1
Firewalls
David Parter
University of Wisconsin Computer Sciences Department Computer Systems Lab dparter@cs.wisc.edu November 11, 2010
Firewalls David Parter University of Wisconsin Computer Sciences - - PowerPoint PPT Presentation
Firewalls David Parter University of Wisconsin Computer Sciences Department Computer Systems Lab dparter@cs.wisc.edu November 11, 2010 1 Topics Firewall basics Types of Firewalls Deployment scenarios Related Technologies
1
University of Wisconsin Computer Sciences Department Computer Systems Lab dparter@cs.wisc.edu November 11, 2010
2
3
4
not
complexity, weaker security
5
6
scientific “instruments”; devices with customized & embedded versions of popular
web servers for configuration or control ...
7
place (not really an advantage from a total security point of view)
8
9
10
11
packet headers
12
13
14
15
Allow?
16
deny ip 128.105.0.0 0.0.255.255 any permit tcp any 128.105.1.1 eq 25 permit tcp any 128.105.1.2 eq 80 permit tcp any 128.105.1.3 eq 22 deny icmp any any redirect log permit icmp any 128.105.1.4 echo deny icmp any any echo log deny ip any any log
17
block in log all block in log quick on $campus_if from 128.105.0.0/16 to any pass in quick on $campus_if proto tcp from any to 128.105.1.1/32 port = 25 ... pass in quick on $cs_if proto tcp from 128.105.0.0/16 to any keep state
18
19
and home devices
filtering capabilities
20
21
22
data between “inside” and “outside” connection
23
24
etc
25
26
27
destination
28
based on source/destination or other status visible to proxy
29
30
services and servers
etc
31
32
with the correct address
destination address
33
34
ACK flag set
35
UDP packets
36
packet
37
requires more CPU and memory
statefull too
38
session data
create new session in state table
39
packet
40
session data
table
41
42
routing failure
43
44
neighbors
45
destination
46
47
48
49
50
51
52
relationships with different outside groups
require isolation from each other
53
bridge)
facilities
54
to single host
by restating policy using different firewall configuration language
55
points
56
57
packet data or application-specific content
firewalls
58
59
addresses
60
61
“inside” home network
addresses/ports to expose to “outside”
62
63
64
IP SEC, etc)
65
via VPN
66
67
content vendors
access, on-campus or off-campus (via the VPN)
get access
not get access
68
authorization
understand
69
session
traffic from “bad” sites
70
71
taller and more solid now
72
problems
73
74
75
76
77
initiated by wifi clients
computers
before OS installation/patching complete
78
79
80
81
82
regular basis
83