Tải bản đầy đủ (.pdf) (10 trang)

CompTIA Network+ Certification Study Guide part 15 pptx

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (221.17 KB, 10 trang )

CHAPTER 3: Network Devices 126
Firewalls
A firewall protects a secure internal network from a public insecure network.
Firewalls are devices or software that has the ability to control the traffic
that’s sent from an external network, such as the Internet, to an internal
network or local computer. As we’ll see later in this chapter, the features
that are provided by a firewall will vary depending on the type you choose
for your network.
The most common implementation today is the use of a firewall between
an organization’s internal network and the Internet. Firewalls can be very
complex because they provide more features that just packet filtering. They
can also provide multiple layers of protection, including actually scanning
the information stored in the packets to search for malicious data. They use
advanced techniques to monitor connections, to log potential intrusions,
and to act upon these incidents.
Firewall Architecture
A firewall is a combination of techniques and technologies used to con-
trol the flow of data between networks. A firewall enables all traffic to pass
through to each network; however, it compares the traffic to a set of rules
that determine how the traffic will be managed. If the traffic matches the
rules for acceptable data, the traffic is passed on to the network. If the
rule specifies that the data be denied, the traffic cannot continue and will
be bounced back. Although some implementations may do this differently,
the same basic functionality is used.
NOTES FROM THE FIELD…
Monitoring Traffic Through Firewalls
As Internet access has become a more common fix-
ture in organizations, so has monitoring the Web sites
visited by personnel in those organizations. Firewalls
are used to prevent unauthorized access to the inter-
nal network from the Internet, but also enable organi-


zations to monitor what their employees are accessing
on the Internet. Companies can check the firewall
logs to determine what sites an employee visited, how
long they spent there, what files they downloaded,
and other information that the employee may consider
private.
Companies may also stipulate the privacy of client
information, or those with a presence on the Web may
include or create a separate policy that deals with the
privacy of a visitor to their Web site. In terms of actual
clients (those people with whom a company does
business), the policy should state the level of privacy
a client can expect. This may include the protection of
client information, including information on sales, credit
card numbers, and so forth. In the case of police, this
might include information on a person’s arrest record
that can’t be concealed under the Public Information
Act and open records laws, personal information, and
other data. For both clients and visitors to Web sites, a
company may stipulate whether information is sold to
third parties that may send you advertisements, spam,
or phone solicitations.
Network Devices 127
Dual-Homed Host Firewalls
A dual-homed firewall consists of a single computer with two physical net-
work interfaces. This computer acts as a gateway between two networks.
The server’s routing capability is disabled so that the firewall can handle all
traffic management. Either an application-level proxy or circuit-level firewall
is run to provide data transfer capability; you must be careful not to enable
routing within the network operating system or you will bypass your firewall

software. Figure 3.6 shows a dual-homed host firewall configuration.
Screened Host Firewalls
Screened host firewall configurations are considered by many to be
more secure than the dual-homed firewall. In this configuration, you place
a screening router between the gateway host and the public network. This
enables you to provide packet filtering before the packets reach the host com-
puter. The host computer could then run a proxy to provide additional secu-
rity to this configuration. As packets travel into the internal network, they
only know of the computer host that exists. Figure 3.7 shows an illustration
of a screened-host configuration.
Screened Subnet Firewalls
A screened subnet firewall configuration takes security to the next level by
further isolating the internal network from the public network. An addi-
tional screening router is placed between the internal network and the fire-
wall proxy server. The internal router handles local traffic while the external
router handles inbound and outbound traffic to the public network. This pro-
vides two additional levels of security. First, by adding a link internally, you
FIGURE 3.7
A Screened Host Firewall.
FIGURE 3.6
A Dual-Homed Host
Firewall.
CHAPTER 3: Network Devices 128
can protect the firewall host from an attack by an internal source. Second, it
makes an external attack much more difficult because the number of links is
increased. Figure 3.8 shows the screened subnet firewall configuration.
Firewall Types
There are three basic categories of firewalls: packet level, application level,
and circuit level. Each uses a different security approach, thus providing
different advantages and disadvantages. One additional feature that was dis-

cussed earlier is encryption services. Most firewalls provide some sort of
cryptographic services for data transfers.
When you have a complete understanding of the features and type of
security that is needed from a firewall, you can then determine the imple-
mentation that bests fits the environment.
Packet Level Firewall
A packet level firewall is usually a form of screening router that examines
packets based upon filters that are set up at the network and transport layers.
You can block incoming or outgoing transfers based on a TCP/IP address or
other rules. For example, you may choose to not allow any incoming IP con-
nections, but enable all outgoing IP connections. You can set up rules that
will enable certain types of requests to pass while others are denied. Rules can
be based on source address, destination address, session protocol type, and
the source and destination port. Because this works at only three layers, it is
a very basic form of protection. To properly provide security to the network,
all seven layers must be protected by a full-featured conventional firewall.
Application Level Firewall
The application level firewall understands the data at the application level.
Application layer firewalls operate at the application, presentation, and
session layers. Data at the application level can actually be understood and
monitored to verify that no harmful information is included. An example
of an application level firewall is an Internet proxy or mail server. Many
uses are available through some form of proxy; however, these functions are
usually very intensive to provide security at that level. In addition, clients
FIGURE 3.8
A Screened Subnet
Firewall.
Network Devices 129
must be configured to pass through the proxy to use it. Proxy servers are
also used to mask the original origin of a packet. For example, an Internet

proxy will pass the request on; however, the source listed in the packet is
the proxy server address. The overall server doesn’t just filter the packets,
it actually takes in the original and retransmits a new packet through a dif-
ferent network interface.
Circuit Level Firewall
A circuit level firewall is similar to an application proxy except that the secu-
rity mechanisms are applied at the time the connection is established. From
then on, the packets flow between the hosts without any further checking
from the firewall. Circuit level firewalls operate at the transport layer.
Firewall Features
As firewalls have evolved, additional feature sets have grown out of or been
added to these implementations. They are used to provide faster access and
better security mechanisms. As encryption techniques have improved, they
are being incorporated more into firewall implementations. Also, caching is
being provided for services such as the World Wide Web. This enables pages
to be cached for a period of time, which can dramatically speed up the user
experience. New management techniques and technologies such as virtual
private networks (VPNs) are now being included as well.
Content filtering is another major feature of a firewall. Because of the
possible damage a Java applet, JavaScript, or ActiveX component can do to
a network in terms of threatening security or attacking machines, many
companies filter out applets completely. Firewalls can be configured to fil-
ter out applets, scripts, and components so that they are removed from
the Hypertext Markup Language (HTML) document that is returned to
a computer on the internal network. Preventing such elements from ever
being displayed will cause the Web page to appear differently from the way
its author intended, but any content that is passed through the firewall will
be more secure.
DMZ
DMZ is short for demilitarized zone and is a military term used to signify

a recognized safe area between two countries where, by mutual agreement,
no troops or war-making activities are allowed. There are usually strict
rules regarding what is allowed within the zone. In computer security, the
DMZ is a neutral network segment where systems accessible to the public
Internet are housed, and which offers some basic levels of protection against
attacks.
CHAPTER 3: Network Devices 130
The creation of these DMZ segments is usually done in one of two
ways:
Layered DMZ implementation
Multiple interface firewall implementation
In the first method, the systems are placed between two firewall devices
with different rule sets, which allows systems on the Internet to connect to
the offered services on the DMZ systems, but prevents them from connect-
ing to the computers on the internal segments of the organization’s network
(often called the protected network). Figure 3.9 shows a common installa-
tion using this layered approach.
As shown in Figure 3.10, the second method is to add a third inter-
face to the firewall and place the DMZ systems on that network segment.
This allows the same firewall to manage the traffic between the Internet, the
DMZ, and the protected network. Using one firewall instead of two lowers
the costs of the hardware and centralizes the rule sets for the network, mak-
ing it easier to manage and troubleshoot problems. Currently, this multiple
interface design is the preferred method for creating a DMZ segment.
In either case, the DMZ systems offer some level of protection from the
public Internet while they remain accessible for the specific services they
provide to external users. In addition, the internal network is protected by
a firewall from both the external network and the systems in the DMZ.
FIGURE 3.9
A Layered DMZ

Implementation.
Network Devices 131
Because the DMZ systems still offer public access, they are more prone to
compromise and thus they are not trusted by the systems in the protected
network. This scenario allows for public services while still maintaining a
degree of protection against attack.
The role of the firewall in all of these scenarios is to manage the traffic
between the network segments. The basic idea is that other systems on the
Internet are allowed to access only the services of the DMZ systems that have
been made public. If an Internet system attempts to connect to a service not
made public, the firewall drops the traffic and logs the information about the
attempt (if configured to do so). Systems on a protected network are allowed
to access the Internet as they require, and they may also access the DMZ
systems for managing the computers, gathering data, or updating content. In
this way, systems are exposed only to attacks against the services that they
offer and not to underlying processes that may be running on them.
FIGURE 3.10
A Multiple Interface
Firewall DMZ
Implementation.
Test Day Tip
DMZs can be a difficult topic to initially understand. In reviewing information about how
they work, try to remember that the DMZ is a “no man’s land” that provides a separation
between your LAN and an external WAN like the Internet.
CHAPTER 3: Network Devices 132
ACLs
ACLs are access control lists, which are used to control access to specific
resources on a computer. An ACL resides on a computer and is a table with
information on which users have specific rights to files and folders on the
machine. The operating system uses this attribute of the file or folder to

determine whether a user is allowed or denied specific privileges to the
object. By using the ACL you can provide users of the network with the
rights they need to access these files or folders. However, in doing so, it is
advisable that you only provide users with the minimum amount of access
required by users to perform their jobs.
Proxy Server (Caching Appliances)
A proxy server is a server that performs a function on behalf of another
system. In most cases this is a system that is acting as a type of gateway
between the Internet and a company network. The employees who wish to
access the Internet will perform actions as they normally would with their
browser, but the browser will submit the request to the proxy server. The
proxy server will then transmit the request on the Internet and receive the
results. The results will then be sent to the original requester. A nice feature
of the proxy server is that the Web pages that are not encrypted will be saved
in a cache on the local hard disk. If another user requests the same page, the
proxy server will not request the page from the Internet, but retrieve it from
the hard disk. This saves quite a bit of time by not having to wait on Internet
requests, which may be coming from an overburdened Web server.
The proxy server can cache information going both ways; because it can
cache requests going out, it can also act as a proxy for Internet users making
requests to the company Web server. This can help keep traffic minimized
on the company network.
Another feature of the proxy server is that it can act as the physical gate-
way between the Internet and company network by filtering out specific infor-
mation, especially if you use the proxy server to act as a proxy between the
Internet and the company Web server. Filtering can be configured for allowing
or not allowing packets if they meet one or more of the following specified cri-
teria: specific port, direction of transfer, or source or destination of packets.
Tunnels and Encryption
Tunneling is used to create a virtual tunnel (a virtual point-to-point link)

between you and your destination using an untrusted public network as
the medium. In most cases, this would be the Internet. When establishing
a tunnel, commonly called a VPN (which we’ll discuss in the next sec-
tion), a safe connection is being created between two points that cannot be
Network Devices 133
examined by outsiders. In other words, all traffic that is traveling through
this tunnel can be seen, but cannot be understood by those on the out-
side. All packets are encrypted and carry information designed to provide
authentication and integrity. This ensures that they are tamperproof and
thus can withstand common IP attacks, such as the man-in-the-middle
(MITM) and packet replay. When a VPN is created, traffic is private and
safe from prying eyes.
VPNs
A VPN provides users with a secure method of connectivity through a public
internetwork such as the Internet. Most companies use dedicated connec-
tions to connect to remote sites, but when users want to send private data
over the Internet they should provide additional security by encrypting the
data using a VPN.
When a VPN is implemented properly, it provides improved wide-area
security, reduces costs associated with traditional WANs, improves produc-
tivity, and improves support for users who telecommute. Cost savings are
twofold. First, companies save money using public networks (such as the
Internet) instead of paying for dedicated circuits (such as point-to-point T1
circuits) between remote offices. Second, telecommuters do not have to pay
long-distance fees to connect to Remote Access Service (RAS) servers. They
can simply dial into their local ISPs and create a virtual tunnel to the office.
A tunnel is created by wrapping (or encapsulating) a data packet inside
another data packet and transmitting it over a public medium. Tunneling
requires three different protocols:
 Carrier Protocol The protocol used by the network (IP on the Inter-

net) that the information is traveling over.
 Encapsulating Protocol The protocol (PPTP, L2TP, IPSec., Secure
Shell [SSH]) that is wrapped around the original data.
 Passenger Protocol The original data being carried.
Essentially, there are two different types of VPNs: site-to-site and remote
access.
Site-to-Site VPN
Site-to-site VPNs are normally established between corporate offices that
are separated by a physical distance extending further than a normal LAN.
VPNs are available in software (such as Windows network operating sys-
tems) and hardware (firewalls such as Nokia/Checkpoint and SonicWALL)
implementations. Generally speaking, software implementations are easier
CHAPTER 3: Network Devices 134
to maintain. However, hardware implementations are considered more
secure, because they are not impacted by operating system vulnerabilities.
For example, suppose Company XYZ has offices in Boston and Phoenix.
As shown in Figure 3.11, both offices connect to the Internet via a T1 con-
nection. They have implemented VPN-capable firewalls in both offices, and
established an encryption tunnel between them.
The first step in creating a site-to-site VPN is selecting the protocols to
be used. Common protocols associated with VPN are Point-to-Point Tunnel-
ing Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP), SSH, and IP Secu-
rity (IPSec). PPTP and L2TP are used to establish a secure tunnel connection
between two sites.
Once a tunnel is established, encryption protocols are used to secure data
passing through the tunnel. As data is passed from one VPN to another, it
is encapsulated at the source and unwrapped at the target. The process of
establishing the VPN and wrapping and unwrapping the data is transparent
to the end user.
Most commercially available firewalls come with a VPN module that can

be set up to easily communicate with another VPN-capable device. Micro-
soft has implemented site-to-site VPN tools on the Windows 2003 plat-
form using either RRAS or the newest rendition of Microsoft’s proxy server,
Microsoft ISA Server 2006.
Whichever product or service is chosen, it is important to ensure that
each end of the VPN is configured with identical protocols and settings.
FIGURE 3.11 A Site-to-Site VPN Established Between Two Remote Offices.
Network Devices 135
Remote Access VPN
A remote access VPN, known as a private virtual dial-up network (PVDN),
differs from a site-to-site VPN in that end users are responsible for estab-
lishing the VPN tunnel between the workstation and their remote office.
An alternative to connecting directly to the corporate VPN is connecting
to an enterprise service provider (ESP) that ultimately connects to the cor-
porate VPN.
In either case, users connect to the Internet or an ESP through a point
of presence (POP) using their particular VPN client software (Figure 3.12).
Once the tunnel is set up, users are forced to authenticate with the VPN
server, usually by username and password.
A remote access VPN is a great solution for a company with sev-
eral employees working in the field. The remote access VPN allows these
employees to transmit data to their home offices from any location. RRAS
offers an easy solution for creating a remote access VPN.
FIGURE 3.12 A Remote-Access VPN Solution Using Regular Internet POPs.

×