall.
● Only authorized traffic, as defined by the security policy, should be allowed to
pass through.
● The firewall itself must be immune to penetration, which implies using a
hardened system with secured Operating Systems.
Firewall Policy
● User control: Controls access to the data based on the role of the user who is
attempting to access it. Applied to users inside the firewall perimeter.
● Service control: Controls access by the type of service offered by the host.
Applied on the basis of network address, protocol of connection and port
numbers.
● Direction control: Determines the direction in which requests may be initiated
and are allowed to flow through the firewall. It tells whether the traffic is
“inbound” (From the network to firewall) or vice-versa “outbound”
Firewall actions
Accepted: Allowed to enter the connected network/host through the firewall.
Rejected: Similar to “Denied”, but tells the source about this decision through
ICMP packet.
Egress filtering: Inspects the outgoing network traffic and prevent the
users in the internal network to reach out to the outside network. For
example like blocking social networking sites in school
Types of filters
Depending on the mode of operation, there are three types of firewalls :
● Connection state
● Example : Connections are only allowed through the table is
maintained to
ports that hold open connections.
understand the
context of
packets.
Application/Proxy Firewall
● Controls input,
output and
access from/to
an application or
service.
● The client’s connection terminates at the proxy and a
● Acts an
separate connection is initiated from the proxy to the
intermediary by
destination host.
impersonating
● Data on the connection is analyzed up to the application the intended
recipient.
layer to determine if the packet should be allowed or
rejected.
Static routing Internet pool: 5.5.5.32/29
Web server: 192.168.100.111 – 5.5.5.33
Lab. FW
Web Server Mail Server: 192.168.100.222 – 5.5.5.34
E-Mail Server
10.10.10.0/24
Building 1 Internal
.2 Server-SW1 204.1.1.0/24
Zone: 172.16.0.0/16
Configuring FW
servers
.2
CoreSW
.1 10.50.50.0/24 .100
.1
Acc-SW1 .1
t ru
Interface VLAN 10:
nk
172.16.10.1/24
.2 .254 .253 VPN client
.2
Interface VLAN 11: Area 0
172.16.11.1/24 DHCP Server DNS Server
k
Int Gi1/1 172.16.13.1/24 Acc-SW2
t ru
Interface VLAN 21: 172.20.21.1/24
tru
nk
nk
Interface VLAN 14:
tru
172.16.14.1/24 Interface VLAN 22: 172.20.22.1/24
nameif inside
Interface VLAN 15:
172.16.15.1/24 Acc-SW4 Interface VLAN 23: 172.20.23.1/24
Acc-SW5 Acc-SW6
Interface VLAN 16:
172.16.16.1/24 Area 2 Interface VLAN 24: 172.20.24.1/24
security-level 100
Acc-SW3
Interface VLAN 25: 172.20.25.1/24
Area 1
Interface VLAN 26: 172.20.26.1/24
….. OSPF Building 2 Zone: 172.20.0.0/16