A network security domain is a contiguous region of a
network that operates under a single, uniform security policy. Whenever domains
intersect, there is a potential need for security to control traffic allowed
into the network. Firewall technology can be used to filter this traffic. The
most common boundary where firewalls are applied is between an organization’s
internal network and the internet. This report will provide readers with a
resource for understanding firewall design principles used in network security.
Firewall Interaction with the OSI and TCP/IP Network Models :
Network Firewalls operate at different layers of the OSI and
TCP/IP network models.
The lowest layer at which a firewall can operate is the
third level which is the network layer for the OSI model and the Internet
Protocol layer for TCP/IP. At this layer a firewall can determine if a packet
is from a trusted source but cannot grant or deny access based on what it
contains. Firewalls that operate at the highest layer, which is the application
layer, know a large amount of information including the source and the packet
contents. Therefore, they can be much more selective in granting access. This
may give the impression that firewalls functioning at a higher layer must be
better, which is not necessarily the case. The lower the layer the packet is
intercepted the more secure the system. If the intruder cannot get past the
third layer, it is impossible to gain control of the operating system. Firewalls fall into four broad categories:
Packet filters,
circuit level gateways, application level gateways and stateful multilayer
inspection firewalls. Packet filtering firewalls operate at the network level
of the OSI model or the IP layer of TCP/IP. In a packet filtering firewall,
each packet is compared to a set of rules before it is forwarded. The firewall
can drop the packet, forward it, or send a message to the source. Circuit level
gateways operate at the session layer of the OSI model, or the TCP layer of
TCP/IP. Circuit level gateways examine each connection setup to ensure that it
follows legitimate TCP handshaking. Application level gateways or proxies operate
at the application layer. Packets received or leaving cannot access services
for which there is no proxy. Stateful multilayer inspection firewalls combine aspects
of the other three types of firewalls. They filter packets at the network
layer, determine whether packets are valid at the session layer, and assess the
contents of packets at the application layer.
Firewall Architectures:
After deciding the security requirements for the network the
first step in designing a firewall is deciding on a basic architecture. There
are two classes of firewall architectures, single layer and multiple layer. In
a single layer architecture, one host is allocated all firewall functions. This
method is usually chosen when either cost is a key factor or if there are only
two networks to connect. The advantage to this architecture is any changes to
the firewall need only to be done at a single host. The biggest disadvantage of
the single layer approach it provides single entry point. If this entry point
is breached, the entire network becomes vulnerable to an intruder.
In a multiple layer architecture the firewall functions are
distributed among two or more hosts normally connected in series. This method
is more difficult to design and manage, it is also more costly, but can provide
significantly greater security by diversifying the firewall defense. A common
design approach for this type of architecture using two firewall hosts with a
demilitarized network (DMZ) between them separating the Internet and the
internal network. Using this setup traffic between the internal network and the
Internet must pass through two firewalls and the DMZ.
Firewall Types
After the security requirements are established, a basic
architecture is selected then Firewall functions can be chosen to meet these
needs. The following is a detailed discussion of the 4 firewall categories:
Packet Filtering Firewalls
The first generation of firewall architectures appeared
around 1985 and came out of Cisco's IOS software division. These are called
packet filter firewalls. Packet Filtering is usually performed by a router as part of
a firewall. A normal router decides where to direct the data, a packet
filtering router decides if it should forward the data at all. Packet Filtering
rules can be set on the following: physical network interface the packet
arrives on; source or destination IP address, the type of transport layer (TCP,
UDP, ICMP), or the transport layer source or destination ports. Packet filtering
firewalls are low cost, have only a small effect on the network performance, and
do not require client computers to be configured in any particular way.
However, packet filtering firewalls are not considered to be very secure on
their own because they do not understand application layer protocols.
Therefore, they cannot make content-based decisions on the packets, which makes
them less secure than application layer and circuit level firewalls. Another
disadvantage of Packet filtering firewalls are they are stateless and do not
retain the state of a connection. They also have very little or no logging
capability which makes it hard to detect if the network is under attack.
Testing the grant and deny rules is also difficult which may leave the network
vulnerable or incorrectly configured.
Circuit Level Gateways
Around 1989-1990, Dave Presotto and Howard Trickey of
AT&T Bell Labs pioneered the second generation of firewall architectures
with research in circuit relays which were called circuit level gateways.[4]
Circuit level gateways are used for TCP connections to observe handshaking
between packets to ensure a requested session is legitimate. Normally, it would
store the following information: a unique session identifier, the state of the
connection (i.e., handshake established or closing), sequencing information,
source or destination IP address, and the physical network interface through
which the packet arrives or departs. The firewall then checks to see if the
sending host has permission to send to the destination, and that the receiving host
has permission to receive from the sender. If the connection is acceptable, all
packets are routed through the firewall with no more security tests. The
advantages of circuit level gateways is that they are usually faster than
application layer firewalls because they perform less evaluations and they can
also protect a network by blocking connections between specific Internet
sources and internal hosts. The main disadvantages to circuit level gateways
are that they cannot restrict access to protocol subsets other than TCP and
similarly to packet filtering, testing the grant and deny rules can be
difficult which may leave the network vulnerable or incorrectly configured.
Application Level Gateways
The third generation of firewall architectures called
Application level gateways was independently researched and developed during
the late 1980s and early 1990s mainly by Gene Spafford of Purdue University,
Marcus Ranum, and Bill Cheswick of AT&T Bell Laboratories. Application level gateways or proxy firewalls
are software applications with two primary modes (proxy server or proxy client).
When a user on a trusted network wants to connect to a service on an untrusted
network such as the Internet, the request is directed to the proxy server on the
firewall. The proxy server pretends to be the real server on the Internet. It
checks the request and decides whether to permit or deny the request based on a
set of rules. If the request is approved, the server passes the request to the
proxy client, which contacts the real server on the Internet. Connections from
the Internet are made to the proxy client, which then passes them on to the
proxy server for delivery to the real client. This method ensures that all
incoming connections are always made with the proxy client, while outgoing
connections are always made with the proxy server. Therefore, there is no
direct connection between the trusted and untrusted networks. The main
advantages are that application level gateways can set rules based on highlevel
protocols, maintain state information about the communications passing through the
firewall server, and can keep detailed activity records. The main disadvantages
are its complex filtering and access control decisions can require significant computing
resources which can cause performance delays and its vulnerability to operating
system and application level bugs.
Stateful Multilayer Inspection Firewalls
Check Point Software released the first commercial product
based on this fourth generation architecture in 1994 called stateful multilayer
inspection firewalls. Stateful multilayer inspection firewalls provide the best
security of the four firewall types by monitoring the data being communicated
at application socket or port layer as well as the protocol and address level
to verify that the request is functioning as expected. An example is if during
an FTP session the port numbers being used or an IP address were to change, the
firewall would not permit the connection to continue. Another advantage is when
a specific session is complete, any ports that were being used are closed.
Stateful inspection systems can dynamically open and close ports for each
session which differs from basic packet filtering that leaves ports in a
constant opened or closed state. The main disadvantage to stateful multilayer
inspection firewalls is that they can be costly because they require the
purchase of additional hardware and/or software that is not normally packaged
with a network device.
There are no specific rules that can be applied when
designing a firewall because there are too many factors to consider. There are
general guidelines that will help if followed. Start by denying all access to
the network by default. In other words, start with a gateway that routes no
traffic. Determine the inbound access policy and then specify the outbound
access policy. Once the inbound and outbound policies have been specified, an
architecture with appropriate firewall functions can be chosen that fits within
the budget. External resources may be needed if the complexity of the firewall
needed to satisfy the security requirements are too great for the in-house
expertise. A costly firewall that is complex and not administrated properly can
be less effective then a straightforward firewall costing many times less.
No comments:
Post a Comment
Thank you for your valuable comment. Stay tuned for Updates.