SlideShare a Scribd company logo
Data Security in LAN using
Distributed Firewall
1
Presented by
Sabreen Irfana
GMIT
Guided by:
Mr. Santosh Kumar
B.E ,M Tech
Asst prof ,Dept ISE
GMIT
Abstract
 Computer and networking have become inseparable
now .
 A number of confidential transaction occur every
second and today computers are used mostly for
transaction rather than processing of data, so Data
security is needed to prevent hacking of data and to
provide authenticated data transfer
2
.Contd
 Data security can be achieved by Firewall
 Conventional firewall relay on the notion of restricted
topology and controlled entry point
 Restricting the network topology difficult in filtering
certain protocols, expanding network and few more
problems leads to the evolution of DISTRIBUTED
FIREWALL
3
Contents
 Introduction to Security and Firewalls
 Problems with traditional Firewalls
 Distributed Firewall Concept
 Distributed Firewall Implementation
 Conclusions
4
Firewalls
 Firewall is a device or set of instruments designed to permit
or deny network transmissions based upon a set of rules and
regulations which are frequently used to protect networks from
unauthorized access
 In most systems today, the firewall is the software that
implements the “security policy” for a system
 A firewall is typically placed at the edge of a system and acts
as a filter for unauthorized traffic
5
Security Policy
 A “security policy” defines the security rules of a system.
 Without a defined security policy, there is no way to know
what access is allowed or disallowed
 An example policy: (simple)
◦ Allow all connections to the web server
◦ Deny all other access
6
Firewall Example
7
Internet
Company 2
Company 4
Company 1
Company 3
Firewall
FirewallFirewall
Firewall
Firewall Drawbacks
 Traditional Firewalls uses restricted topology of the network
 Donot protect networks from internal attack
 Certain protocols (FTP, Real-Audio) are difficult for
firewalls to process
 Assumes inside users are “trusted”
 single points of access make firewalls hard to manage
8
.contd
1.Restricted topology
9
.contd
2 .Assumes inside users are trusted
10
.contd
3.Single point of failure or access
11
.Data security Threats
 IP Spoofing or IP masquerading
12
A
10.10.10.1
B
134.117.1.60
B
10.10.10.1
Src_IP
134.117.1.60
dst_IP
Any (>1024)
Src_port
80
dst_port
11.11.11.1
Src_IP
134.117.1.60
dst_IP
Any (>1024)
Src_port
80
dst_port
spoofed
.cont IP spoofing
13
sender
victim
partner
Oh, my partner
sent me a packet.
I’ll process this.
impersonation
.contd
 Session hijacking
14
contd
 Denial of service(DOS)
15
Distributed Firewall Concept
 Destributed firewall is a mechanism to enforce a network
domain security policy through the use of policy language
 Security policy is defined centrally
 Enforcement of policy is done by network endpoint(s) where
is the hackers try to penetrate
16
.contd
 It filters traffic from both the internal and internet
network
 They overcome the single point of failure concept
17
18
Architecture of Distributed
Firewalls
The whole distributed firewall system consists of four
main parts:
I. The management center
II. Policy actuator:
III. Remote endpoint connectors
IV. Log server
19
.contd
20
PBNA System
Policy Based Network Management System
21
Standard Firewall Example
22
Corporate Network
Corporate
Firewall
Internet
InternalExternal
External
Host
Internal
Host
1
Internal
Host
2
(untrusted)
Webserver
Intranet
Webserver
(company
private)
Standard Firewall Example
Connection to web server
23
Corporate Network
Corporate
Firewall
Internet
InternalExternal
External
Host
Internal
Host
1
Internal
Host
2
(untrusted)
Webserver
Intranet
Webserver
(company
private)
Standard Firewall Example
Connection to intranet
24
Corporate Network
Corporate
Firewall
Internet
InternalExternal
External
Host
Internal
Host
1
Internal
Host
2
(untrusted)
Webserver
Intranet
Webserver
(company
private)
blocked by
firewall connection
allowed,
but should
not be
Distributed Firewall Example
25
Corporate NetworkInternet
InternalExternal
External
Host
Internal
Host
1
Internal
Host
2
(untrusted)
Webserver
Intranet
Webserver
(company
private)
Internal
Host
(telecommuting)
Distributed Firewall Example to
web server
26
Corporate NetworkInternet
InternalExternal
External
Host
Internal
Host
1
Internal
Host
2
(untrusted)
Webserver
Intranet
Webserver
(company
private)
Internal
Host
(telecommuting)
Distributed Firewall Example to
intranet
27
Corporate NetworkInternet
InternalExternal
External
Host
Internal
Host
1
Internal
Host
2
(untrusted)
Webserver
Intranet
Webserver
(company
private)
Internal
Host
(telecommuting)
Components of Distributed
Firewalls
28
A Distributed Firewall is a mechanism to enforce a network domain
security policy through the use of the following:
 Policy Language
 Policy Distributed Scheme
 Certificates
.contd
29
Policy language
 The Policy language is used to create policies for each firewall.
 These policies are the collection of rules, which guides the firewall
for evaluating the network traffic. It also defines which
inbound and outbound connections on any component
of the network policy domain are allowed.
.contd
30
Policy Distribution Scheme
 The policy distribution scheme should guarantee the integrity
of the policy during transfer.
 This policy is consulted before processing the incoming or
outgoing messages.
 The distribution of the policy can be different and varies with
the implementation. It can be either directly pushed to end systems ,
or pulled when necessary
.contd
31
Certificates
 There may be the chance of using IP address for the
host identification by the distributed firewalls.
 But a mechanism of security is more important.
 It is preferred to use certificate to identify hosts.
 IPSec provides cryptographic certificates. Unlike IP address,
which can be easily spoofed, the digital certificate is much more
secure and the authentication of the certificate is not easily
forged. Policies are distributed by means of these
Advantages
32
1. Provides security for internet and intranet
2. Multiple access points
3. Insiders are no longer trusted
4. Security policy rules are distributed and established on
needed basis
5 End to End can be easily done and filtering packets is easy
Disadvantage
33
1. Compliance of the security policy for insiders is one of the
major issues of the distributed firewalls. This problem
especially occurs when each ending host have the right of
changing security policy. There can be some techniques to
make modifying policies harder but it is not totally impossible
to prevent it.
2 It is not so easy to implement an intrusion detection system in
a distributed firewall environment. It is possible to log
suspicious connections on local server but these logs need to
be collected and analyzed by security experts in central service
Distributed Firewall
implementation..
 Language to express policies and resolving requests
(KeyNote system)
 Using keynode and Ipsec allows control of mixed level
policies where authentication mechanism is applied
through public key cryptography
34
KeyNote
 A language to describe security policies (RFC 2704)
 Fields :
◦ KeyNote Version – Must be first field, if present
◦ Authorizer – Mandatory field, identifies the issuer of the assertion
◦ Comment
◦ Conditions – The conditions under which the Authorizer trusts the Licensee
◦ Licensees – Identifies the authorized, should be public key, but can be IP address
◦ Signature – Must be last, if present
 All field names are case-insensitive
35
KeyNote Example 1
36
KeyNote Example 2
37
KeyNote-Version: 2
Authorizer: “rsa-hex:1023abcd”
Licensee: “IP:158.130.6.141”
Conditions: (@remote_port < 1024 &&
@local_port == 22 ) -> “true”;
Signature: “rsa-sha1-hex:bee11984”
Note that this credential delegates to an IP address,
Application interaction with
keyNote
38
Example of Connection to a
Distributed Firewall
local host security policy:
KeyNote-Version: 2
Authorizer: “POLICY”
Licensees: ADMINISTRATIVE_KEY
Assumes an IPSEC SA between hosts
39
Example of Connection to a
Distributed Firewall
KeyNote-Version: 2
Authorizer: ADMINISTRATIVE_KEY
Licensees: USER_KEY
Conditions:
(app_domain == "IPsec policy" &&
encryption_algorithm == “yes" &&
local_address == "158.130.006.141")
-> "true";
(app_domain == "Distributed Firewall" &&
@local_port == 23 &&
encrypted == "yes" &&
authenticated == "yes") -> "true";
Signature: ...
40
Example of Connection to a
Distributed Firewall
41
source
local host
158.130.6.141
(running Policy
Daemon)
IPSEC SA
TCP connect (23)
context created
local port=23
encrypted="yes"
authenticated="yes"
Policy Daemon
checks context
vs.
credential
continue TCP
session
Returns TRUE
Conclusions
 Distributed firewalls allows the network security policy
to remain under control of the system administrators
 Insiders may no longer be unconditionally treated as
“trusted”
 Does not completely eliminate the need for traditional
firewalls
 More research is needed in this area to increase
robustness, efficiency,
42
Future Work
 High quality administration tools NEED to exist for
distributed firewalls to be accepted
 Allow per-packet scanning as opposed to per-connection
scanning
 Policy updating
43
References
 [1] Sotiris Ioannidis, Angelos D. Keromytis, Steve M. Bellovin, Jonathan
M. Smith, “Implementing a Distributed Firewall”, CCS ’00,Athens,
Greece.
 [2] Steven M. Bellovin, “Distributed Firewalls”, November 1999 issue of;
login: pp. 37-39.
 [3] W. R. Cheswick and S. M. Bellovin. “Firewalls and Internet Security”:
Repelling the Wily Hacker. Addison-Wesley, 1994.
 [4] [Robert Stepanek, “Distributed Firewalls”, rost@cc.hut.fi, T-110.501
Seminar on Network Security, HUT TML 2001.
 [5] Dr. Mostafa Hassan Dahshan “Security and Internet Protocol”,
Computer Engineering
44
45

More Related Content

What's hot (20)

PPT
key distribution in network security
babak danyal
 
PPT
Secure shell ppt
sravya raju
 
PDF
4 (data security in local network using)
JIEMS Akkalkuwa
 
PPTX
Network security and cryptography
Pavithra renu
 
PPT
Snmp
hetaljadav
 
PPTX
Encryption.ppt
reshmy12
 
PPT
Vpn presentation
Kuldeep Padhiyar
 
PPTX
Cryptography
subodh pawar
 
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
PPTX
Hash Function
Siddharth Srivastava
 
PPT
Email Security : PGP & SMIME
Rohit Soni
 
PPTX
Security services and mechanisms
Rajapriya82
 
PPTX
Network Security- Secure Socket Layer
Dr.Florence Dayana
 
PPTX
Firewall in Network Security
lalithambiga kamaraj
 
PPTX
Data Acquisition
primeteacher32
 
PPT
Data Security in Local Area Network Using Distributed Firewall
Manish Kumar
 
PPTX
Firewall presentation
gaurav96raj
 
PPT
Fundamentals of cryptography
Hossain Md Shakhawat
 
PPTX
Virtual Private Network VPN
Farah M. Altufaili
 
PPTX
System security
sommerville-videos
 
key distribution in network security
babak danyal
 
Secure shell ppt
sravya raju
 
4 (data security in local network using)
JIEMS Akkalkuwa
 
Network security and cryptography
Pavithra renu
 
Encryption.ppt
reshmy12
 
Vpn presentation
Kuldeep Padhiyar
 
Cryptography
subodh pawar
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Hash Function
Siddharth Srivastava
 
Email Security : PGP & SMIME
Rohit Soni
 
Security services and mechanisms
Rajapriya82
 
Network Security- Secure Socket Layer
Dr.Florence Dayana
 
Firewall in Network Security
lalithambiga kamaraj
 
Data Acquisition
primeteacher32
 
Data Security in Local Area Network Using Distributed Firewall
Manish Kumar
 
Firewall presentation
gaurav96raj
 
Fundamentals of cryptography
Hossain Md Shakhawat
 
Virtual Private Network VPN
Farah M. Altufaili
 
System security
sommerville-videos
 

Viewers also liked (20)

PDF
Approach of Data Security in Local Network Using Distributed Firewalls
International Journal of Science and Research (IJSR)
 
PPT
Firewall
Amuthavalli Nachiyar
 
PPT
FireWall
rubal_9
 
PPTX
Firewall presentation
yogendrasinghchahar
 
PDF
NoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQL
DATAVERSITY
 
PPTX
network security, group policy and firewalls
Sapna Kumari
 
PPT
Lecture 4 firewalls
rajakhurram
 
PPTX
Fogscreen
Sovan Misra
 
PPTX
Mobile Ad hoc Networks
Jagdeep Singh
 
PPTX
Wi Vi technology
Liju Thomas
 
DOC
Firewall
Apo
 
PPTX
Introduction of firewall slides
rahul kundu
 
ODP
Building Secure Open & Distributed Social Networks
Henry Story
 
PDF
Barbed Wire Network Security Policy 27 June 2005 7
Khawar Nehal [email protected]
 
PDF
Length Frequency Distribution of (Chrysichthys nigrodigitatus) (Lecepede, 180...
International Journal of Science and Research (IJSR)
 
PDF
Key Policy Considerations When Implementing Next-Generation Firewalls
AlgoSec
 
PPT
Network Security Through FIREWALL
TheCreativedev Blog
 
PPT
Rob livingstone Canberra Cloud Security Conference Nov 2011
Livingstone Advisory
 
PPTX
what is data security full ppt
Shahbaz Khan
 
PPTX
BIG-IP Data Center Firewall Solution
F5 Networks
 
Approach of Data Security in Local Network Using Distributed Firewalls
International Journal of Science and Research (IJSR)
 
FireWall
rubal_9
 
Firewall presentation
yogendrasinghchahar
 
NoSQL Now! Webinar Series: Migrating Security Policies from SQL to NoSQL
DATAVERSITY
 
network security, group policy and firewalls
Sapna Kumari
 
Lecture 4 firewalls
rajakhurram
 
Fogscreen
Sovan Misra
 
Mobile Ad hoc Networks
Jagdeep Singh
 
Wi Vi technology
Liju Thomas
 
Firewall
Apo
 
Introduction of firewall slides
rahul kundu
 
Building Secure Open & Distributed Social Networks
Henry Story
 
Barbed Wire Network Security Policy 27 June 2005 7
Khawar Nehal [email protected]
 
Length Frequency Distribution of (Chrysichthys nigrodigitatus) (Lecepede, 180...
International Journal of Science and Research (IJSR)
 
Key Policy Considerations When Implementing Next-Generation Firewalls
AlgoSec
 
Network Security Through FIREWALL
TheCreativedev Blog
 
Rob livingstone Canberra Cloud Security Conference Nov 2011
Livingstone Advisory
 
what is data security full ppt
Shahbaz Khan
 
BIG-IP Data Center Firewall Solution
F5 Networks
 
Ad

Similar to Data security in local network using distributed firewall ppt (20)

PDF
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET Journal
 
PDF
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET Journal
 
PPTX
Network and internet security
Kaviya452563
 
PPT
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
gocokir267
 
PPTX
Using distributed firewalls in securing LANs
ANTHONY C. OKIGBO
 
PPTX
Using distributed firewalls in securing LANs
ANTHONY C. OKIGBO
 
PDF
A firewall is an important and necessary part of that security, but cannot be...
psenthilkumarshadan
 
PDF
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
IJIR JOURNALS IJIRUSA
 
PPTX
FIREWALLS BY SAIKIRAN PANJALA
Saikiran Panjala
 
PDF
Guide to Firewalls and VPNs 3rd Edition Whitman Test Bank
rendestelve
 
PDF
Paper id 24201492
IJRAT
 
PPT
Firewalls
junaid15bsse
 
PDF
We live in the earh seventy or eight years
AyalewWakeyo1
 
PDF
shivam sahu (firewall).pdfb jndvhjfvhjjf
sahushivam4928
 
PDF
ML13198A410.pdf
ParvezAhmed59842
 
PDF
ML13198A410.pdf
KalsoomTahir2
 
PDF
ML13198A410.pdf
ParasPatel967737
 
PPT
firewall.ppt
ssuser530a07
 
PPTX
Firewall ppt.pptx
BhushanLokhande12
 
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET Journal
 
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET Journal
 
Network and internet security
Kaviya452563
 
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
gocokir267
 
Using distributed firewalls in securing LANs
ANTHONY C. OKIGBO
 
Using distributed firewalls in securing LANs
ANTHONY C. OKIGBO
 
A firewall is an important and necessary part of that security, but cannot be...
psenthilkumarshadan
 
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
IJIR JOURNALS IJIRUSA
 
FIREWALLS BY SAIKIRAN PANJALA
Saikiran Panjala
 
Guide to Firewalls and VPNs 3rd Edition Whitman Test Bank
rendestelve
 
Paper id 24201492
IJRAT
 
Firewalls
junaid15bsse
 
We live in the earh seventy or eight years
AyalewWakeyo1
 
shivam sahu (firewall).pdfb jndvhjfvhjjf
sahushivam4928
 
ML13198A410.pdf
ParvezAhmed59842
 
ML13198A410.pdf
KalsoomTahir2
 
ML13198A410.pdf
ParasPatel967737
 
firewall.ppt
ssuser530a07
 
Firewall ppt.pptx
BhushanLokhande12
 
Ad

Recently uploaded (20)

PDF
Design Thinking basics for Engineers.pdf
CMR University
 
PDF
Electrical Engineer operation Supervisor
ssaruntatapower143
 
PPTX
澳洲电子毕业证澳大利亚圣母大学水印成绩单UNDA学生证网上可查学历
Taqyea
 
PPT
Footbinding.pptmnmkjkjkknmnnjkkkkkkkkkkkkkk
mamadoundiaye42742
 
PDF
SERVERLESS PERSONAL TO-DO LIST APPLICATION
anushaashraf20
 
PPTX
Mechanical Design of shell and tube heat exchangers as per ASME Sec VIII Divi...
shahveer210504
 
DOCX
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
PPTX
Water Resources Engineering (CVE 728)--Slide 3.pptx
mohammedado3
 
PPTX
How Industrial Project Management Differs From Construction.pptx
jamespit799
 
PDF
AN EMPIRICAL STUDY ON THE USAGE OF SOCIAL MEDIA IN GERMAN B2C-ONLINE STORES
ijait
 
PPTX
Introduction to Design of Machine Elements
PradeepKumarS27
 
PDF
AI TECHNIQUES FOR IDENTIFYING ALTERATIONS IN THE HUMAN GUT MICROBIOME IN MULT...
vidyalalltv1
 
PDF
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
PDF
20ES1152 Programming for Problem Solving Lab Manual VRSEC.pdf
Ashutosh Satapathy
 
PPTX
fatigue in aircraft structures-221113192308-0ad6dc8c.pptx
aviatecofficial
 
PPT
Carmon_Remote Sensing GIS by Mahesh kumar
DhananjayM6
 
PPTX
VITEEE 2026 Exam Details , Important Dates
SonaliSingh127098
 
PDF
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
PPTX
Worm gear strength and wear calculation as per standard VB Bhandari Databook.
shahveer210504
 
PPTX
DATA BASE MANAGEMENT AND RELATIONAL DATA
gomathisankariv2
 
Design Thinking basics for Engineers.pdf
CMR University
 
Electrical Engineer operation Supervisor
ssaruntatapower143
 
澳洲电子毕业证澳大利亚圣母大学水印成绩单UNDA学生证网上可查学历
Taqyea
 
Footbinding.pptmnmkjkjkknmnnjkkkkkkkkkkkkkk
mamadoundiaye42742
 
SERVERLESS PERSONAL TO-DO LIST APPLICATION
anushaashraf20
 
Mechanical Design of shell and tube heat exchangers as per ASME Sec VIII Divi...
shahveer210504
 
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
Water Resources Engineering (CVE 728)--Slide 3.pptx
mohammedado3
 
How Industrial Project Management Differs From Construction.pptx
jamespit799
 
AN EMPIRICAL STUDY ON THE USAGE OF SOCIAL MEDIA IN GERMAN B2C-ONLINE STORES
ijait
 
Introduction to Design of Machine Elements
PradeepKumarS27
 
AI TECHNIQUES FOR IDENTIFYING ALTERATIONS IN THE HUMAN GUT MICROBIOME IN MULT...
vidyalalltv1
 
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
20ES1152 Programming for Problem Solving Lab Manual VRSEC.pdf
Ashutosh Satapathy
 
fatigue in aircraft structures-221113192308-0ad6dc8c.pptx
aviatecofficial
 
Carmon_Remote Sensing GIS by Mahesh kumar
DhananjayM6
 
VITEEE 2026 Exam Details , Important Dates
SonaliSingh127098
 
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
Worm gear strength and wear calculation as per standard VB Bhandari Databook.
shahveer210504
 
DATA BASE MANAGEMENT AND RELATIONAL DATA
gomathisankariv2
 

Data security in local network using distributed firewall ppt

  • 1. Data Security in LAN using Distributed Firewall 1 Presented by Sabreen Irfana GMIT Guided by: Mr. Santosh Kumar B.E ,M Tech Asst prof ,Dept ISE GMIT
  • 2. Abstract  Computer and networking have become inseparable now .  A number of confidential transaction occur every second and today computers are used mostly for transaction rather than processing of data, so Data security is needed to prevent hacking of data and to provide authenticated data transfer 2
  • 3. .Contd  Data security can be achieved by Firewall  Conventional firewall relay on the notion of restricted topology and controlled entry point  Restricting the network topology difficult in filtering certain protocols, expanding network and few more problems leads to the evolution of DISTRIBUTED FIREWALL 3
  • 4. Contents  Introduction to Security and Firewalls  Problems with traditional Firewalls  Distributed Firewall Concept  Distributed Firewall Implementation  Conclusions 4
  • 5. Firewalls  Firewall is a device or set of instruments designed to permit or deny network transmissions based upon a set of rules and regulations which are frequently used to protect networks from unauthorized access  In most systems today, the firewall is the software that implements the “security policy” for a system  A firewall is typically placed at the edge of a system and acts as a filter for unauthorized traffic 5
  • 6. Security Policy  A “security policy” defines the security rules of a system.  Without a defined security policy, there is no way to know what access is allowed or disallowed  An example policy: (simple) ◦ Allow all connections to the web server ◦ Deny all other access 6
  • 7. Firewall Example 7 Internet Company 2 Company 4 Company 1 Company 3 Firewall FirewallFirewall Firewall
  • 8. Firewall Drawbacks  Traditional Firewalls uses restricted topology of the network  Donot protect networks from internal attack  Certain protocols (FTP, Real-Audio) are difficult for firewalls to process  Assumes inside users are “trusted”  single points of access make firewalls hard to manage 8
  • 10. .contd 2 .Assumes inside users are trusted 10
  • 11. .contd 3.Single point of failure or access 11
  • 12. .Data security Threats  IP Spoofing or IP masquerading 12 A 10.10.10.1 B 134.117.1.60 B 10.10.10.1 Src_IP 134.117.1.60 dst_IP Any (>1024) Src_port 80 dst_port 11.11.11.1 Src_IP 134.117.1.60 dst_IP Any (>1024) Src_port 80 dst_port spoofed
  • 13. .cont IP spoofing 13 sender victim partner Oh, my partner sent me a packet. I’ll process this. impersonation
  • 15. contd  Denial of service(DOS) 15
  • 16. Distributed Firewall Concept  Destributed firewall is a mechanism to enforce a network domain security policy through the use of policy language  Security policy is defined centrally  Enforcement of policy is done by network endpoint(s) where is the hackers try to penetrate 16
  • 17. .contd  It filters traffic from both the internal and internet network  They overcome the single point of failure concept 17
  • 18. 18
  • 19. Architecture of Distributed Firewalls The whole distributed firewall system consists of four main parts: I. The management center II. Policy actuator: III. Remote endpoint connectors IV. Log server 19
  • 21. PBNA System Policy Based Network Management System 21
  • 22. Standard Firewall Example 22 Corporate Network Corporate Firewall Internet InternalExternal External Host Internal Host 1 Internal Host 2 (untrusted) Webserver Intranet Webserver (company private)
  • 23. Standard Firewall Example Connection to web server 23 Corporate Network Corporate Firewall Internet InternalExternal External Host Internal Host 1 Internal Host 2 (untrusted) Webserver Intranet Webserver (company private)
  • 24. Standard Firewall Example Connection to intranet 24 Corporate Network Corporate Firewall Internet InternalExternal External Host Internal Host 1 Internal Host 2 (untrusted) Webserver Intranet Webserver (company private) blocked by firewall connection allowed, but should not be
  • 25. Distributed Firewall Example 25 Corporate NetworkInternet InternalExternal External Host Internal Host 1 Internal Host 2 (untrusted) Webserver Intranet Webserver (company private) Internal Host (telecommuting)
  • 26. Distributed Firewall Example to web server 26 Corporate NetworkInternet InternalExternal External Host Internal Host 1 Internal Host 2 (untrusted) Webserver Intranet Webserver (company private) Internal Host (telecommuting)
  • 27. Distributed Firewall Example to intranet 27 Corporate NetworkInternet InternalExternal External Host Internal Host 1 Internal Host 2 (untrusted) Webserver Intranet Webserver (company private) Internal Host (telecommuting)
  • 28. Components of Distributed Firewalls 28 A Distributed Firewall is a mechanism to enforce a network domain security policy through the use of the following:  Policy Language  Policy Distributed Scheme  Certificates
  • 29. .contd 29 Policy language  The Policy language is used to create policies for each firewall.  These policies are the collection of rules, which guides the firewall for evaluating the network traffic. It also defines which inbound and outbound connections on any component of the network policy domain are allowed.
  • 30. .contd 30 Policy Distribution Scheme  The policy distribution scheme should guarantee the integrity of the policy during transfer.  This policy is consulted before processing the incoming or outgoing messages.  The distribution of the policy can be different and varies with the implementation. It can be either directly pushed to end systems , or pulled when necessary
  • 31. .contd 31 Certificates  There may be the chance of using IP address for the host identification by the distributed firewalls.  But a mechanism of security is more important.  It is preferred to use certificate to identify hosts.  IPSec provides cryptographic certificates. Unlike IP address, which can be easily spoofed, the digital certificate is much more secure and the authentication of the certificate is not easily forged. Policies are distributed by means of these
  • 32. Advantages 32 1. Provides security for internet and intranet 2. Multiple access points 3. Insiders are no longer trusted 4. Security policy rules are distributed and established on needed basis 5 End to End can be easily done and filtering packets is easy
  • 33. Disadvantage 33 1. Compliance of the security policy for insiders is one of the major issues of the distributed firewalls. This problem especially occurs when each ending host have the right of changing security policy. There can be some techniques to make modifying policies harder but it is not totally impossible to prevent it. 2 It is not so easy to implement an intrusion detection system in a distributed firewall environment. It is possible to log suspicious connections on local server but these logs need to be collected and analyzed by security experts in central service
  • 34. Distributed Firewall implementation..  Language to express policies and resolving requests (KeyNote system)  Using keynode and Ipsec allows control of mixed level policies where authentication mechanism is applied through public key cryptography 34
  • 35. KeyNote  A language to describe security policies (RFC 2704)  Fields : ◦ KeyNote Version – Must be first field, if present ◦ Authorizer – Mandatory field, identifies the issuer of the assertion ◦ Comment ◦ Conditions – The conditions under which the Authorizer trusts the Licensee ◦ Licensees – Identifies the authorized, should be public key, but can be IP address ◦ Signature – Must be last, if present  All field names are case-insensitive 35
  • 37. KeyNote Example 2 37 KeyNote-Version: 2 Authorizer: “rsa-hex:1023abcd” Licensee: “IP:158.130.6.141” Conditions: (@remote_port < 1024 && @local_port == 22 ) -> “true”; Signature: “rsa-sha1-hex:bee11984” Note that this credential delegates to an IP address,
  • 39. Example of Connection to a Distributed Firewall local host security policy: KeyNote-Version: 2 Authorizer: “POLICY” Licensees: ADMINISTRATIVE_KEY Assumes an IPSEC SA between hosts 39
  • 40. Example of Connection to a Distributed Firewall KeyNote-Version: 2 Authorizer: ADMINISTRATIVE_KEY Licensees: USER_KEY Conditions: (app_domain == "IPsec policy" && encryption_algorithm == “yes" && local_address == "158.130.006.141") -> "true"; (app_domain == "Distributed Firewall" && @local_port == 23 && encrypted == "yes" && authenticated == "yes") -> "true"; Signature: ... 40
  • 41. Example of Connection to a Distributed Firewall 41 source local host 158.130.6.141 (running Policy Daemon) IPSEC SA TCP connect (23) context created local port=23 encrypted="yes" authenticated="yes" Policy Daemon checks context vs. credential continue TCP session Returns TRUE
  • 42. Conclusions  Distributed firewalls allows the network security policy to remain under control of the system administrators  Insiders may no longer be unconditionally treated as “trusted”  Does not completely eliminate the need for traditional firewalls  More research is needed in this area to increase robustness, efficiency, 42
  • 43. Future Work  High quality administration tools NEED to exist for distributed firewalls to be accepted  Allow per-packet scanning as opposed to per-connection scanning  Policy updating 43
  • 44. References  [1] Sotiris Ioannidis, Angelos D. Keromytis, Steve M. Bellovin, Jonathan M. Smith, “Implementing a Distributed Firewall”, CCS ’00,Athens, Greece.  [2] Steven M. Bellovin, “Distributed Firewalls”, November 1999 issue of; login: pp. 37-39.  [3] W. R. Cheswick and S. M. Bellovin. “Firewalls and Internet Security”: Repelling the Wily Hacker. Addison-Wesley, 1994.  [4] [Robert Stepanek, “Distributed Firewalls”, [email protected], T-110.501 Seminar on Network Security, HUT TML 2001.  [5] Dr. Mostafa Hassan Dahshan “Security and Internet Protocol”, Computer Engineering 44
  • 45. 45