Foundation TopicsFirewall TechnologiesTo understand the different firewall technologies, you first need to have a good understanding of the Open System Interconnection (OSI) reference model. The seven-layer OSI reference model is the standard for network communication and is the foundation upon which each firewall technology was built. The lower four layers of the OSI reference model are generally considered to be the layers that deal with networking, whereas the upper three layers deal more with application functions.Firewalls are the primary components required to perform network perimeter security. The function of a firewall is to permit or to deny traffic that attempts to pass through it, based on specific predefined rules. All firewalls perform the function of examining network traffic and directing that traffic based on the rule set; however, the methods that the various firewalls use may differ. The following are the three different types of firewall technologies, each of which is discussed in more detail in the following sections:
Packet FilteringPacket-filtering firewalls are the oldest and most commonly used firewall technologies. A packet-filtering firewall simply inspects incoming traffic for items that occur at the network and transport layers of the OSI reference model. The packet-filtering firewall analyzes IP packets and compares them to a set of established rules called an access control list (ACL). Packet filtering inspects the packet for only the following elements:
NoteIn addition to the elements just listed, some packet-filtering firewalls check for header information to determine if the packet is from a new connection or an existing connection.Figure 2-1 depicts how traffic passes through a packet-filtering firewall from the source to the destination as compared to the OSI reference model. Traffic is depicted as passing between the network and transport layers because some network layer items are checked (source and destination addresses) and some transport layer items are checked (the transport protocol, such as TCP or UDP). The items listed in the previous paragraph are verified against the ACL (rule set) to determine if the packets are permitted or denied. Figure 2-1. Packet-Filtering Firewall![]()
Packet filtering is a feature that is commonly used on routers. Chapter 7, "Configuring Access," discusses ACLs as applied to the Cisco PIX Firewall in greater detail. ProxyNew Webster''''s Dictionary of the English Language defines proxy as "the agency of a person who acts as a substitute for another person; authority to act for another." Although this definition does not define a proxy firewall, the function is very similar.A proxy firewall, commonly called a proxy server, acts on behalf of hosts on the protected network segments. The protected hosts never actually make any connections with the outside world. Hosts on the protected network send their requests to the proxy server, where they are compared to the rulebase. If the request matches a rule within the rulebase and is allowed, the proxy server sends a request on behalf of the requesting host to the external host and forwards the reply to the requesting host.Proxies run at the upper layers of the OSI reference model. Once again, the connections are established between the network and transport layers; however, the application proxy then examines the request at the upper layers while verifying the request against the rule set. If the traffic meets the requirements of the upper-layer inspection and is verified against the rule set, the proxy firewall creates a new connection to the destination.Figure 2-2 depicts, using the OSI reference model, how traffic passes through a proxy firewall from the source to the destination. Figure 2-2. Proxy Firewall![]() Stateful InspectionStateful inspection, also called stateful packet filtering, provides the best combination of security and performance because connections are not only applied to an ACL but also logged in to a small database known as the state table. After a connection is established, all session data is compared to the state table. If the session data does not match the state table information for that connection, the connection is dropped.Figure 2-3 depicts, using the OSI reference model, how traffic passes through a stateful inspection firewall from the source to the destination. Note that the traffic enters between the network and transport layers, and is verified against the state table and the rule set, while basic protocol compliance is checked at the upper layers. Figure 2-3. Stateful Inspection Firewall![]() Cisco PIX FirewallFour major characteristics of the Cisco Secure PIX Firewall design make it a leading-edge, high-performance security solution:
Secure Real-Time Embedded SystemUnlike most firewalls, the Cisco PIX Firewall runs on a single, proprietary, embedded system. Whereas most firewalls run a firewall application over a general-purpose operating system, the PIX Firewall has a single system that is responsible for operating the device. This single system is beneficial for the following reasons:
Adaptive Security AlgorithmThe Adaptive Security Algorithm (ASA) is the key to stateful connection control on the Cisco PIX Firewall. The ASA creates a stateful session flow table (also called the state table). Source and destination addresses and other connection information are logged in to the state table. By using the ASA, the Cisco PIX Firewall can perform stateful filtering on the connections in addition to filtering packets. Additionally, the ASA generates random TCP sequence numbers for outbound traffic by making it look like a response to an outbound request is unlikely to succeed. Cut-Through ProxyCut-through proxy is a method of transparently performing authentication and authorization of inbound and outbound connections at the firewall. Cut-through proxy requires very little overhead because it occurs as the session is being established and provides a significant performance advantage over application proxy firewalls. Cut-through proxy is discussed in greater detail in Chapter 3. RedundancyChapter 10, "Cisco PIX Firewall Failover." ![]() |