110 likes | 221 Vues
Discover the latest in firewall technology and InterCell communication solutions explained by Peter T. Dinsmore of Trusted Information Systems Network Associates Inc. Explore firewall architectures, technologies, features, policies, and more to enhance network security.
E N D
Firewall Technology and InterCell Communication Peter T. Dinsmore Trusted Information Systems Network Associates Inc 3060 Washington Rd (Rt. 97) Glenwood, MD 21738 ptd@tis.com 301-854-5706
Overview • Firewall Background • network architecture • firewall technologies • other features • policies • DCE Communications • Solutions?
What is a Firewall? • Implements a communication policy between two networks • Funnels communications to controlled point • incoming • outgoing • Used to • protect • separate • restrict • log • control
Firewall Firewall ArchitecturesDual Homed Host Network A Network B • firewall typically has addresses for interfaces • may be multi-homed
Firewall Firewall Server Firewall ArchitecturesPerimeter Network/DMZ Network A Perimeter Net/DMZ Network B • server may provide DCE services • server may use DCE services to reach info on Net B
Firewall Technologies • Packet Filtering • based on IP headers, TCP/UDP headers, stateful (or not), appl info • Circuit Gateway • terminates connection • Application Gateway • application knowledge • verifies format • follows protocol • authentication • access control of application functions • logging
Firewall Features • Network Address Translation (NAT) • Address hiding • Virtual Private Networks (VPN) • Content Scanning • virus scanning • integrity • proof of origin
Firewall Policies • “that which is not expressly permitted is denied” • “that which is not expressly denied is permitted” • “all incoming connections are authenticated” • “all incoming traffic is authenticated”
DCE Communications • UDP - no state • Dynamic port allocation • Encrypted traffic • Intrinsic authentication mechanism • Network addresses in protocol messages • Assumption of full network connectivity
Solutions? • Restrict DCE to TCP • Limit port range • VPN • DCE servers on firewall • DCE servers in DMZ • DCE knowledgeable proxies • handle message NAT • listen to ports dynamically • authentication • other access control