Ch8 - 8.01 - Understanding Firewalls & Proxy Servers Flashcards
Ch8 - Securing the Network Infrastructure
Firewalls
Firewalls are designed to protect systems on one side of the firewall from systems on the other side by analyzing packets that reach the firewall and determining whether each packet is allowed to pass through. You will configure rules on the firewall that indicate to the firewall which traffic is to pass through and which is to be blocked.
For the Security+ exam, know that firewalls are examples of protective controls, as they have rules configured to control what type of traffic can enter the network. This chapter also discusses intrusion detection systems, which in general are considered detective controls (unless it is an active IDS, or IPS)
Host-based or Application-based Firewall
A piece of software you install on a system that is used to protect that one system
Network-based Firewall
Network-based firewall is placed at the edge of the network and controls what traffic is allowed to enter and leave the network.
Types of Firewalls
- Packet-Filtering Firewall (Stateless)
- Stateful Packet Inspection Firewall
- Application-Layer Firewall
Packet-Filtering Firewall (Stateless Inspection Firewall)
A packet-filtering firewall can block or allow traffic (known as filtering traffic) based on the source or destination IP address and the source or destination port number
Packet-filtering firewall filters traffic based on the layer-3 and layer-4 headers.
Cons:
The attacker could alter the addresses in the header of the packet to fit into the rule placed on the firewall, and then the firewall would allow the packet into the network.
Stateful Packet Inspection Firewall
Like packet-filtering firewalls, a stateful packet inspection firewall can filter traffic based on the source and destination IP address or port number, but can also look at the context of the conversation and determine if the packet is supposed to be received at that point in the conversation. If the firewall receives a packet in the correct context of the conversation and the packet follows one of the rules, it allows the packet into the network.
Pros:
Stateful packet inspection firewalls use rules to filter traffic as well, but they also are smart enough to know the context of the conversation. (In other words, can filter traffic by knowing what packets are expected during certain phases of the conversation)
Example:
An example of a stateful packet inspection firewall knowing about the context of a conversation is that if a hacker tries to send malicious commands to the firewall with a destination port of 80 and the hacker has not performed a three-way handshake first, the firewall says, “Nope, sorry, you are not allowed in because I don’t see that we have established a connection.” Stateful packet inspection firewalls know that before TCP communication can occur, there needs to be a three-way handshake.
Application-Layer Firewall
The application-layer firewall, the next type of firewall, implements features of both the packet-filtering firewall and the stateful packet inspection firewall, but also can filter traffic based on the payload data of the packet.
This means that an application-layer firewall can deny packets containing suspicious commands. This allows the
firewall to control what types of actions, or commands, can be passed through the firewall in the payload of the packet.
Firewall Topologies
- Dual-Homed Host Firewalls
2. Screened-Host Firewalls
Dual-Homed Host Firewalls
A dual-homed host firewall consists of a single computer with two physical network interfaces that acts as a gateway between the two networks. The server’s routing capability is disabled so that the firewall software that is installed on the system can handle all traffic management. An application firewall or proxy server software is typically run on this system to pass packets from one side of the dual-homed system to the other. You must be careful not to enable routing within the network operating system that will be used as the dual-homed system, or you will bypass your firewall software and simply be routing data
Screened-Host Firewalls
Screened-host firewall configurations are considered by many to be more secure than the dual-homed firewall. In this configuration, you place a screening router between the dual-homed host and the public network. This enables you to provide packet filtering before the packets reach the dual-homed firewall, thereby adding an extra layer of network security. The dual-homed system can then run an application firewall or a proxy server to provide additional security to this configuration.
In short, a screened-host firewall configuration adds an extra layer of security by adding a packet-filtering router in front of the firewall.
Screened-Subnet Firewalls
A screened-subnet firewall configuration takes
security to the next level by further isolating the internal network from the public network. An additional screening router is placed between the internal network and the dual-homed firewall.
Pros:
This provides two additional levels of security. First, by adding a screening router internally, you can protect the dual-homed firewall host from an attack by an internal source. Second, it makes an external attack much more difficult because the number of layers that an attacker must go through is increased.
Security Zones (Firewalls divide networks into different zones)
- Private LAN/intranet
- DMZ
- Public zone
- Extranet
- Wireless
- Guest
Private LAN/intranet
The firewall placed in front of the private LAN
ensures that no traffic from any other network is sent through the firewall to the private LAN. Note that this zone could be called the private zone, private LAN, or intranet zone.
DMZ
The DMZ is an area between two firewalls (typically referred to as external and internal firewalls) that allows selected traffic from the Internet to pass through the external firewall into systems within the DMZ. The purpose of the internal firewall is to not allow any traffic originating from the Internet to pass through it. The DMZ is where you place any servers that need to be reached by the general public, such as a web server, SMTP server, FTP server, or DNS server.
Public Zone
The public zone is any network not controlled by the network administrator. The best and most popular example of a public zone is the Internet. As a firewall administrator, you will control which traffic comes from the public zone to the intranet zone