Sie sind auf Seite 1von 6

Firewall Architecture & Types

FIREWALL ARCHITECURE Netgear FVS318:Netgear's entry-level


& TYPES firewall is aimed at the professional
home user or small business and is a
feature-packed, yet user-friendly,
Abstract device. A simple Web interface allows
easy configuration of security policies
A firewall is a device (usually a router
and the included comprehensive help
or a computer) installed between the
files enable quick deployment. The
internal network of an organization and
FVS318 has URL filtering and
the rest of the Internet. It is designed to
keyword blocking and can detect
forward some packets and filter (not
harmful ActiveX and Java modules.
forward) others. Firewalls can be
The wall-mounted case comes with a
deployed as either network firewalls or
lockable security device to deal with
on application layers or can be a hybrid
real, as well as virtual, security threats.
one.Various architectures of firewall
are possible like Dual-Homed Host
Architecture, Screened Host 1.2) Software Based Firewalls
Architecture, Screened Subnet
Architecture and various variations in A firewall that runs on generic
architecture are possible like multiple operating systems such as Windows
external router, combination of and Linux is known as software
internal router and bastion host etc to firewall. Examples of software firewall
improve the performance and security are: Microsoft ISA Server (uses
of the firewall. Windows 2000/2003), CheckPoint
FW-1 and many personal firewalls
such as Zone Alarm. FW-1 runs on
1.1) Hardware based firewalls Windows NT/2000, Solaris, Linux, and
AIX, as well as proprietary appliance
Firewalls that run in a proprietary
operating systems. Software-based
hardware and software environment
firewalls provide a level of protection
are known as hardware based firewalls.
intended to keep cyber-criminal and
Examples of hardware firewalls
BotNets from gaining unauthorized
Hardware firewalls take the form of a
access to individual computers. In
physical device that sits between the
addition, software-based firewalls
computer and the internet. Unlike
block malicious code from contacting
software firewalls, hardware firewalls
out to the mother server. Although it is
require quite a bit of work to fully
common for the average computer user
configure. Firewalls such as these may
to download free firewalls, it is a best
range from a simple router to a proxy
practice to find an enterprise-grade
server that directs all traffic to a server
firewall that allows custom filtering
elsewhere on the internet before
rules that are best suited for the
sending or taking data from a computer
individual user's specific needs.
or a network. not created equal, and an
Software Firewalls.Software firewalls
inexpensive hardware-based or free
are firewalls that are installed directly
software-based firewall can give the
into the computer as programs. Once
computer owner a false sense of
installed, these firewalls activate
security and allow unauthorized traffic
themselves and set up with relative
to go undetected. Since the firewall is
ease.The free AVG Anti-Rootkit is
the first line of defense against cyber-
designed to protect you. It finds and
kills rootkits. Tiny Personal Firewall
helps you selectively receive data.

Roll No-C07348 1
Firewall Architecture & Types

2)FIREWALL A dual-homed host can only provide


ARCHITECTURES services by proxying them, or by
having users log into the dual-homed
Various architectures of firewalls are host directly. Furthermore, most users
described in detail below.Also various find it inconvenient to use a dual-
variations are shown to improve homed host by logging into it.
performance and security of firewall.

2.1) DUAL-HOMED HOST


ARCHITECTURE

It is built around the dual-homed host


computer, a computer which has at
least two network interfaces. Such a
host could act as a router between the
networks. These interfaces are attached
to; it is capable of routing IP packets
from one network to another.
However, to implement a dual-homed
host type of firewalls architecture, you
disable this routing function. Thus, IP
packets from one network (e.g., the Fig: Dual Homed Host Architecture
Internet) are not directly routed to the
other network (e.g., the internal, 2.2) SCREENED HOST
protected network). Systems inside the ARCHITECTURE
firewall can communicate with the
dual-homed host, and systems outside It provides services from a host that's
the firewall (on the Internet) can attached to only the internal network,
communicate with the dual-homed using a separate router. In this, the
host, but these systems can't primary security is provided by packet
communicate directly with each other. filtering. (e.g. packet filtering is what
IP traffic between them is completely prevents people from going around
blocked. In the architecture, the dual proxy servers to make direct
homed host sits between, and is connections.) The bastion host sits on
connected to, the Internet and the the internal network. The packet
internal network. filtering on the screening router is set
up in such a way that the bastion host
Dual-homed hosts can provide a very is the only system on the internal
high level of control. If you aren't network that hosts on the Internet can
allowing packets to go between open connections to (e.g. to deliver
external and internal networks at all, incoming email). Even then, only
you can be sure that any packet on the certain types of connections are
internal network that has an external allowed. Any external system trying to
source is evidence of some kind of access internal systems or services will
security problem. In some cases, a have to connect to this host. The
dual-homed host will allow you to bastion host thus needs to maintain a
reject connections that claim to be for a high level of host security. The packet
particular service but that don't filtering configuration in the screening
actually contain the right kind of data. router may do one of the following:

Roll No-C07348 2
Firewall Architecture & Types

Allow other internal hosts to open 2.3) SCREENED SUBNET


connections to hosts on the Internet for ARCHITECTURE
certain services (allowing those
services via packet filtering).Disallow It adds an extra layer of security to the
all connections from internal hosts screened host architecture by adding a
(forcing those hosts to use proxy perimeter network that further isolates
services via the bastion host). the internal network from the Internet.
By their nature, bastion hosts are the
Because this architecture allows most vulnerable machines on your
packets to move from the Internet to network. Despite your best efforts to
the internal networks, it may seem protect them, they are the machines
more risky but in practice, however, it most likely to be attacked, because
is also prone to failures that let packets they're the machines that can be
actually cross from the external attacked. By isolating the bastion host
network to the internal network. on a perimeter network, you can
Furthermore, it's easier to defend a reduce the impact of a break-in on the
router, which provides a very limited bastion host, thus it gives an intruder
set of services, than it is to defend a some access, but not all.With the
host. It provides both better security simplest type of screened subnet
and better usability than the former. architecture, there are two screening
The disadvantage is that if an attacker routers, each connected to the
manages to break in to the bastion perimeter net. One sits between the
host, there is nothing left in the way of perimeter net and the internal network,
network security between the bastion and the other sits between the
host and the rest of the internal hosts. perimeter net and the external network
The router also presents a single point (usually the Internet). To break into the
of failure; if the router is compromised, internal network with this type of
the entire network is available to an architecture, an attacker would have to
attacker. Thus, it has become get past both routers. Even if the
increasingly popular. attacker somehow broke in to the
bastion host, he'd still have to get past
the interior router. There is no single
vulnerable point that will compromise
the internal network.

Fig. Screened Host Architecture

Fig. Screened Subnet Architecture

Roll No-C07348 3
Firewall Architecture & Types

Perimeter Network: the exterior router are those that


protect the machines on the perimeter
If an attacker successfully breaks into net (that is, the bastion hosts and the
the outer reaches of your firewall, then internal router). One of the security
the perimeter net (network between the tasks that the exterior router can
external network and your protected usefully perform - a task that usually
internal network) offers an additional can't easily be done anywhere else - is
layer of protection between that the blocking of any incoming packets
attacker and your internal systems. from the Internet that have forged
Thus, if someone breaks into a bastion source addresses. Such packets claim
host on the perimeter net, he'll be able to have come from within the internal
to snoop only on traffic on that net. All network, but actually are coming in
the traffic on the perimeter net should from the Internet.
be either to or from the bastion host, or
to or from the Internet. Because no 2.4) Further variations that
strictly internal traffic (which is can be made in this model are:
presumably sensitive or proprietary)
passes over the perimeter net, internal 2.4.1) Use Multiple Bastion
traffic will be safe from prying eyes if
the bastion host is compromised.
Hosts
You might decide to have one bastion
Bastion Host host handle the services that are
important to your own users (such as
With the screened subnet architecture, SMTP servers, proxy servers, and so
you attach a bastion host (or hosts) to on), while another host handles the
the perimeter net; this host is the main services that you provide to the
point of contact for incoming Internet, but which your users don't
connections from the outside world; care about (for example, an
for example: anonymous FTP server). In this
way,performance for your own users
Interior Router won't be dragged down by the
activities of outside users.You may
Interior (or choke router) protects the have performance reasons to create
internal network both from the Internet multiple bastion hosts even if you don't
and from the perimeter net. The provide services to the Internet.
interior router does most of the packet
filtering for your firewall. It allows 2.4.2) Merge the Interior
selected services outbound from the
Router and the Exterior
internal net to the Internet. These
services are the services your site can Router
safely support and safely provide using
packet filtering rather than proxies. You can merge the interior and
exterior routers into a single router, but
only if you have a router sufficiently
Exterior Router capable and flexible. In general, you
need a router that allows you to specify
Exterior (or access router) protects
both inbound and outbound filters on
both the perimeter net and the internal
each interface. In , we discuss what
net from the Internet. The only packet
this means, and we describe the packet
filtering rules that are really special on
filtering problems that may arise with

Roll No-C07348 4
Firewall Architecture & Types

routers that have more than two came from. Modern network layer
interfaces and don't have this firewalls have become increasingly
capability.If you merge the interior and more sophisticated, and now maintain
exterior routers, as we how in you'll internal information about the state of
still have a perimeter net . connections passing through them at
any time.
2.4.3) Merge the Bastion Host
and the Exterior Router Network layer firewall is a type of
firewall that works as a packet filter by
There might be cases in which you use deciding what packets will pass the
a single dual-homed machine as both firewall according to rules defined by
your bastion host and your exterior the administrator. Filtering rules can
router.Unlike merging the interior and act on the basis of source and
exterior routers, merging the bastion destination address and on ports, in
host with the exterior router, does not addition to whatever higher-level
open significant new vulnerabilities. It network protocols the packet contains.
does expose the bastion host further. In Network layer firewalls tend to operate
this architecture, the bastion host is very fast, and transparently to users.
more exposed to the Internet, protected Network layer firewalls generally fall
only by whatever filtering (if any) its into two sub-categories, stateful and
own interface package does, and you non-stateful. Stateful firewalls hold
will need to take extra care to protect some information on the state of
it. connections as part of their rules.
Stateless firewalls have packet-filtering
capabilities but cannot make more
3.1) FIREWALL TYPES complex decisions on what stage
communications between hosts have
Security expert Michael Gregg says the
reached. Stateless firewalls therefore
National Institute of Standards and
offer less security.
Technology 800-10 divides firewalls in
to five basic types: Packet filters
,Stateful Inspection ,Proxys ,Dynamic 3.2) APPLICATION LAYER
and Kernel.These divisions, however, FIREWALLS
are not quite well defined as most
modern firewalls have a mix of Application layer firewalls defined, are
abilities that place them in more than hosts running proxy servers, which
one of the categories shown above. permit no traffic directly between
networks, and they perform elaborate
3.1) NETWORK LAYER logging and examination of traffic
passing through them. Since proxy
FIREWALLS applications are simply software
running on the firewall, it is a good
Network layer firewalls generally
place to do lots of logging and access
make their decisions based on the
control. Application layer firewalls can
source address, destination address and
be used as network address translators,
ports in individual IP packets. A
since traffic goes in one side and out
simple router is the traditional network
the other.Application layer firewall is a
layer firewall, since it is not able to
firewall operating at the application
make particularly complicated
layer of the networking
decisions about what a packet is
communication. Generally, it is a host
actually talking to or where it actually
using various forms of proxy servers to

Roll No-C07348 5
Firewall Architecture & Types

proxy traffic instead of routing it. As it as the IP addresses and ports involved
works on the application layer, it may in the connection and the sequence
inspect the contents of the traffic, numbers of the packets traversing the
blocking what the firewall connection. The most CPU intensive
administrator views as inappropriate checking is performed at the time of
content, such as certain websites, setup of the connection. All packets
viruses, attempts to exploit known after that (for that session) are
logical flaws in client software, and so processed rapidly because it is simple
forth. and fast to determine whether it
belongs to an existing, pre-screened
A network-based application layer session. Once the session has ended, its
firewall is a computer networking entry in the state-table is discarded.
firewall operating at the application
layer of a protocol stack[1], and are also In order to prevent the state table from
known as a proxy-based or reverse- filling up, sessions will time out if no
proxy firewall. Application firewalls traffic has passed for a certain period.
specific to a particular kind of network These stale connections are removed
traffic may be titled with the service from the state table. Many applications
name, such as a web application therefore send keepalive messages
firewall. They may be implemented periodically in order to stop a firewall
through software running on a host or a from dropping the connection during
stand-alone piece of network hardware. periods of no user-activity, though
Often, it is a host using various forms some firewalls can be instructed to
of proxy servers to proxy traffic before send these messages for applications. It
passing it on to the client or server. is worth noting that the most common
Host-based application firewall can Denial of Service attack on the internet
monitor any application input, output, these days is the SYN flood, where a
and/or system service calls made from, malicious user intentionally sends
to, or by an application. This is done large amounts of SYN packets to the
by examining information passed server in order to overflow its state
through system calls instead of or in table, thus blocking the server from
addition to a network stack. A host- accepting other connections.Many
based application firewall can only stateful firewalls are able to track the
provide protection to the applications state of flows in connectionless
running on the same host.An example protocols, like UDP. Such sessions
of a host-based application firewall usually get the ESTABLISHED state
which controls system service calls by immediately after the first packet is
an application is the Mac OS X seen by the firewall. Sessions in
application firewall.Host-based connectionless protocols can only end
application firewalls may also provide by time-out.
network-based application firewalling.

3.3) STATEFUL FIREWALL

A stateful firewall is able to hold


significant attributes of each
connection in memory, from start to
finish. These attributes, which are
collectively known as the state of the
connection, may include such details

Roll No-C07348 6

Das könnte Ihnen auch gefallen