SlideShare une entreprise Scribd logo
1  sur  49
CS 6262 Fall 02 Firewalls
Firewall Technologies Julie Schneider
What is a firewall? ,[object Object],[object Object],Trusted Networks Untrusted Networks & Servers Firewall Router Internet Intranet DMZ Public Accessible Servers &  Networks Trusted Users Untrusted Users
Firewalls ,[object Object],[object Object],[object Object]
Firewalls can: ,[object Object],[object Object]
Convenient ,[object Object],[object Object],[object Object]
Firewalls Cannot Protect… ,[object Object],[object Object],[object Object],[object Object]
Access Control DMZ Net Web Server Pool Corporate Network ,[object Object],[object Object],[object Object],Internet ALERT!! ALERT!! ALERT!!
Filtering ,[object Object],[object Object]
Filtering ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Filtering ,[object Object],[object Object],[object Object]
Packet Filtering ,[object Object],[object Object]
Typical Configuration ,[object Object],[object Object]
Packet Filter Applications Presentations Sessions Transport DataLink Physical DataLink Physical Router Applications Presentations Sessions Transport DataLink Physical Network Network
Session Filtering ,[object Object],[object Object],[object Object]
Typical Configuration ,[object Object],[object Object]
Session Filtering Applications Presentations Sessions Transport DataLink Physical DataLink Physical Applications Presentations Sessions Transport DataLink Physical Network Network Network Presentations Sessions Transport Applications ,[object Object],[object Object],[object Object],Dynamic State Tables Dynamic State Tables Dynamic State Tables
Telnet “ PORT 1234”   “ ACK” Telnet Client Telnet Server 23 1234    Client opens channel to server; tells server its port number.  The ACK bit is not set while establishing the connection but will be set on the remaining packets.     Server acknowleges.
Example: Telnet Format: access-list  <rule number> <permit|deny> <protocol> <SOURCE host with IP address| any|IP address and mask> [<gt|eq port number>] <DEST host with IP address| any|IP address and mask> [<gt|eq port number>] The following allows user to telnet from an IP address (172.168.10.11) to any destination, but not vice-versa: access-list 100 permit tcp host 172.168.10.11 gt 1023 any eq 23 ! Allows packets out to remote Telnet servers access-list 101 permit tcp any eq 23 host 172.168.10.11 established ! Allows returning packets to come back in.  It verifies that the ACK bit is set interface Ethernet 0 access-list 100 out  ! Apply the first rule to outbound traffic access-list 101 in  ! Apply the second rule to inbound traffic ! Note :  anything not explicitly permitted in an access-list is denied.
FTP “ PORT 5151”   “ OK”  DATA CHANNEL  TCP ACK FTP Client FTP Server 20 Data 21 Command 5150 5151    Client opens command channel to server; tells server second port number.    Server acknowleges.    Server opens data channel to client’s second port.    Client Acknowledges.
Example FTP – Packet Filter Format: access-list  <rule number> <permit|deny> <protocol> <SOURCE host with IP address| any|IP address and mask> [<gt|eq port number>] <DEST host with IP address| any|IP address and mask> [<gt|eq port number>] The following allows a user to FTP (not passive FTP) from any IP address to the FTP server (172.168.10.12) : access-list 100 permit tcp any gt 1023 host 172.168.10.12 eq 21 access-list 100 permit tcp any gt 1023 host 172.168.10.12 eq 20 ! Allows packets from any client to the FTP control and data ports  access-list 101 permit tcp host 172.168.10.12 eq 21 any gt 1023 access-list 101 permit tcp host 172.168.10.12 eq 20 any gt 1023 ! Allows the FTP server to send packets back to any IP address with TCP ports > 1023 interface Ethernet 0 access-list 100 in  ! Apply the first rule to inbound traffic access-list 101 out  ! Apply the second rule to outbound traffic !
FTP – Passive Mode “ PASV”   “ OK 3267”  TCP ACK  DATA CHANNEL FTP Client FTP Server 20 Data 21 Command 5150 5151    Client opens command channel to server; requests passive mode.    Server allocates port for data channel; tells client port number.    Client opens data channel to server’s second port.    Server Acknowledges.
Example FTP : Session Filter
Proxy Firewalls ,[object Object],[object Object],[object Object],[object Object],[object Object]
Application Gateways ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Application Gateways ,[object Object],[object Object],[object Object],[object Object],[object Object]
Application Gateways ,[object Object],[object Object]
Application Layer GW/proxy Applications Presentations Sessions Transport DataLink Physical Network DataLink Physical Applications Presentations Sessions Transport DataLink Physical Application Gateway Applications Presentations Sessions Transport Network Network Telnet HTTP FTP
Circuit-Level Gateways ,[object Object],[object Object],[object Object],[object Object],[object Object]
SOCKS ,[object Object],[object Object],[object Object],[object Object]
Comparison Lower is better for security & performance Typically < 20  Dependent on vendor for dynamic support No dynamic w/o holes Service Support 4 1 App. GW 3 2 Circuit GW 2 2 Session Filter 1 3 Packet Filter Performance Security
Comparison Unless transparent, client application must be proxy-aware & configured App. GW Typical, SOCKS-ify client applications Circuit GW No Session Filter No Packet Filter Modify Client Applications?
Comparison yes No App. GW Yes (SOCKS v5) Circuit GW Maybe Yes Session Filter No Yes Packet Filter Fragmen-tation ICMP
Proxying UDP/ICMP ,[object Object],[object Object],[object Object],[object Object]
Circuit Level GW ,[object Object],[object Object]
NAT ,[object Object],[object Object],[object Object]
NAT ,[object Object],[object Object],[object Object],[object Object]
Encryption (VPNs) ,[object Object],[object Object],[object Object]
Encrypted Tunnels ,[object Object],[object Object],[object Object]
Attacks ,[object Object],[object Object]
IP Spoofing ,[object Object]
Anti-Spoofing ,[object Object],[object Object],[object Object]
Anti-Spoofing Internet 130.207.5.0 130.207.3.0 130.207.4.0 e1 e2 e3 e4 Allowed Networks: E1: 130207.4.0/24 E2: 130.207.3.0/24 E3: 130.207.5.0/24 E4: All except E1,E2,E3
Mitnick & Shimomura ,[object Object],[object Object],[object Object]
  Telnet Client Telnet Server 23 1234 Allow only if ACK bit set  ,     Send 2 fragments with the ACK bit set; when the server re-assembles the packet, the fragment offset are chosen so the full datagram forms a packet with the SYN bit set (the fragment offset of the second packet overlaps into the space of the first packet)     All following packets will have the ACK bit set  FRAG1 (with ACK) FRAG2 (with ACK) SYN packet (no ACK) ACK Fragmentation: The 1 st  Wave
IP Datagram IP Header TCP Header Fragmentation Data Link Layer Trailer Data Options + Padding Urgent Pointer Checksum Window U  A  P R S F Offset/Reserved Acknowledgement Number Sequence Number Destination Port Source Port Options + Padding Destination Address Source Address Header Checksum Protocol Time To Live Fragment Offset Flags Identifier Total Length Type of Service Ver/IHL Data Link Layer Header
Fragemtation: 2 nd  Wave ,[object Object],[object Object],[object Object],[object Object],[object Object]
Chargen Service ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sendmail ,[object Object],[object Object]

Contenu connexe

Tendances

Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Sabreen Irfana
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security DefinitionPatten John
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Firewall protection
Firewall protectionFirewall protection
Firewall protectionVC Infotech
 
Windows firewall
Windows firewallWindows firewall
Windows firewallVC Infotech
 
Types of firewall
Types of firewallTypes of firewall
Types of firewallPina Parmar
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsüremin_oz
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewallsSapna Kumari
 
FIREWALL
FIREWALL FIREWALL
FIREWALL Akash R
 

Tendances (20)

Firewall & its Services
Firewall & its ServicesFirewall & its Services
Firewall & its Services
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Firewall Security Definition
Firewall Security DefinitionFirewall Security Definition
Firewall Security Definition
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
What is firewall
What is firewallWhat is firewall
What is firewall
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Firewalls
FirewallsFirewalls
Firewalls
 
Windows firewall
Windows firewallWindows firewall
Windows firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewalls
 
FIREWALL
FIREWALL FIREWALL
FIREWALL
 
Firewalls
FirewallsFirewalls
Firewalls
 
Linux and firewall
Linux and firewallLinux and firewall
Linux and firewall
 

En vedette

Access list-cheatsheet
Access list-cheatsheetAccess list-cheatsheet
Access list-cheatsheetvannastart
 
dynamic host configuration protocol
dynamic host configuration protocoldynamic host configuration protocol
dynamic host configuration protocolkinish kumar
 
Wireless Security, Firewall,Encryption
Wireless Security, Firewall,EncryptionWireless Security, Firewall,Encryption
Wireless Security, Firewall,EncryptionAshwin Harikumar
 
Internet innovation with Multipath TCP
Internet innovation with Multipath TCPInternet innovation with Multipath TCP
Internet innovation with Multipath TCPOlivier Bonaventure
 
Cross site scripting
Cross site scriptingCross site scripting
Cross site scriptingkinish kumar
 
INTRODUCTION TO NETWORK OS
INTRODUCTION TO NETWORK OSINTRODUCTION TO NETWORK OS
INTRODUCTION TO NETWORK OSkinish kumar
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture Yovan Chandel
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip securityrajakhurram
 
pfSense firewall workshop guide
pfSense firewall workshop guidepfSense firewall workshop guide
pfSense firewall workshop guideSopon Tumchota
 
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6koolkampus
 
Transmission media
Transmission mediaTransmission media
Transmission mediakinish kumar
 
Firewall
FirewallFirewall
FirewallApo
 

En vedette (20)

Firewall
Firewall Firewall
Firewall
 
lmplementing Firewall Technologies
lmplementing Firewall Technologieslmplementing Firewall Technologies
lmplementing Firewall Technologies
 
Access list-cheatsheet
Access list-cheatsheetAccess list-cheatsheet
Access list-cheatsheet
 
dynamic host configuration protocol
dynamic host configuration protocoldynamic host configuration protocol
dynamic host configuration protocol
 
Firewalls
FirewallsFirewalls
Firewalls
 
Wireless Security, Firewall,Encryption
Wireless Security, Firewall,EncryptionWireless Security, Firewall,Encryption
Wireless Security, Firewall,Encryption
 
Internet innovation with Multipath TCP
Internet innovation with Multipath TCPInternet innovation with Multipath TCP
Internet innovation with Multipath TCP
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cross site scripting
Cross site scriptingCross site scripting
Cross site scripting
 
INTRODUCTION TO NETWORK OS
INTRODUCTION TO NETWORK OSINTRODUCTION TO NETWORK OS
INTRODUCTION TO NETWORK OS
 
4. system models
4. system models4. system models
4. system models
 
Ip security
Ip security Ip security
Ip security
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
IPsec
IPsecIPsec
IPsec
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
 
pfSense firewall workshop guide
pfSense firewall workshop guidepfSense firewall workshop guide
pfSense firewall workshop guide
 
IP Security
IP SecurityIP Security
IP Security
 
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
Firewall
FirewallFirewall
Firewall
 

Similaire à Firewall

Transport Layer [Autosaved]
Transport Layer [Autosaved]Transport Layer [Autosaved]
Transport Layer [Autosaved]Ram Dutt Shukla
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.pptRaj Kumar
 
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe Agnieszka Kuba
 
Firewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth FirewallsFirewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth Firewallsphanleson
 
Application Layer and Socket Programming
Application Layer and Socket ProgrammingApplication Layer and Socket Programming
Application Layer and Socket Programmingelliando dias
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slidesadam_merritt
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)Jeff Green
 
Chapter Five - Transport Layer.pptx
Chapter Five - Transport Layer.pptxChapter Five - Transport Layer.pptx
Chapter Five - Transport Layer.pptxGirT2
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Finalmasoodnt10
 
Jaimin chp-6 - transport layer- 2011 batch
Jaimin   chp-6 - transport layer- 2011 batchJaimin   chp-6 - transport layer- 2011 batch
Jaimin chp-6 - transport layer- 2011 batchJaimin Jani
 
Chapter 01 - Overview
Chapter 01 - OverviewChapter 01 - Overview
Chapter 01 - Overviewphanleson
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].pptBachaSirata
 

Similaire à Firewall (20)

Firewalls
FirewallsFirewalls
Firewalls
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Transport Layer [Autosaved]
Transport Layer [Autosaved]Transport Layer [Autosaved]
Transport Layer [Autosaved]
 
Firewalls (6)
Firewalls (6)Firewalls (6)
Firewalls (6)
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 
Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe Zdalna komunikacja sieciowa - zagadnienia sieciowe
Zdalna komunikacja sieciowa - zagadnienia sieciowe
 
Firewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth FirewallsFirewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth Firewalls
 
Application Layer and Socket Programming
Application Layer and Socket ProgrammingApplication Layer and Socket Programming
Application Layer and Socket Programming
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
 
16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)16.) layer 3 (basic tcp ip routing)
16.) layer 3 (basic tcp ip routing)
 
Chapter Five - Transport Layer.pptx
Chapter Five - Transport Layer.pptxChapter Five - Transport Layer.pptx
Chapter Five - Transport Layer.pptx
 
Mod4
Mod4Mod4
Mod4
 
security
securitysecurity
security
 
class12_Networking2
class12_Networking2class12_Networking2
class12_Networking2
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
 
Jaimin chp-6 - transport layer- 2011 batch
Jaimin   chp-6 - transport layer- 2011 batchJaimin   chp-6 - transport layer- 2011 batch
Jaimin chp-6 - transport layer- 2011 batch
 
Chapter 01 - Overview
Chapter 01 - OverviewChapter 01 - Overview
Chapter 01 - Overview
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 

Dernier

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Dernier (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Firewall

  • 1. CS 6262 Fall 02 Firewalls
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Packet Filter Applications Presentations Sessions Transport DataLink Physical DataLink Physical Router Applications Presentations Sessions Transport DataLink Physical Network Network
  • 15.
  • 16.
  • 17.
  • 18. Telnet “ PORT 1234”   “ ACK” Telnet Client Telnet Server 23 1234  Client opens channel to server; tells server its port number. The ACK bit is not set while establishing the connection but will be set on the remaining packets.  Server acknowleges.
  • 19. Example: Telnet Format: access-list <rule number> <permit|deny> <protocol> <SOURCE host with IP address| any|IP address and mask> [<gt|eq port number>] <DEST host with IP address| any|IP address and mask> [<gt|eq port number>] The following allows user to telnet from an IP address (172.168.10.11) to any destination, but not vice-versa: access-list 100 permit tcp host 172.168.10.11 gt 1023 any eq 23 ! Allows packets out to remote Telnet servers access-list 101 permit tcp any eq 23 host 172.168.10.11 established ! Allows returning packets to come back in. It verifies that the ACK bit is set interface Ethernet 0 access-list 100 out ! Apply the first rule to outbound traffic access-list 101 in ! Apply the second rule to inbound traffic ! Note : anything not explicitly permitted in an access-list is denied.
  • 20. FTP “ PORT 5151”   “ OK”  DATA CHANNEL  TCP ACK FTP Client FTP Server 20 Data 21 Command 5150 5151  Client opens command channel to server; tells server second port number.  Server acknowleges.  Server opens data channel to client’s second port.  Client Acknowledges.
  • 21. Example FTP – Packet Filter Format: access-list <rule number> <permit|deny> <protocol> <SOURCE host with IP address| any|IP address and mask> [<gt|eq port number>] <DEST host with IP address| any|IP address and mask> [<gt|eq port number>] The following allows a user to FTP (not passive FTP) from any IP address to the FTP server (172.168.10.12) : access-list 100 permit tcp any gt 1023 host 172.168.10.12 eq 21 access-list 100 permit tcp any gt 1023 host 172.168.10.12 eq 20 ! Allows packets from any client to the FTP control and data ports access-list 101 permit tcp host 172.168.10.12 eq 21 any gt 1023 access-list 101 permit tcp host 172.168.10.12 eq 20 any gt 1023 ! Allows the FTP server to send packets back to any IP address with TCP ports > 1023 interface Ethernet 0 access-list 100 in ! Apply the first rule to inbound traffic access-list 101 out ! Apply the second rule to outbound traffic !
  • 22. FTP – Passive Mode “ PASV”   “ OK 3267”  TCP ACK  DATA CHANNEL FTP Client FTP Server 20 Data 21 Command 5150 5151  Client opens command channel to server; requests passive mode.  Server allocates port for data channel; tells client port number.  Client opens data channel to server’s second port.  Server Acknowledges.
  • 23. Example FTP : Session Filter
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. Application Layer GW/proxy Applications Presentations Sessions Transport DataLink Physical Network DataLink Physical Applications Presentations Sessions Transport DataLink Physical Application Gateway Applications Presentations Sessions Transport Network Network Telnet HTTP FTP
  • 29.
  • 30.
  • 31. Comparison Lower is better for security & performance Typically < 20 Dependent on vendor for dynamic support No dynamic w/o holes Service Support 4 1 App. GW 3 2 Circuit GW 2 2 Session Filter 1 3 Packet Filter Performance Security
  • 32. Comparison Unless transparent, client application must be proxy-aware & configured App. GW Typical, SOCKS-ify client applications Circuit GW No Session Filter No Packet Filter Modify Client Applications?
  • 33. Comparison yes No App. GW Yes (SOCKS v5) Circuit GW Maybe Yes Session Filter No Yes Packet Filter Fragmen-tation ICMP
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43. Anti-Spoofing Internet 130.207.5.0 130.207.3.0 130.207.4.0 e1 e2 e3 e4 Allowed Networks: E1: 130207.4.0/24 E2: 130.207.3.0/24 E3: 130.207.5.0/24 E4: All except E1,E2,E3
  • 44.
  • 45.   Telnet Client Telnet Server 23 1234 Allow only if ACK bit set  ,  Send 2 fragments with the ACK bit set; when the server re-assembles the packet, the fragment offset are chosen so the full datagram forms a packet with the SYN bit set (the fragment offset of the second packet overlaps into the space of the first packet)  All following packets will have the ACK bit set  FRAG1 (with ACK) FRAG2 (with ACK) SYN packet (no ACK) ACK Fragmentation: The 1 st Wave
  • 46. IP Datagram IP Header TCP Header Fragmentation Data Link Layer Trailer Data Options + Padding Urgent Pointer Checksum Window U A P R S F Offset/Reserved Acknowledgement Number Sequence Number Destination Port Source Port Options + Padding Destination Address Source Address Header Checksum Protocol Time To Live Fragment Offset Flags Identifier Total Length Type of Service Ver/IHL Data Link Layer Header
  • 47.
  • 48.
  • 49.