Saturday, 10 September 2016

Firewall Wikipedia

In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.[1] A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed not to be secure or trusted.[2] Firewalls are often categorized as either network firewalls or host-based firewalls. Network firewalls are a software appliance running on general purpose hardware or hardware-based firewall computer appliances that filter traffic between two or more networks. Host-based firewalls provide a layer of software on one host that controls network traffic in and out of that single machine.[3][4] Firewall appliances may also offer other functionality to the internal network they protect such as acting as a DHCP[5][6] or VPN[7][8][9][10] server for that network.[11][12]

https://www.youtube.com/watch?v=Cek8sRx7VFI 

History

The term firewall originally referred to a wall intended to confine a fire or potential fire within a building.[13] Later uses refer to similar structures, such as the metal sheet separating the engine compartment of a vehicle or aircraft from the passenger compartment.
Firewall technology emerged in the late 1980s when the Internet was a fairly new technology in terms of its global use and connectivity.[14] The predecessors to firewalls for network security were the routers used in the late 1980s:[15]

First generation: packet filters

Screenshot of Gufw: The firewall shows its settings for incoming and outgoing traffic.
The first type of firewall was the packet filter which looks at network addresses and ports of the packet and determines if that packet should be allowed or blocked.[18] The first paper published on firewall technology was in 1988, when engineers from Digital Equipment Corporation (DEC) developed filter systems known as packet filter firewalls. This fairly basic system was the first generation of what is now a highly involved and technical internet security feature. At AT&T Bell Labs, Bill Cheswick and Steve Bellovin were continuing their research in packet filtering and developed a working model for their own company based on their original first generation architecture.[19]
Packet filters act by inspecting the "packets" which are transferred between computers on the Internet. If a packet does not match the packet filter's set of filtering rules, the packet filter will drop (silently discard) the packet or reject it (discard it, and send "error responses" to the source). Conversely, if the packet matches one or more of the programmed filters, the packet is allowed to pass. This type of packet filtering pays no attention to whether a packet is part of an existing stream of traffic (i.e. it stores no information on connection "state"). Instead, it filters each packet based only on information contained in the packet itself (most commonly using a combination of the packet's source and destination address, its protocol, and, for TCP and UDP traffic, the port number). TCP and UDP protocols constitute most communication over the Internet, and because TCP and UDP traffic by convention uses well known ports for particular types of traffic, a "stateless" packet filter can distinguish between, and thus control, those types of traffic (such as web browsing, remote printing, email transmission, file transfer), unless the machines on each side of the packet filter are both using the same non-standard ports.[20]
Packet filtering firewalls work mainly on the first three layers of the OSI reference model, which means most of the work is done between the network and physical layers, with a little bit of peeking into the transport layer to figure out source and destination port numbers.[21] When a packet originates from the sender and filters through a firewall, the device checks for matches to any of the packet filtering rules that are configured in the firewall and drops or rejects the packet accordingly. When the packet passes through the firewall, it filters the packet on a protocol/port number basis (GSS). For example, if a rule in the firewall exists to block telnet access, then the firewall will block the TCP protocol for port number 23.[22]

Second generation: "stateful" filters

Main article: Stateful firewall
From 1989–1990 three colleagues from AT&T Bell Laboratories, Dave Presotto, Janardan Sharma, and Kshitij Nigam, developed the second generation of firewalls, calling them Circuit-level gateways.[23]
Second-generation firewalls perform the work of their first-generation predecessors but operate up to layer 4 (transport layer) of the OSI model. This is achieved by retaining packets until enough information is available to make a judgement about its state.[24] Known as stateful packet inspection, it records all connections passing through it and determines whether a packet is the start of a new connection, a part of an existing connection, or not part of any connection.[25] Though static rules are still used, these rules can now contain connection state as one of their test criteria.
Certain denial-of-service attacks bombard the firewall with thousands of fake connection packets in an attempt to overwhelm it by filling its connection state memory.[26]

Third generation: application layer

Flow of network packets through Netfilter, a Linux kernel module
Marcus Ranum, Wei Xu, and Peter Churchyard developed an Application Firewall known as Firewall Toolkit (FWTK). In June 1994, Wei Xu extended the FWTK with the Kernel enhancement of IP filter and socket transparent. This was known as the first transparent Application firewall, released as a commercial product of Gauntlet firewall at Trusted Information Systems. Gauntlet firewall was rated one of the number one firewalls during 1995–1998.
The key benefit of application layer filtering is that it can "understand" certain applications and protocols (such as File Transfer Protocol (FTP), Domain Name System (DNS), or Hypertext Transfer Protocol (HTTP)). This is useful as it is able to detect if an unwanted protocol is attempting to bypass the firewall on an allowed port, or detect if a protocol is being abused in any harmful way. As of 2012, the so-called next-generation firewall (NGFW) is nothing more than the "widen" or "deepen" inspection at application-stack. For example, the existing deep packet inspection functionality of modern firewalls can be extended to include

Types

An illustration of where a firewall would be located in a network
Firewalls vary in type depending on where communication originates, where it is intercepted, and the state of communication being traced.[28]

Network layer or packet filters

Network layer firewalls, also called packet filters, operate at a relatively low level of the TCP/IP protocol stack, not allowing packets to pass through the firewall unless they match the established rule set. The firewall administrator may define the rules; or default rules may apply. The term "packet filter" originated in the context of BSD operating systems.
Network layer firewalls generally fall into two sub-categories, stateful and stateless. Stateful firewalls maintain context about active sessions, and use that "state information" to speed packet processing. Any existing network connection can be described by several properties, including source and destination IP address, UDP or TCP ports, and the current stage of the connection's lifetime (including session initiation, handshaking, data transfer, or completion connection). If a packet does not match an existing connection, it will be evaluated according to the ruleset for new connections. If a packet matches an existing connection based on comparison with the firewall's state table, it will be allowed to pass without further processing.
Stateless firewalls require less memory, and can be faster for simple filters that require less time to filter than to look up a session. They may also be necessary for filtering stateless network protocols that have no concept of a session. However, they cannot make more complex decisions based on what stage communications between hosts have reached.
Newer firewalls can filter traffic based on many packet attributes like source IP address, source port, destination IP address or port, destination service like WWW or FTP. They can filter based on protocols, TTL values, netblock of originator, of the source, and many other attributes.
Commonly used packet filters on various versions of Unix are IPFilter (various), ipfw (FreeBSD/Mac OS X), NPF (NetBSD), PF (OpenBSD, and some other BSDs), iptables/ipchains (Linux).

Application-layer

Application-layer firewalls work on the application level of the TCP/IP stack (i.e., all browser traffic, or all telnet or ftp traffic), and may intercept all packets traveling to or from an application. They block other packets (usually dropping them without acknowledgment to the sender).
On inspecting all packets for improper content, firewalls can restrict or prevent outright the spread of networked computer worms and trojans. The additional inspection criteria can add extra latency to the forwarding of packets to their destination.
Application firewalls function by determining whether a process should accept any given connection. Application firewalls accomplish their function by hooking into socket calls to filter the connections between the application layer and the lower layers of the OSI model. Application firewalls that hook into socket calls are also referred to as socket filters. Application firewalls work much like a packet filter but application filters apply filtering rules (allow/block) on a per process basis instead of filtering connections on a per port basis. Generally, prompts are used to define rules for processes that have not yet received a connection. It is rare to find application firewalls not combined or used in conjunction with a packet filter.[29]
Also, application firewalls further filter connections by examining the process ID of data packets against a ruleset for the local process involved in the data transmission. The extent of the filtering that occurs is defined by the provided ruleset. Given the variety of software that exists, application firewalls only have more complex rulesets for the standard services, such as sharing services. These per process rulesets have limited efficacy in filtering every possible association that may occur with other processes. Also, these per process rulesets cannot defend against modification of the process via exploitation, such as memory corruption exploits. Because of these limitations, application firewalls are beginning to be supplanted by a new generation of application firewalls that rely on mandatory access control (MAC), also referred to as sandboxing, to protect vulnerable services.[30]

Proxies

Main article: Proxy server
A proxy server (running either on dedicated hardware or as software on a general-purpose machine) may act as a firewall by responding to input packets (connection requests, for example) in the manner of an application, while blocking other packets. A proxy server is a gateway from one network to another for a specific network application, in the sense that it functions as a proxy on behalf of the network user.[2]
Proxies make tampering with an internal system from the external network more difficult and misuse of one internal system would not necessarily cause a security breach exploitable from outside the firewall (as long as the application proxy remains intact and properly configured). Conversely, intruders may hijack a publicly reachable system and use it as a proxy for their own purposes; the proxy then masquerades as that system to other internal machines. While use of internal address spaces enhances security, crackers may still employ methods such as IP spoofing to attempt to pass packets to a target network.

Network address translation

Firewalls often have network address translation (NAT) functionality, and the hosts protected behind a firewall commonly have addresses in the "private address range", as defined in RFC 1918. Firewalls often have such functionality to hide the true address of protected hosts. Originally, the NAT function was developed to address the limited number of IPv4 routable addresses that could be used or assigned to companies or individuals as well as reduce both the amount and therefore cost of obtaining enough public addresses for every computer in an organization. Although NAT on its own is not considered a security feature, hiding the addresses of protected devices has become an often used percepted defense against network reconnaissance.[31]

See also

References


  • Boudriga, Noureddine (2010). Security of mobile communications. Boca Raton: CRC Press. pp. 32–33. ISBN 0849379423.

  • Oppliger, Rolf (May 1997). "Internet Security: FIREWALLS and BEYOND". Communications of the ACM. 40 (5): 94. doi:10.1145/253769.253802.

  • Vacca, John R. (2009). Computer and information security handbook. Amsterdam: Elsevier. p. 355. ISBN 9780080921945.

  • "What is Firewall?". Retrieved 2015-02-12.

  • "Firewall as a DHCP Server and Client". Palo Alto Networks. Retrieved 2016-02-08.

  • "DHCP". www.shorewall.net. Retrieved 2016-02-08.

  • "What is a VPN Firewall? - Definition from Techopedia". Techopedia.com. Retrieved 2016-02-08.

  • "VPNs and Firewalls". technet.microsoft.com. Retrieved 2016-02-08.

  • "VPN and Firewalls (Windows Server)". Resources and Tools for IT Professionals | TechNet.

  • "Configuring VPN connections with firewalls".

  • AndrĂ©s, Steven; Kenyon, Brian; Cohen, Jody Marc; Johnson, Nate; Dolly, Justin (2004). Birkholz, Erik Pack, ed. Security Sage's Guide to Hardening the Network Infrastructure. Rockland, MA: Syngress. pp. 94–95. ISBN 9780080480831.

  • Naveen, Sharanya. "Firewall". Retrieved 7 June 2016.

  • Canavan, John E. (2001). Fundamentals of Network Security (1st ed.). Boston, MA: Artech House. p. 212. ISBN 9781580531764.

  • Liska, Allan (Dec 10, 2014). Building an Intelligence-Led Security Program. Syngress. p. 3. ISBN 0128023708.

  • Ingham, Kenneth; Forrest, Stephanie (2002). "A History and Survey of Network Firewalls" (PDF). Retrieved 2011-11-25.

  • [1] Firewalls by Dr.Talal Alkharobi

  • RFC 1135 The Helminthiasis of the Internet

  • Peltier, Justin; Peltier, Thomas R. (2007). Complete Guide to CISM Certification. Hoboken: CRC Press. p. 210. ISBN 9781420013252.

  • Ingham, Kenneth; Forrest, Stephanie (2002). "A History and Survey of Network Firewalls" (PDF). p. 4. Retrieved 2011-11-25.

  • TCP vs. UDP By Erik Rodriguez

  • William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin (2003). "Google Books Link". Firewalls and Internet Security: repelling the wily hacker

  • Aug 29, 2003 Virus may elude computer defenses by Charles Duhigg, Washington Post

  • Proceedings of National Conference on Recent Developments in Computing and Its Applications, August 12–13, 2009. I.K. International Pvt. Ltd. 2009-01-01. Retrieved 2014-04-22.

  • Conway, Richard (204). Code Hacking: A Developer's Guide to Network Security. Hingham, Massachusetts: Charles River Media. p. 281. ISBN 1-58450-314-9.

  • Andress, Jason (May 20, 2014). The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice (2nd ed.). Elsevier Science. ISBN 9780128008126.

  • Chang, Rocky (October 2002). "Defending Against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial". IEEE Communications Magazine. 40 (10): 42–43. doi:10.1109/mcom.2002.1039856.

  • "WAFFle: Fingerprinting Filter Rules of Web Application Firewalls". 2012.

  • "Firewalls". MemeBridge. Retrieved 13 June 2014.

  • "Software Firewalls: Made of Straw? Part 1 of 2". Symantec Connect Community. 2010-06-29. Retrieved 2014-03-28.

  • "Auto Sandboxing". Comodo Inc. Retrieved 2014-08-28.

    1. "Advanced Security: Firewall". Microsoft. Retrieved 2014-08-28.

    External links

    Firewall and Its Services

    Firewall and Its Services


    What is a firewall?
    Firewall is a device or a software feature  designed to control the flow of trafic into and out-of a network.
    Firewall interconnects networks with different trust.
    Firewall implements and enforces a security policy between networks.

    Firewall Zones
    Trusted Zone
    Untrusted Zone
    Demilitarized Zone(DMZ)

    Trusted zone contains a numerical value of 100 which means highest level of trust.
    Untrusted zone contains a  numerical value of 0 which means lowest level of trust.
    A WAN port can only be mapped to an Untrusted Zone.
    DMZs are less trusted zones
    Public Zone is demilitarized zone and has a trust value of 50

    Types of firewall
    Software Based Firewalls
    Run as additional program on Personal Computers
    Known as Personal Firewalls
    Examples of SBFs are:- Windows Firewall, Kaspersky Firewall, Zone Alarm Pro Firewall
    Also there are some open source firewall available. Exa:- OpenWRT, PfSense, Untangle Gateway, IPcop.

    Hardware based firewalls are the first line of defense against the cyber attacks.
    HBFs are more expensive as compared to SBFs.
    Traditionally HBFs were only used to carry out Packet Filtering.
    Today HBFs have built-in Intrusion Prevention System and Intrusion Detection System IPS/IDPS
    When IDPS detects a malicious activity it sends a signal, drops the packet, blocks the IP and resets the connection.
    Some Hardware Based Firewall providers are:
    CISCO
    ProSafe
    D-Link
    SonicWall
    Netgear

    Services provided by firewall
    Packet Filtering
    Stateful packet Inspection
    Proxying
    Authentication
    Logging
    Content Filtering
    Network Address Translation

    Packet Filtering
    The header of the each packet is compared to the pre-configured set of rules.
    Rules of packet filtering are:
    Protocol Type (TCP,IP,UDP,ICMP,ESP,etc)
    Source Address
    Source Port
    Destination Address
    Destination Port
    Packet Filtering Firewalls works on the Network Layer (layer 3) and Transport Layer (layer 4) of the OSI model of reference.

    Stateful Packet Inspection
    All packets are examined and the header information is stored  in dynamic state session table.
    The rules of stateful packet inspection are:
    Protocol Type (TCP,IP,UDP,ICMP,ESP,etc)
    Source Address
    Source Port
    Destination Address
    Destination Port
    Connection State

    Proxy Services
    Proxy/Application gateway acts as an intermediate between the connections.
    Each connection can only communicate with other by going through the proxy/application gateway.
    Proxy/Application gateway operates at the Application layer (Layer 7) of the OSI Model of reference.
     When a client issues a request from an untrusted network, a connection is established between the client and proxy/gateway. The proxy/gateway compares the request to the set of rules, if finds the request valid, it sends a connection request to the destination on the behalf of the client.

    Proxy Servers also provide some other services:
    Logging:-Proxy servers makes log of the each communication.
    Content Filtering
    Authentication

    NAT(Network Address Translation)
    NAT is a method that enables hosts on private networks to communicate with hosts on the Internet.
    NAT is mostly used to translate between public address and private address.
    NAT can be also used for Public to Public Address Translation and Private to Private Address Translation.
    NAT hides the IP address and IP address structure of the internal network.
    In NAT the actual IP address/port used in an internal network is translated to the outside IP address/outside port.
    This is done by replacing the local IP address from the header of the data packet with the outside IP address.
    Types of NAT
    Static NAT
    Dynamic NAT
    Load Sharing NAT

    Static NAT
    Static NAT performs one to one translation between two addresses or between a port on one address to a port on another address.
    Static NAT maps a block on external IP addresses to the same size block of internal IP addresses.
    NAT maps a specific port to come through the firewall rather than all ports.
     Static NAT allows the internal client to maintain their set-up information.
    Multiple ISP’s can be enlisted to provide a degree of fault-tolerant access to the system. If network performance or quality degrades, connections can be swapped to another supplier.

    Dynamic NAT
    Dynamic does not perform one to one translation but instead maps a group on internal IP addresses to a pool of external IP addresses.
    These mappings can be set to expire if they are not used within a programmable period of time.
    Dynamic NAT works as firewall between internal network and the outside network or internet.
    Dynamic NAT only allows the connections that originate inside the internal domain.
    A computer on an external network can not connect to one of the internal servers unless the internal node has initiated the contact.

    Load Sharing NAT
    Load Sharing NAT(LSNAT) distributes a session load across a pool of servers.
    LSNAT is most often used in embedded server farms where a single blade server is unable to handle the increasing number of clients or sessions.