Access Control, Firewalls and VPNs

Diomidis Spinellis
Department of Management Science and Technology
Athens University of Economics and Business
Athens, Greece
dds@aueb.gr

Hardware-based Access Control

Operating System Access Control

Firewall Purpose

Security Strategies

Security by Obscurity

Not effective when it: Valid when it:

Firewall Limitations

A firewall can not protect against:

Firewall Technologies

How Packet Filtering Works

Evaluation of Packet Filtering

Basic Packet Filtering

Other Service Packet Filtering

IP Packet Filtering

Block:

How Proxying Works

Evaluation of Proxying

How Network Address Translation Works

NAT Example

Packets Inside the NAT

14:59:13.710291 eagle.spinellis.gr.1112 > istlab.dmst.aueb.gr.http:
 S 3678001010:3678001010(0) win 64240 <mss 1460,nop,nop,sackOK> (DF)

14:59:13.810853 istlab.dmst.aueb.gr.http > eagle.spinellis.gr.1112:
 S 881432074:881432074(0) ack 3678001011 win 57344 <mss 1460> (DF)

Packets on the Internet

14:59:13.725267 nat.spinellis.gr.1112 > istlab.dmst.aueb.gr.http:
 S 3678001010:3678001010(0) win 64240 <mss 1460,nop,nop,sackOK> (DF)

14:59:13.725285 istlab.dmst.aueb.gr.http > nat.spinellis.gr.1112:
 S 881432074:881432074(0) ack 3678001011 win 57344 <mss 1460> (DF)

Evaluation of Network Address Translation

Firewall Architectures

Screening Router

Router configuration set to drop packets.

Dual-homed Host

Host with two network adapters, routing often disabled.

Screened Host

Screened Subnet

Internal Firewall

Personal Firewall

Incident Levels

Probe

A few (random) tries to break in.

Attack

Concerted break-in attempt.

Break-in

Host has been compromised.

Maintenance: Housekeeping

Maintenance: Monitoring

Maintenance: Updating

VPN Architectures

Tunneling

Defence in Depth Example

2 Layers

  1. Firewall
  2. Host based packet filtering

5 Layers

(Increase security on the Internet side to handle DDOS attacks)
  1. Border router
  2. Network management system
  3. Intrusion detection system
  4. Firewall
  5. Host based packet filtering

8 Layers

(Increase security on the workstation side to handle internal attacks)
  1. Border router
  2. Network management system
  3. Intrusion detection system
  4. Firewall
  5. Host based packet filtering
  6. Log analysis and alert
  7. File integrity validation
  8. Cryptography

Bibliography