Ch05_Firework

Chapter 06 Filewalls

Policy Actions

Filewall Types

伪装信任主机/合法地址/电话拨号 绕过防火墙

Demilitarized Zone DMZ 隔离区,控制区,非军事化区

那些需要从外部访问,但是需要一定保护措施的系统通常被设置在DMZ网络中,一般来讲,DMZ中的系统需要或者本身具有外部连通性。

一体化威胁管理产品(Unified Threat Management Products, UTM)

One approach to reducing the administrative and performance burden is to replace all inline network products (firewall, IPS, IDS, VPN, antispam, antisypware, and so on) with a single device, a unified threat management (UTM) system, that integrates a variety of approaches to dealing with network-based attacks. A significant issue with a UTM device is performance, both throughput and latency, e.g. typical throughput losses for current commercial devices is 50%. Figure 9.6 is a typical UTM appliance architecture, in it note:

  1. inbound traffic is decrypted if necessary before its initial inspection. If the device functions as a VPN boundary node, then IPSec decryption would take place here.
  2. an initial firewall module filters traffic, discarding packets that violate rules and/or passing packets that conform to rules set in the firewall policy.
  3. then, a number of modules analyze individual packets and flows of packets at various protocols levels. A data analysis engine is responsible for keeping track of packet flows and coordinating the work of antivirus, IDS, and IPS engines.
  4. the data analysis engine also reassembles multipacket payloads for content analysis by the antivirus engine and the Web filtering and antispam modules.
  5. some incoming traffic may need to be re-encrypted to maintain internal security
  6. all detected threats are reported to the logging and reporting module, which is used to issue alerts for specified conditions and for forensic analysis.
  7. the bandwidth-shaping module can use various priority and quality of service (QoS) algorithms to optimize performance.

IDS

Type

基于主机or网络或混合

Host-based IDS

specialized software to monitor system activity to detect suspicious behavior

检测内容: 系统调用、端口调用、系统日志、安全审记、应用日志

Network-based IDS

  1. Monitors traffic at selected points on the network
    1. Real time; packet-by-packet

IDS detection Model

Misuse detection/signature detection

anomaly detection

Hybrid

目前商业化的入侵检测产品大都是将误用检测技术和异常检测技术结合起来,以误用检测模块作为主体,异常检测模块作为有益的补充。