Lo2 Security
Lo2 Security
Firewalls can be viewed as gated borders or gateways that manage the travel of permitted and
prohibited web activity in a private network. The term comes from the concept of physical walls
being barriers to slow the spread of fire until emergency services can extinguish it. By
comparison, network security firewalls are for web traffic management — typically intended to
slow the spread of web threats.
Firewalls create 'choke points' to funnel web traffic, at which they are then reviewed on a set of
programmed parameters and acted upon accordingly. Some firewalls also track the traffic and
connections in audit logs to reference what has been allowed or blocked.
Firewalls are typically used to gate the borders of a private network or its host devices. As such,
firewalls are one security tool in the broader category of user access control. These barriers are
typically set up in two locations — on dedicated computers on the network or the user computers
and other endpoints themselves (hosts).
A network firewall requires configuration against a broad scope of connections, whereas a host
firewall can be tailored to fit each machine's needs. However, host firewalls require more effort
to customize, meaning that network-based are ideal for a sweeping control solution. But the use
of both firewalls in both locations simultaneously is ideal for a multi-layer security system.
Filtering traffic via a firewall makes use of pre-set or dynamically learned rules for allowing
and denying attempted connections. These rules are how a firewall regulates the flow of web
traffic through your private network and private computer devices. Regardless of type, all
firewalls may filter by some combination of the following:
Source: Where an attempted connection is being made from.
Destination: Where an attempted connection is intended to go.
Contents: What an attempted connection is trying to send.
Packet protocols: What ‘language’ an attempted connection is speaking to carry its
message. Among the networking protocols that hosts use to ‘talk’ with each other,
TCP/IP protocols are primarily used to communicate across the internet and within
intranet/sub-networks.
Application protocols: Conmmon protocols include HTTP, Telnet, FTP, DNS, and SSH.
Source and destination are communicated by internet protocol (IP) addresses and ports. IP
addresses are unique device names for each host. Ports are a sub-level of any given source and
destination host device, similar to office rooms within a larger building. Ports are typically
assigned specific purposes, so certain protocols and IP addresses using uncommon ports or
disabled ports can be a concern.
Types of firewall
Different types of firewalls incorporate varied methods of filtering. While each type was
developed to surpass previous generations of firewalls, much of the core technology has passed
between generations.
Firewall types are distinguished by their approach to:
1. Connection tracking
2. Filtering rules
3. Audit logs
Each type operates at a different level of the standardized communications model, the Open
Systems Interconnection model (OSI). This model gives a better visual of how each firewall
interacts with connections.
Static Packet-Filtering Firewall
Static packet-filtering firewalls, also known as stateless inspection firewalls, operate at the OSI
network layer (layer 3). These offer basic filtering by checking all individual data packets sent
across a network, based on where they're from and where they're attempting to go. Notably,
previously accepted connections are not tracked. This means each connection must be re-
approved with every data packet sent.
Filtering is based on IP addresses, ports, and packet protocols. These firewalls, at the bare
minimum, prevent two networks from directly connecting without permission.
Rules for filtering are set based on a manually created access control list. These are very rigid
and it is difficult to cover unwanted traffic appropriately without compromising network
usability. Static filtering requires ongoing manual revision to be used effectively. This can be
manageable on small networks but can quickly become difficult on larger ones.
Inability to read application protocols means the contents of a message delivered within a packet
cannot be read. Without reading the content, packet-filtering firewalls have a limited quality of
protection.
Circuit-Level Gateway Firewall
Circuit-level gateways operate on the session level (layer 5). These firewalls check for functional
packets in an attempted connection, and—if operating well—will permit a persistent open
connection between the two networks. The firewall stops supervising the connection after this
occurs.
Aside from its approach to connections, the circuit-level gateway can be similar to proxy
firewalls.
The ongoing unmonitored connection is dangerous, as legitimate means could open the
connection and later permit a malicious actor to enter uninterrupted.
Stateful Inspection Firewall
Stateful inspection firewalls, also called dynamic packet-filtering firewalls, are unique from
static filtering in their ability to monitor ongoing connections and remember past ones. These
began by operating on the transport layer (layer 4) but nowadays, these firewalls can monitor
many layers, including the application layer (layer 7).
Like the static filtering firewall, stateful inspection firewalls allow or block traffic based on
technical properties, such as specific packet protocols, IP addresses, or ports. However, these
firewalls also uniquely track, and filter based on the state of connections using a state table.
This firewall updates filtering rules based on past connection events logged in the state table by
the screening router.
Generally, filtering decisions are often based on the administrator's rules when setting up the
computer and firewall. However, the state table allows these dynamic firewalls to make their
own decisions based on previous interactions it has ‘learned’ from. For example, traffic types
that caused disruptions in the past would be filtered out in the future. Stateful inspection's
flexibility has cemented it as one of the most ubiquitous types of shields available.
Proxy Firewall
Proxy Firewalls, also known as application-level firewalls (layer 7), are unique in reading and
filtering application protocols. These combine application-level inspection, or ‘deep packet
inspection (DPI),’ and stateful inspection.
A proxy firewall is as close to an actual physical barrier as it's possible to get. Unlike other types
of firewalls, it acts as an additional two hosts between external networks and internal host
computers, with one as a representative (or ‘proxy’) for each network.
Filtering is based on application-level data rather than just IP addresses, ports, and basic packet
protocols (UDP, ICMP) like in packet-based firewalls. Reading and understanding FTP, HTTP,
DNS, and other protocols allow for more in-depth investigation and cross-filtering for many
different data traits.
Similar to a guard at a doorway, it essentially looks at and evaluates incoming data. If no
problem is detected, the data is allowed to pass through to the user.
The downside to this kind of heavy security is that it sometimes interferes with incoming data
that isn't a threat, leading to functionality delays.
Next-Generation Firewall (NGFW)
Evolving threats continue to demand more intense solutions, and next-generation firewalls stay
on top of this issue by combining the features of a traditional firewall with network intrusion
prevention systems.
Threat-specific next-generation firewalls are designed to examine and identify specific threats,
such as advanced malware, at a more granular level. More frequently used by businesses and
sophisticated networks, they provide a holistic solution to filtering out threats.
Hybrid Firewall
As implied by the name, hybrid firewalls use two or more firewall types in a single private
network.
What Is Firewall Configuration?
A firewall plays a vital role in network security and needs to be properly configured to keep
organizations protected from data leakage and cyberattacks.
This is possible by configuring domain names and Internet Protocol (IP) addresses to keep the
firewall secure. Firewall policy configuration is based on network type, such as public or private,
and can be set up with security rules that block or allow access to prevent potential attacks from
hackers or malware.
Proper firewall configuration is essential, as default features may not provide maximum
protection against a cyberattack.
Improper firewall configuration can result in attackers gaining unauthorized access to protected
internal networks and resources. As a result, cyber criminals are constantly on the lookout for
networks that have outdated software or servers and are not protected. Gartner highlighted the
size and magnitude of this issue, predicting that 99% of firewall breaches would be caused by
misconfigurations in 2020.
The default settings on most firewalls and protocols like the File Transfer Protocol (FTP) do
not provide the necessary level of protection to keep networks secure from cyberattacks.
Organizations must ensure basic firewall configuration meets the unique needs of their networks.
However, having more zones also demands more time to manage them. With a network zone
structure established, it is also important to establish a corresponding IP address structure that
assigns zones to firewall interfaces and sub interfaces.
ACLs must be made specific to the exact source and destination port numbers and IP addresses.
Each ACL should have a “deny all” rule created at the end of it, which enables organizations to
filter out unapproved traffic. Each interface and subinterface also needs an inbound and
outbound ACL to ensure only approved traffic can reach each zone. It is also advisable to disable
firewall administration interfaces from public access to protect the configuration and disable
unencrypted firewall management protocols.
Further, firewalls must be configured to report to a logging service to comply with and fulfill
Payment Card Industry Data Security Standard (PCI DSS) requirements.
1. Using broad policies or the wrong firewall settings can result in server issues, such
as Domain Name System (DNS) and connectivity issues.
2. Ignoring outgoing traffic can present a risk to networks.
3. Relying solely on a firewall for network security or non-standard authentication methods
may not protect all corporate resources.
If internal devices use private IP addresses without NAT protection, attackers might be able
to list all of the devices and use each one's IP address to target and enumerate them. By
hiding the internal network architecture and only disclosing one public IP address to outside
parties, NAT reduces this danger.
Examine a TechSecure Solution web server that isn't protected by a DMZ and is linked
straight to the internal network. This web server could have uncontrolled access to the
internal network in the unlikely case that it is compromised by an outside party, which could
have fatal results. By isolating servers within the approved media zone, organizations can
lessen the chance of lateral movement and unwanted access (Ribeiro et al., 2022).
Delicate planning and configuration are necessary for DMZ implementation. Maintaining the
integrity of the DMZ requires regular security audits, firewall regulations, and access
controls. In order to keep an eye on and counter possible threats inside the DMZ,
organizations ought to think about implementing intrusion detection and prevention systems.