Title: FIREWALL
1MASTER OF COMMINUCATION ADVANCED NETWORKING
PROJECT
Supervised by associate professor Dr Hassan
Abbas
Prepared by Eng Reem Issa
2Outline
- Why We Need a Firewall
- What is the Firewall
- Types of Firewalls
3Firewall
- Why We Need a Firewall
- Connecting to the Internet is like opening a door
to your computer. Through that door, you can
easily go online to shop, read the latest news,
send e-mail, and more. - But an open door also allows hackers to easily
gain access to your PC. hackers can steal your
valuable personal data, such as bank account
numbers and passwords. - firewall shuts your computer's door to hackers,
allowing only authorized traffic to flow through.
4Firewall
- Is a system designed to prevent unauthorized
access to or from a private network . - firewalls can be performed in both hardware and
software or a combination of both. - Firewalls provide the first level of defense for
computers that exchange information - And work as a barrier between a protected network
and an unsecured network
5Figure 1
firewall
6HOW IT WORKS??
- All incoming and outgoing packets from the
network must pass through the firewall - The firewall examines each packets according to
the security criteria and blocks those packets
which do not meet the criteria.
7Types of firewalls
- 1.packet-filtering
- 2.circuit- level gateway
- 3.Application-Level Gateway
- 4.Hybrid Firewall Technologies
8Packet Filters
- The most basic type of firewall .
- Packet filter firewalls are essentially routing
devices that include access control functionality
for system addresses and communication sessions.
- The access control functionality of a packet
filter firewall is governed by set of rules.
9Packet Filters
- Packet filters operate at the Network Layer to
examine incoming and outgoing packets and apply a
fixed set of rules to the packets to determine
whether they will be allowed to pass. - The packet filter firewall is typically very fast
because it does not examine any of the data in
the packet.
10Packet Filters
- It simply examines the IP packet header, the
source and destination IP addresses, and the
port, then it applies filtering rules.
11Figure 2
12Packet Filtering Figure 3
Discard or allow packets based on configurable
criteria
ACCEPT !!!!!
Drop!!!
Internet
13Advantage
- Packet filtering is fast, flexible, transparent
(no changes are required at the client) and
cheap. - Most routers will provide packet filtering
capabilities, and pure packet filter firewalls do
not require powerful hardware. - This type of filter is used in small to medium
business that need to control where users can or
cannot go.
14Basic Weaknesses Of Packet Filters
- 1-Because packet filter firewalls do not examine
upper-layer data, they cannot prevent attacks
that employ application-specific vulnerabilities
or functions - 2- Because of the limited information available
to the firewall, the logging functionality
present in packet filter firewalls is limited.
Packet filter logs normally contain source
address, destination address, and traffic type.
15- Consequently, packet filter firewalls are very
suitable for high-speed environments where
logging and user authentication with network
resources are not important.
16Circuit-level Gateways
- known as stateful packet inspection firewalls.
- In the circuit-level firewall, all connections
are monitored and only the connections that are
found to be valid are allowed to pass through the
firewall.
17Circuit-level Gateways
- stateful firewall is able to hold in memory
significant characteristic of each connection,
from start to finish. These characteristic known
as the state of the connection, may include
details as the IP addresses and ports involved in
the connection and the sequence numbers of the
packets passing the connection.
18Circuit-level Gateways
- When packet arrives at firewall from the
Internet, the firewall must decide if it should
be pass . - Then the firewall looks to see what connections
have been opened from the inside of network to
the Internet. If there is a connection open that
applies to the packet that has arrived from the
Internet then it will be allowed through,
otherwise it will be rejected.
19Circuit-level Gateways
- The firewall looks at the source and destination
IP addresses, the source and destination ports
and the sequence numbers to decide if the packet
belongs to a current open connection - source port will be some number greater
- than 1023 and less than 16384.
- the destination port on the host will be
- low-numbered port less than 1024
20- the firewall builds dynamic state tables It
uses these tables to keep track of the
connections that go through the firewall then
allowing all packets that meet the rule set's to
pass. - Stateful inspections usually occur at the
Transport Layer, thus making it fast and
preventing suspect packets from traveling up.
21Advantage And Disadvantages
- It inexpensive, fast
- More secure, because they maintain the
- connection state
- Disadvantages
- Lack of application awareness
22Application Proxy gateway
- Firewall proxy servers operate at the application
layer. A firewall proxy server is an application
that acts as an intermediary between two end
systems. No direct connection between trusted and
entrusted network. - Application proxy mediates connections
23Application Proxy gateway
- each proxy has the ability to require
authentication of each individual network user. - This user authentication can take many forms,
including the following - User ID and Password Authentication
- Source Address Authentication
24Application Proxy gateway
- Proxy server firewalls have large
- processor and memory requirements in order to
support many simultaneous users
25Application Proxy gateway
- To reduce the load on the firewall and faster the
process, A proxy service must be run for each
type of Internet application the firewall will
support a Simple Mail Transport Protocol (SMTP)
proxy for e-mail, an HTTP proxy for Web services
and so on. Proxy servers are almost always
one-way arrangements running from the internal
network to the outside network.
26Figure 4
27Advantages
- Best security
- work at application layer
- Full application awareness
- Information hiding
- Authentication of network users based on their
user ID and password - Extensive logging capabilities
28Disadvantages
- Very slow
- Less flexible, for any new application
- New proxy, harder to adapt to new technologies
- Not suited to real-time applications Because of
the full packet awareness the firewall is
forced to spend more time in reading and
interpreting each packet.
29Hybrid Firewall Technologies
- As a result of advances in network infrastructure
engineering and information security. firewall
products incorporate functionality from several
different classifications of firewall to offset
some of the weaknesses associated with firewall.
30Hybrid Firewall Technologies
- It Combine best of stateful inspection and
- application gateway technologies
- Achieve better balance between security and
performance - Inspect and filter the packet from the network
- level (network layer) up to the data content
- (application layer)
- Allow direct connection between client and
- server when acting as stateful inspection
firewall
31The Algorithm Of the Packet Filter
- Every packet has the following five fields
32The Algorithm Of the Packet Filtering
- 1. Rule r1 (I 1) and (S any) and
- (D Mail Server) and (T 25) and (P tcp) ?
accept - (This rule allows incoming SMTP packets to
proceed to the mail server.) - 2. Rule r2 (I 1) and (S Malicious Hosts) and
(D any) and (N any) and (P any) ? discard - (This rule discards incoming packets from
previously known malicious hosts.)
33The Algorithm Of the Packet Filtering
- 3. Rule r3 (I 0) and (S server) and (D
any) and (N any) and (P any) ? accept - (This rule allows any outgoing packet to
proceed.)
34Reference
- Guidelines on Firewalls and Firewall Policy by
John Wack, Ken Cutler, Jamie Pole. - www.csrc.nist.gov
- Firewall Architecture A Nextep Broadband White
Paper - www.nextep.com.au
- www. Howstuffworks.com
- Firewall Design Consistency, Completeness, and
Compactness by Mohamed G. Gouda and Xiang-Yang
Alex Liu - www.cse.msu.edu
35- THANKS
- For your attention