Firewall
Firewall
Firewall Design
Firewalls
Principles
• Effective means of protection a local • Information systems undergo a
system or network of systems from steady evolution (from small LAN`s
network-based security threats while to Internet connectivity)
affording access to the outside world • Strong security features for all
via WAN`s or the Internet workstations and servers not
established
Firewall Design
Firewall Characteristics
Principles
• The firewall is inserted between the • Design goals:
premises network and the Internet – All traffic from inside to outside must
• Aims: pass through the firewall (physically
blocking all access to the local network
– Establish a controlled link
except via the firewall)
– Protect the premises network from
– Only authorized traffic (defined by the
Internet-based attacks
local security policy) will be allowed to
– Provide a single choke point pass
1
Firewall Characteristics Firewall Characteristics
2
Types of Firewalls Types of Firewalls
3
Types of Firewalls Types of Firewalls
4
Firewall Configurations Firewall Configurations
5
Firewall Configurations Firewall Configurations
6
Data Access Control Data Access Control
7
The Concept of The Concept of
Trusted Systems Trusted Systems
• Trusted Systems • Multilevel security
– Definition of multiple categories or levels of
– Protection of data and resources on the data
basis of levels of security (e.g. military) • A multilevel secure system must enforce:
– Users can be granted clearances to – No read up: A subject can only read an object
access certain categories of data of less or equal security level (Simple Security
Property)
– No write down: A subject can only write into an
object of greater or equal security level (*-
Property)
8
The Concept of
Trojan Horse Defense
Trusted Systems
• A system that can provide such • Secure, trusted operating systems
verifications (properties) is referred are one way to secure against Trojan
to as a trusted system Horse attacks
Recommended Reading
• Chapman, D., and Zwicky, E. Building
Internet Firewalls. O’Reilly, 1995
• Cheswick, W., and Bellovin, S. Firewalls and
Internet Security: Repelling the Wily
Hacker. Addison-Wesley, 2000
• Gasser, M. Building a Secure Computer
System. Reinhold, 1988
• Pfleeger, C. Security in Computing. Prentice
Hall, 1997
Henric Johnson 53