|
|
What is a Firewall? Firewalls are software/hardware based security components that divide
computer networks into two logical segments: Although it's possible to operate publicly accessible servers within a private network, serious dangers are involved. Even with well-administered firewalls and up-to-date host software, there's always a chance that attackers could use an application-level attack to gain unrestricted access to a computer that is running a server program. If that happens when the server computer is inside a private network, the attacker may gain access to important private data or greatly disrupt the operation of critical internal services. Because of the dangers of running servers inside private networks, many firewall configurations, employ "DMZ" (demilitarized zone) networks. A DMZ network is intended to provide a safe, relatively neutral "drop area" for communication between inside and outside systems. The network topology is shown in the following figure: No connections are permitted from the "untrusted" Internet to the private network; instead, Internet users connect to servers on the DMZ network. This server provides all the services that a company wishes to offer to outside users. The DMZ server itself is prevented from initiating connections into the private network; although systems on the private network can use the services provided by the DMZ, the DMZ cannot reach internal services.
Event Logging Event logging allows administrators to track potential security breaches or other nonstandard activities on a real-time basis by logging output from system error messages to a console terminal or syslog server, setting severity levels, and recording other parameters. (Syslog, in general, is a Protocol that allows a computer to send logging information to another computer.) The raw data logged from a firewall can be use for
See an sample of messages received from a PIX firewall. Below is a graph depicting the number of attempted Inbound connections (from the Internet to the private network) per hour, over four and a half days. Note the large amount of activity between 5:00 pm and 7:00 pm on Saturday night. From another log file, the IP addresses were resolved to machine names (where possible) and the frequency of Inbound attempts is plotted against the originating site of these attempts. The second graph is a detail of the larger one.
Types of Attack In general, firewalls are intended to protect network resources from several kinds of attacks:
|
Questions or comments? Enter your comments on our Feedback Form Or send mail to paul@PaulAcacia.com or to pacacia@mail.com. Copyright©2000 P. Acacia Consulting Last modified: Monday, April 24, 2000
|