You are on page 1of 18

3Com Technical Papers

Internet Firewalls and Security

A Technology Overview
Internet Firewalls and Security
A Technology Overview

Contents
Internet Firewalls 2
Benefits of an Internet Firewall 2
Limitations of an Internet Firewall 3
The Hacker’s Toolbox 4
Information Gathering 4
Probing Systems for Security Weaknesses 5
Accessing Protected Systems 5
Basic Firewall Design Decisions 5
Stance of the Firewall 5
Security Policy of the Organization 6
Cost of the Firewall 6
Components of the Firewall System 6
Building Blocks: Packet-Filtering Routers 6
Service-Dependent Filtering 7
Service-Independent Filtering 7
Benefits of Packet-Filtering Routers 7
Limitations of Packet-Filtering Routers 8
Building Blocks: Application-Level Gateways 8
Bastion Host 8
Example: Telnet Proxy 9
Benefits of Application-Level Gateways 10
Limitations of Application-Level Gateways 11
Building Blocks: Circuit-Level Gateways 11
Firewall Example #1: Packet-Filtering Router 11
Firewall Example #2: Screened Host Firewall 12
Firewall Example #3: “Demilitarized Zone” or Screened-Subnet Firewall 13
Summary 14
References 15

Copyright © 1996 3Com Corporation. All rights reserved. 1


Internet Firewalls and Security to the permitted inside services, and which
outside services may be accessed by insiders.
A Technology Overview For a firewall to be effective, all traffic to
and from the Internet must pass through the
By Chuck Semeria firewall, where it can be inspected (Figure 1).
The firewall must permit only authorized
Chuck Semeria has worked for
Security has become one of the primary traffic to pass, and the firewall itself must be
3Com for the past six years. In
his position as a marketing concerns when an organization connects its immune to penetration. Unfortunately, a
engineer in the network private network to the Internet. Regardless of firewall system cannot offer any protection
systems division, he develops the business, an increasing number of users once an attacker has gotten through or around
classroom and independent on private networks are demanding access to the firewall.
study courses for the edu- Internet services such as the World Wide Web It is important to note that an Internet
cation services department
(WWW), Internet mail, Telnet, and File firewall is not just a router, a bastion host, or
in the customer services
organization. Transfer Protocol (FTP). In addition, corpo- a combination of devices that provides
rations want to offer WWW home pages and security for a network. The firewall is part of
Prior to joining 3Com, Chuck
FTP servers for public access on the Internet. an overall security policy that creates a
was the senior course
developer and instructor for Network administrators have increasing perimeter defense designed to protect the
Adept, a robotics and vision concerns about the security of their networks information resources of the organization.
systems company. Before that, when they expose their organization’s private This security policy must include published
he taught mathematics and data and networking infrastructure to Internet security guidelines to inform users of their
computer science in California
crackers. To provide the required level of pro- responsibilities; corporate policies defining
high schools and junior
colleges. Chuck is a graduate tection, an organization needs a security network access, service access, local and
of the University of California policy to prevent unauthorized users from remote user authentication, dial-in and dial-
at Davis. accessing resources on the private network out, disk and data encryption, and virus pro-
and to protect against the unauthorized export tection measures; and employee training. All
of private information. Even if an organization potential points of network attack must be
is not connected to the Internet, it may still protected with the same level of network
want to establish an internal security policy to security. Setting up an Internet firewall
manage user access to portions of the network without a comprehensive security policy is
and protect sensitive or secret information. like placing a steel door on a tent.

Internet Firewalls Benefits of an Internet Firewall


An Internet firewall is a system or group of Internet firewalls manage access between the
systems that enforces a security policy Internet and an organization’s private network
between an organization’s network and the (Figure 2). Without a firewall, each host
Internet. The firewall determines which system on the private network is exposed to
inside services may be accessed from the attacks from other hosts on the Internet. This
outside, which outsiders are permitted access means that the security of the private network

e
efens
erim eter d
ernet rity p ice
The I
nt Secu te off
Remo
d line
Lease ice
et te off
Intern ewall e Remo
fir ystem Fram
s
rate H
Q Relay
Corpo
ms
Mode

Figure 1. Security Policy Creates a Perimeter Defense

2
et • Concentrates network security
ntern
The I • Serves as centralized access “choke point”
• Generates security alarms
• Monitors and logs Internet usage
et
Intern ewall • Good location for Network Address Translator (NAT)
fir ystem
s • Good location for WWW and FTP servers
twork
te ne
Priva

Figure 2. Benefits of an Internet Firewall

would depend on the “hardness” of each when an organization changes Internet service
host’s security features and would be only as providers (ISPs).
secure as the weakest system. An Internet firewall is the perfect point
Internet firewalls allow the network to audit or log Internet usage. This permits
administrator to define a centralized “choke the network administrator to justify the
point” that keeps unauthorized users such as expense of the Internet connection to man-
hackers, crackers, vandals, and spies out of the agement, pinpoint potential bandwidth
protected network; prohibits potentially vul- bottlenecks, and provide a method for depart-
nerable services from entering or leaving the mental charge-backs if this fits the organi-
protected network; and provides protection zation’s financial model.
from various types of routing attacks. An An Internet firewall can also offer a
Internet firewall simplifies security man- central point of contact for information
agement, since network security is consol- delivery service to customers. The Internet
idated on the firewall systems rather than firewall is the ideal location for deploying
being distributed to every host in the entire World Wide Web and FTP servers. The
private network. firewall can be configured to allow Internet
Firewalls offer a convenient point where access to these services, while prohibiting
Internet security can be monitored and alarms external access to other systems on the pro-
generated. It should be noted that for organi- tected network.
zations that have connections to the Internet, Finally, some might argue that the
the question is not whether but when attacks deployment of an Internet firewall creates a
will occur. Network administrators must audit single point of failure. It should be emphasized
and log all significant traffic through the that if the connection to the Internet fails, the
firewall. If the network administrator doesn’t organization’s private network will still
take the time to respond to each alarm and continue to operate—only Internet access is
examine logs on a regular basis, there is no lost. If there are multiple points of access, each
need for the firewall, since the network admin- one becomes a potential point of attack that the
istrator will never know if the firewall has been network administrator must firewall and
successfully attacked! monitor regularly.
For the past few years, the Internet has
been experiencing an address space crisis that Limitations of an Internet Firewall
has made registered IP addresses a less An Internet firewall cannot protect against
plentiful resource. This means that organi- attacks that do not go through the firewall. For
zations wanting to connect to the Internet may example, if unrestricted dial-out is permitted
not be able to obtain enough registered IP from inside the protected network, internal
addresses to meet the demands of their user users can make a direct SLIP or PPP con-
population. An Internet firewall is a logical nection to the Internet. Savvy users who
place to deploy a Network Address Translator become irritated with the additional authenti-
(NAT) that can help alleviate the address space cation required by firewall proxy servers may
shortage and eliminate the need to renumber be tempted to circumvent the security system

3
ole
e rity h
efens Secu
ter d
erime
rity p
Secu
te
Priva k SLIP
or
netw
et
Intern ewall
fir ystem
Glossary s et
Internervice r
s e
provid
Back door et
ntern
A security hole in a com- The I
promised system that allows
continued access to the system
by an intruder even if the Figure 3. A Connection Circumventing an Internet Firewall
original attack is discovered.
Bastion host by purchasing a direct SLIP or PPP connection executed to launch an attack. For example, a
A designated Internet firewall to an ISP. Since these types of connections data-driven attack could cause a host to modify
system specifically armored bypass the security provided by the most security-related files, making it easier for an
and protected against attacks.
carefully constructed firewall, they create a intruder to gain access to the system. As we
Circuit-level gateway significant potential for back-door attacks will see, the deployment of proxy servers on a
A specialized function that (Figure 3). Users must be made aware that bastion host is an excellent means of pro-
relays TCP connections without
these types of connections are not permitted as hibiting direct connections from the outside
performing any additional
packet processing or filtering. part of the organization’s overall security and reducing the threat of data-driven attacks.
architecture.
Internet firewall The Hacker’s Toolbox
Internet firewalls cannot protect against
A system or group of systems
that enforces an access control the types of threats posed by traitors or It is difficult to describe a typical hacker attack
policy between an organi- unwitting users. Firewalls do not prohibit because intruders have different levels of
zation’s network and the traitors or corporate spies from copying sen- technical expertise and many different moti-
Internet. sitive data onto floppy disks or PCMCIA cards vations. Some hackers are intrigued by the
Packet filtering and removing them from a building. Firewalls challenge, others just want to make life more
A feature that allows a router do not protect against attacks where a hacker, difficult for others, and still others are out to
to make a permit/deny decision pretending to be a supervisor or a befuddled steal sensitive data for profit.
for each packet based on the new employee, persuades a less sophisticated
packet header information that Information Gathering
is made available to the IP for-
user into revealing a password or granting
them “temporary” network access. Employees Generally, the first step in a break-in is some
warding process.
must be educated about the various types of form of information gathering. The goal is to
Proxy service construct a database of the target organi-
Special-purpose, application-
attacks and about the need to guard and period-
ically change their passwords. zation’s network and gather information about
level code installed on an
Internet firewall gateway. The Internet firewalls cannot protect against the hosts residing on each of the networks.
proxy service allows the the transfer of virus-infected software or files. There are a number of tools that a hacker can
network administrator to permit Since there are so many different viruses, use to collect this information:
or deny specific applications or • The SNMP protocol can be used to examine
operating systems, and ways of encoding and
specific features of an appli- the routing table of an unsecured router to
cation. compressing binary files, an Internet firewall
cannot be expected to accurately scan each and learn intimate details about the target organi-
Trojan horse zation’s network topology.
every file for potential viruses. Concerned
A packet sniffer that hides its • The TraceRoute program can reveal inter-
sniffing activity. These packet organizations should deploy anti-viral software
at each desktop to protect against their arrival mediate network numbers and routers in the
sniffers can collect account
names and passwords for from floppy disks or any other source. path to a specific host.
Internet services, allowing a Finally, Internet firewalls cannot protect • The Whois protocol is an information
hacker to gain unauthorized against data-driven attacks. A data-driven service that can provide data about all DNS
access to other machines. domains and the system administrators
attack occurs when seemingly harmless data is
mailed or copied to an internal host and is responsible for each domain. However, this
information is usually out of date.

4
• DNS servers can access a list of host IP • The intruder can attempt to destroy evidence
addresses and their corresponding host of the assault and open new security holes or
names. back doors in the compromised system in
• The Finger protocol can reveal detailed order to have continued access even if the
information about the users (login names, original attack is discovered.
phone numbers, time they last logged in, • The intruder can install packet sniffers that
Acronyms
etc.) of a specified host. include Trojan horse binaries that hide the
• The Ping program can be employed to locate sniffing activity on the installed systems. CERT
a particular host and determine its reacha- The packet sniffers collect account names Computer Emergency Response
bility. This simple tool can be used in a short and passwords for Telnet and FTP services Team
scanning program that pings every possible that allow the hacker to spread the attack to DNS
host address on a network to construct a list other machines. Domain Name Service
of the hosts actually residing on the network. • The intruder can find other hosts that trust
FAQ
the compromised system. This allows the Frequently Asked Questions
Probing Systems for Security Weaknesses hacker to exploit the vulnerabilities of a
After information about the targeted organi- FTP
single host and spread the attack across the
zation’s network is gathered, the hacker File Transfer Protocol
entire organization’s network.
attempts to probe each host for security weak- • If the hacker can obtain privileged access on ICMP
nesses. There are a number of tools that a Internet Control Message
a compromised system, he or she can read
hacker can use to automatically scan the indi- Protocol
mail, search private files, steal private files,
vidual hosts residing on a network; for example: and destroy or corrupt important data. ISP
• Since the list of known service vulnera- Internet service provider
bilities is rather short, a knowledgeable Basic Firewall Design Decisions ISS
hacker can write a small program that When designing an Internet firewall, there are Internet Security Scanner
attempts to connect to specific service ports a number of decisions that must be addressed NAT
on a targeted host. The output of the by the network administrator: Network Address Translator
program is a list of hosts that support • The stance of the firewall PCMCIA
services that are exposed to attack. • The overall security policy of the organi- Personal Computer Memory
• There are several publicly available tools, zation Card International Association
such as the Internet Security Scanner (ISS) • The financial cost of the firewall PPP
or the Security Analysis Tool for Auditing • The components or building blocks of the Point-to-Point Protocol
Networks (SATAN), that scan an entire firewall system
RFC
domain or subnetwork and look for security
Request for Comment
holes. These programs determine the weak- Stance of the Firewall
nesses of each system with respect to several The stance of a firewall system describes the SATAN
fundamental security philosophy of the orga- Security Analysis Tool for
common system vulnerabilities. Intruders
Auditing Networks
use the information collected from these nization. An Internet firewall may take one of
scans to gain unauthorized access to the two diametrically opposed stances: SLIP
• Everything not specifically permitted is Serial Line Internet Protocol
targeted organization’s systems.
A clever network administrator can use denied. This stance assumes that a SMTP
these tools within their private network to firewall should block all traffic, and that Simple Mail Transfer Protocol
discover potential security weaknesses and each desired service or application should TCP
determine which hosts need to be updated with be implemented on a case-by-case basis. Transmission Control Protocol
new software patches. This is the recommended approach. It UDP
creates a very secure environment, since User Datagram Protocol
Accessing Protected Systems only carefully selected services are sup-
The intruder uses the results of the host probes ported. The disadvantage is that it places
to target a specific system for attack. After security ahead of ease of use, limiting the
gaining access to a protected system, the number of options available to the user
hacker has many options available: community.

5
• Everything not specifically denied is per- domain software, but there are still costs in
mitted. This stance assumes that a firewall terms of the time to develop and deploy the
should forward all traffic, and that each firewall system. Finally, all firewalls require
potentially harmful service should be shut continuing support for administration, general
off on a case-by-case basis. This approach maintenance, software updates, security
creates a more flexible environment, with patches, and incident handling.
Learning More About
more services available to the user com-
Internet Attacks Components of the Firewall System
munity. The disadvantage is that it puts
ease of use ahead of security, putting the After making decisions about firewall stance,
For the latest, up-to-date infor-
mation concerning attacks on network administrator in a reactive mode security policy, and budget issues, the organi-
Internet sites, contact the and making it increasingly difficult to zation can determine the specific components
Computer Emergency Response provide security as the size of the protected of its firewall system. A typical firewall is
Team (CERT) Coordination composed of one or more of the following
network grows.
Center. CERT periodically pub-
building blocks:
lishes warnings and summaries
to draw attention to the various Security Policy of the Organization • Packet-filtering router
types of attacks that have been As discussed earlier, an Internet firewall does • Application-level gateway (or proxy server)
reported to their incident not stand alone—it is part of the organi- • Circuit-level gateway
response staff. These reports zation’s overall security policy, which defines The remainder of this paper discusses
also contain information and all aspects of its perimeter defense. To be suc- each of these building blocks and describes
solutions for defeating each
cessful, organizations must know what they how they can work together to build an
type of attack. New or updated
files are available for are protecting. The security policy must be effective Internet firewall system.
anonymous FTP from based on a carefully conducted security
ftp://info.cert.org, and past analysis, risk assessment, and business needs Building Blocks: Packet-Filtering Routers
summaries are available from analysis. If an organization does not have a A packet-filtering router (Figure 4) makes a
ftp://info.cert.org/pub/ permit/deny decision for each packet that it
detailed security policy, the most carefully
cert_summaries.
crafted firewall can be circumvented to expose receives. The router examines each datagram
For more information con- the entire private network to attack. to determine whether it matches one of its
cerning the techniques packet-filtering rules. The filtering rules are
employed by hackers, track the Cost of the Firewall based on the packet header information that is
following USENET newsgroups:
How much security can the organization made available to the IP forwarding process.
comp.security.announce,
comp.security.mis, afford? A simple packet-filtering firewall can This information consists of the IP source
comp.security.unix, alt.2600 , have a minimal cost since the organization address, the IP destination address, the encap-
alt.wired, alt.hackers, and needs a router to connect to the Internet, and sulated protocol (TCP, UDP, ICMP, or IP
alt.security. Finally, look for packet filtering is included as part of the Tunnel), the TCP/UDP source port, the
various hacker bulletin
standard router feature set. A commercial TCP/UDP destination port, the ICMP message
boards—they’re everywhere!
firewall system provides increased security type, the incoming interface of the packet, and
but may cost from U.S.$4,000 to $30,000, the outgoing interface of the packet. If a match
depending on its complexity and the number is found and the rule permits the packet, the
of systems protected. If an organization has packet is forwarded according to the infor-
the in-house expertise, a home-brewed mation in the routing table. If a match is found
firewall can be constructed from public and the rule denies the packet, the packet is

twork
te ne
Priva
e
efens
erimeter d
et- rity p
et Pack Secu
ntern g
The I filterin
r
route

Figure 4. Packet-Filtering Router

6
discarded. If there is no matching rule, a user- attacker hopes that the use of a spoofed source
configurable default parameter determines IP address will allow penetration of systems
whether the packet is forwarded or discarded. that employ simple source address security
where packets from specific trusted internal
Service-Dependent Filtering hosts are accepted and packets from other
The packet-filtering rules allow a router to hosts are discarded. Source spoofing attacks
permit or deny traffic based on a specific can be defeated by discarding each packet
service, since most service listeners reside on with an inside source IP address if the packet
well-known TCP/UDP port numbers. For arrives on one of the router’s outside
example, a Telnet server listens for remote interfaces.
connections on TCP port 23 and an SMTP
server listens for incoming connections on Source Routing Attacks. In a source routing
TCP port 25. To block all incoming Telnet attack, the source station specifies the route
connections, the router simply discards all that a packet should take as it crosses the
packets that contain a TCP destination port Internet. This type of attack is designed to
value equal to 23. To restrict incoming Telnet bypass security measures and cause the packet
connections to a limited number of internal to follow an unexpected path to its destination.
hosts, the router must deny all packets that A source routing attack can be defeated by
contain a TCP destination port value equal to simply discarding all packets that contain the
23 and that do not contain the destination IP source route option.
address of one of the permitted hosts.
Some typical filtering rules include: Tiny Fragment Attacks. For this type of
• Permit incoming Telnet sessions only to a attack, the intruder uses the IP fragmentation
specific list of internal hosts feature to create extremely small fragments
• Permit incoming FTP sessions only to and force the TCP header information into a
specific internal hosts separate packet fragment. Tiny fragment
• Permit all outbound Telnet sessions attacks are designed to circumvent user-
• Permit all outbound FTP sessions defined filtering rules; the hacker hopes that a
• Deny all incoming traffic from specific filtering router will examine only the first
external networks fragment and allows all other fragments to
pass. A tiny fragment attack can be defeated
Service-Independent Filtering
by discarding all packets where the protocol
There are certain types of attacks that are dif-
type is TCP and the IP FragmentOffset is
ficult to identify using basic packet header
equal to 1.
information because the attacks are service
independent. Routers can be configured to Benefits of Packet-Filtering Routers
protect against these types of attacks, but The majority of Internet firewall systems are
they are more difficult to specify since the deployed using only a packet-filtering router.
filtering rules require additional information Other than the time spent planning the filters
that can be learned only by examining the and configuring the router, there is little or no
routing table, inspecting for specific IP cost for implementing packet filtering since the
options, checking for a special fragment feature is included as part of standard router
offset, and so on. Examples of these types of software releases. Since Internet access is gen-
attacks include: erally provided over a WAN interface, there is
little impact on router performance if traffic
Source IP Address Spoofing Attacks. For this loads are moderate and few filters are defined.
type of attack, the intruder transmits packets Finally, a packet-filtering router is generally
from the outside that pretend to originate from transparent to users and applications, so it does
an internal host: the packets falsely contain the not require specialized user training or that
source IP address of an inside system. The specific software be installed on each host.

7
Limitations of Packet-Filtering Routers Building Blocks: Application-Level Gateways
Defining packet filters can be a complex task An application-level gateway allows the
because network administrators need to have a network administrator to implement a much
detailed understanding of the various Internet stricter security policy than with a packet-fil-
services, packet header formats, and the tering router. Rather than relying on a generic
specific values they expect to find in each packet-filtering tool to manage the flow of
field. If complex filtering requirements must Internet services through the firewall, special-
be supported, the filtering rule set can become purpose code (a proxy service) is installed on
very long and complicated, making it difficult the gateway for each desired application. If
to manage and comprehend. Finally, there are the network administrator does not install the
few testing facilities to verify the correctness proxy code for a particular application, the
of the filtering rules after they are configured service is not supported and cannot be for-
on the router. This can potentially leave a site warded across the firewall. Also, the proxy
open to untested vulnerabilities. code can be configured to support only those
Any packet that passes directly through a specific features of an application that the
router could potentially be used launch a data- network administrator considers acceptable
driven attack. Recall that a data-driven attack while denying all other features.
occurs when seemingly harmless data is for- This enhanced security comes with an
warded by the router to an internal host. The increased cost in terms of purchasing the
data contains hidden instructions that cause gateway hardware platform, the proxy service
the host to modify access control and security- applications, the time and knowledge required
related files, making it easier for the intruder to configure the gateway, a decrease in the
to gain access to the system. level of service that may be provided to users,
Generally, the packet throughput of a and a lack of transparency resulting in a less
router decreases as the number of filters user-friendly system. As always, the network
increases. Routers are optimized to extract the administrator is required to balance the orga-
destination IP address from each packet, make nization’s need for security with the user com-
a relatively simple routing table lookup, and munity’s demand for ease of use.
then forward the packet to the proper interface It is important to note that users are per-
for transmission. If filtering is enabled, the mitted access to the proxy services, but they
router must not only make a forwarding are never permitted to log in to the appli-
decision for each packet, but also apply all of cation-level gateway. If users are permitted to
the filter rules to each packet. This can log in to the firewall system, the security of
consume CPU cycles and impact the per- the firewall is threatened, since an intruder
formance of a system. could potentially perform some activity that
IP packet filters may not be able to compromises the effectiveness of the firewall.
provide enough control over traffic. A packet- For example, the intruder could gain root
filtering router can permit or deny a particular access, install Trojan horses to collect
service, but it is not capable of understanding passwords, and modify the security configu-
the context/data of a particular service. For ration files of the firewall.
example, a network administrator may need to
filter traffic at the application layer in order to Bastion Host
limit access to a subset of the available FTP or Unlike packet-filtering routers, which allow
Telnet commands, or to block the import of the direct flow of packets between inside
mail or newsgroups concerning specific systems and outside systems, application-level
topics. This type of control is best performed gateways allow information to flow between
at a higher layer by proxy services and appli- systems but do not allow the direct exchange
cation-level gateways. of packets. The chief risk of allowing packets
to be exchanged between inside systems and

8
outside systems is that the host applications • Each proxy is a small and uncomplicated
residing on the protected network’s systems program specifically designed for network
must be secured against any threat posed by security. This allows the source code of the
the allowed services. proxy application to be reviewed and
An application-level gateway is often checked for potential bugs and security
referred to as a “bastion host” because it is a holes. For example, a typical UNIX mail
designated system that is specifically armored application may contain over 20,000 lines of
and protected against attacks. Several design code, while a mail proxy may contain fewer
features are used to provide security for a than 1000!
bastion host: • Each proxy is independent of all other
• The bastion host hardware platform executes proxies on the bastion host. If there is a
a “secure” version of its operating system. problem with the operation of any proxy, or
For example, if the bastion host is a UNIX® if a future vulnerability is discovered, it can
platform, it executes a secure version of the be uninstalled without affecting the
UNIX operating system that is specifically operation of the other proxy applications.
designed to protect against operating system Also, if the user population requires support
vulnerabilities and ensure firewall integrity. for a new service, the network administrator
• Only the services that the network adminis- can easily install the required proxy on the
trator considers essential are installed on the bastion host.
bastion host. The reasoning is that if a • A proxy generally performs no disk access
service is not installed, it can’t be attacked. other than to read its initial configuration
Generally, a limited set of proxy appli- file. This makes it difficult for an intruder to
cations such as Telnet, DNS, FTP, SMTP, install Trojan horse sniffers or other dan-
and user authentication are installed on a gerous files on the bastion host.
bastion host. • Each proxy runs as a nonprivileged user in a
• The bastion host may require additional private and secured directory on the bastion
authentication before a user is allowed host.
access to the proxy services. For example,
the bastion host is the ideal location for Example: Telnet Proxy
installing strong authentication using a one- Figure 5 on page 10 illustrates the operation of
time password technology where a smart a Telnet proxy on an bastion host. For this
card cryptographic authenticator generates a example, the outside client wants to Telnet to
unique access code. In addition, each proxy an inside server protected by the application-
service may require its own authentication level gateway.
before granting user access. The Telnet proxy never allows the remote
• Each proxy is configured to support only a user to log in or have direct access to the
subset of the standard application’s com- internal server. The outside client Telnets to
mand set. If a standard command is not sup- the bastion host, which authenticates the user
ported by the proxy application, it is simply employing one-time password technology.
not available to the authenticated user. After authentication, the outside client gains
• Each proxy is configured to allow access access to the user interface of the Telnet proxy.
only to specific host systems. This means The Telnet proxy permits only a subset of the
that the limited command/feature set may be Telnet command set and determines which
applied only to a subset of systems on the inside hosts are available for Telnet access.
protected network. The outside user specifies the destination host
• Each proxy maintains detailed audit infor- and the Telnet proxy makes its own connection
mation by logging all traffic, each con- to the inside server and forwards commands to
nection, and the duration of each connection. the inside server on behalf of the outside
The audit log is an essential tool for dis- client. The outside client believes that the
covering and terminating intruder attacks. Telnet proxy is the real inside server, while

9
e
Insid
y
tewa er
vel ga -serv
cation-le Proxy ection
Appli FTP Out n ver
con e ser
de In proxy Insid
Outsi t
Telne Out
xy In proxy
t-pro
Clien ction
n e
con

nt
e clie
Outsid

Figure 5. Telnet Proxy

the inside server believes that the Telnet subject to theft, but using a combination of
proxy is the outside client. both methods increases the likelihood of
Figure 6 shows the output to the outside correct user authentication. In the Telnet
client’s terminal screen as the connection to the example, the proxy transmits a challenge and
inside server is established. Note that the client the user, with the aid of a smart card, obtains
is not performing a logon to the bastion host; a response to the challenge. Typically, a user
the user is being authenticated by the bastion unlocks the smart card by entering their PIN
host and a challenge is issued before the user is number and the card, based on a shared
permitted to communicate with the Telnet “secret” encryption key and its own internal
proxy. After passing the challenge, the proxy clock, returns an encrypted value for the user
server limits the set of commands and desti- to enter as a response to the challenge.
nations that are available to the outside client.
Authentication can be based on either Benefits of Application-Level Gateways
something the user knows (like a password) There are many benefits to the deployment of
or something the user physically possesses application-level gateways. They give the
(like a smart card). Both techniques are network manager complete control over each

Outside-Client > telnet bastion_host


Username: John Smith
Challenge Number “237936”
Challenge Response: 723456
Trying 200.43.67.17 ...

HostOS UNIX (bastion_host)

bh-telnet-proxy> help
Valid commands are:

connect hostname
help/?
quit/exit

bh-telnet-proxy> connect inside_server

HostOS UNIX (inside_server)

login: John Smith


Password: ######
Last login: Wednesday April 15 11:17:15

Figure 6. Telnet “Session” Terminal Display

10
service, since the proxy application limits the simply relays the Telnet connection through
command set and determines which internal the firewall but does no additional exami-
hosts may be accessed by the service. Also, nation, filtering, or management of the Telnet
the network manager has complete control protocol. The circuit-level gateway acts like a
over which services are permitted, since the wire, copying bytes back and forth between the
absence of a proxy for a particular service inside connection and the outside connection.
means that the service is completely blocked. However, because the connection appears to
Application-level gateways have the ability to originate from the firewall system, it conceals
support strong user authentication and information about the protected network.
provide detailed logging information. Finally, Circuit-level gateways are often used for
the filtering rules for an application-level outgoing connections where the system admin-
gateway are much easier to configure and test istrator trusts the internal users. Their chief
than for a packet-filtering router. advantage is that a bastion host can be con-
figured as a hybrid gateway supporting appli-
Limitations of Application-Level Gateways cation-level or proxy services for inbound
The greatest limitation of an application-level connections and circuit-level functions for
gateway is that it requires either that users outbound connections. This makes the firewall
modify their behavior, or that specialized system easier to use for internal users who
software be installed on each system that want direct access to Internet services, while
accesses proxy services. For example, Telnet still providing the firewall functions needed to
access via an application-level gateway protect the organization from external attack.
requires two user steps to make the connection
rather than a single step. However, specialized Firewall Example #1: Packet-Filtering Router
end-system software could make the appli- The most common Internet firewall system
cation-level gateway transparent by allowing consists of nothing more than a packet-filtering
the user to specify the destination host rather router deployed between the private network
than the application-level gateway in the and the Internet (Figure 8 on page 12). A
Telnet command. packet-filtering router performs the typical
routing functions of forwarding traffic between
Building Blocks: Circuit-Level Gateways networks as well as using packet-filtering rules
A circuit-level gateway is a specialized to permit or deny traffic. Typically, the filter
function that can be performed by an appli- rules are defined so that hosts on the private
cation-level gateway. A circuit-level gateway network have direct access to the Internet,
simply relays TCP connections without per- while hosts on the Internet have limited access
forming any additional packet processing or to systems on the private network. The
filtering. external stance of this type of firewall system
Figure 7 illustrates the operation of a is usually that everything not specifically per-
typical Telnet connection through a circuit- mitted is denied.
level gateway. The circuit-level gateway

y
tewa
it-level ga nectio
n
t
Circu In e con e hos
In Insid Insid
n Out
nectio Out In
e con
Outsid Out

t
e hos
Outsid

Figure 7. Circuit-Level Gateway

11
et- Insid
e
Pack
g
filterin twork
r te ne
route Priva
e
Outsid

et
ntern
The I

Figure 8. Packet-Filtering Router Firewall

Although this firewall system has the For this firewall system, the bastion host
benefit of being inexpensive and transparent to is configured on the private network with a
users, it possesses all of the limitations of a packet-filtering router between the Internet
packet-filtering router such as exposure to and the bastion host. The filtering rules on the
attacks from improperly configured filters and exposed router are configured so that outside
attacks that are tunneled over permitted systems can access only the bastion host;
services. Since the direct exchange of packets traffic addressed to all other internal systems
is permitted between outside systems and is blocked. Since the inside hosts reside on the
inside systems, the potential extent of an attack same network as the bastion host, the security
is determined by the total number of hosts and policy of the organization determines whether
services to which the packet-filtering router inside systems are permitted direct access to
permits traffic. This means that each host the Internet, or whether they are required to
directly accessible from the Internet needs to use the proxy services on the bastion host.
support sophisticated user authentication and Inside users can be forced to use the proxy
needs to be regularly examined by the network services by configuring the router’s filter rules
administrator for signs of an attack. Also, if the to accept only internal traffic originating from
single packet-filtering router is penetrated, the bastion host.
every system on the private network may be One of the benefits of this firewall system
compromised. is that a public information server providing
Web and FTP services can be placed on the
Firewall Example #2: Screened Host Firewall segment shared by the packet-filtering router
The second firewall example employs both a and the bastion host. If the strongest security is
packet-filtering router and a bastion host required, the bastion host can run proxy
(Figure 9). This firewall system provides a services that require both internal and external
higher level of security than the previous users to access the bastion host before commu-
example because it implements both network- nicating with the information server. If a lower
layer security (packet-filtering) and appli- level of security is adequate, the router may be
cation-layer security (proxy services). Also, an configured to allow outside users direct access
intruder has to penetrate two separate systems to the public information server.
before the security of the private network can
be compromised. Insid
e
n
Bastio
host

te
de Priva sts
Outsi ork h
o
ation netw
Inform er
et- se v
r
et Pack
ntern g
The I filterin
r
route

Figure 9. Screened Host Firewall System (Single-Homed Bastion Host)

12
e
Insid
n
Bastio
host

te
de Priva sts
Outsi w ork h
o
e t
ation n
Inform er
et- serv
ernet Pack
nt g
The I fil in
t e r
r
route

Figure 10. Screened Host Firewall System (Dual-Homed Bastion Host)

An even more secure firewall system can Firewall Example #3: “Demilitarized Zone”
be constructed using a dual-homed bastion or Screened-Subnet Firewall
host system (Figure 10). A dual-homed bastion The final firewall example employs two
host has two network interfaces, but the host’s packet-filtering routers and a bastion host
ability to directly forward traffic between the (Figure 11). This firewall system creates the
two interfaces bypassing the proxy services is most secure firewall system, since it supports
disabled. The physical topology forces all both network- and application-layer security
traffic destined for the private network through while defining a “demilitarized zone” (DMZ)
the bastion host and provides additional network. The network administrator places the
security if outside users are granted direct bastion host, information servers, modem
access to the information server. pools, and other public servers on the DMZ
Since the bastion host is the only internal network. The DMZ network functions as a
system that can be directly accessed from the small, isolated network positioned between the
Internet, the potential set of systems open to Internet and the private network. Typically, the
attack is limited to the bastion host. However, DMZ is configured so that systems on the
if users are allowed to log on to the bastion Internet and systems on the private network
host, the potential set of threatened systems can access only a limited number of systems
expands to include the entire private network, on the DMZ network, but the direct trans-
since it is much easier for an intruder to com- mission of traffic across the DMZ network is
promise the bastion host if they are allowed to prohibited.
log on. It is critical that the bastion host be For incoming traffic, the outside router
hardened and protected from penetration and protects against the standard external attacks
that users never be allowed to log on to the (source IP address spoofing, source routing
bastion host. attacks, etc.) and manages Internet access to
the DMZ network. It permits external systems

n
Bastio Insid
e
host r twork
route te ne
Priva
e
Insid
ms
DMZ Mode

Outside
ation
Inform er
e serv
et Outsid
ntern r
The I route

Figure 11. Screened-Subnet Firewall System

13
to access only the bastion host (and possibly • Packet-filtering routers direct traffic to
the information server). The inside router specific systems on the DMZ network, elim-
provides a second line of defense, managing inating the need for the bastion host to be
DMZ access to the private network by dual-homed.
accepting only traffic originating from the • The inside router supports greater packet
bastion host. throughput than a dual-homed bastion host
For Internet-bound traffic, the inside when it functions as the final firewall system
router manages private network access to the between the private network and the
DMZ network. It permits internal systems to Internet.
access only the bastion host (and possibly the • Since the DMZ network is a different
information server). The filtering rules on the network than the private network, a Network
outside router require use of the proxy services Address Translator (NAT) can be installed
by accepting only Internet-bound traffic from on the bastion host to eliminate the need to
the bastion host. renumber or resubnet the private network.
There are several key benefits to the
deployment of a screened subnet firewall Summary
system: There is no single correct answer for the design
• An intruder must crack three separate and deployment of Internet firewalls. Each
devices (without detection) to infiltrate the organization’s decision will be influenced by
private network: the outside router, the many different factors such as their corporate
bastion host, and the inside router. security policy, the technical background of
• Since the outside router advertises the their staff, cost, and the perceived threat of
DMZ network only to the Internet, systems attack. This paper focused on many of the
on the Internet do not have routes to the issues relating to the construction of Internet
protected private network. This allows the firewalls, including their benefits, limitations,
network manager to ensure that the private building blocks, and examples of firewall
network is “invisible,” and that only system topologies. Since the benefits of con-
selected systems on the DMZ are known to necting to the global Internet probably exceed
the Internet via routing table and DNS its costs, network managers should proceed
information exchanges. with an awareness of the dangers and an
• Since the inside router advertises the DMZ understanding that, with the proper pre-
network only to the private network, systems cautions, their networks can be as safe as they
on the private network do not have direct need them to be.
routes to the Internet. This guarantees that
inside users must access the Internet via the
proxy services residing on the bastion host.

14
References

Textbooks “Internet Firewalls Frequently Asked


Building Internet Firewalls. D. Brent Questions.” Maintained by Marcus J.
Chapman and Elizabeth Zwicky. O’Reilly & Ranum, Trusted Information Systems,
Associates, 1995. Inc. (http://www.v-one.com/pubs/fw-
faq/faq.htm).
Firewalls and Internet Security: Repelling
the Wily Hacker. Bill Cheswick and Steve “Thinking About Firewalls.” Marcus J.
Bellovin. Addison-Wesley, 1994. Ranum, Trusted Information Systems,
Inc.(http://www.telstra.com.au/pub/docs/
Practical UNIX Security. Simson Garfinkel security/ThinkingFirewalls/ThinkingFire
and Gene Spafford. O’Reilly & Associates, walls. html).
1991.
“A Toolkit and Methods for Internet
Requests for Comment
Firewalls.” Marcus J. Ramus and
RFC 1244: Site Security Handbook. P.
Frederick M. Avolio, Trusted
Holbrook and J. Reynolds, July 1991.
Information Systems, Inc.
(http://web1.cohesive.com/
RFC 1636: Report of IAB Workshop on
original/centri/usenix.htm).
Security in the Internet Architecture
(February 8–10, 1994). R. Braden, D. Clark,
“What If Your Machines Are Compromised
S. Crocker, and C. Huitema, June 1994.
by an Intruder.” Christopher Klaus,
Internet Security Systems, Inc.
RFC 1704: On Internet Authentication. N.
(http://www.cis.ohio-state.edu/hypertext/
Haller and R. Atkinson, October 1994.
faq/usenet/ computer-security/com-
promise-faq/faq.html).
RFC 1858: Security Considerations for IP
Fragment Filtering. G. Ziemba, D. Reed, and
“The World Wide Web Security FAQ.”
P. Traina, October 1995.
Lincoln D. Stein (http://www-
Firewall and Security Papers genome.wi. mit.edu/WWW/faqs/www-
“Almost Everything You Ever Wanted to security-faq.html).
Know About Security (but were afraid to
World Wide Web Index Pages to
ask).” Maintained by Alec Muffett Security-Related Documents
(http://www.cis.ohio-state.edu/ http://lcweb.loc.gov/global/internet/
hypertext/faq/usenet/ security-faq/ security.html
faq.html). Library of Congress page containing
links to documents on computer security.
“How to Set Up a Secure Anonymous FTP
Site.” Christopher Klaus, Internet http://www.telstra.com.au/pub/docs/security/
Security Systems, Inc. Telstra page containing links to doc-
(http://www.cis.ohio-state.edu/ uments on computer security.
hypertext/faq/usenet/computer-
security/anonymous-ftp-faq/faq.html).

15
References (Continued)

http://mls.saic.com/docs.html http://burgau.inesc.pt/docs/security/firewall/
Science Applications International index.html
Corporation’s (SAIC) page containing General index page containing links to
links to documents on computer security. documents on firewalls.

http://csrc.ncsl.nist.gov/first/resources/ http://burgau.inesc.pt/docs/security/
from-cd95/pap.htm IP-security/index.html
Forum of Incident Response and General index page containing links to
Security Teams (FIRST) page con- documents on IP security.
taining links to documents on network
security. ftp://ftp.uni-paderborn.de/doc/FAQ/comp.
security.misc/
http://web1.cohesive.com/original/centri/ General index page containing links to
info.htm#applevel security-related Frequently Asked
Cohesive Systems’ page containing links Questions (FAQs).
to documents on network security.

http://www.netsurf.com/nsf/v01/01/resource/
firewall.html
General index page containing links to
documents on firewalls.

16
®

3Com Corporation Taiwan Poland 3Com Mediterraneo


P.O. Box 58145 Phone: 886 2 377 5850 Phone: 48 22 6451351 Milano, Italy
5400 Bayfront Plaza Fax: 886 2 377 5860 Fax: 48 22 6451352 Phone: 39 2 253011
Santa Clara, CA Thailand Switzerland Fax: 39 2 27304244
95052-8145 Phone: 622 231 8151 2 Phone: 41 31 9984555 Rome, Italy
Phone: 800-NET-3Com Fax: 622 231 8121 Fax: 41 31 9984550 Phone: 39 6 5917756
or 408-764-5000 Fax: 39 6 5918969
3Com Benelux B.V. 3Com Ireland
Fax: 408-764-5001 Spain
Belgium, Luxembourg Phone: 353 1 820 7077
World Wide Web: Phone: 34 1 3831700
Phone: 32 2 716 4880 Fax: 353 1 820 7107
http://www.3com.com Fax: 34 1 3831703
Fax: 32 2 716 4780
3Com Japan
3Com ANZA Netherlands 3Com Middle East
Phone: 81 3 3345 7251
ANZA East Phone: 31 030 6029700 Phone: 971 4 349049
Fax: 81 3 3345 7261
Phone: 61 2 9937 5000 Fax: 31 030 6029777 Fax: 971 4 349803
Fax: 61 2 9956 6247 3Com Latin America
3Com Canada 3Com Nordic AB
ANZA West U.S. Headquarters
Calgary Sweden
Phone: 61 3 9653 9515 Phone: 408-764-6075
Phone: 403 265 3266 Phone: 46 8 632 91 00
Fax: 61 3 9653 9505 Fax: 408-764-5730
Fax: 403 265 3268 Fax: 46 8 632 09 05
Argentina
3Com Asia Limited Montreal Norway
Phone: 541 815 7164
Beijing, China Phone: 514 874 8008 Phone: 47 22 18 40 03
Fax: 541 815 7165
Phone: 8610 8492568 Fax: 514 393 1249 Fax: 47 22 18 23 85
Brazil
Fax: 8610 8492789 Toronto Denmark
Phone: 55 11 546 0869
Shanghai, China Phone: 416 498 3266 Phone: 45 33 37 71 17
Fax: 55 11 246 6813
Phone: 86 21 3740220 Fax: 416 498 1262 Fax: 45 33 32 43 70
Chile
Ext. 6115 Vancouver Finland
Phone: 562 633 9242
Fax: 86 21 3552079 Phone: 604 434 3266 Phone: 358 0 435 420 67
Fax: 562 633 8935
Hong Kong Fax: 604 434 3264 Fax: 358 0 435 422 00
Colombia
Phone: 852 2501 1111
3Com European HQ Phone: 571 618 4584 3Com South Africa
Fax: 852 2537 1149
Phone: 44 1628 897000 Fax: 571 618 4534 Phone: 27 11 803 7404/5
Indonesia
Fax: 44 1628 897041 Mexico Fax: 27 11 803 7411
Phone: 6221 523 9181
Phone: 525 520 7841
Fax: 6221 523 9156 3Com France 3Com UK Ltd.
Fax: 525 520 7837
Korea Phone: 33 1 69 86 68 00 Buckinghamshire
Phone: 82 2 319 4711 Fax: 33 1 69 07 11 54 3Com Northern Latin Phone: 44 1628 897000
Fax: 82 2 319 4710 America Fax: 44 1628 897003
3Com GmbH
Malaysia Miami, Florida Manchester
Germany
Phone: 60 3 732 7910 Phone: 305-261-3266 Phone: 44 161 873 7717
Phone: 49 89 627320
Fax: 60 3 732 7912 Fax: 305-261-4901 Fax: 44 161 873 8053
Fax: 49 89 62732233
Singapore Venezuela Scotland
Berlin
Phone: 86 21 6374 0220 Phone: 582 261 0710 Phone: 44 131 220 8228
Phone: 49 30 3498790
Ext. 6155 Fax: 582 261 5257 Fax: 44 131 226 1410
Fax: 49 30 34987999
Fax: 86 21 6355 2079

© 1996 3Com Corporation. All rights reserved. 3Com is a publicly owned corporation (NASDAQ.COMS). 3Com is a registered trademark of 3Com Corporation. Other
brand and product names may be trademarks or registered trademarks of their respective owners.

Printed in U.S.A. 500619-001 7/96

You might also like