16 Firewalls
16 Firewalls
Firewall
Internet/WAN’s/outside network
Aims:
2
Sample Firewalls Design
3
Firewall Characterstics
4
Why use a firewall?
Protect a wide range of machines from general probes and
many attacks.
Someone probing a network for computers.
Someone attempting to crash services on a computer.
Someone attempting to crash a computer
(Win nuke).
Someone attempting to gain access to a computer to use
resources or information
Provides some protection for machines lacking in security.
5
Classification of Firewall
Characterized by protocol level it
controls in
Packet filtering
Circuit gateways
Application gateways
Examples
DNS uses port 53
No incoming port 53 packets except known trusted
servers
Firewalls – Packet Filters
Usage of Packet Filters
Filtering with incoming or outgoing
interfaces
E.g.,
Ingress filtering of spoofed IP
addresses
Egress filtering
Most common
Provide good administrators
protection and full transparency
Network given full control over traffic
Captures semantics of a connection
Stateful Filtering
Firewall Outlines
Packet filtering
Application gateways
Circuit gateways
firewall
Policy embedded in proxy programs
Two kinds of proxies
Application-level gateways/proxies
Tailored to http, ftp, smtp, etc.
Circuit-level gateways/proxies
Working on TCP level
Firewalls - Application
Level Gateway (or Proxy)
Application-Level
Filtering
Has full access to protocol
user requests service from proxy
proxy validates request as legal
user
Need separate proxies for each service
E.g., SMTP (E-Mail)
NNTP (Net news)
backbone
Routing Filters (cont)
Packet filters obviate the need for route
filters
Route filtering becomes difficult or
impossible in the presence of complex
technologies
Route squatting – using unofficial IP
addresses inside firewalls that belong to
someone else
Difficult to choose non-addressed address
space
Dual Homed Host
Architecture