Firewalls
The Security Device
They do not filter all traffic
Firewall Types
Stateless – Do not inspect traffic. Packet filtering only.
Stateful – Inspects traffic and follows rules. SRC IP, SRC Port, DST IP, DST Port. Keeps dynamic rule until TCP connection closes.
UTM (Unified Threat Management) – Stateful firewall + higher OSI layer security functions. IPS, AV, URL filtering, DLP, etc.
Proxy – MITM. Allows the firewall to look at traffic.
NGFW – Application aware firewalls
Where to place your firewall? Multi homed device.
Inside zone (LAN)
Outside zone(WAN)
DMZ zone (web servers, mail servers, etc)
Firewall Rules
ACLs (Access Control Lists)
List of entries
Each entry describes traffic and an action
ACL Filtering Criteria
By IP address
Bogon filtering. Filters bogus IP addresses (loopback, private Ips from the internet, multicast, etc)
By protocol
By application
By flags, fragments, etc
ACL actions
Accept
Reject
Drop
Implicit Deny (deny any any)
Applying firewall rules
Traditional, ingress filtering. Filtering traffic coming in.
Egress filtering. Blocking traffic out.
Block C&C (C2) traffic
Block access to malware sites
Block IP addresses or domains based on reputation
Block outside access from high-security networks
Firewalking – Techniques for testing firewall rules, looking for unpatched holes.
TTL (time to live). Decrements by 1 every hop count. When it hits 0, sends a ICMP time exceeded message. This message lets an attacker know that IP address is reachable. ICMP message code 11.
Last updated