Firewall: Hardware Firewalls
Firewall: Hardware Firewalls
Firewall: Hardware Firewalls
Firewalls are essential since they can provide a single block point where
security and auditing can be imposed. Firewalls provide an important
logging and auditing function; often they provide summaries to the
administrator about what type/volume of traffic has been processed through
it. This is an important point since providing this block point can serve the
same purpose (on your network) as an armed guard can (for physical
premises).
Hardware Firewalls
Hardware firewalls can be purchased as a stand-alone product but
more recently hardware firewalls are typically found in broadband
routers, and should be considered an important part of your system
and network set-up, especially for anyone on a broadband
connection. Hardware firewalls can be effective with little or no
configuration, and they can protect every machine on a local network.
Most hardware firewalls will have a minimum of four network ports to
connect other computers, but for larger networks, business
networking firewall solutions are available.
Not all firewalls are created equal, and to this end it is important to
read the manual and documentation that comes with your product.
Additionally the manufacturer's Web site will usually provide a
knowledgebase or FAQ to help you get started. If the terminology is a
bit too tech-oriented, you can also use the Webopedia search to help
you get a better understanding of some of the tech and computer
terms you will encounter while setting up your hardware firewall.
Software Firewalls
For individual home users, the most popular firewall choice is a
software firewall. Software firewalls are installed on your computer
(like any software) and you can customize it; allowing you some
control over its function and protection features. A software firewall
will protect your computer from outside attempts to control or gain
access your computer, and, depending on your choice of software
firewall, it could also provide protection against the most common
Trojan programs or e-mail worms. Many software firewalls have user
defined controls for setting up safe file and printer sharing and to
block unsafe applications from running on your system. Additionally,
software firewalls may also incorporate privacy controls, web filtering
and more. The downside to software firewalls is that they will only
protect the computer they are installed on, not a network, so each
computer will need to have a software firewall installed on it.
Lost or stolen PDAs, laptops, cell phones, USB keys, external hard drives,
CDs, DVDs, etc. For protection against this type of data loss, you will need
a good policy, encryption, and some sort of enterprise
auditing/enforcement. Places that really care about Intellectual Property (IP)
and data loss prevention use USB firewalling technology on their desktops
and systems in public areas. The details are outside the scope of this FAQ.
Another thing a firewall can't really protect you against is traitors or idiots
inside your network. While an industrial spy might export information
through your firewall, he's just as likely to export it through a telephone,
FAX machine, or Compact Disc. CDs are a far more likely means for
information to leak from your organization than a firewall. Firewalls also
cannot protect you against stupidity. Users who reveal sensitive information
over the telephone are good targets for social engineering; an attacker may
be able to break into your network by completely bypassing your firewall, if
he can find a ``helpful'' employee inside who can be fooled into giving
access to a modem pool or desktop through a "remote support" type portal.
Before deciding this isn't a problem in your organization, ask yourself how
much trouble a contractor has getting logged into the network or how much
difficulty a user who forgot his password has getting it reset. If the people on
the help desk believe that every call is internal, you have a problem that can't
be fixed by tightening controls on the firewalls.
Lastly, firewalls can't protect against bad things being allowed through them.
For instance, many Trojan Horses use the Internet Relay Chat (IRC) protocol
to allow an attacker to control a compromised internal host from a public
IRC server. If you allow any internal system to connect to any external
system, then your firewall will provide no protection from this vector of
attack.
WINDOW XP FIREWALL
• Currently not enabled by default
• Enable under Start -> Settings -> Control Panel
• Select Local Area Connection
• Select the Properties button
• Click the “Advanced” tab
• Windows XP firewall
• Updates to Windows XP Firewall
• Will be enabled in default installations of Windows XP Service Pack 2
• Ports will be closed except when they are in use
• Improved user interface for easier configuration
• Improved application compatibility when firewall is enabled
TYPES OF FIREWALL:
1.PACKET FILTERS
2.APPLICATION GATEWAY
A packet filter has a set of rules with accept or deny actions. When the
packet filter receives a packet of information, the filter compares the packet
to your pre-configured rule set. At the first match, the packet filter either
accepts or denies the packet of information. Most packet filters have an
implicit deny all rule at the bottom of the rules file.
All packet filters have a common problem: the trust is based on IP addresses.
Although this security type is not sufficient for an entire network, this type
of security is acceptable on a component level.
Most IP packet filters are stateless, which means they do not remember
anything about the packets they previously process. A packet filter with state
can keep some information about previous traffic, which gives you the
ability to configure that only replies to requests from the internal network
are allowed from the Internet. Stateless packet filters are vulnerable to
spoofing since the source IP address and ACK bit in the packet's header can
be easily forged by attackers.
2.APPLICATION GATEWAY:
Application layer firewalls defined, are hosts running proxy servers, which
permit no traffic directly between networks, and they perform elaborate
logging and examination of traffic passing through them. Since proxy
applications are simply software running on the firewall, it is a good place to
do lots of logging and access control. Application layer firewalls can be used
as network address translators, since traffic goes in one side and out the
other, after having passed through an application that effectively masks the
origin of the initiating connection, Chris Partsenidis says.
The future of firewalls sits somewhere between both network layer firewalls
and application layer firewalls. It is likely that network layer firewalls will
become increasingly aware of the information going through them, and
application layer firewalls will become more and more transparent. The end
result will be kind of a fast packet-screening system that logs and checks
data as it passes through.
This has two major advantages. Firstly, no direct communication is allowed
between outside sources and computers behind the firewall, since everything
must first pass through a proxy, and secondly, filtering can now be done
using the actual content of the data, as opposed to just where it came from
and where it's going.
For example, using an application level gateway firewall, you can not only
control which computers inside your network can access internet web pages
, but also specify which web pages they are allowed to view, since the proxy
for HTTP can read the contents of the data sent from a web server and check
for restricted websites.
Circuit level gateways work at the session layer of the OSI model, or as a
"shim-layer" between the application layer and the transport layer of the
TCP/IP stack. They monitor TCP handshaking between packets to determine
whether a requested session is legitimate. Information passed to a remote
computer through a circuit level gateway appears to have originated from the
gateway. This is useful for hiding information about protected networks.
Circuit level gateways are relatively inexpensive and have the advantage of
hiding information about the private network they protect. On the other
hand, they do not filter individual packets. As an example of how circuit
level gateways work, say computer A is in a network protected by a circuit
level gateway firewall
, and wants to view a web page on computer B which is outside the firewall.
Computer A sends the request for the web page to computer B, which is
intercepted and recorded by the firewall before being passed on. Computer B
receives the request, which as far as it is concerned came from the address of
the firewall, and starts sending the web-page data back across the Internet.
When it reaches the firewall, it is compared to computer A's request to see if
the IP address and the port match up, then the data is either allowed or
dropped.
4.PROXY SERVER:
In computer networks, a proxy server is a server (a computer system or an
application program) that acts as an intermediary for requests from clients
seeking resources from other servers. A client connects to the proxy server,
requesting some service, such as a file, connection, web page, or other
resource, available from a different server. The proxy server evaluates the
request according to its filtering rules. For example, it may filter traffic by IP
address or protocol. If the request is validated by the filter, the proxy
provides the resource by connecting to the relevant server and requesting the
service on behalf of the client. A proxy server may optionally alter the
client's request or the server's response, and sometimes it may serve the
request without contacting the specified server. In this case, it 'caches'
responses from the remote server, and returns subsequent requests for the
same content directly.
A proxy server that passes requests and replies unmodified is usually called
a gateway or sometimes tunneling proxy.
A proxy server can be placed in the user's local computer or at various points
between the user and the destination servers on the Internet.
Because of the popularity of this technique (see below), the term NAT has
become virtually synonymous with the method of IP masquerading.
The benefits of using a firewall are immense for an organization and that is
why it is in such great demand. There are many different levels of
configuration possible with firewalls and any organization using them would
require trained IT employees to oversee and maintain them.
When we talk about computers at home, the firewall used is not as complex
as that used in an organization. Here the firewall just has to protect your
home PC and network from malicious software like viruses and spyware. A
firewall on your home computer does not allow traffic to enter or go out
other than what has been programmed. So, if a program entering your
computer is infected with virus and does not conform to the preset criteria
stipulated on your firewall, it will block it.
DISADVATAGES OF USING
FIREWALL:
Firewalls evolve due to cracker's ability to circumvent them increases.
Some firewalls claim full firewall capability when it's not the case. Not
all firewalls are created equally or offer the same protection so it's up to
the user to do their homework.
Cost varies. There are some great free firewalls available to the PC User
but there are also a few highly recommended products, which can only be
purchased. The difference may be just the amount of support or features
that a User can get from a free product as opposed to a paid one and how
much support that user thinks he or she will require.