Effective means of protection a local system or network of systems from network-based security threats while affording access to the outside world via WAN`s or the means of protection a local system or network of systems from network-based security threats while affording access to the outside world via WAN`s or the Internet | Chapter 10 Firewalls Blekinge Institute of Technology, Sweden +46-708-250375 Henric Johnson Outline Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations Trusted Systems Data Access Control The Concept of Trusted systems Trojan Horse Defense Henric Johnson Firewalls Effective means of protection a local system or network of systems from network-based security threats while affording access to the outside world via WAN`s or the Internet Henric Johnson Firewall Design Principles Information systems undergo a steady evolution (from small LAN`s to Internet connectivity) Strong security features for all workstations and servers not established Henric Johnson Firewall Design Principles The firewall is inserted between the premises network and the Internet Aims: Establish a controlled link Protect the premises network from Internet-based attacks Provide a single choke point Henric Johnson Firewall Characteristics Design goals: All traffic from inside to outside must pass through the firewall (physically blocking all access to the local network except via the firewall) Only authorized traffic (defined by the local security police) will be allowed to pass Henric Johnson Firewall Characteristics Design goals: The firewall itself is immune to penetration (use of trusted system with a secure operating system) Henric Johnson Firewall Characteristics Four general techniques: Service control Determines the types of Internet services that can be accessed, inbound or outbound Direction control Determines the direction in which particular service requests are allowed to flow Henric Johnson Firewall Characteristics User control Controls access to a service according to which user is attempting to access it Behavior control Controls how particular services are used (. filter e-mail) Henric Johnson Types of Firewalls Three common types of Firewalls: Packet-filtering | Chapter 10 Firewalls Blekinge Institute of Technology, Sweden +46-708-250375 Henric Johnson Outline Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations Trusted Systems Data Access Control The Concept of Trusted systems Trojan Horse Defense Henric Johnson Firewalls Effective means of protection a local system or network of systems from network-based security threats while affording access to the outside world via WAN`s or the Internet Henric Johnson Firewall Design Principles Information systems undergo a steady evolution (from small LAN`s to Internet connectivity) Strong security features for all workstations and servers not established Henric Johnson Firewall Design Principles The firewall is inserted between the premises network and the Internet Aims: Establish a controlled link Protect the premises network from Internet-based attacks Provide a single choke point Henric Johnson .