Security Technology: Firewalls and Vpns
Security Technology: Firewalls and Vpns
• Identification
• Authentication
• Authorization
• Accountability
• Application gateways
– Frequently installed on a dedicated computer; also
known as a proxy server
– Since proxy server is often placed in unsecured area
of the network (e.g., DMZ), it is exposed to higher
levels of risk from less trusted networks
– Additional filtering routers can be implemented
behind the proxy server, further protecting internal
systems
• Hybrid firewalls
– Combine elements of other types of firewalls; i.e.,
elements of packet filtering and proxy services, or of
packet filtering and circuit gateways
– Alternately, may consist of two separate firewall
devices; each a separate firewall system, but
connected to work in tandem
• SOCKS servers
– SOCKS is the protocol for handling TCP traffic via a
proxy server
– A proprietary circuit-level proxy server that places
special SOCKS client-side agents on each
workstation
– A SOCKS system can require support and
management resources beyond those of traditional
firewalls
• Sesame
– Secure European System for Applications in a
Multivendor Environment (SESAME) is similar to
Kerberos
• User is first authenticated to authentication server and
receives token
• Token then presented to privilege attribute server as
proof of identity to gain privilege attribute certificate
• Uses public key encryption; adds additional and more
sophisticated access control features; more scalable
encryption systems; improved manageability; auditing
features; delegation of responsibility for allowing
access
Abdul K Mustafa, Fall 2017
Virtual Private Networks (VPNs)
• Firewalls
– Technology from packet filtering to dynamic stateful
inspection
– Architectures vary with the needs of the network
• Various approaches to remote and dial-up access
protection
– RADIUS and TACACS
• Content filtering technology
• Virtual private networks
– Encryption between networks over the Internet
Abdul K Mustafa, Fall 2017