Page 311 - DCAP103_Principle of operating system
P. 311

Principles of Operating Systems



                   Notes         packet’s source and destination address, its protocol, and, for TCP and UDP traffic, the port
                                 number).
                                 TCP and UDP protocols constitute most communication over the Internet, and because TCP
                                 and UDP traffic by convention uses well known ports for particular types of traffic, a “stateless”
                                 packet  filter  can  distinguish  between,  and  thus  control,  those  types  of  traffic  (such  as  web
                                 browsing, remote printing, email transmission, file transfer), unless the machines on each side
                                 of the packet filter are both using the same non-standard ports.

                                 Packet filtering firewalls work mainly on the first three layers of the OSI reference model, which
                                 means most of the work is done between the network and physical layers, with a little bit of
                                 peeking into the transport layer to figure out source and destination port numbers. When a packet
                                 originates from the sender and filters through a firewall, the device checks for matches to any
                                 of the packet filtering rules that are configured in the firewall and drops or rejects the packet
                                 accordingly. When the packet passes through the firewall, it filters the packet on a protocol/
                                 port number basis (GSS). For example, if a rule in the firewall exists to block telnet access, then
                                 the firewall will block the IP protocol for port number 23.
                                 9.6.2 Second Generation: Application Layer

                                 The key benefit of application layer filtering is that it can “understand” certain applications
                                 and protocols (such as File Transfer Protocol, DNS, or web browsing), and it can detect if an
                                 unwanted protocol is sneaking through on a non-standard port or if a protocol is being abused
                                 in any harmful way.

                                 An application firewall is much more secure and reliable compared to packet filter firewalls
                                 because it works on all seven layers of the OSI model, from the application down to the physical
                                 Layer. This is similar to a packet filter firewall but here we can also filter information on the basis
                                 of content. Good examples of application firewalls are MS-ISA (Internet Security and Acceleration)
                                 server, McAfee Firewall Enterprise & Palo Alto PS Series firewalls. An application firewall can
                                 filter higher-layer protocols such as FTP, Telnet, DNS, DHCP, HTTP, TCP, UDP and TFTP (GSS).
                                 For example, if an organization wants to block all the information related to “foo” then content
                                 filtering can be enabled on the firewall to block that particular word. Software-based firewalls
                                 (MS-ISA)  are  much  slower  than  hardware  based  stateful  firewalls  but  dedicated  appliances
                                 (McAfee & Palo Alto) provide much higher performance levels for Application Inspection.

                                 In 2009/2010, the focus of the most comprehensive firewall security vendors turned to expanding
                                 the list of applications such firewalls are aware of now covering hundreds and in some cases
                                 thousands of applications which can be identified automatically. Many of these applications can
                                 not only be blocked or allowed but manipulated by the more advanced firewall products to allow
                                 only certain functionally enabling network security administrations to give users functionality
                                 without  enabling  unnecessary  vulnerabilities.  As  a  consequence  these  advanced  version  of
                                 the “Second Generation” firewalls are being referred to as “Next Generation” and surpass the
                                 “Third Generation” firewall. It is expected that due to the nature of malicious communications
                                 this trend will have to continue to enable organizations to be truly secure.
                                 9.6.3 Third Generation: “Stateful” Filters

                                 From 1989-1990, three colleagues from AT&T Bell Laboratories, Dave Presetto, Janardan Sharma,
                                 and Kshitij Nigam, developed the third generation of firewalls, calling them circuit level firewalls.




        304                               LOVELY PROFESSIONAL UNIVERSITY
   306   307   308   309   310   311   312   313   314   315   316