Application Layer Firewalls
Download
Report
Transcript Application Layer Firewalls
Lesson 10-Firewalls
Overview
Defining the types of firewalls.
Developing a firewall configuration.
Designing a firewall rule set.
Overview
A firewall is a network access control device.
It can perform a centralized security management function.
It denies all traffic except that which is explicitly allowed.
It can be configured based on services, source or
destination IP address, and the user ID.
Defining the Types of
Firewalls
Application layer firewalls.
Packet filtering firewalls.
Hybrids.
Application Layer Firewalls
Application layer firewalls (proxy firewalls) are software
packages that reside on operating systems or on firewall
appliances.
Firewalls have multiple interfaces.
All connections terminate on the firewall.
They use proxies for inbound connections.
Application Layer Firewalls
A set of policy rules defines how traffic from one network is
transported to any other.
If no rule exists, firewalls deny or drop the data packets.
Policy rules are enforced through the use of proxies.
Each protocol on a firewall must have its own proxy.
Application Layer Firewalls
Application layer firewall proxy connections
Packet Filtering Firewalls
Policy rules are enforced using packet inspection filters.
If a protocol runs over UDP, the packet filtering firewall
tracks the state of the UDP traffic.
Connections do not terminate on the firewall.
They do not rely on proxies for each protocol.
They support network address translation.
Packet Filtering Firewalls
Traffic through a packet filtering firewall
Hybrids
Hybrid firewalls provide a way for handling protocols for
which specific proxies do not exist.
The generic services proxy (GSP) allows application layer
proxies to handle other protocols.
In a hybrid system, the GSP behaves like packet filtering
firewalls.
Developing a Firewall
Configuration
Organization’s Internet policy allows users to use services
such as HTTP, HTTPS, FTP, Telnet, and SSH.
Based on the Internet policy, a set of policy rules for
various architectures can be constructed.
Developing a Firewall
Configuration
Architecture 1: Internet accessible systems outside the
firewall.
Architecture 2: Single firewall.
Architecture 3: Dual Firewall.
Internet Accessible Systems
Architecture #1: Internet systems accessible to outside the firewall.
Internet Accessible Systems
Firewall Rules for Internet Systems
Accessible Outside the Firewall.
Single Firewall
Architecture #2: Single firewall.
Single Firewall
Firewall Rules for the Single Firewall
Architecture.
Dual Firewalls
Architecture #3: Dual Firewalls.
Dual Firewalls
Firewall Rules for Firewall #1 in the Dual
Firewall Architecture.
Dual Firewalls
Firewall Rules for Firewall #2 in the Dual
Firewall Architecture.
Designing a Firewall Rule Set
When designing a firewall rule set, the first match algorithm
dictates:
The most specific rules to be placed at the top of the rule
set.
The least specific rules to be placed at the bottom of the
rule set.
Designing a Firewall Rule Set
To define a general rule set, examine:
The expected traffic load of the firewall.
Rank the traffic types in order. The Internet service with the
largest traffic at the top of the rule set.
Place any deny rules pertaining to the protocol.
Summary
A firewall is a network access control device, available as
application layer and packet filtering firewalls.
A combination of these firewalls can also be used.
Application layer or proxy firewalls use proxies for
connections.
In this setup, all connections terminate on the firewall.
Summary
Unlike the application layer, the packet filtering firewalls
enforce policy rules using packet inspection filters.
A firewall can be configured as single, dual or placing
Internet accessible systems outside the firewall.
In a firewall rule set, place the specific rules on top and the
least specific rules at the bottom.