Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Firewalls: Perimeter Defense in Network Security, Slides of Cryptography and System Security

An in-depth understanding of firewalls, their role in network security, and their limitations. Topics covered include packet filters, stateful packet filters, application-level gateways, circuit-level gateways, and firewall configurations. Access control and trusted computer systems are also discussed. The document concludes with an overview of common criteria, an international initiative for specifying security requirements and evaluation criteria.

Typology: Slides

2011/2012

Uploaded on 11/05/2012

patel
patel 🇮🇳

3.8

(15)

81 documents

1 / 30

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Cryptography and
Network Security
Chapter 20
Docsity.com
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e

Partial preview of the text

Download Firewalls: Perimeter Defense in Network Security and more Slides Cryptography and System Security in PDF only on Docsity!

Cryptography and

Network Security

Chapter 20

Chapter 20 – Firewalls

The function of a strong position is to make the forces holding it practically unassailable On War, Carl Von Clausewitz

What is a Firewall?

 a choke point of control and monitoring

 interconnects networks with differing trust

 imposes restrictions on network services  only authorized traffic is allowed

 auditing and controlling access  can implement alarms for abnormal behavior

 provide NAT & usage monitoring

 implement VPNs using IPSec

 must be immune to penetration

Firewall Limitations

 cannot protect from attacks bypassing it

 eg sneaker net, utility modems, trusted organisations, trusted services (eg SSL/SSH)

 cannot protect against internal threats

 eg disgruntled or colluding employees

 cannot protect against transfer of all virus infected programs or files  because of huge range of O/S & file types

Firewalls – Packet Filters

Firewalls – Packet Filters

Firewalls – Stateful Packet

Filters

 traditional packet filters do not examine higher layer context  ie matching return packets with outgoing flow

 stateful packet filters address this need

 they examine each IP packet in context  keep track of client-server sessions  check each packet validly belongs to one

 hence are better able to detect bogus packets out of context

Firewalls - Application Level

Gateway (or Proxy)

 have application specific gateway / proxy

 has full access to protocol

 user requests service from proxy  proxy validates request as legal  then actions request and returns result to user  can log / audit traffic at application level

 need separate proxies for each service

 some services naturally support proxying  others are more problematic

Firewalls - Circuit Level Gateway

 relays two TCP connections

 imposes security by limiting which such connections are allowed

 once created usually relays traffic without examining contents

 typically used when trust internal users by allowing general outbound connections

 SOCKS is commonly used

Firewalls - Circuit Level Gateway

Firewall Configurations

Firewall Configurations

Access Control

 given system has identified a user

 determine what resources they can access

 general model is that of access matrix with

subject - active entity (user, process)  object - passive entity (file or resource)  access right – way object can be accessed

 can decompose by

 columns as access control lists  rows as capability tickets

Access Control Matrix