Overview
Different
Firewall Technologies
Packet
Filtering
-
Works at the Network Layer
-
Only examines the packet header
-
Two choices with regard to outbound,
passive FTP connections.
-
Leave the entire range of upper ports (port
number > 1023) open to allow a session to take place over the dynamically
allocated port, which exposes the internal network
-
Shut down the entire upper range of ports
thus securing the internal network but blocking other services
(This is the trade off between
application support and security.)
Pros:
low cost; low overhead; application transparency; quicker than application
gateways
Cons:
low security; access limited to a small part of the packet header; screening
limited above network layer; information manipulation very limited; difficult to
configure, manage and monitor; inadequate logging and alerting mechanisms;
subject to IP spoofing
Application Layer Gateway
-
Works at the Application Layer
-
Uses complicated application logic to
determine intruder attempts
Pros:
good security; full Application-layer awareness
Cons:
application level implementation is detrimental to performance; cannot provide
RPC and other services; most proxies are non-transparent; vulnerable to OS and
application level bugs; poor scalability (each service requires its own
application layer gateway); overlooks information in other layers; expensive
performance costs
Note:
Every client server communication requires two connections:
-
One from client to FireWall
-
One from FireWall to server
Stateful
Inspection
-
Communication information from top 5 packet
layers
-
State derived from previous communications
(Outgoing Port etc.)
-
Application derived state such that a
previously authenticated user would be allowed access for authorised services
only
-
Evaluation of flexible expressions based on
communication information, application derived state and communication-derived
state
-
Benefits:
good security, full
application awareness, high performance, scalability, extensibility and
transparency
FireWall Capability |
Packet Filters |
Application Layer Gateways |
Stateful Inspection |
Communication Information |
Partial |
Partial |
Yes |
Communication Derived State |
No |
Partial |
Yes |
Application Derived State |
No |
Yes |
Yes |
Information Manipulation |
Partial |
Yes |
Yes |
Note:
-
The Inspect Engine is located in the Kernel
Module
-
It can Accept, Reject or Drop packets
-
It saves system processing time
Firewall-1
Products
Checkpoint uses OPSEC Open
Platform for Secure Enterprise Connectivity architecture, which provides a
scalable framework for security implementation by means of separating the
firewall product into different modules.
Enterprise
Product
-
Management Module
– Centralised graphical security management for either one or unlimited
security enforcement points
-
Inspection Module
– Access Control; client and session authentication; network address
translation; auditing
-
Firewall Module
– Includes inspection module; user authentication; multiple firewall
synchronisation; content security
-
Encryption Module
– Provides DES and FWZ1 Encryption
-
Router Security Management – Security
management for router ACL’s across one or more routers
-
Open Security Manager –
Centralised security management for 3Com, Cisco and Microsoft NT Server
routers, and Cisco Pix firewalls
Single
Gateway Product
-
Management Module
– Centralised graphical security management for either one or unlimited
security enforcement points
-
Inspection Module
– Access Control; client and session authentication; network address
translation; auditing
-
Firewall Module
– Includes inspection module; user authentication; multiple firewall
synchronisation; content security
Enterprise
Management Product
Connect Control Module
– Automatic application server load balancing across multiple servers (deployed
with Firewall-1)
Firewall-1
Firewall Module
Inspection Module
– Access Control; client and session authentication; network address
translation; auditing User Authentication; multiple firewall synchronisation;
content security
Firewall-1
Inspect Module
Access control; client and
session authentication; network address translation; auditing
The Encryption Module
-
DES Encryption Module for use in North
America
-
FWZ1 Module for worldwide export
Firewall-1
Architecture
-
A 3-tier architecture: there can be many
different firewall modules running in different locations (security
enforcement points) controlled by a central Management Console. Administrators
can administer the security system either directly via the console, or by
running GUI clients connected to the Management Console through the network
from another desktop
-
For Single Gateway Product, there is only
one Firewall Module controlled by one Management Console, and both must be
installed on the same machine, which means that there is only one security
enforcement point. However, you can still run the GUI client form another
desktop. Firewall Internet Gateway/25 is a Firewall Internet Gateway
(including one firewall module and management server) that protects 25 nodes
or IP addresses. The number included with the product name pertains to the
number of IP addresses a user needs to protect: e.g., 25/50/100/250/Unlimited.
-
GUI is available only for Win95/98/NT and
Motif. The exam focuses on the GUI, not the command line. The three different
GUIs are: Security Policy Editor for setting up the security settings, Log
Viewer for viewing the logs, and System Status tool for viewing the current
statistics of different firewall components. Network Object Manager is a
function within the Policy Editor, which is for creating objects so that we
can place the objects in the rule base and set up corresponding security
rules.
-
FWD Firewall Daemon is the process
responsible for moving data between the components.
-
When the server is started and the
Firewall-1 services have not finished loading, the server’s IP forwarding
function can provide hackers with security holes to get in. This is the
specific vulnerable time we need to pay attention to. The best way is to let
Firewall-1 control the server’s IP forwarding function.
Firewall-1 as a service in Control Panel – Services

Back
Home