An Evaluation of Firewall Technologies: Warnock
An Evaluation of Firewall Technologies: Warnock
An Evaluation of Firewall Technologies: Warnock
Warnock
Table of Contents
Table of Contents ................................................................................................................ 2 Executive Summery ............................................................................................................ 3 Introduction ......................................................................................................................... 3 Defense in Depth............................................................................................................. 5 OSI Model ....................................................................................................................... 5 Packet Filtering Firewall ..................................................................................................... 8 Circuit Level Gateways....................................................................................................... 8 Stateful Packet Inspection ............................................................................................... 9 Application Level Gateway .............................................................................................. 10 Stateful Multilevel Inspection ........................................................................................... 11 Conclusion ........................................................................................................................ 13 References ......................................................................................................................... 14
Warnock
Executive Summery
There are four main types of firewall technologies. Packet filtering firewalls are simple and cheap solutions. They provide good security to protect one device, such as a workstation or sever, but can only allow or deny connections by network address or port number. Circuit Level Gateways provide more protection than packet filtering devices and can protect several workstations by hiding the originators network address. They check connections at the session level by checking the handshake before allowing data to be sent. They are well suited to protect a home network. Application level firewalls provide protection for large networks by inspecting the data that passes through the network device. This provides a more complex configuration which can protect better, but requires more resources to implement. The most secure and efficient firewall device is the Stateful Multilayer Inspection firewall. This device implements protection found in the other three types of firewalls, and provides a faster, more efficient way of inspecting data. These devices are the most expensive and complicated to configure. Each device is useful when placed in the proper place on a network. Firewalls must never be used as the only source of security and are just a part of the multi-layer defenses on a network.
Introduction
Firewalls are one of the most popular security devices in any architecture from the personal firewall included with some operating systems (OS) to the array of firewalls used to protect large networks in companies and government organizations. A firewall is used to separate a computer or network from another computer or network by using rules to decide what kind of connections are allowed and what kind should be dropped. While 3
Warnock these devices do not protect against everything, this paper will review four firewall technologies to compare and contrast their functionality, configurability and effectiveness. Figure 1 Network Firewall Location, shows an example of where a network firewall should be located, while Figure 2 Personal Firewall location, shows how a software, or personal firewall, separates the computer from the rest of the internet.
Warnock
Defense in Depth
The true definition of Defense in Depth comes from the military strategy in which you build several layers of defenses to slow an enemy. The Information Assurance (IA) version of defense in depth means creating different levels of network defenses, and not just relying on one particular product, technology or barrier to protect assets. Defense in Depth requires a balance of People, Technology and Operations. The definition of Defense in Depth means that relying on one thing, such as a firewall, or even several firewalls distributed across a network could be detrimental. Each technology has its own benefits but they are only part of the entire network architecture. Also, each firewall technology has different requirements from the people in an organization, the firewall technologies are examples of a range of technologies, and operations are required to be in place, along with firewalls, to keep the network running. Defense in Depth is taken into consideration for each firewall technology.
OSI Model
To better understand how each firewall technology works, you must understand the Open System Interconnection (OSI) reference model. This is a concept by which each task in a network connection, from a piece of software requesting information, to the electrons moving across the country, is separated into 7-layers. These layers include the Application, Presentation, Session, Transport, Network, Data Link and Physical layers. To understand the firewall technologies, you must understand the Application, Session, and Network layers.
Warnock The network layer in the OSI model performs the functions that route packets to certain destinations by their network address. A good example of this is the Internet Protocol (IP) in which each computer has an IP address and other computers on the network use this address to communicate. Each packet will have a source and destination IP address and the network layer uses this information to move packets around a network. After a packet knows where to go in a network, the session must be initiated. The session layer is used by a network system to start and stop the network session. This includes initiating the connection, the handshake and ultimately termination. This layer includes the Transport Control Protocol (TCP). The most high-level layer in the OSI model is the application layer. The application layer is used by software to perform network activity. This is what the user directly works with. Programs like Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP) and other software run on the application layer. Figure 3 Layers of the OSI model, visually describes how each layer stacks, and each piece of data is passed to and from each layer.
Warnock
Figure 3 7 Layers of the OSI model (from The Abdus Salam International Centre for Theoretical Physics http://www.ictp.trieste.it/~radionet/1998_school/networking_presentation/index.html.)
Now that you understand Defense in Depth and the OSI model, you will see how each firewall technology utilizes both.
Warnock
Warnock and checks it against the rules and if it is allowed, the gateway makes the connection to the destination. The destination server sees the connection come from the gateway, not the source computer. No data is transferred until the gateway validates the connection. Then the data is forwarded to the source computer. This adds security by checking for a valid TCP handshake. Unlike Packet Filtering firewalls, IP spoofing is difficult through a Circuit Level Gateway. A Circuit Level Gateway is more secure than Packet Filtering because it only opens the port for an incoming connection after the outgoing connection is made. This prevents unwanted traffic from coming into your network. While Circuit Level Gateways protect against invalid sessions and hides the originator, it still does not protect against certain attacks, which will be discussed later. Network Address Translation (NAT) is an example of a Circuit Level Gateway. NAT hides the IP address of the internal network from the destination host so the destination only sees the IP address of the gateway. It then uses packet filtering to move the packet to the correct originator. Cable modem and DSL routers used in many homes are examples of Circuit Level Gateways.
Warnock
10
Warnock be added to the device. Microsoft Internet Security and Acceleration (ISA) is a good example of an Application Level Gateway.
Warnock Filtering. Application Level Gateways require a lot of resources from people including training, configurations and policy, but the technology itself will protect better than Packet Filtering and Circuit Level Gateways. Following the same trend, Stateful Multilayer Inspection requires the most resources from people, but the technology protects better than any other firewall technology. Operations, including security policy, C&A and security management, must be included with any security configuration and therefore must be included with each firewall technology, but firewalls affect people and technology more than operations. That is why firewalls must never be the only line of defense on a network.
12
Warnock
Conclusion
The most important thing to remember about firewall technologies is that they must be implemented by taking Defense in Depth into consideration. Each firewall technology is the best solution for different applications. The packet filtering firewall is the simplest so it is easy to configure, and is very cheap, but is the least secure. A packet filtering firewall can be used on each device to protect against a mis-configured device somewhere else in the network. A circuit level gateway firewall is also very simple and cheap to implement, but can provide added security to several computers. A circuit level gateway used for NAT can protect a home network, while each computer on the home network can use packet filtering firewalls. An application level firewall is more complicated and more expensive to implement, but provides better security. It is well suited for a large network where one configuration can protect many people and many servers. Packet filtering firewalls can still be installed on each workstation and server for more security. Lastly, a large, diverse network, which requires more protection that a network protected by an application level firewall, is well-suited to be protected by the Stateful Multilayer Inspection device.
13
Warnock
References
Packet Filtering Firewall, National Institute for Standards and Technology, http://csrc.nist.gov/publications/nistpubs/800-10/node55.html, Accessed 2 Jan 2005
What different types are there?, Vicomsoft, http://www.vicomsoft.com/knowledge/reference/firewalls1.html, Accessed 2 Jan 2005
14