Firewalls

Dr Lawrie Brown

School of Computer Science,
University College, UNSW,
Australian Defence Force Academy
Canberra

Lawrie.Brown@adfa.edu.au

Abstract

The Internet continues to grow exponentially, and the information and people contactable on it becomes more indespensible. Organisations are finding increasing pressure to connect in order to fulfil their goals. However there are persistent security concerns with an Internet connection. This workshop will summarise the threats to be considered, and the possible countermesures. In particular we will discuss the use of firewalls to provide perimeter defence around private networks, by providing a single controlled and monitored point of connection. We will discuss several practical firewall configurations: a screening router, a single bastion host, and a double host scheme. These provide a range of tradeoffs between ease of design and maintenance, access to service and security. Some guides to building these alternatives will be provided.

Contents

  • Introduction
  • Threats
  • Malicious Humans
  • Malicious Software
  • Countermeasures
  • Internet
  • Internet Services
  • Firewalls
  • Why a Firewall
  • Is a Firewall Enough?
  • Host Security
  • Some Resources - References
  • Some Resources - Sources
  • Security Policies
  • Possible Services
  • Firewall Components
  • Some Practical Firewalls
  • Screening Router
  • Security Policy and Access
  • Router Configuration
  • Sample Router Configuration 1
  • Sample Router Configuration 2
  • Remote Login (In)Security
  • OPIE - One-time Passwords
  • OPIE in use
  • Single Bastion Host
  • Security Policy and Access
  • System Configuration
  • Domain Name Service
  • IP Addreses and Routing
  • Applications
  • SOCKS
  • SOCKS - Installation
  • SOCKS - Configuration
  • TIS Firewall Toolkit
  • Mail
  • News
  • External Remote Login
  • External FTP or Web Server
  • Other Applications
  • inetd.conf
  • TIS - Configuration
  • TIS - Configuration
  • TIS - Configuration
  • Logging - syslogd
  • Double Bastion Host
  • Security Policy and Access
  • External Gateway and Router
  • Internal Router
  • Domain Name Service
  • IP Addreses and Routing
  • Internal Gateway - Applications
  • TIS Firewall Toolkit
  • Mail
  • News
  • Administration
  • Log Analysis and Anomalous Event Detection
  • Packet Sniffing
  • Summary

  • Copyright © 1995 Lawrie Brown