Lecture 2 - Packet Filtering and Inter-networking

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Packet Filtering and Inter-networking

1 / 17

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

18 Terms

1

Packet Filtering and Inter-networking

-Hardware inter-network devices containing a packet filter are colloquially referred to as firewalls

  • Routers, bridges, or switches

-Inter-network processes typically used

  • Bridging

    • A switch is a multi-port bridge

  • Routing

    • Standard routing

    • Network Address Translation (NAT)

      • Static NAT

      • Dynamic NAT/PAT

New cards
2

Bridging

-Bridges are layer 2 devices

  • The layer 3 header is not referenced in the forwarding decision

  • A local address table (LAT) keeps track of the physical port on which each layer 2 address resides

-Bridge NICs operate in promiscuous mode

  • To build the LAT

-Frames or cells are forwarded based on their destination layer 2 address

  • Care must be taken not to create loops in a bridged environment

    • Leads to broadcast storms and infinite life frames/cells

    • Can be automated with the spanning tree algorithm

New cards
3

Filtering Bridges

-A bridge that contains a packet filter

-Allows protecting address sets not easily routed

  • Addresses that cannot be aggregated

  • Environments where you cannot affect routing changes

-Can protect noncontiguous addresses on a single L3 segment

  • Any address on the segment can be placed behind the bridge with no routing configuration changes

-Requires a dedicated target interface (or VLAN)

-Induces latency from promiscuous mode

-Can create broadcast storms and loops

New cards
4

Filtering Bridge Best Practices

-If possible use straight routing instead

-For a couple addresses consider SNAT

-Leave target NIC unbound (no L3 address)

-Try to avoid sharing an interface as a bridge source and routing/NAT target

  • Promiscuous mode latency will affect all traffic in/out of the interface

New cards
5

Routing

-Layer 3 process used to re-write a packet to another interface

-Packets are addressed to an interface’s L3 address

-Logical place to put a packet filter as the L3 address will be processed anyway

-Types of routing

  • Standard routing

    • Simply adding a packet filter to a router

  • Network Address Translation (NAT)

  • Addresses are re-written when routed

New cards
6

Standard Routing Best Practices

  • Use whenever possible to filter Internet servers

    • Adds the least latency

  • The addresses on both sides of the firewall must be “legal“ in the inter-network

    • On the Internet some addresses are not allowed

      • RFC 1918 (private) - 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16

      • RFC 5735 (link local) - 169.254.0.0/16

  • All normal routing rules and protocols apply

    • Default routes

    • Route aggregation

    • Routing Protocols

New cards
7

Network Address Translation (NAT)

  • Traffic crossing the device has its L3 address re-written

    • Outgoing traffic (private to public)

      • The source address is re-written to a public address on the device

    • Incoming traffic (public to private)

      • The destination address is re-written to the address of the target

  • Depending on NAT type additional protocol addresses may be re-written as well

New cards
8

Static NAT

  • AKA SNAT or 1:1 NAT

  • Operates exclusively at L3

  • Each internal L3 host address is translated to/from a unique L3 address on the public side of the firewall

    • Multiple addresses are commonly bound to the public interface of the firewall

    • Does not reduce the number of required IP addresses

  • Supports both ingress and egress connection requests

New cards
9

Static NAT Best Practices

  • Use only when incoming connections are needed

    • If only outgoing connections are required use DNAT/PAT

  • Each external interface can only support a limited number of addresses

    • Varies by OS

    • Best for under 10 addresses

    • Adds latency to all inbound traffic on the interface

      • As each packet must be inspected to see if translation is required

New cards
10

Dynamic NAT

  • AKA DNAT or Port Address Translation (PAT)

  • All outgoing traffic is translated to a single public address on the firewall

    • Layer 4/5 addresses are used to track the internal address for each session

    • Allows a single public address to support many private clients

  • Very limited support for incoming connections

    • AKA port forwarding

    • A single internal host can be defined for each port number

    • Different ports can be targeted to different hosts

New cards
11

Dynamic NAT Best Practices

  • Best routing solution for true private zones

    • Minimal public addresses required

    • No additional configuration when new internal hosts are added

    • Provides perfect protection from incoming connection requests

      • Unless a port forward is in place

  • Remember that a session is made directly between the internal and external hosts for egress traffic

    • Once a session is in place it can be co-opted for nefarious use

New cards
12

Beyond Packet Filtering - ALGs

  • An Application Layer Gateway (ALG) completely insulates the internal machine from the external machine

    • The internal machine communicates only with the internal interface of the proxy

    • The proxy then relays the message to the external machine and vice-versa

    • Allows access between private address space and public address space

  • A separate ALG is required for each L6/7 protocol

    • Some are bundled into sets

New cards
13

Application Layer Gateways (ALG)

  • Allow robust inspection of L6/7 layer traffic

    • Web content filtering

    • Email SPAM and Malware filtering

  • Allow protocols that dynamically open ports to traverse the public/private boundary

    • H.323, Active FTP, etc

    • ALG monitors control channels for other ports to manage

New cards
14

Hybrid Firewall

  • Combine elements of traditional pack filters and ALGs

    • Support bridging/routing/NAT

    • Provide ALG services for some common protocols

  • Most current solutions fall into this category

    • Swiss Army knife tools/ Does everything

    • Getting harder to categorize these types of tools

New cards
15

Firewall Performance Metrics

  • Throughput (bytes per second)

    • Can be misleading

    • As much of an issue of the protocol than the firewall itself

      • Low overhead, big packet protocols vs. small packet, chatty protocols (FTP vs. SMTP)

    • Can be useful for the exact same traffic

  • Packet forwarding rate (packets per second)

    • More accurately measures performance

    • Will vary by filtering method

      • Routed, bridged, static natted, dynamic natted, etc

    • Better captures latency across the firewall

New cards
16

Packet Inspection = Latency

  • Packets must be buffered

    • The packet must be inspected and allowed before the first bit is forwarded

    • No cut-through forwarding

  • Stateful inspection adds additional latency

    • Requires a state table update/lookup

  • All forms of NAT require the packet header be re-written

    • Along with an address table update/lookup

  • Latency is added on a per-packet basis

New cards
17

Latency Order from Best to Worst

  • Standard Routing

    • Minimal additional processing required

  • Bridging

    • NICs must be in promiscuous mode which reduces efficiency

  • Static NAT

    • To/from layer 3 addresses must be bi-directionally re-written

  • Dynamic NAT/PAT

    • To/from layer 3 address and L4 addresses must be rewritten

  • Application Layer Gateways

    • Two separate sessions must be managed

New cards
18

Firewalls Aren’t Everything

  • There is much more to network security than firewalls

    • However, they are a good place to start as they typically provide the initial barrier to attack

  • You should practice defense in depth

    • Multiple layers of security

  • Too many people use the triple lock the front door approach with firewalls

    • Then leave the back door unlocked and wonder how the compromise happened……

New cards

Explore top notes

note Note
studied byStudied by 51 people
... ago
5.0(1)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 14 people
... ago
5.0(1)
note Note
studied byStudied by 4 people
... ago
5.0(1)
note Note
studied byStudied by 59 people
... ago
5.0(3)
note Note
studied byStudied by 7 people
... ago
4.0(1)
note Note
studied byStudied by 123508 people
... ago
4.8(561)

Explore top flashcards

flashcards Flashcard (85)
studied byStudied by 4 people
... ago
5.0(2)
flashcards Flashcard (37)
studied byStudied by 17 people
... ago
5.0(1)
flashcards Flashcard (40)
studied byStudied by 11 people
... ago
5.0(1)
flashcards Flashcard (56)
studied byStudied by 548 people
... ago
4.8(5)
flashcards Flashcard (169)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (24)
studied byStudied by 4 people
... ago
5.0(2)
flashcards Flashcard (118)
studied byStudied by 52 people
... ago
5.0(1)
flashcards Flashcard (21)
studied byStudied by 2 people
... ago
5.0(1)
robot