0% found this document useful (0 votes)
46 views11 pages

Firewall Notes 2025

Network security encompasses activities aimed at protecting the usability and integrity of networks and data, utilizing both hardware and software technologies like firewalls and intrusion detection systems. It addresses various threats such as packet sniffing and denial of service, managing access and ensuring only authorized traffic is allowed. Different types of firewalls, including application layer and circuit-level gateways, offer varying levels of security and control over network traffic.

Uploaded by

yaswanthe812
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views11 pages

Firewall Notes 2025

Network security encompasses activities aimed at protecting the usability and integrity of networks and data, utilizing both hardware and software technologies like firewalls and intrusion detection systems. It addresses various threats such as packet sniffing and denial of service, managing access and ensuring only authorized traffic is allowed. Different types of firewalls, including application layer and circuit-level gateways, offer varying levels of security and control over network traffic.

Uploaded by

yaswanthe812
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Network Security

Network security is any activity designed to protect the usability and integrity of your
network and data.

 It includes both hardware and software technologies


 Firewall- CISCO, Fortinet
 IDS- CISCO, Firepower
 Unified Threat Management Appliances- Combined Multiple feature
firewall(Antivirus,Content Filtering etc)-Fortinet UTM,SOPHOS UTM
 It targets a variety of threats
 Packet Sniffing
 Denial Of Service
 DNS Spoofing
 It stops them from entering or spreading on your network
 Effective network security manages access to the network

A firewall establishes a barrier between a trusted, secure internal network and


another network (e.g., the Internet) that is assumed not to be secure and
trusted.

 Effective means of protection a local system or network of systems from


network-based security threats while affording access to the outside world via
WAN`s or the Internet

Design goals:
1. All traffic from inside to outside must pass through the firewall
(physically blocking all access to the local network except via the
firewall)
2. Only authorized traffic (defined by the local security police) will be
allowed to pass
3. The firewall itself is immune to penetration (use of trusted system with a
secure operating system)

Firewall Characteristics

Four general techniques:


• Service control

– Determines the types of Internet services that can be accessed, inbound


or outbound

– can filter traffic based on its Internet Protocol (IP) address or the port it
uses.

• Direction control

– Determines the direction in which particular service requests are allowed


to flow.

– For instance, if you suspect that an application in a certain area of your


network has been compromised, you can prevent computers and devices
within that segment from sending requests out to the internet.

• User control

– Controls access to a service according to which user is attempting to


access it

– With user control, you can decide which users are allowed to access a
server. This can include people inside your network's perimeter and
those outside

• Behavior control

– Controls how particular services are used (e.g. filter e-mail)

– Controls how particular services are used. For example, the firewall may
filter e-mail to eliminate spam, or it may enable external access to only a
portion of the information on a local Web server

• Packet-filtering Router

– Applies a set of rules to each incoming IP packet and then forwards or


discards the packet

– Filter packets going in both directions

– The packet filter is typically set up as a list of rules based on matches to


fields in the IP or TCP header

– Two default policies (discard or forward)


• Advantages:

– Simplicity

– Transparency to users

– High speed

• Disadvantages:

– the trust is based on IP addresses.

– They are unable to protect against malicious data packets arriving from
trusted source IPs because they lack the necessary packet inspection
capability.

– Lack of Authentication

1. Permit trusted File Transfer Protocol traffic to a specific IP address.

2. Restrict traffic to known malicious IP addresses.

3. Authorize a specific internal IP address to access a designated file-sharing IP


address.

4. Prohibit traffic to file-sharing IP addresses for all other internal IP addresses.


5. Allow web traffic on commonly used ports 80 and 443.

6. Block all other traffic types.

Proxy Server

• Intermediate agent or server acting on behalf of endpoint without allowing a


direct connection between the two endpoints

– So each endpoint talks to proxy, thinking it is talking to other endpoint

– Proxy decides whether to forward messages, and whether to alter them

• Access control done with proxies

– Usually bases access control on content as well as source, destination


addresses, etc.

• Also called an applications level or application level firewall

• Example: virus checking in electronic mail

– Incoming mail goes to proxy firewall

– Proxy firewall receives mail, scans it

– If no virus, mail forwarded to destination

– If virus, mail rejected or disinfected before forwarding

• Application-level Gateway

• Acts as relay of application-level traffic.

• The user contacts the gateway using a TCP/IP application, such as FTP, and the
gateway asks the user for the name of a remote host to be accessed.

• When the user responds and provides a valid user ID and authentication
information, the gateway contacts the application on the remote host and
relays TCP segments containing the application data between the two points
• Advantages:

– Higher security than packet filters

– Only need to scrutinize a few allowable applications

– Easy to log and audit all incoming traffic

• Disadvantages:

– Additional processing overhead on each connection (gateway as splice


point)

An Application Layer Firewall is a type of firewall that operates at the application layer of the
OSI model (Layer 7). Unlike traditional firewalls that focus on IP addresses, ports, and protocols,
application layer firewalls inspect the actual content of the traffic, making decisions based on
what the traffic is trying to do, not just where it's going.

Key Features:

 Deep Packet Inspection (DPI): It examines the full contents of the packets, including
the payload, allowing it to detect malicious activity hidden within seemingly legitimate
traffic.
 Protocol Awareness: Understands and filters traffic based on specific applications or
protocols (e.g., HTTP, FTP, DNS, SMTP).
 Granular Control: Can enforce detailed rules (e.g., only allow file downloads from
certain domains, or block specific email attachments).
 User Authentication: Can require users to authenticate before accessing certain
applications or services.
 Protection Against Application-Layer Attacks: Helps detect and block threats like
SQL injection, cross-site scripting (XSS), and other web-based attacks.

Examples:

 Web Application Firewalls (WAFs) like AWS WAF, Cloudflare WAF, or


ModSecurity.
 Proxy firewalls (e.g., Squid Proxy with filtering).
 Next-Generation Firewalls (NGFWs) often include application layer features.
Pros:

 More precise security filtering.


 Protects against sophisticated, application-specific attacks.
 Can provide logging and auditing at the application level.

Cons:

 Can introduce latency due to deep inspection.


 Higher resource usage.
 More complex to configure and manage.

CIRCUIT-LEVEL GATEWAY

– Stand-alone system or

– Specialized function performed by an Application-level Gateway

– Sets up two TCP connections

– The gateway typically relays TCP segments from one connection to the
other without examining the contents


• Circuit-level Gateway

– The security function consists of determining which connections will be


allowed

– Typically use is a situation in which the system administrator trusts the


internal users

– An example is the SOCKS package


A Circuit-Level Firewall is a type of firewall that works at the session layer (Layer 5) of the
OSI model. It monitors TCP handshakes and other session-level communications between
trusted internal hosts and untrusted external hosts to determine whether a connection is
legitimate.

Key Characteristics:

 Monitors TCP/UDP sessions rather than individual packets.


 Tracks connection states, ensuring that only valid sessions are allowed.
 Does not inspect the actual data content (payload) of packets—only the session-level
info like the handshake and connection status.
 Often used as part of proxy servers.

How It Works:

1. When a connection is initiated, the firewall checks the legitimacy of the TCP
handshake.
2. If valid, it establishes a virtual circuit between internal and external hosts.
3. After that, the data flows freely without inspection of the payload.

Pros:

 Efficient performance (less resource-intensive than deep packet inspection).


 Good at hiding internal network structure, improving security via NAT or proxies.
 Works well for trusted applications and known services.

Cons:

 No application-level inspection, so it can't detect malware or attacks hidden in the data.


 Limited control over content-based policies.
 Not ideal for environments needing high security at the application level.
Singled-homed bastion host

• Has greater security than simply a packet filtering router or an application level
gateway alone.

• Implements both packet-level and application-level filtering, allowing for


considerable flexibility in defining security policy.

• An intruder must generally penetrate two separate systems before the security
of the internal network is compromised.

• If the packet-filtering router is completely compromised, traffic could flow


directly through the router between the Internet and other hosts on the private
network.
• A singled-homed bastion host has only one network interface and is normally
used for application-level gateway firewalls.

• The external router is configured to send all incoming data to the bastion host,
and all internal clients are configured to send all outgoing data to the host

Dual-homed bastion host

• Serve as application gateways, packet filters, and circuit gateways creating a


complete break between the external network and internal network.
Security issues that affect TCP/IP include IP spoofing, fragmentation, sequence
number prediction, and hijacking.

 IP spoofing involves an attacker sending packets with a forged source IP


address, potentially to bypass authentication or launch denial-of-service
attacks.
 IP fragmentation is when large packets are split into smaller fragments to fit the
MTU of the network, which can create opportunities for attackers to
manipulate or reassemble the fragments maliciously.
 TCP sequence number prediction is when an attacker guesses the sequence
number of a TCP connection, allowing them to inject or modify data or
terminate the connection.
 TCP hijacking is when an attacker takes over an existing TCP connection by
sending forged packets with the correct sequence number and
acknowledgment number, allowing them to redirect or steal data or execute
commands on the target system.

IP Spoofing

 The creation of IP packets with a forged source.


 The purpose of it is to conceal the identity of the sender or impersonating
another computing system
 A technique used to gain unauthorized access to computers, whereby the
intruder sends messages to a computer with an IP address indicating that the
message is coming from a trusted host
 Base for IP spoofing
The concept of IP spoofing was discovered as a security weakness in the IP
protocol which carries the Source IP address and the TCP protocol which
contains port and sequencing information.

You might also like