Short notes on Firewall.
Firewalls and Its Types:
- The most commonly accepted network protection is a barrier—a firewall between the corporate network and the outside world (untrusted network).
- A firewall is a method of placing a device—a computer or a router— between the network and the Internet to control and monitor all traffic between the outside world and the local network.
- Typically, the device allows insiders to have full access to services.
- While granting access from the outside only selectively, based on log-on name, password, IP address, or other identifiers as shown in the figure below.
- In general, a firewall is a protection device to shield vulnerable areas from some form of danger.
- In the context of the Internet, a firewall is a system—a router, a personal computer, a host, or a collection of hosts—set up specifically to shield a site or subnet from protocols and services that can be abused from hosts on the outside of the subnet.
- A firewall system is usually located at a gateway point, such as a site's connection to the Internet, but can be located at internal gateways to provide protection for a smaller collection of hosts or subnets.
- Generally, firewalls operate by screening packets and/or the applications that pass through them, provide controllable filtering of network traffic, allow restricted access to certain applications, and block access to everything else.
- The actual mechanism that accomplishes filtering varies widely, but in principle, the firewall can be thought of as a pair of mechanisms: one to block incoming traffic and the other to permit outgoing traffic.
- Some firewalls place a greater emphasis on blocking traffic, and others emphasize permitting traffic.
- Firewalls range from simple traffic logging systems that record all network traffic flowing through the firewall in a file or database for auditing purposes to more complex methods such as IP packet screening routers, hardened fire-wall hosts, and proxy application gateways.
- The simplest firewall is a packet-filtering gateway or screening router. Configured with filters to restrict packet traffic to designated addresses, screening routers also limit the types of services that can pass through them.
- More complex and secure are application gateways.
Types of Firewall
1. IP Packet Screening Routers:
• This is a static traffic routing service placed between the network service provider's router and the internal network.
• The traffic routing service may be implemented at an IP level via screening rules in a router or at an application level via proxy gateways and services.
• Figure below shows a secure firewall with an IP packet screening router.
• The firewall router filters incoming packets to permit or deny IP packets based on several screening rules.
• These screening rules, implemented into the router are automatically performed.
• Rules include target interface to which the packet is routed, known source IP address, and incoming packet protocol (TCP, UDP, ICMP).
• ICMP stands for Internet Control Message Protocol, a network management tool of the TCP/IP protocol suite.
Disadvantages
• Although properly configured routers can plug many security holes, they do have several disadvantages.
• First, screening rules are difficult to specify, given the vastly diverse needs of users.
• Second, screening routers are fairly inflexible and do not easily extend to deal with functionality different from that preprogrammed by the vendor.
• Lastly, if the screening router is circumvented by a hacker, the rest of the network is open to attack.
2. Proxy Application Gateways:
• A proxy application gateway is a special server that typically runs on a firewall machine.
• Their primary use is access to applications such as the World Wide Web from within a secure perimeter as shown in the figure below.
• Instead of talking directly to external WWW servers, each request from the client would be routed to a proxy on the firewall that is defined by the user.
• The proxy knows how to get through the firewall.
• An application-Level proxy makes a firewall safely permeable for users in an organization, without creating a potential security hole through which hackers can get into corporate networks.
• The proxy waits for a request from inside the firewall, forwards the request to the remote server outside the firewall, reads the response, and then returns it to the client. • In the usual case, all clients within a given subnet use the same proxy.
• This makes it possible for the proxy to execute efficient caching of documents requested by many clients.
• The proxy must be in a position to filter dangerous URLs and malformed commands.
3. Hardened Firewall Hosts:
• A hardened firewall host is a stripped-down machine that has been configured for increased security.
• This type of firewall requires inside or outside users to connect to the trusted applications on the firewall machine before connecting further.
• Generally, these firewalls are configured to protect against unauthenticated interactive logins from the external world.
• This, more than anything, helps prevent unauthorized users from logging into machines on the network.
• The hardened firewall host method can provide a greater level of audit and security, in return for increased configuration cost and decreased 'level of service (because a proxy needs to be developed for each desired service).
OR,
Firewall
- A firewall provides a defense, sometimes the first line of defense, between a corporate network and the Internet.
- All corporate access to and from the Internet flows through the firewall.
- The network and computers being protected are inside the firewall, and any other network is outside.
- The networks inside the firewall are called trusted, whereas networks outside the firewall are called untrusted.
- In the TCP/IP protocol stack, a firewall works in the application layer. Thus, it provides a software solution.
- Firewalls are computers that have the following characteristics:
- All traffic from inside to outside and outside to inside must pass through it.
- Only authorized traffic is allowed to pass through it.
- The firewall itself must be immune to penetration.
Classification of Firewalls
a) Packet filters:- Examine all packets flowing back and forth through the firewall
b) Gateway servers
- Filter traffic based on the requested application such as Telnet, FTP, and HTTP.
- A gateway might permit incoming FTP requests, but not outgoing FTP requests.
- A gateway might prevent employees inside a firewall from downloading any program outside the firewall.
c) Proxy servers
- Communicate on behalf of the private network
- Serve as a huge cache for Web pages
Comments
Post a Comment