Secure your Networks with the Opensource Firewall pfSense - - PowerPoint PPT Presentation

secure your networks with the opensource firewall pfsense
SMART_READER_LITE
LIVE PREVIEW

Secure your Networks with the Opensource Firewall pfSense - - PowerPoint PPT Presentation

Secure your Networks with the Opensource Firewall pfSense hagen.bauer@rusticus-consulting.de Agenda About me Why something new? My provider gave me a fjrewall. What exactly is pfSense? Its an easy start More complex


slide-1
SLIDE 1

Secure your Networks with the Opensource Firewall pfSense

hagen.bauer@rusticus-consulting.de

slide-2
SLIDE 2

Agenda

  • About me
  • Why something new? My provider gave me a

fjrewall.

  • What exactly is pfSense?
  • It’s an easy start
  • More complex scenarios are easy to implement
  • Summary
slide-3
SLIDE 3

About Me

  • First job: technical sales for enterprise collaboratjon sofuware
  • neither sysadmin nor network engineer
  • Power User with “learning by doing”
  • pfSense in my home offjce since 2009

– 10 PCs, 4 Server, 8 mobile devices, – Home automatjon, Freifunk, Sonos, Asterisk – 2 Tor Nodes – 4 VLANs – Dual WAN

  • netgate authorized partner
slide-4
SLIDE 4

Why something new? My provider gave me a fjrewall.

slide-5
SLIDE 5

Firewall Market (roughly)

  • Enterprise solutjons

– $$$$

  • Home use devices

– Cheap – Simple but growing set of functjons – Bad track record in regards of security updates

slide-6
SLIDE 6

Devices for Home Use

  • Missing functjons for small / medium enterprises

and family use.

– Logging – Site to site connectjons / VPN – Bandwidth limitjng – Network segmentatjon – Multj WAN – Outgoing block of traffjc

slide-7
SLIDE 7

local branch your parents

LAN DMZ IOT VOIP LAN

Internet

slide-8
SLIDE 8

So what exactly is pfSense?

slide-9
SLIDE 9

pfSense Overview

  • Based on FreeBSD

– Popular OS plaform for network- and security

products

– Juniper Junos, NetApp, NetASQ, Cisco IronPort,

Citrix, Netglix, etc...

  • Administratjon via web interface
  • Connects the base components of FreeBSD in
  • ne easy to use web user interface
  • More functjons then most commercial products
slide-10
SLIDE 10

Project History

  • Started in 2004 as fork from m0n0wall

1.2 - 02/2008 (FreeBSD 6.2) 2.0 - 09/2011 (FreeBSD 8.1) 2.1 - 09/2013 (FreeBSD 8.3) 2.2 - 01/2015 (FreeBSD 10.1) 2.3 - 04/2016 (FreeBSD 10.3) 2.4 - 10/2017 (FreeBSD 11.1)

slide-11
SLIDE 11

Comprehensive Feature Set

  • DHCP Server
  • DHCP Relay
  • DNS Resolver
  • Dynamic DNS
  • Load Balancer
  • Multj WAN
  • Wake on LAN
  • VLAN
  • Intrusion Detectjon
  • PKI
  • HA
  • Captjve Portal
  • Freeradius3
  • Squid
  • ...
slide-12
SLIDE 12

Runs On

  • Your own hardware

– Min CPU - 500 Mhz RAM - 512 MB

  • Appliances from Netgate

– Preconfjgured and optjmized – With or without support

  • In the cloud

– Microsofu Azure / Amazon Cloud

  • Hardware requirements depend on

throughput and installed packages

slide-13
SLIDE 13

It’s an easy start

slide-14
SLIDE 14

Scenario 1: Base Installatjon

Head office LAN 172.17.1.0/24 172.17.1.100 10.17.1.100 172.17.1.1

Internet ISP 1

slide-15
SLIDE 15

Demonstratjon Base Installatjon

slide-16
SLIDE 16

Szenario 1: Base Installatjon

Head office LAN 172.17.1.0/24 172.17.1.100 10.17.1.100 172.17.1.1

Internet ISP 1

slide-17
SLIDE 17

Firewall Rules

  • Rules are inbound (to the pfSense box)
  • First rule wins, the rest will be ignored
  • Stateful fjltering
  • Aliases simplify the administratjon and reduce

possibilitjes of errors

– IP addresses – Networks – Hostnames – Ports

slide-18
SLIDE 18

More complex scenarios are easy to implement

slide-19
SLIDE 19

Advanced Features

  • VPN
  • DMZ and network segmentatjon
  • Bandwidth limitatjon
  • Logs of confjguratjon changes
slide-20
SLIDE 20

Virtual Private Network

  • Connectjon to remote offjces or mobile clients
  • IPSec

– Standard clients on OS X, iOS, Android – Interoperable

  • OpenVPN

– Clients behind NAT – Very easy client confjguratjon

slide-21
SLIDE 21
  • Architektur

Local branch

Headquarter LAN 172.17.1.0/24 172.17.1.100 10.17.1.100 172.17.1.1 LAN 172.18.1.0/24 172.18.1.100 172.18.1.1 10.18.1.100

Internet ISP 1

slide-22
SLIDE 22

Szenario: Connect 2 Offjces

  • Server

– Defjnitjon of the VPN server – Open fjrewall for OpenVPN – Defjne network traffjc for VPN tunnel

  • Client

– Defjnitjon VPN client

  • Connectjon test
slide-23
SLIDE 23

Demo: Connect 2 Offjces

slide-24
SLIDE 24
  • Architektur

Local branch

Headquarter LAN 172.17.1.0/24 172.17.1.100 10.17.1.100 172.17.1.1 LAN 172.18.1.0/24 172.18.1.100 172.18.1.1 10.18.1.100

Internet ISP 1

slide-25
SLIDE 25

Network Segmentatjon

  • Base component of network security
  • Physical or virtual (VLAN)
  • Privat use: IOT, VOIP, „YourChildsLAN”
  • Business use: DMZ, old OS in manufacturing

facilitjes

slide-26
SLIDE 26
  • Architektur

Local branch

Headquarter LAN 172.17.1.0/24 172.17.1.100 10.17.1.100 172.17.1.1 DMZ 172.17.2.0/24 172.17.2.10 LAN 172.18.1.0/24 172.18.1.100 172.18.1.1 10.18.1.100

Internet ISP 1

slide-27
SLIDE 27

Szenario 3: DMZ

  • Defjnitjon Network / DHCP
  • Test Ping

– HQ LAN → DMZ => OK – DMZ → HQ Intranet => Error – DMZ → Internet => Error – Branch → DMZ Server => NA

  • Port forward to webserver in DMZ
  • Test Webserver

– Branch → DMZ Server => OK

slide-28
SLIDE 28

Demo: DMZ

  • Video
slide-29
SLIDE 29
  • Architektur

Local branch

Headquarter LAN 172.17.1.0/24 172.17.1.100 10.17.1.100 172.17.1.1 DMZ 172.17.2.0/24 172.17.2.10 LAN 172.18.1.0/24 172.18.1.100 172.18.1.1 10.18.1.100

Internet ISP 1

slide-30
SLIDE 30

Scenario 4: Traffjc Shaping

  • “Managed unfairness of bandwidth” instead of

FIFO

  • Queues defjne prioritjes
  • Rules manage the queues
  • Two methods

– Limiter: hard boundary – Traffjc Shaper (ALTQ)

slide-31
SLIDE 31

Demo 4: Traffjc Shaping

slide-32
SLIDE 32
  • Necessary to be GDPR compliant
  • Automatjc backup of every change
  • “Go back to last version” (save your a**)
  • Who did what at what tjme?

Confjguratjon History

slide-33
SLIDE 33

Demo: Confjguratjon History

slide-34
SLIDE 34

Summary

  • Standard device supplied by your provider do not match

your growing need.

  • pfSense stands out due to

– Low / no pre-investments – Enterprise level feature set – Enterprise support if needed – No running license fees of individual capabilitjes (ports / user)

  • Ideal start for

– Small and medium companies – High end home offjce – Domestjc home

slide-35
SLIDE 35

Secure your Networks with the Opensource Firewall pfSense

hagen.bauer@rusticus-consulting.de