Wednesday, November 5, 2014

Firewalls

In Information Security a firewall is any device that prevents a specific type of information from moving between trusted and untrusted network. Trusted is in-side world, Un-trusted is outside the world such as Internet. The firewall may be a separate computer system, a service running on an existing router or server, or a separate network containing a number of supporting devices.
First generation of firewalls are packet filtering firewalls, are networking devices that filter packets by examining every incoming and outgoing packet header.  Second generation firewalls known as application-level firewalls; often consist of dedicated computers kept separate from the first filtering router, commonly used in conjunction with a second or internal filtering router. Second server is often called as proxy server.  Third generation firewalls, stateful inspection firewalls, keep track of each network connection established between internal and external systems using as state table. State tables track the state and context of each exchanged packet by recording which station sent which packet and when.  Like first generation stateful inspection firewalls perform packet filtering; stateful inspection firewall can restrict incoming packets by restricting access to packets that constitute responses to internal requests. If the stateful inspections firewall receives an incoming packet that it cannot match in its state table, it defaults to its access control list (ACL) to determine whether to allow the packet to pass. Fourth Generation firewalls called ‘dynamic packet filtering firewalls’, allow only a particular packet with specific source, destination, and port address to pass through the firewall. The new generation firewall is a hybrid built from capabilities of modern networking equipment that can perform a variety of tasks according to the organization’s needs, known as Unified Threat Management (UTM).

Firewall Architectures

Configurations are sometimes mutually exclusive, sometimes can be combined. Architectural implementations of firewalls are
Packet filtering routers:  Routers configured to block packets that the organization doesn’t allow into the network.  This lowers the organization risk from external attack.
Screened-Host Firewall Systems: Combines the packet filtering with a separate, dedicated firewall such as an application proxy server. Approach allows the router to screen packets to minimize the network traffic and load on the internal proxy.
Dual-homed host firewalls: Bastion host contains two network interfaces; one that is connected to external network and one that is connected to the internal network. All traffic must go through the firewall to move between the internal and external networks.
Screened –subnet firewalls: Consists of one or more internal bastion hosts located behind a packet filtering router, with each host protecting the trusted network. 
First general model uses two filtering routers, with one or more dual homed bastion hosts between them.  The second general model connections from the outside or untrusted network are routed through an external filter router, connections from the outside or untrusted network are route into and then out of a routing firewall to the separate network segment known as the DMZ, connections into the trusted internal network are allowed only from the DMZ bastion host servers.

Source: Management of Information Security by Whitman and Mattord.


No comments:

Post a Comment