Firewall
Firewall
• i. All traffic from inside to outside and vice versa must pass through the firewall. This is achieved
by physically blocking all access to the local network except via the firewall.
ii. Only authorized traffic as defined by the local security policy will be allowed to pass. Various types
of firewalls that can be used are Packet-Filters, Stateful Filters and Application Proxy Filters.
iii. The firewall itself is immune to penetration. This implies that use of a trusted system with a
secure operating system.
• The basic subnet segments are as follows:
• External public networks typically refer to the public/global internet or various extranets.
• Internal private network defines a home network, corporate intranets, and other ‘closed’
networks.
• Perimeter networks detail border networks made of bastion hosts — computer hosts dedicated
with hardened security that are ready to endure an external attack. As a secured buffer between
internal and external networks, these can also be used to house any external-facing services
provided by the internal network (i.e., servers for web, mail, FTP, VoIP, etc.). These are more
secure than external networks but less secure than internal. These are not always present in
simpler networks like home networks but may often be used in organizational or national
intranets.
• Packet protocols: What ‘language’ an attempted connection is speaking to
carry its message. Among the networking protocols that hosts use to ‘talk’
with each other, TCP/IP protocols are primarily used to communicate across
the internet and within intranet/sub-networks.
• Application protocols: Common protocols include HTTP, Telnet, FTP, DNS,
and SSH.
• Source and destination are communicated by internet protocol (IP)
addresses and ports. IP addresses are unique device names for each
host. Ports are a sub-level of any given source and destination host device,
similar to office rooms within a larger building. Ports are typically assigned
specific purposes, so certain protocols and IP addresses using uncommon
ports or disabled ports can be a concern.
• By using these identifiers, a firewall can decide if a data packet attempting a
connection is to be discarded—silently or with an error reply to the sender
—or forwarded.
Techniques for Control:
Four general techniques that firewalls use to control access and
enforce security policy are as follows
i. Service Control- This determines the types of internet services
that can be accessed inbound or outbound.
ii. Direction Control: This determines the direction in which
particular service requests may be initiated and allowed to flow
through the firewall.
iii. User Control: Control access to a service according to which user
is attempting to access it. This feature is typically applied to users
inside the firewall perimeter.
iv. Behaviour Control: Controls how particular services are used.
Firewalls
A firewall is a network security device that monitors and controls incoming and outgoing
network traffic to prevent unauthorized access. It works by inspecting data packets and
deciding whether to allow or block them based on a set of security rules.
• Firewall rules can be based on:
• IP addresses (e.g. Packet from IP address X is allowed to pass while packet from IP address Y
is denied to pass through firewall.)
• Domain name
• Ports
• Programs
• Keywords
• Protocols
Two types of Firewalls
1. Host based firewall:-
• Software firewall that is installed on a computer.
• Protects that computer only.
• Software firewalls
• Software firewalls are installed on the devices being protected. Windows Defender is the most
common example, but there are many alternative providers. Software firewalls require
installation and updating and protect a single device. But users can easily customize their
filtering settings with a software firewall, making them a more precise solution.