Firewalls
-
Defensive technology
-
Designed to screen out incoming traffic at the perimeter of an organization’s network and also authorize outbound traffic
- but also can be on individual machines
-
note an organization may want to inspect outgoing traffic to ensure sensitive data isn’t exfiltrated
Packet-filter firewall
-
inspects individual packets using rules
- often a “match first rule” system
- actions are ACCEPT, DROP (no notice), REJECT (provide error), LOG
-
filter rules usually based on:
- source IP address
- source port
- destinaton IP address
- destination port
- protocol
-
may also use ICMP type and code
-
stateless filters vs stateful filters
- e.g. can track TCP connection states, treat packets belonging to an accepted TCP connection different from new connections
-
see Table 10.1, page 285, and the text above it explaining each type of rule
-
the “perimeter” doesn’t take into account personal devices, USB drives, phones
-
limitations: see list on page 286
-
advantages of dedicated firewalls: see list on page 287
Proxy firewalls
-
circuit-level proxy firewalls: relay an entire connection, either allow or deny, and then relay bytes
- see Figure 10.2, page 289
- uses a socket daemon, sockd, on the firewall, and the SOCKS protocol to communicate
- user --- sockd --- Internet site
- separate TCP connections!
- application -> intercepted by SOCKS library -> SOCKS protocol to sockd -> internet
- connection is allowed or disallowed
-
application-level proxy firewalls: relay application-specific traffic
- see Figure 10.3, page 290
- able to inspect contents of packets since they have knowledge of the protocol
- can remove malicious JavaScript, emails, etc.
Enterprise firewall architectures
- see Figure 10.4, page 292
- the firewall (3) is exposed to the hostile newtork, so it maybe called a bastion host
- the web server and DNS server are public-facing, so they sit on a network right after the firewall, in a demilitarized zone or DMZ
- there is a second internal firewall (4) that protects internal assets
- routers (1) and (2) provide connectivity
- provides defense in depth