SlideShare uma empresa Scribd logo
1 de 27
CYBER SECURITY
Active learning assignment
On
FIRE WALL
Prepared by:-
1). Sonani Manav 140120119223
2). Suthar Chandresh 140120119229
3). Tade Govind 140120119230
Guided by :- Mukesh Khemani
 A choke point of control and monitoring
 Interconnects networks with differing trust
 Imposes restrictions on network services
◦ only authorized traffic is allowed
 Auditing and controlling access
◦ can implement alarms for abnormal behavior
 Itself immune to penetration
 Provides perimeter defence
Characterized by protocol level it
controls in
 Packet filtering
 Circuit gateways
 Application gateways
 Combination of above is dynamic
packet filter
 Simplest of components
 Uses transport-layer information only
◦ IP Source Address, Destination Address
◦ Protocol/Next Header (TCP, UDP, ICMP, etc)
◦ TCP or UDP source & destination ports
◦ TCP Flags (SYN, ACK, FIN, RST, PSH, etc)
◦ ICMP message type
 Examples
◦ DNS uses port 53
 No incoming port 53 packets except known trusted servers
 Filtering with incoming or outgoing
interfaces
◦ E.g., Ingress filtering of spoofed IP
addresses
◦ Egress filtering
 Permits or denies certain services
◦ Requires intimate knowledge of TCP and UDP port
utilization on a number of operating systems
 Start with a security policy
 Specify allowable packets in terms of logical
expressions on packet fields
 Rewrite expressions in syntax supported by
your vendor
 General rules - least privilege
◦ All that is not expressly permitted is prohibited
◦ If you do not need it, eliminate it
Every ruleset is followed by an implicit rule
reading like this.
Example 1:
Suppose we want to allow inbound mail
(SMTP, port 25) but only to our gateway
machine. Also suppose that mail from some
particular site SPIGOT is to be blocked.
Solution 1:
Example 2:
Now suppose that we want to implement the
policy “any inside host can send mail to the
outside”.
Solution 2:
This solution allows calls to come from any
port on an inside machine, and will direct them
to port 25 on the outside. Simple enough…
So why is it wrong?
 Our defined restriction is based solely on the
outside host’s port number, which we have
no way of controlling.
 Now an enemy can access any internal
machines and port by originating his call
from port 25 on the outside machine.
What can be a better solution ?
 The ACK signifies that the packet is part of an
ongoing conversation
 Packets without the ACK are connection
establishment messages, which we are only
permitting from internal hosts
 IP address spoofing
◦ Fake source address to be trusted
◦ Add filters on router to block
 Tiny fragment attacks
◦ Split TCP header info over several tiny packets
◦ Either discard or reassemble before check
 Degradation depends on number of rules applied
at any point
 Order rules so that most common traffic is dealt
with first
 Correctness is more important than speed
 TCP connection
◦ Server port is number less than 1024
◦ Client port is number between 1024 and 16383
 Permanent assignment
◦ Ports <1024 assigned permanently
 20,21 for FTP 23 for Telnet
 25 for server SMTP 80 for HTTP
 Variable use
◦ Ports >1024 must be available for client to make any
connection
◦ This presents a limitation for stateless packet filtering
 If client wants to use port 2048, firewall must allow incoming
traffic on this port
◦ Better: stateful filtering knows outgoing requests
 Traditional packet filters do not examine
higher layer context
◦ ie matching return packets with outgoing flow
 Stateful packet filters address this need
 They examine each IP packet in context
◦ Keep track of client-server sessions
◦ Check each packet validly belongs to one
 Hence are better able to detect bogus packets
out of context
 Packet filtering
 Application gateways
 Circuit gateways
 Combination of above is dynamic packet filter
 Firewall runs set of proxy programs
◦ Proxies filter incoming, outgoing packets
◦ All incoming traffic directed to firewall
◦ All outgoing traffic appears to come from firewall
 Policy embedded in proxy programs
 Two kinds of proxies
◦ Application-level gateways/proxies
 Tailored to http, ftp, smtp, etc.
◦ Circuit-level gateways/proxies
 Working on TCP level
 Has full access to protocol
◦ user requests service from proxy
◦ proxy validates request as legal
◦ then actions request and returns result to user
 Need separate proxies for each service
◦ E.g., SMTP (E-Mail)
◦ NNTP (Net news)
◦ DNS (Domain Name System)
◦ NTP (Network Time Protocol)
◦ custom services generally not supported
Daemon spawns proxy when communication detected …
Network Connection
Telnet
daemon
SMTP
daemon
FTP
daemon
Telnet
proxy
FTP
proxy SMTP
proxy
 E.g., Virus scanning for SMTP
◦ Need to understand MIME, encoding, Zip archives
 Packet filtering
 Application gateways
 Circuit gateways
 Combination of above is dynamic packet filter
Figure 9.7: A typical SOCKS connection through interface A,
and rogue connection through the external interface, B.
 Useless against attacks from the inside
◦ Evildoer exists on inside
◦ Malicious code is executed on an internal machine
 Organizations with greater insider threat
◦ Banks and Military
 Protection must exist at each layer
◦ Assess risks of threats at every layer
 Cannot protect against transfer of all virus
infected programs or files
◦ because of huge range of O/S & file types
Fire wall security

Mais conteúdo relacionado

Mais procurados (20)

Port Scanning Overview
Port Scanning  OverviewPort Scanning  Overview
Port Scanning Overview
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Mobile Security - Wireless hacking
Mobile Security - Wireless hackingMobile Security - Wireless hacking
Mobile Security - Wireless hacking
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanning
 
Auto mac rateless wireless concurrent medium access
Auto mac rateless wireless concurrent medium accessAuto mac rateless wireless concurrent medium access
Auto mac rateless wireless concurrent medium access
 
Best!
Best!Best!
Best!
 
Sniffing via dsniff
Sniffing via dsniffSniffing via dsniff
Sniffing via dsniff
 
Network scan
Network scanNetwork scan
Network scan
 
Detection and analysis_of_syn_flood_ddos
Detection and analysis_of_syn_flood_ddosDetection and analysis_of_syn_flood_ddos
Detection and analysis_of_syn_flood_ddos
 
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
Ethical hacking   Chapter 6 - Port Scanning - Eric VanderburgEthical hacking   Chapter 6 - Port Scanning - Eric Vanderburg
Ethical hacking Chapter 6 - Port Scanning - Eric Vanderburg
 
Firewall Essentials
Firewall EssentialsFirewall Essentials
Firewall Essentials
 
Namp
Namp Namp
Namp
 
Firewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth FirewallsFirewall - Network Defense in Depth Firewalls
Firewall - Network Defense in Depth Firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 
Marrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga ; Firewalls
Marrion Kujinga ; Firewalls
 
Password sniffing
Password sniffingPassword sniffing
Password sniffing
 
I ptable
I ptableI ptable
I ptable
 
Dynamic Port Scanning
Dynamic Port ScanningDynamic Port Scanning
Dynamic Port Scanning
 

Destaque (20)

Gears
GearsGears
Gears
 
Boring machine
Boring machineBoring machine
Boring machine
 
Thermal stesses
Thermal stessesThermal stesses
Thermal stesses
 
Solidification
SolidificationSolidification
Solidification
 
protocolo pop y spam
protocolo pop y spamprotocolo pop y spam
protocolo pop y spam
 
Https
HttpsHttps
Https
 
Google y sus maravilosas aplicasiones
Google y sus maravilosas aplicasionesGoogle y sus maravilosas aplicasiones
Google y sus maravilosas aplicasiones
 
W3 c tipos de dominio protocolos de
W3 c tipos de dominio protocolos deW3 c tipos de dominio protocolos de
W3 c tipos de dominio protocolos de
 
Presentación http https-dns
Presentación http https-dnsPresentación http https-dns
Presentación http https-dns
 
3. protocolos de red
3.  protocolos de red3.  protocolos de red
3. protocolos de red
 
protocolo pop
protocolo popprotocolo pop
protocolo pop
 
Stess strain basic concept
Stess strain basic conceptStess strain basic concept
Stess strain basic concept
 
Free body diagram
Free body diagramFree body diagram
Free body diagram
 
Presentación POP3
Presentación POP3Presentación POP3
Presentación POP3
 
Heat conduction equation
Heat conduction equationHeat conduction equation
Heat conduction equation
 
Non destructive testing
Non destructive testingNon destructive testing
Non destructive testing
 
Protocolo HTTP
Protocolo HTTPProtocolo HTTP
Protocolo HTTP
 
Presentacion http y https
Presentacion http y httpsPresentacion http y https
Presentacion http y https
 
Frictional clutch
Frictional clutchFrictional clutch
Frictional clutch
 
Protocolo HTTP
Protocolo HTTPProtocolo HTTP
Protocolo HTTP
 

Semelhante a Fire wall security

Semelhante a Fire wall security (20)

firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 
firewalls.ppt
firewalls.pptfirewalls.ppt
firewalls.ppt
 
Firewalls
FirewallsFirewalls
Firewalls
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
 
Network security
 Network security Network security
Network security
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 
Network Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdfNetwork Security_Dr Shivashankar_Module 5.pdf
Network Security_Dr Shivashankar_Module 5.pdf
 
Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)
 
Firewall Facts
Firewall FactsFirewall Facts
Firewall Facts
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 
firewall.ppt
firewall.pptfirewall.ppt
firewall.ppt
 
firewalls
firewallsfirewalls
firewalls
 
Firewall
FirewallFirewall
Firewall
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 

Mais de Chandresh Suthar

Process of entrepreneureship
Process of entrepreneureshipProcess of entrepreneureship
Process of entrepreneureshipChandresh Suthar
 
Recording techniques in method study
Recording techniques in method studyRecording techniques in method study
Recording techniques in method studyChandresh Suthar
 
Multiport fuel injector system
Multiport fuel injector system Multiport fuel injector system
Multiport fuel injector system Chandresh Suthar
 
Dynamics of reciprocating masses
Dynamics of reciprocating massesDynamics of reciprocating masses
Dynamics of reciprocating massesChandresh Suthar
 
Homogeneous representation in geometric transformation
Homogeneous representation in geometric transformation Homogeneous representation in geometric transformation
Homogeneous representation in geometric transformation Chandresh Suthar
 

Mais de Chandresh Suthar (11)

Process of entrepreneureship
Process of entrepreneureshipProcess of entrepreneureship
Process of entrepreneureship
 
Solar energy
Solar energySolar energy
Solar energy
 
CELLULAR MANUFACTURING
CELLULAR MANUFACTURINGCELLULAR MANUFACTURING
CELLULAR MANUFACTURING
 
Recording techniques in method study
Recording techniques in method studyRecording techniques in method study
Recording techniques in method study
 
Multiport fuel injector system
Multiport fuel injector system Multiport fuel injector system
Multiport fuel injector system
 
Dynamics of reciprocating masses
Dynamics of reciprocating massesDynamics of reciprocating masses
Dynamics of reciprocating masses
 
Air conditioning system
Air conditioning system Air conditioning system
Air conditioning system
 
Homogeneous representation in geometric transformation
Homogeneous representation in geometric transformation Homogeneous representation in geometric transformation
Homogeneous representation in geometric transformation
 
Design of pressure vessel
Design of pressure vesselDesign of pressure vessel
Design of pressure vessel
 
Signal flow graph
Signal flow graphSignal flow graph
Signal flow graph
 
Lami's theorem
Lami's theoremLami's theorem
Lami's theorem
 

Último

Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 

Último (20)

Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 

Fire wall security

  • 1. CYBER SECURITY Active learning assignment On FIRE WALL Prepared by:- 1). Sonani Manav 140120119223 2). Suthar Chandresh 140120119229 3). Tade Govind 140120119230 Guided by :- Mukesh Khemani
  • 2.  A choke point of control and monitoring  Interconnects networks with differing trust  Imposes restrictions on network services ◦ only authorized traffic is allowed  Auditing and controlling access ◦ can implement alarms for abnormal behavior  Itself immune to penetration  Provides perimeter defence
  • 3. Characterized by protocol level it controls in  Packet filtering  Circuit gateways  Application gateways  Combination of above is dynamic packet filter
  • 4.
  • 5.  Simplest of components  Uses transport-layer information only ◦ IP Source Address, Destination Address ◦ Protocol/Next Header (TCP, UDP, ICMP, etc) ◦ TCP or UDP source & destination ports ◦ TCP Flags (SYN, ACK, FIN, RST, PSH, etc) ◦ ICMP message type  Examples ◦ DNS uses port 53  No incoming port 53 packets except known trusted servers
  • 6.  Filtering with incoming or outgoing interfaces ◦ E.g., Ingress filtering of spoofed IP addresses ◦ Egress filtering  Permits or denies certain services ◦ Requires intimate knowledge of TCP and UDP port utilization on a number of operating systems
  • 7.  Start with a security policy  Specify allowable packets in terms of logical expressions on packet fields  Rewrite expressions in syntax supported by your vendor  General rules - least privilege ◦ All that is not expressly permitted is prohibited ◦ If you do not need it, eliminate it
  • 8. Every ruleset is followed by an implicit rule reading like this. Example 1: Suppose we want to allow inbound mail (SMTP, port 25) but only to our gateway machine. Also suppose that mail from some particular site SPIGOT is to be blocked.
  • 9. Solution 1: Example 2: Now suppose that we want to implement the policy “any inside host can send mail to the outside”.
  • 10. Solution 2: This solution allows calls to come from any port on an inside machine, and will direct them to port 25 on the outside. Simple enough… So why is it wrong?
  • 11.  Our defined restriction is based solely on the outside host’s port number, which we have no way of controlling.  Now an enemy can access any internal machines and port by originating his call from port 25 on the outside machine. What can be a better solution ?
  • 12.  The ACK signifies that the packet is part of an ongoing conversation  Packets without the ACK are connection establishment messages, which we are only permitting from internal hosts
  • 13.  IP address spoofing ◦ Fake source address to be trusted ◦ Add filters on router to block  Tiny fragment attacks ◦ Split TCP header info over several tiny packets ◦ Either discard or reassemble before check  Degradation depends on number of rules applied at any point  Order rules so that most common traffic is dealt with first  Correctness is more important than speed
  • 14.  TCP connection ◦ Server port is number less than 1024 ◦ Client port is number between 1024 and 16383  Permanent assignment ◦ Ports <1024 assigned permanently  20,21 for FTP 23 for Telnet  25 for server SMTP 80 for HTTP  Variable use ◦ Ports >1024 must be available for client to make any connection ◦ This presents a limitation for stateless packet filtering  If client wants to use port 2048, firewall must allow incoming traffic on this port ◦ Better: stateful filtering knows outgoing requests
  • 15.  Traditional packet filters do not examine higher layer context ◦ ie matching return packets with outgoing flow  Stateful packet filters address this need  They examine each IP packet in context ◦ Keep track of client-server sessions ◦ Check each packet validly belongs to one  Hence are better able to detect bogus packets out of context
  • 16.
  • 17.  Packet filtering  Application gateways  Circuit gateways  Combination of above is dynamic packet filter
  • 18.  Firewall runs set of proxy programs ◦ Proxies filter incoming, outgoing packets ◦ All incoming traffic directed to firewall ◦ All outgoing traffic appears to come from firewall  Policy embedded in proxy programs  Two kinds of proxies ◦ Application-level gateways/proxies  Tailored to http, ftp, smtp, etc. ◦ Circuit-level gateways/proxies  Working on TCP level
  • 19.
  • 20.  Has full access to protocol ◦ user requests service from proxy ◦ proxy validates request as legal ◦ then actions request and returns result to user  Need separate proxies for each service ◦ E.g., SMTP (E-Mail) ◦ NNTP (Net news) ◦ DNS (Domain Name System) ◦ NTP (Network Time Protocol) ◦ custom services generally not supported
  • 21. Daemon spawns proxy when communication detected … Network Connection Telnet daemon SMTP daemon FTP daemon Telnet proxy FTP proxy SMTP proxy
  • 22.  E.g., Virus scanning for SMTP ◦ Need to understand MIME, encoding, Zip archives
  • 23.  Packet filtering  Application gateways  Circuit gateways  Combination of above is dynamic packet filter
  • 24.
  • 25. Figure 9.7: A typical SOCKS connection through interface A, and rogue connection through the external interface, B.
  • 26.  Useless against attacks from the inside ◦ Evildoer exists on inside ◦ Malicious code is executed on an internal machine  Organizations with greater insider threat ◦ Banks and Military  Protection must exist at each layer ◦ Assess risks of threats at every layer  Cannot protect against transfer of all virus infected programs or files ◦ because of huge range of O/S & file types