Packet Filtering Firewalls
arliest type of network firewall. All firewalls can still
perform this basic function.
Stateless operation
(packet filtering firewall)
This means that it does not preserve
information about network sessions.
This type of filtering requires the least
processing effort, but it can be vulnerable to attacks that are spread over a sequence
of packets.
Stateful Inspection Firewalls
State table stores connection information
A stateful inspection firewall addresses these problems by tracking information about
the session established between two hosts, or blocking malicious attempts to start a
bogus session. The vast majority of firewalls now incorporate some level of stateful
inspection capability.
iptable
linux tool that allow you to edit rules on your firewall (drop, accept, etc) See slide 6 for sample ip table
Firewall impllementation
Types of Firewall Appliances
appliance firewall is a stand-alone hardware firewall deployed to monitor traffic
passing into and out of a network zone. A firewall appliance can be deployed in two
ways:
•Routed (layer 3) - the firewall performs forwarding between subnets. Each interface
on the firewall connects to a different subnet and represents a different security
zone.
•Bridged/transparent (layer 2) - the firewall inspects traffic passing between two nodes, such
as a router and a switch.
•Router/firewall - SOHO. Built into the router. but usually the router is meant first as a router and secondarily as a firewall
Application-based firewalls
Host-based (personal) - software firewal runing on a single host
Application firewall—software designed to run on a server to protect a particular
application
Network operating system (NOS) firewall— protects a server. a software-based firewall running
under a network server OS, such as Windows or Linux. The server would function as
a gateway or proxy for a network segment.
Forward Proxy Servers
Proxy opens connections with external servers on behalf of internal clients
Transparrent vs non-transparent proxy
non-transparent proxy means that the client must be configured with the proxy
server address and port number to use it. The port on which the proxy server
accepts client connections is often configured as port 8080.auto
• A transparent (or forced or intercepting) proxy intercepts client traffic without
the client having to be reconfigured. A transparent proxy must be implemented on a
switch or router or other inline network appliance.
Reverse proxy server
Proxy opens connections with internal servers on behalf of external clients
Access Control Lists
Network address translation (NAT)
translates private to public IP addresses and public to proviate
Static and dynamic source NAT
perform 1:1 mappings between private (“inside
local”) network address and public (“inside global”) addresses. These mappings can
be static or dynamically assigned
Overloaded NAT/Network Address Port Translation (NAPT)/Port Address
Translation (PAT)—
provides a means for multiple private IP addresses to be mapped onto a single public address. For
Virtual Firewalls
Hypervisor-based
•Filtering built into the hypervisor or cloud service
Virtual appliance
•Deployed as a virtual machine to the cloud
Multiple context
•Firewall appliance running multiple instances
•East-west security design and microsegmentation
Main purpose of Virutal firewals
to support the east-west security and zero-trust
microsegmentation design paradigms
Open source vs proprietary firewalls
Source code inspection and supply chain issues
• Wholly proprietary appliance OS
• partially proprietary - UNIX or Linux kernel with proprietary features
• Wholly open-source
•Support arrangements and subscription features should be considered…as well as access to threat feeds etc
intrusion detection system (IDS)
is a means of using software tools to provide
real-time analysis of either network traffic or system and application logs
networkbased IDS (NIDS)
captures traffic via a packet sniffer, referred to as a sensor.
Passive detection/alerting*
Network-Based Intrusion Prevention Systems
Signature-Based Detection
Behavior and Anomaly-Based Detection
Computer learns behaviors. ….could protected against zero day attached…a lot of false positives and false negatives until it leanrs
Anomaly-based detection as irregularity in packet construction
Next-generation firewall
•Application-aware filtering, user account-based filtering, IPS, cloud inspection, …
Unified threat management (UTM)