Lesson 10 Flashcards
Packet Filtering Firewalls
arliest type of network firewall. All firewalls can still
perform this basic function.
- *****Enforce a network access control list (ACL)
- Act to deny (block or drop), log, or accept a packet
- Inspect headers of individual packets
* Source and destination IP address
* Protocol ID/type (TCP, UDP, ICMP, routing protocols, and so on)
* Source and destination port numbers (TCP or UDP application type) - Inbound, outbound, or both
- Stateless operation
Stateless operation
(packet filtering firewall)
This means that it does not preserve
information about network sessions.
This type of filtering requires the least
processing effort, but it can be vulnerable to attacks that are spread over a sequence
of packets.
Stateful Inspection Firewalls
State table stores connection information
A stateful inspection firewall addresses these problems by tracking information about
the session established between two hosts, or blocking malicious attempts to start a
bogus session. The vast majority of firewalls now incorporate some level of stateful
inspection capability.
iptable
linux tool that allow you to edit rules on your firewall (drop, accept, etc) See slide 6 for sample ip table
Firewall impllementation
- Firewall appliances (physical appliance
•Routed (layer 3)
•Bridged/transparent (layer 2)
•Router/firewall - Application-based firewalls
•Host-based (personal)
•Application firewall
•Network operating system (NOS) firewall
Types of Firewall Appliances
appliance firewall is a stand-alone hardware firewall deployed to monitor traffic
passing into and out of a network zone. A firewall appliance can be deployed in two
ways:
•Routed (layer 3) - the firewall performs forwarding between subnets. Each interface
on the firewall connects to a different subnet and represents a different security
zone.
•Bridged/transparent (layer 2) - the firewall inspects traffic passing between two nodes, such
as a router and a switch.
•Router/firewall - SOHO. Built into the router. but usually the router is meant first as a router and secondarily as a firewall
Application-based firewalls
Host-based (personal) - software firewal runing on a single host
Application firewall—software designed to run on a server to protect a particular
application
Network operating system (NOS) firewall— protects a server. a software-based firewall running
under a network server OS, such as Windows or Linux. The server would function as
a gateway or proxy for a network segment.
Forward Proxy Servers
Proxy opens connections with external servers on behalf of internal clients
Transparrent vs non-transparent proxy
non-transparent proxy means that the client must be configured with the proxy
server address and port number to use it. The port on which the proxy server
accepts client connections is often configured as port 8080.auto
• A transparent (or forced or intercepting) proxy intercepts client traffic without
the client having to be reconfigured. A transparent proxy must be implemented on a
switch or router or other inline network appliance.
Reverse proxy server
Proxy opens connections with internal servers on behalf of external clients
Access Control Lists
- Least access - minimum amoiunt of traffic allowed for a service
- Top to bottom processing order - order of rules
- Implicit deny - deny everyting that does fit rules
- Explicit deny all
- Criteria for rules (tuples) - parameters within a rule
- Documenting and testing configuration
Network address translation (NAT)
translates private to public IP addresses and public to proviate
Static and dynamic source NAT
perform 1:1 mappings between private (“inside
local”) network address and public (“inside global”) addresses. These mappings can
be static or dynamically assigned
Overloaded NAT/Network Address Port Translation (NAPT)/Port Address
Translation (PAT)—
provides a means for multiple private IP addresses to be mapped onto a single public address. For
Virtual Firewalls
Hypervisor-based
•Filtering built into the hypervisor or cloud service
Virtual appliance
•Deployed as a virtual machine to the cloud
Multiple context
•Firewall appliance running multiple instances
•East-west security design and microsegmentation
Main purpose of Virutal firewals
to support the east-west security and zero-trust
microsegmentation design paradigms