Cover image for Practical firewalls
Title:
Practical firewalls
Personal Author:
Publication Information:
Indianapolis : QUE, 2000
ISBN:
9780789724168

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010053525 QA76.9.A25 O35 2000 Open Access Book Book
Searching...

On Order

Summary

Summary

A firewall's purpose is to keep hackers out of networks. This book is aimed at network adminstrators charged with building and maintaining a firewall.


Author Notes

Terry Ogletree is a consultant. He has worked with computers since 1980. Terry has worked with UNIX and TCP/IP since 1985 and has been involved with Windows NT since it first appeared. He is the lead author for Upgrading and Repairing Networks, 2nd Edition (Que), and has contributed chapters to Special Edition Using UNIX, Third Edition (Que) and Windows NT Server Unleashed (SAMS).


Table of Contents

Introductionp. 1
I Understanding Firewalls and Internet Securityp. 7
1 Firewall Basicsp. 9
Why You Need a Firewallp. 10
What Is a Firewall?p. 10
It's a Jungle Out There!p. 12
Use Your Site's Security Policy to Design the Firewallp. 12
New Security Threats to Considerp. 13
Decide Which Services You Will Provide for Your Usersp. 14
Firewall Policyp. 16
Firewall Technologiesp. 16
The First Firewalls: Packet Filteringp. 17
Using Application Gatewaysp. 17
Other Firewall Componentsp. 18
Hardware or Software Firewalls? Build or Buy?p. 18
Operating System Concernsp. 19
What a Firewall Can Dop. 21
What a Firewall Cannot Protect You Fromp. 21
Maintaining a Firewallp. 23
Summaryp. 24
2 Introduction to the TCP/IP Protocol Suitep. 25
The OSI Networking Modelp. 26
Physical Layerp. 28
Data Link Layerp. 28
Network Layerp. 28
Transport Layerp. 29
Session Layerp. 29
Presentation Layerp. 30
Application Layerp. 30
How Does TCP/IP Fit into the OSI Model?p. 30
TCP/IP Protocolsp. 31
The Internet Protocol (IP)p. 31
The Transmission Control Protocol (TCP)p. 32
Other Related Protocolsp. 33
IP Addressingp. 36
IP Address Classesp. 36
Class A Addressesp. 38
Class B Addressesp. 39
Class C Addressesp. 39
Broadcast and Multicast Addressesp. 40
What Are Subnets?p. 41
Examining the Contents of an IP Datagramp. 45
Important Packet Header Informationp. 47
What Are TCP and UDP Ports?p. 49
Well-Known Portsp. 49
Registered Portsp. 50
Common TCP/IP Servicesp. 50
Telnetp. 50
The File Transfer Protocol (FTP)p. 51
The Trivial File Transfer Protocol (TFTP)p. 52
The Domain Name Service (DNS)p. 52
Primary, Secondary, and Caching-Only Name Serversp. 54
The Simple Mail Transport Protocol (SMTP)p. 60
The r Utilitiesp. 60
Other Network Servicesp. 62
Summaryp. 62
3 Security and the Internetp. 63
LANS and WANSp. 64
Security in the Local Area Networkp. 64
User Authenticationp. 64
Resource Protectionsp. 66
Physical Safeguardsp. 67
Security in Wide Area Networksp. 67
Network Protocol Backdoors and Holesp. 68
What Is Source Routing and Why Is It Not a Good Idea?p. 69
Denial-of-Service Attacksp. 69
SYN Floodingp. 70
ICMP Redirects and Other ICMP Problemsp. 72
Ping of Deathp. 74
Distributed Denial-of-Service Attacksp. 74
Packet Fragmentationp. 76
Viruses and Trojan Horsesp. 78
Forged Emailp. 78
Break-Insp. 79
Password Theftp. 80
Friendly Customer Service (Social Engineering)p. 80
Backdoorsp. 81
Snooping: Monitoring Network Trafficp. 81
IP Spoofing and Impersonationp. 82
Summaryp. 83
4 Firewall Security Policy and Firewall Design Strategiesp. 85
The Design Comes Before the Firewallp. 86
Your Company's Security Policyp. 86
The Firewall Policyp. 91
Firewall Strategiesp. 93
Using a Packet Filterp. 94
Using an Application Proxy Gatewayp. 96
Combinationsp. 97
Using a Screened Subnet to Create a Demilitarized Zone (DMZ)p. 101
Using Bastion Hosts and Sacrificial Hostsp. 104
Incident Reporting and Responsep. 105
Keeping Up-to-date on Security Advisoriesp. 106
Summaryp. 107
5 Packet Filteringp. 109
The First Line of Defensep. 110
Where to Use Packet Filtersp. 110
Creating Packet Filtering Rulesp. 113
Dangerous Servicesp. 115
IP Header Information That Can Be Used to Filter Packetsp. 116
TCP and UDP Header Informationp. 117
Ports and Socketsp. 120
The SYN Bitp. 123
The ACK Bitp. 123
ICMP Packetsp. 124
Stateless Operation Versus Stateful Inspectionp. 125
Hardware and Software Packet Filtersp. 126
Using a Router to Restrict Accessp. 126
Using a Dual-Homed Host to Restrict Accessp. 127
Advantages and Disadvantages of Packet Filtersp. 128
Summaryp. 129
6 Using a Bastion Hostp. 131
Configuring a Bastion Hostp. 132
Installing a Secure Operating System from Scratchp. 133
Eliminating Unnecessary Services and Applicationsp. 134
UNIXp. 135
Other UNIX Network Files to Reviewp. 138
Windows NTp. 139
Removing Unnecessary Applications and Filesp. 141
Resource Protections and Access Controlp. 142
UNIX Resource Permissionsp. 142
Windows NTp. 147
Configuring Auditing and Loggingp. 152
Running Proxy Software on the Bastion Hostp. 153
When the Bastion Host Is Compromisedp. 154
Summaryp. 155
7 Application Gateways and Proxy Serversp. 157
Disable Routing on the Proxy Serverp. 160
Advantages and Disadvantages of Proxy Serversp. 161
Classical and Transparent Proxiesp. 162
Classical Proxiesp. 162
Transparent Proxiesp. 163
Classical Proxies Can Hide DNS Information About Your Networkp. 165
Creating a Custom Proxy Applicationp. 166
Network Address Translators (NATs)p. 166
Basic NATp. 167
Network Address Port Translation (NAPT)p. 168
Using NAT to Hide Information About the LANp. 169
Using NAT to Increase the LAN Address Spacep. 170
What Is Address Vectoring?p. 170
Content Screening and Blockingp. 171
Logging and Alerting Facilitiesp. 173
Client Considerationsp. 174
Summaryp. 175
8 Operating System Monitoring and Auditing Techniquesp. 177
What Is Auditing?p. 178
Reviewing Those Log Files!p. 178
The Front End of Auditing: Resource Protectionsp. 181
UNIXp. 181
Using the syslog Utilityp. 181
Miscellaneous UNIX Log Filesp. 185
Windows NTp. 188
Setting Up Auditing Eventsp. 189
Using the Event Viewer to Review Log Filesp. 193
Managing Event Log Filesp. 195
Application-Specific Log Filesp. 196
Other Considerationsp. 196
Summaryp. 196
II Encryption and Secure Communications on the Internetp. 197
9 Encryption Technologyp. 199
Protecting Sensitive Informationp. 200
What Is Encryption?p. 201
Single Key Encryptionp. 201
Public Key Encryptionp. 202
Hybridsp. 203
Practical Applications for Cryptography on the Internetp. 204
What Are Digital Signatures?p. 204
Digital Certificatesp. 206
The Secure Sockets Layer (SSL) Protocolp. 207
Is That Web Page Using Encryption?p. 209
Summaryp. 210
10 Virtual Private Networks (VPNs) and Tunnelingp. 211
Secure Communications on the Internetp. 212
What Is a Virtual Private Network (VPN)?p. 212
What Can a VPN Do?p. 214
Disadvantages of VPNsp. 215
The IPSec Protocol Suitep. 216
Internet Key Exchange (IKE)p. 217
The Authentication Header (AH)p. 219
Encapsulation Security Payload (ESP)p. 221
AH and ESPp. 221
The Point-to-Point Tunneling Protocol (PPTP)p. 222
The PPTP Control Connectionp. 223
Data Transmission Using PPTP Tunnelp. 224
Layer Two Tunneling Protocol (L2TP)p. 225
Summaryp. 225
11 Using Pretty Good Privacy (PGP) for Encryptionp. 227
Securing Information Transfers on the Internetp. 228
Installing PGPp. 229
Installing PGP on UNIX Systemsp. 229
Installing PGP on Windows NTp. 233
Summaryp. 238
III Firewall Installation and Configurationp. 239
12 Firewall Tools Available on the Internetp. 241
Using Freeware and Shareware Productsp. 242
TCP Wrappersp. 242
The TIS Firewall Toolkitp. 244
SOCKSp. 246
SQUIDp. 247
Drawbridgep. 248
SATANp. 250
Other Handy Security Softwarep. 252
Summaryp. 252
13 Using TCP Wrappersp. 253
Introduction to TCP Wrappersp. 254
How TCP Wrappers Worksp. 255
Logging via syslogdp. 255
Obtaining TCP Wrappersp. 256
Configuring TCP Wrappersp. 256
Configuring the inetd.conf Filep. 257
The hosts.allow and hosts.deny Filesp. 258
Limitations of TCP Wrappersp. 261
Summaryp. 262
14 Using the TIS Firewall Toolkit (FWTK)p. 263
Building a Firewall Using the Toolkitp. 264
A Short History of the Toolkitp. 264
Obtaining FWTKp. 264
How Does Gauntlet Firewall Differ from FWTK?p. 265
FWTK Componentsp. 266
netaclp. 267
The Configuration File: /usr/local/etc/netperm-tablep. 272
Configuring Proxy Servicesp. 275
FTP: ftp-gwp. 275
Remote Logins and Telnet: tn-gw and rlogin-gwp. 279
SMTP: smapp. 282
Configuring Other Services: plug-gwp. 285
Other FWTK Componentsp. 289
Installing the Toolkit on a Bastion Hostp. 289
Summaryp. 290
15 SOCKSp. 291
SOCKS V4 and SOCKS V5p. 292
Version 4p. 292
Version 5p. 296
SOCKSified Applicationsp. 298
SocksCapp. 298
How to Get SOCKSp. 299
SOCKS Supportp. 299
Summaryp. 300
16 SQUIDp. 301
What Is SQUID?p. 302
Where to Get SQUIDp. 303
Installing and Configuring SQUIDp. 303
Choosing a SQUID Serverp. 303
Installing the Softwarep. 304
Managing SQUIDp. 305
The squid.conf filep. 305
The squid Commandp. 306
SQUID Log Filesp. 308
What Is the SQUID Cache Hierarchy?p. 309
Configuring Clients to Use SQUIDp. 310
Summaryp. 311
17 Using ipfwadm and ipchains on Linuxp. 313
What Are ipfwadm and ipchains?p. 314
Installing and Configuring ipfwadmp. 315
Obtaining ipfwadmp. 315
Installing ipfwadmp. 316
Using ipfwadm Commandsp. 316
Place ipfwadm Rules in a Startup Filep. 321
Installing and Configuring ipchainsp. 321
Obtaining ipchainsp. 322
How ipchains Differs from ipfwadmp. 322
Creating and Deleting Chainsp. 323
Summaryp. 331
18 Microsoft Proxy Serverp. 333
Overview of Microsoft Proxy Serverp. 334
Installing and Configuring Microsoft Proxy Server 2.0p. 335
Running Setupp. 336
Using the Internet Service Managerp. 340
Packet Filter Propertiesp. 341
Web Proxy Service Propertiesp. 343
Configuration Management on the
Service Property Pagep. 346
Managing Permissions For the Web Proxy Servicesp. 346
Managing the Caching Properties of the Servicep. 347
Routing Within Proxy Arraysp. 350
Using the Publishing Propertyp. 350
Setting Real Time Alerts and Logging Optionsp. 351
Client Software Configuration Issuesp. 353
Summaryp. 355
19 The Elron CammandView Firewallp. 357
Overviewp. 358
Installing CommandView Firewallp. 358
Running the Setup Programp. 360
The Command View Firewall Manager Applicationp. 364
File Menu and View Menup. 365
Firewall Menu Optionsp. 367
Logs Menu Optionsp. 368
Managing User Servicesp. 368
Where to Go from Herep. 369
Summaryp. 370
20 Firewall Appliancesp. 371
What Is a Firewall Appliance?p. 372
Quick, Easy Installationp. 373
Simple Management Interfacep. 373
Self-Contained Devicep. 374
Multiple Network Interfacesp. 374
Default Security Policiesp. 375
Packet Filtering and Application Proxiesp. 376
Network Address Translation (NAT)p. 376
Reporting and Alertingp. 377
Virtual Private Networking (VPN)p. 378
Pricing a Firewall Appliancep. 378
Summaryp. 379
21 Firewalls and Beyondp. 381
New Functionalityp. 382
Firewall Integrationp. 383
Firewall Testingp. 384
Home Computersp. 384
Virtual Private Network Clientsp. 385
IPv6: The Next Generation IP Protocolp. 386
The IPv6 Headerp. 386
Extension Headersp. 389
IPv6 Addressingp. 391
The Transition to IPv6p. 391
Summaryp. 392
IV Appendixesp. 393
A TCP and UDP Common Portsp. 395
B Other Security Tools You Can Usep. 445
C Additional Resourcesp. 455