Guide to Network Defense and Countermeasures - Chapter 9: Firewalls
Chapter 9: Firewalls
An Overview of Firewalls
Definition: A firewall is a hardware or software solution configured to block unauthorized network access.
Firewalls have limitations:
They cannot protect against malicious insiders who may send proprietary information outside the organization or copy confidential information to disk.
They also cannot protect connections that bypass them, such as remote dial-up connections.
Components of Network Firewalls
A network firewall consists of a combination of multiple software and hardware components. The term 'firewall perimeter' might be more descriptive.
Historical Context: The earliest firewalls utilized packet filtering, with a single packet-filtering router placed at the network perimeter.
Consumer Firewalls: Examples include Norton Security Suite Firewall and ZoneAlarm.
Personal and Large-Scale Firewalls
Personal Firewalls: Establish rules for blocking traffic on a case-by-case basis; often prompt the user regarding whether traffic should be allowed.
Example: Check Point NGX firewall is designed to protect and monitor large-scale networks.
Firewall Appliances: Self-contained hardware devices added to networks, such as the Cisco PIX.
Limitations and Solutions
Firewalls are not a standalone solution. They cannot protect from internal threats and thus require:
A strong security policy and employee education.
A policy that includes strict procedures for keeping patches updated and checking for vulnerabilities.
Combination with other technologies such as antivirus software and Intrusion Detection and Prevention Systems (IDPS).
Defense in Depth (DiD): A layered defense strategy that encompasses an IDPS, firewalls, antivirus software, access control, and auditing.
Comparing Software and Hardware Firewalls
Core Functions of Firewalls:
Filtering: Controls what data can pass through the firewall.
Proxying: Acts as an intermediary between users and the services they access.
Logging: Records actions and traffic that pass through the firewall.
Types of Firewalls: The following sections cover the two main categories:
Software-based firewalls
Hardware-based firewalls
Software-Based Firewalls
Description: Software firewalls are programs that may be integrated with hardware devices to strengthen security; they require extensive configuration.
Free Firewall Programs: Often have inadequate logging and configuration capabilities. Popular options include:
Netfilter
ZoneAlarm
Commercial Firewall Programs
Personal Firewalls: Positioned between the Ethernet adapter driver and the TCP/IP stack, these firewalls inspect traffic flow. Popular examples include:
CA Internet Security Suite
Norton Internet Security
Kaspersky Internet Security
These options typically do not offer extensive firewall protection.
Enterprise Firewalls: Offer centralized management and can manage multiple installations from one location. Examples include:
Check Point NGX
Proventia Security Products
Features may include user authentication, NAT, and encryption.
Hardware Firewalls
Advantages:
Do not rely on conventional operating systems, leading to generally better scalability than software firewalls.
Capable of handling larger data volumes with faster throughput.
Disadvantages:
They do rely on non-conventional operating systems and can be more expensive than software solutions.
Examples:
Cisco ASA Series
Fortinet FortiGate Series
Barracuda NG Firewall
Comparison of Firewall Types
Type of Firewall | Advantages | Disadvantages |
|---|---|---|
Software Freeware | Small file size, ease of installation | Minimal features, lack of support |
Software Commercial Personal | Economical, auto-configuration for novice users | Less robust than enterprise products |
Software Commercial Enterprise | Installed on a dedicated host for security, centralized admin | Can be costly and complex to configure |
Hardware Appliances | More scalable, faster throughput | Expensive and difficult to patch |
Packet Filtering Techniques
Firewalls utilize different packet filtering strategies, which depend on component positions within the network perimeter.
Stateless Packet Filtering
Process: This filtering method determines whether to allow or block packets based on their protocol headers.
Common Header Features:
IP address
Ports
TCP flags
Advantages: Cost-effective and simple.
Disadvantages: Hard to maintain, susceptible to IP spoofing, and lacks authentication.
Stateful Packet Filtering
Description: Maintains a record of connections established between internal hosts and other computers using a state table.
Function: Allows inbound packets known to be part of connections that have already been established.
Advantages: More secure than stateless filtering.
Example of Stateful Packet Filtering
A state table might record all established connections with source IPs, destination IPs, ports, and connection states.
Windows Firewall as a User-Friendly Option
Recognized as one of the most user-friendly packet filters, allowing detailed control over traffic:
Control Over Program Traffic: Windows Firewall allows users to limit program-specific traffic and create detailed rules based on protocols, ports, and IP addresses.
Packet Filtering Based on Position
Placement Considerations:
Firewalls should be placed between the Internet and a host to track all inbound/outbound traffic.
Operation between a proxy server and the Internet to handle traffic securely while hiding internal IP addresses.
Firewall Rule Sets
Rule Base Definition: A rule base dictates how a firewall reacts to various types of traffic.
Best Practices for Rule Base:
Align with the organization’s security policy.
Maintain simplicity to ensure quick processing.
Specify access restrictions to internal network ports and subnets.
Control access to Internet services effectively.
Creating and Implementing Rules
Rules should allow certain types of traffic, restrict others, and maintain clear operational orders.
Summary
Firewall Functionality: Firewalls act as protective tools against unauthorized access.
Importance of Configuration: They need to be configured correctly to avoid potential vulnerabilities while allowing necessary traffic.
Foundation for Rule Bases: Rule bases should be concise and reflect the organization’s security posture and policies effectively, ensuring comprehensive yet manageable control over network traffic.