CS205 - Information Security: Week 11
CS205 - Information Security: Week 11
Week 11
Firewalls
2
Firewalls Processing Modes
3
Firewalls Processing Modes (cont’d.)
5
Firewalls Processing Modes (cont’d.)
• Application gateways
– Frequently installed on a dedicated computer; also
known as a proxy server
– Since proxy server is often placed in unsecured area
of the network (e.g., DMZ), it is exposed to higher
levels of risk from less trusted networks
– Additional filtering routers can be implemented behind
the proxy server, further protecting internal systems
6
Firewalls Processing Modes (cont’d.)
7
Firewalls Processing Modes (cont’d.)
8
Firewalls Processing Modes (cont’d.)
• Hybrid firewalls
– Combine elements of other types of firewalls; i.e.,
elements of packet filtering and proxy services, or of
packet filtering and circuit gateways
– Alternately, may consist of two separate firewall
devices; each a separate firewall system, but
connected to work in tandem
9
Firewalls Categorized by Generation
10
Firewalls Categorized by Structure
11
Firewall Architectures
13
Firewall Architectures (cont’d.)
14
Firewall Architectures (cont’d.)
15
Firewall Architectures (cont’d.)
17
Firewall Architectures (cont’d.)
• SOCKS servers
– SOCKS is the protocol for handling TCP traffic via a
proxy server
– A proprietary circuit-level proxy server that places
special SOCKS client-side agents on each
workstation
– A SOCKS system can require support and
management resources beyond those of traditional
firewalls
18
Selecting the Right Firewall
19
Configuring and Managing Firewalls
20
Configuring and Managing Firewalls
(cont’d.)
• Best practices for firewalls
– All traffic from trusted network is allowed out
– Firewall device never directly accessed from public
network
– Simple Mail Transport Protocol (SMTP) data allowed
to pass through firewall
– Internet Control Message Protocol (ICMP) data
denied
– Telnet access to internal servers should be blocked
– When Web services offered outside firewall, HTTP
traffic should be denied from reaching internal
networks
21
Configuring and Managing Firewalls
(cont’d.)
• Firewall rules
– Operate by examining data packets and performing
comparison with predetermined logical rules
– Logic based on set of guidelines most commonly
referred to as firewall rules, rule base, or firewall logic
– Most firewalls use packet header information to
determine whether specific packet should be allowed
or denied
22
Content Filters