Kingston University London

Kingston University London
Thesis Title
Design and Implementation of a Network Security Policy Based on Firewalls
Dissertation submitted
For the Degree of Master of Science in Networking and Data
Communications
By
FILIPPIDIS VASILEIOS
SUPERVISOR
DR. PANAYIOTIS KOTZANIKOLAOU
KINGSTON UNIVERSITY, FACULTY OF COMPUTING, INFORMATION
SYSTEMS & MATHEMATICS
ΤEI OF PIRAEUS, DEPARTMENTS OF ELECTRONICS AND
AUTOMATION
JULY 2011
ACKNOWLEDGMENTS
I would like to thank everyone for their helpful support and subscription, in a
professional or personal status, to carry out my thesis subject and finally my Master
of Science (MSc) studies have come to an end.
I especially thank my professor Dr. P. Kotzanikolaou for being my supporter and of
course my advisor for this thesis accomplishment.
Several people deserve my thanks for their help, support and being next to me but
very special thanks to Antonis Anagnostopoulos for his time, for sharing his
administrative support and for his friendship.
2
TABLE OF CONTENTS
ABSTRACT ........................................................................................................................................... 4
1. INTRODUCTION .......................................................................................................................... 5
1.1.
Thesis Statement .................................................................................................................. 7
1.2.
Terminology ........................................................................................................................ 7
1.3.
Thesis Outline ...................................................................................................................... 8
2. Related Work – Background ........................................................................................................... 9
2.1.
Firewall Concepts ................................................................................................................ 9
2.2.
What is a Firewall? ............................................................................................................ 11
2.3.
Types of Firewall ............................................................................................................... 13
2.3.1.
Packet Filters................................................................................................................. 13
2.3.2.
Stateful Inspection Packet Filter ................................................................................... 14
2.3.3.
Application.................................................................................................................... 15
2.3.4.
Hybrid ........................................................................................................................... 15
2.4.
Mentioned Firewall Advantages ........................................................................................ 16
2.5.
Firewall Interfaces: Inside, Outside and DMZ................................................................... 18
2.6.
Firewall Policies ................................................................................................................ 19
3. Designing the Test-Bed Environment ........................................................................................... 20
3.1.
Evaluation of different solutions........................................................................................ 20
3.2.
Test-Bed Environment ....................................................................................................... 21
3.3.
Security Network Design .................................................................................................. 23
3.4.
Network Details ................................................................................................................. 23
3.5.
VMware Machines............................................................................................................. 24
3.6.
Encountered Problems ....................................................................................................... 25
4. Network Security Policy ............................................................................................................... 27
4.1.
Groups and Nodes.............................................................................................................. 28
4.2.
Networks............................................................................................................................ 29
4.3.
Security Zone Objects........................................................................................................ 29
4.4.
Basic Firewall Configuration & Policy Rules.................................................................... 31
4.5.
Extending Firewall Configuration ..................................................................................... 33
5. The Process of Implementation..................................................................................................... 35
5.1.
Brief description of the Virtual Machines.......................................................................... 35
5.2.
The Setup of Virtual Machines .......................................................................................... 37
5.2.1.
Mail Server ................................................................................................................... 37
5.2.2.
Web Server ................................................................................................................... 37
5.2.3.
Firewall ......................................................................................................................... 38
5.2.4.
Administrator’s Workstation......................................................................................... 40
6. CheckPoint Smart Console R70 Programs ................................................................................... 42
6.1.
Smart Dashboard ............................................................................................................... 43
6.2.
SmartView Tracker ............................................................................................................ 43
6.3.
SmartView Monitor ........................................................................................................... 44
7. Summary, Conclusion and Future Directions ............................................................................... 45
3
ABSTRACT
This thesis, studies the design and implementation of a network security policy based
on firewalls. This implementation will provide a virtual organization unit emulating a
real one, due to the use of virtualization software. This emulated environment will
provide the prerequisites for the implementation of this project.
A firewall in general is a unique powerful equipment that gives all the magic skills to
its owner. In our case, with the additional settings and configuration, it provides an
amazing shield against to any unreliable item, person or organization.
This thesis will start with a general analysis of firewall technology, how to categorize
firewalls and what their individual role is. This section will continue with a
classification of firewall layers, presenting their advantages and disadvantages. It
ends with a historical description and overview about firewalls.
We introduce the steps that this essay will follow, so the precondition information
and data will be ready to support this implementation. The data that have as purpose
to give life to this implementation are the design and definition of a Test-Bed along
with the network security policy.
The implementation of a virtual Firewall based on the CheckPoint technology side
by side with all the necessary peripheral machines, will give “flesh and bone” to a
real environment structure.
CheckPoint as one of the most reliable firewall, with the relevant settings of its basic
and extended modulation, will give a combination of dexterity, knowledge and the
philosophy of building a dynamic structure of your network.
4
1. INTRODUCTION
Some decades ago, Universities along with some companies and agencies
were the first organizations that started a new communication method, which was
called Internet. At the beginning internet wasn’t so famous. The need of someone has
to look for something useful and interesting has made the Internet one of the most
famous searching machines. From that day till now, everything has been changed.
Day by day, the number of people that relies on the power of Internet is extremely
high. The value of important information makes networks a candidate target from
security attacks.
Talking for security problems, in the past, was really a joke. Now, a possible attack
from other user, hacker or virus is 100% positive and extremely dangerous without
the appropriate help. That’s why companies have started to spend their budget for
new applications, projects, procedures, products but most of it, to new and more
secure mechanisms for all these anonymous threats and attacks.
There are many types of attacks, some of them are:

Scanning and Spoofing

DoS attacks

Trojans, worms and viruses

Software attacks
All the above, along with other types of attacks, have to be stopped from the
beginning of their attempt. A virus in a network structure is something like a virtual
intruder which is unstoppable and invisible.
Before giving a brief description of what firewalls are and what this thesis will give
to the audience, it is necessary to present the preliminaries. Before the
implementation of a firewall, there is a need to design an appropriate and compatible
security policy. This step is so important because all the mapping analysis with the
access permissions and deny rules for the incoming and outgoing traffic is here.
Anything wrong in the design may have vital sequences for the security of the
organization.
5
From an engineering perspective (Ralph et al.2002), an efficient policy has the
following characteristics:

States its purpose and what or who it covers.

Is realistic and easy to implement.

Has a long-term focus—in other words, does not contain specifications that
will change often.

Is clear and concise.

Is up to date, with provisions for regular review.

Is communicated effectively to all affected parties, including regular
awareness training.

Is balanced between security of assets and ease of use.
In a booklet, Tina Darmohray (1983) emphasized that in 1988 a worm with the name
“Morris” hit the internet very hard. After the worm, the attention turned to secure the
network for the first time. This event was the starting idea of the “Network Access
Control”. From all the interesting and useful books, white papers and technical
reports, it is common acceptable that there is not a single term of the word “Firewall”
and apart from that, there is not a general model that will describe the idea of a
firewall technology.
In the architectonic terminology the word bricks & mortar is the beginning of what
exactly the firewall is. A firewall in buildings is a good structured wall with the
power of stopping fire or any other things that want to pass through. A network
firewall is exactly what it is mentioned above, it is, somehow, a wall that protects, in
general, the inside secured and trusted network (users, machines and applications)
from the outside, unsecured and dangerous malicious Internet (Robert J. Shimonski
et al, 2003). In other words, it is the software or hardware machines that allow or
reject the access to the incoming or outgoing traffic.
Figure 1: Firewall Diagram I (West IT Solutions, 1980)
6
1.1. Thesis Statement
Even if there is not a certain consolidation for a firewall model, this paper will try to
give not only a brief review of the up-today bibliography but will also present a TestBed network design. Through this implementation all the traffic from inside and
outside of the network will be filtered with the use of a proper security policy.
This network security policy will come from theory into practice through one of the
most popular firewall mechanisms, namely the CheckPoint firewall (Gonðcalves,
Marcus, 2000). This firewall holds one of the top positions in vendors firewall
market including Symantec, Cisco and of course Secure Computing.
From the implementation of this Test-Bed environment, a firewall model comes to
give real evidences across the design of the structure, sub-networks, network zones,
security levels, rules and polices.
The main goal in every research is to examine and analyze all the possible
perspective of the subject and through an implementation to give answers to all the
unanswerable wonders.
1.2. Terminology
The right place to include all the key-words that dissertations use or the words that a
subject thesis refers to, is the Terminology Chapter.
L. Morales (2010) described the word network as the inter-connection of cables and
other communications media, connectivity equipment such as switches and routers,
electronic devices such as computers, printers, scanners, plotters, etc., for the purpose
of sharing data and resources.
With the helpful data, from Information Technology Security Evaluation Criteria
[ITSEC] (1991), which is a recognized place with security and product evaluation
from a lot of European countries, the terminology of security policy and more
specific the corporate security policy is the set of laws, rules, and practices that
regulates how assets including sensitive information are managed, protected, and
distributed within a user organization.
A Test-Bed environment is a configured platform or in other words a summary of
software, hardware equipment that has been configured in a way of helping a team of
researchers to test their projects and take their results.
7
Subnetworks and network zones and their definitions will occupy us in the following
Chapter during the implementation of the firewall.
1.3. Thesis Outline
The organization of Chapters is the following. Chapter 1 has the introduction along
with the thesis statement and terminology. In Chapter 2 the background of firewalls
in general and a small history flash back will introduce all type of firewalls, the
advantages and disadvantages and not to forget the firewall policies. In Chapter 3 we
present the design of the Test-Bed environment. This includes the evaluation of
different solutions, a presentation of the Test-Bed structure, the network details and
the encountered problems that appears in the middle of this thesis. Chapter 4 includes
the network security policy which is one step back from the process of
implementation. In this Chapter we have ready all the available information about
groups, users, networks, security zones and finally basic and extending policy rules.
In Chapter 5 will bring the process of implementation during the data that come from
the security policy. In this setup all the virtual machines will transform to an
imaginary but real organization. Finally this thesis will end with the configuration of
the most powerful firewall console. This console “Checkpoint Smart Console R70”,
will be analyzed in Chapter 6. In other words CheckPoint Smart Console R70 will
give a brief view of what this firewall can do in real conditions.
Figure 2: Firewall (Shutterstock, 2010)
8
2. Related Work – Background
2.1. Firewall Concepts
It is about some years now the existence of internet is considered to be a very
promising tool and a great chance offered to business in order to develop their
relationships with customers and organizations. (Stackpole B., 2004). These
appropriate relationships can also include any channel of services delivery in the
context of exchange, while those could exist in business or any other entertainment
service.
Some people have also said that there is a number of about 60,000,000 users and
their predictions estimate this to be increased into 1,100,000 in 2011. Moreover, Bill
Gates has mentioned that information gained through internet is considered to be
changed in near future and actually the way that internet services will be offered to
users. These predictions are considered to be true, with Adams Smith’s views about
the idea of free capitalism and the trading through web, they will come true real
soon. Despite the enthusiasm that will actually come along with many internet users
in our days, there are also some organizations which do not operate through the
existence of internet use. As Howard Rheingold has stated, in our era there is a great
number of prophets who profit by the use of internet, through organizations and
businesses.
However and according to all those trends and phenomena, all these could change in
near future. Various specialists to that field have stated that any proposition that
exists right now, is about to change the size or effect of any virtual community as
also the creation of different channels for the distribution service through the web
upon a way that communication will be organized much better. What should also be
noticed here about is the various arguments concerning the case of virtual
communities which can become very critical on the fact that customers will also be
served to develop any relation. Some organizations can also have the control of very
popular websites and by consequence to dominate a great number of daily
transactions talking about a place inside the channels of World Wide Web.
By far, it could therefore be said that any individual network could also lead to a
digital platform of provision information as also could set all those standards for any
9
new and updated conduits of trading as also business’ purposes. Finally, there also
some different opinions which mention that any revolution of virtual communities in
the world web and the sector of organization services and especially on the indirect
and direct channels, could also be used extensive e-commerce, trading or even social
relationships.
As was already mentioned above, it is actually a fact in our days that the aspect of
Internet has evolved and provided support to a considerable small community of
some users who have actually valued great openness for the details of collaboration
and sharing (Habtamu, 2000). Particular opinion was also challenged by Morris
Warm. Although, still without opinion of Morris Worm, providing trust to
community could cause some serious thoughts of variegation. Remarkable examples
of some successful or mutual attempted intrusions, almost in the same period and
time, could include the discovery made by Stroll as to the German spies tampering
inside this particular system. Moreover, Steven M. Bellovin (1994) proceeded to the
description of a specific collection of attacks where he noticed those while he was
monitoring the firewall of AT&T and the various networks around this case.
As a result it was found that there were some different malicious as also
untrustworthy users on the web. Due to the fact that not all of those could be trusted
and by the time that networks are connected together, a slight different level of trust
has to exist on both sides of the connection. The term trust refers to the aspect that
some organizations could believe that software as also the users on the computers,
are not perceived as malicious one. To that point, it could be said that firewalls are
used so as to enforce trust boundaries and which those are imposed for a great variety
of reasons, like the security problems in the operation of systems where those
mentioned to the Windows 95 and Windows 98 as also to many others
configurations. In advance, file sharing turned to be a default where a collection of
serious viruses could also exploit such vulnerability.
For the above mentioned reasons, it should be noticed that individuals could protect
their computers by connecting to the web and just purchasing a personal owned
firewall. In most of the times by trying to underlie some operating systems,
appropriate firewalls can simply provide a security to users when those proceed to
communications through internet. All the above firewalls can also be used in
10
personal laptops and home computers. At this particular case, the aspect of trust
boundary is considered to be the actual network interface of the preventing machine
(Ingham and Forrest, 2002, p. 1-2). Firewalls can also work in a way with which they
could prevent access to information. National firewalls are just one example of this
case where they protect people from attacks on their computers and appropriate
activities.
The aspect of enforcing a policy is just one aspect of firewalls. It could be mentioned
that technology of firewalls is used so as to protect networks by just installing it in a
specific way at some single security screen stations and in cases when intranets or
private networks are being connected to the web, making it just easier to ensure
monitor traffic, security and audit as also to trace some break in attempts (Ingham
and Forrest, 2002, p. 1-2). Moreover, it has to be noticed that firewalls are used to
isolate specific sub-networks within a business. Packet filtering (Ariane Keller,
2006), application proxy (Fortinet, 2000) and circuit proxy (uCertify Articles, 2010)
are just three basic approaches used in firewalls in order to provide protection to
network. Finally, there are authors like Habtamu, who classifies these into two kinds
of approaches, the application and transport levels.
2.2. What is a Firewall?
Trying to provide the definition of firewall, it could be said that a firewall is a
network device that can enforce a security policy within a network. By the time that
those were developed, some various methods have been used in order to implement
these irrespectively (Ingham and Forrest, 2002, p. 1-2). Particular methods could
operate in a way that filter the network traffic to all seven layers of OSI network
model and most specific, at the specific application of data link, transport and
network levels. In advance, specialists have also developed some recent methods like
the distributed firewalls and protocol normalization but these have not been adopted
widely in our days.
11
Figure 3: 7 OSI Layers (OSI Layers, 2010)
From the beginning, the area of firewalling was only for a small number of people
with expert knowledge, specialized in programming environment and administrative
skills. They put firewall in a place between the internal local network and the outside
world which is the Internet. But day after day, things have been changed and
networks have been getting bigger with more complex departments. This was the
start of transformation the building configuration of firewalls.
Due to the fact that some appropriate data has to be able to pass in and out of a
firewall and in order to protected the network to be considered as useful, we have to
focus on some various attacks that must stop by the firewalls, straightforward. In
order to be achieved this goal, technologies like the VPN – Virtual Private Network
(Netgear Inc, 2005) and peer-to-peer (Dejan S. Milojicic et all, 2003) networking
may pose some completely new challenges for the firewalls. There are actually some
different devices and appliances sold in the market which could provide connectivity
to a firewall network. This is known as subscriber unit. Moreover, it should be said
that there is an extremely increasing focus on the portable units where this could
include the handsets, the Smart phones, the PC peripherals and the USB dongles. All
these devices could be embedded to laptops which in our days are available with WiFi services. In advance, it should be noticed that the operators emphasised in the
consumption of the electronics appliances like the gaming consoles, MP3 players and
all the similar devices where firewall is considered to be more similar to the Wi-Fi
that the 3G cellular technologies.
Some papers and books have noticed that the first type of firewall has been
developed and written in the early of 1990s, from a well-known those days
researcher called Marcus Ranum. He was working for TIS those days and the name
of his firewall was Firewall-Toolkit or in other words FWTK. It was an application
12
proxy type and was playing the intervener between servers and Users. For all the
deployments – researches, the main goal was to make something easy and of course,
definitely working in real-time.
Those aspects of firewalls were actually developed from the specific outset for the
main delivery of the broadband services including also the voice, data, and video
accordingly. Upon the use of the fast air link, the asymmetric downlink/uplink
capability and the flexible resource allocation mechanism, the use of firewalls can
also meet the QoS requirements for a wide range of the whole data services and
various applications. Inside the aspect of firewall layers, the QoS (Quality of
Service) is also been provided via the service flows.
In the following Chapter, the different and flexible types of firewall will give the
answers to the complexity and tricky development structure.
2.3. Types of Firewall
From previous Chapters, Firewall-Toolkit was the first application proxy firewall.
With the helpful structure of OSI layers, everyone could realize that there are
firewalls with a different approach and ways to be developed. Some of them are
Packet filters, Stateful inspection packet filter, Hybrid and of course the application
proxies. A few words in the following sub-Chapters will solve all the unanswered
questions.
2.3.1. Packet Filters
The packet filters is something like the access-list in Cisco Routers. They applied to
specific interfaces, either in or out. The “in” or “out” mean that it filters the incoming
or outgoing traffic. The IP packet filter can be based on the source / destination IP
address and source / destination Port Number.
Some simple packet filter examples are the following:

In the following example, suppose that you a have a network, 194.215.3.0/24.
With the following rule you are able to stop anyone from the internet to send
ping packets to this network.
Iptables –A FORWARD –d 194.215.3.0/24 –p ICMP –j DROP
13

In this example, imaging that you have a private network and you don’t want
the internet to watch the shared files. So the only thing that you have to do is
to put the following rule.
Iptables –A FORWARD –p UDP –sport 137:139 –j DROP
It must be highlighted here that the real job of packet filter is to compare IP header,
of one by one packets with a table to see if the packet is allowed to continue to the
next hop or not. If the rule permits it then the packet goes in the next one until
finishing all the rest rules. It is extremely inexpensive as much flexible and fast.
So why people don’t trust packet filter like other firewalls? The answer is a little bit
difficult. As we will see in the following Chapter, packet filtering has some
disadvantages to deal with. The most important is that it cannot keep track of session.
This is something very important because IP spoofing attacks is a vital enemy for
them. Further more it has to be with a lot of applications that dynamically allocate
port numbers and this can cause problems with deny rules.
At the end, UTP traffic makes things 100 times harder than TCP traffic.
2.3.2. Stateful Inspection Packet Filter
The idea of stateful inspection came after some better concepts about improving the
process of packet filtering. Now the disadvantage of the above firewall type has been
here a great advance and benefit.
A packet filter is able to track all the network sessions. So when a packet is on, our
interesting interface, it specifies its rightness by matching the packet in the
connection table. This table is a place where all connections have been written until
the end of the standard time.
When an entry is written on this table and the firewall recognizes the first SYN
packet then the TCP session starts. From that time, that entry has been record and it
plays the role of a reference for the up following packets.
Something similar but not so stateful are things with UDP. A good example of UDP
packets is FTP or in other words File Transfer Protocol. Although stateful inspection
packet filter is the quickest firewall, it will always be less secured than the
followings.
14
2.3.3. Application
A network-based application layer is considered to be a computer networking
firewall at the most appropriate protocol stack, and is also known as a proxy-based or
reverse-proxy firewall. Application firewalls specific relate a particular kind of
network traffic that may be titled with the service name, such as a web application
firewall (Yeng N., 2009). They might be implemented through software running on a
host or even a stand-alone piece of network hardware. Most of the times, it is a host
using various forms of the well known proxy servers so as to proxy the traffic before
passing it on to the client or server. Due to the fact that it acts on the application
layer, it may inspect the contents of traffic and block specific content such as certain
websites, viruses that attempts to exploit known logical flaws in client software.
Finally, it should be noticed that network-based application-layer firewalls work on
the application level of the network stack, and it might intercept all the appropriate
packets by travelling to or from an application. In other words, application firewalls
can also prevent all the unwanted outside traffic from the reaching protected
machines. Modern application firewalls may also offload encryption from the
servers, by just blocking the application of input/output from the detected intrusions
or malformed communication, manage or consolidate authentication, or the block
content which violates the accumulative (Vacca A. J., 2010).
2.3.4. Hybrid
It is worth mentioning that, this Chapter could complete the analysis of different
firewall categories and it is necessary to work-out the last but most common type of
firewall, which is the hybrid.
Previous Chapters have all the required elements and reasons of firewall necessity.
That’s why the security of a private network even if it is a home or a company has
been the primary and most important objective for system and network administrator.
In 2011, the best ways of creating a firewall is to invest and construct not only one of
the above types but a combination of all these. With this product the network will
have a strong and capable security.
The best example of a hybrid firewall model is Netfilter / IPtables.
15
For their helpful website, “www.netfilter.org “, they make clear of the main role, the
combination of what well-known types of firewall they use along with main features.
So, it is good to mention that Netfilter supports the three following basic functions:

packet filtering

network address and port translation (NAT/PAT)

flexible and extensible infrastructure
From Chapter (2.3.2), packet filtering had a clear and full understandable analysis.
-
But what about NAT?
Network Address Translation (NAT) is one of the most well-known access-control
mechanisms in the first line of defence. As everybody knows, most broadband
connections come with a single IP address which is sometimes static or dynamic. If
more than one machine from outside wants to connect with the internal network,
NAT is the only way that will work with. It enables LAN to use one set of IP
addresses for internal traffic and a second set of addresses for external traffic.
The three main purposes that NAT serves are:
a) It is one of the best security services, after packet filter.
b) It enables to use more internal IP addresses.
c) It allows a combination of multiple connections to create singe faster Internet
connections.
Some of the disadvantages of NAT are the followings:
a) Can be run with static address services but not from dynamic.
b) With UDP dynamic allocation requires state information and this is not
available.
c) Embedded IP addresses are a problem and NAT boxes only know certain
protocols like VPNs, SNMP, BOOT, etc.
d) Dynamic allocation of ports may interfere with packet filtering.
2.4. Mentioned Firewall Advantages
Concerning technologies like the Triple-play, it is good to say that is supported by
Firewall, as QoS – Quality of Service and Multicasting can be obtained. It should be
mentioned that on May 7th, 2008, companies of Google, Intel, Comcast, Time
16
Warner and House proceeded to the announcement of a pooling of an average 120
MHz of spectrum and merged upon Clear wire so as to form a business which could
receive the name “Clear” (Wang, F., 2008).
This new business hoped to benefit from the combined services offerings as also the
network resources and as a major springboard to all its competitors. The cable
companies would also be able to provide some media services to any other partners
while those would gain access to the present wireless network upon provision of
triple –play services (Blanding S., 2004).
There are various analysts who have actually wondered whether this deal works out
due to the fact that although the fixed and mobile convergence has been recognized
in particular industry, there are some prior attempts so as to form partnerships among
the cable and wireless companies have generally failed to lead to some specific
advantages for all the participants (Gregory, An., 2000).
Moreover, a firewall in network is considered to be partitioned into the three
independent architectural components, where those are the Radio Access Network,
the user equipment and the network which provides an IP connectivity in the rest of
the internet. It is presented then that this model can allow a single operator to a freely
mix as also to match the offerings from the different manufacturers for those three
parts and at least after the case where the interoperable equipment, can become
readable in a specific way (Hosny, 2006).
By far, each of those components and in the case of the operational network can also
be deployed and be managed accordingly by the various service providers also.
It has also to be mentioned that with some previous data networks, the IP is
considered to be fundamental manufactured in a network of firewall. By far, the IP
can currently “play” a basic role in the actual state of the telecommunications
industry accordingly (Hosny, 2006). Finally, the protocols, which are standardized
by the Internet Engineering Task Force, are also preferred over the proprietary
solutions and there are also adopted in the reference model.
17
2.5. Firewall Interfaces: Inside, Outside and DMZ
In the most of the cases, a type of firewall is consisted by two network interfaces,
known as inside and outside. Those actual labels are mentioned to the appropriate
level of trust in the case of an attached network, where the outside interface is being
connected to the intranet as also the inside interface will be connected to the
appropriate trusted network
Moreover, it should be noticed that a business internet access needed also to become
some more complex and all the limitations of just having two interfaces becoming
apparent. For example, where a company to put his web server for its customers and
in what position. Let’s say that if someone places it on the outside of the firewall, the
web server is considered to be fully exposed to the various attacks and only one
screening router so as to provide some minimal protection. For such reason, people
have to rely on the aspect of security of the host system in that case (Cisco PT Guide
to Firewalls, 2010).
Some other possibilities exist in the two interface firewall scenario which is to place
the web server inside the firewall and on an actual internal segment. This will
actually protect some direct honesty for the internal network by an attacker but the
question that arises is: What if a person is able to compromise his /her web server
through port 80 so as to gain remote super user access?
Particular solution would allow for some establishment of intermediate zones for the
trust that are considered to be either inside or outside. Those are referred actually to
the DMZs (Cisco PT Guide to Firewalls, 2010).
Such a DMZ network is actually protected by a case of firewall to the actual same
extent like the internal network which is spitted in order to access from the DMZ to
the internal network and this will also be filtered. There is also another design where
sometimes deployed by using two possible firewalls. The first makes a word for the
outer one and like an inner one, upon the DMZ which lies between these.
Although, particular evidence has shown that all firewall breaches come from the
aspect of mis-configuration, not from the errors in the firewall code itself. Therefore
this design can only increases the management and the expense overhead but without
providing some additional security. Some appropriate sites would have also
implemented various DMZs, where each would have a different purpose or scope
18
and would correspond to a specific level of trust. For such case, one DMZ sector
would contain only the aspect of servers for the public access, whereas someone else
could host particular servers for basic customers.
In a case of more complex e-commerce environment, web server might also need to
access some customer data by a backend database server on the internal LAN. In
particular case, a basic firewall could also be configured so as to allow Hypertext
Transfer Protocol (HTTP) connections from the outside of the web server and after
that some specific connections to the relative IP addresses and ports as those needed
from the web server to the actual inside data server accordingly.
2.6. Firewall Policies
Firewall policies used actually as a basic part of the security of an assessment
process and where people should appraise a clear idea for the various business
sections and for the various communications allowed via the existence of firewall.
For such case, it could be said that each of those protocols carry some certain risks
and some far more that some others (Yeng N., 2009). These particular risks should
be balanced upon business chances but they have also to be balanced upon people’s
business benefits.
On the other hand, a drop box of File Transfer Protocol (FTP) server for the sharing
of files upon customers who might also satisfy those specifications. Therefore most
of the times occur that a firewall rule base can grow organically over the time so as
to reach a point where the administrator no longer can fully understand the reasons
for everything in that case.
For particular reason, it is considered to be well documented that a firewall policy
should be implemented within a business justification for each of the rules clearly
mentioned in that case. Any changes to a firewall policy should have as a result a
serious impact it the analysis – configuration of the firewall. If these kinds of
changes are vital for the company, this may put in a great danger the local unsafe, for
that moment, data.
19
3. Designing the Test-Bed Environment
3.1. Evaluation of different solutions
To find the best firewall solution for our structure and continue with the design, we
have to check and specify the advantages and disadvantages of the alternative
solutions. So after a brief analysis we have to decide which firewall technology is the
best for our implementation Test-Bed. The choices we examined are the following:
a. IPTables
IPTables (Oskar Andreasson, 2001) is a firewall technology for the Linux
environment. Even if it was one of the most accurate firewalls, for people without
knowledge on Linux kernel a little bit trouble and tricky. At the same time, it has a
demanding environment with all the well-known improvements of firewalls like:

Reliable and stable with the requirements of factory specifications

Network Translation

Filtering in IP and Mac addresses

Packet inspection and real-time monitoring

Report and Sys-logging.
In this case, the greatest disadvantage is the lack of knowledge from the creator about
the command and scripting configuration.
b. Cisco-PIX
Cisco-PIX (Peter J. Welcher, 2002) is a well-known firewall technology which was
developed by Cisco Systems. It is a stand-alone hardware machine with a special
operating system called PIX OS with a lot of certifications and evaluation status.
It has a lot of services that make it unbeatable, with the combination of the graphical
user interface, like:

IPSec VPN

DHCP client +server

URL filtering

PPPoE

Tacacs (AAA)

NAT & PAT
20
c. CheckPoint
Finally, examine the CheckPoint firewall (Gonðcalves, Marcus, 2000). For a Cisco
network administrator the idea of a new existing type of firewall, apart from Cisco
Firewall, access-lists and VPN encryption was something strange and not acceptable
sometimes.
But, it was wrong. After some tries with CheckPoint tutorials, guides and during the
setup, configuration and tests, it was clear that it was something new and interesting
for a pliable environment.
CheckPoint supports all the available firewall policies. It has a real time activation of
the rules and policies and, of course, a real monitoring application that helps to
understand what goes wrong in the last update policy.
3.2. Test-Bed Environment
It is impossible to accomplish the implementation and design of a firewall in an
active network environment. Because in real life it is impossible for a person in real
time to arrange all the necessary procedures – instructions.
That’s why a new method that completes all the above have been developed. The
name of this method is the “Test-Bed” environment. A Test-Bed is a combination of
hardware – software and network equipment where all the possible tests are taking
place. It is like a virtual separated place that offers the credential that the creator
wants, like physical memory, processes and hard drives for a real time test and
project.
All the well-known programs and technologies have been tested in a Test-Bed
platform before take the final approval and proceed for publication. In other words it
is something like a LAB where published and rejected projects have definitely
passed through. So for the hardware implementation our Test-Bed structure will be
on a “Server IBM XSeries 206”.
On the other hand, in terms of software, there is a very good and free downloaded
program that in a few minutes is able to scan your computer and finally presents in
front of you the summary of your server – workstation profile.
21
This program, except for the specification of the server, can give, as the most of the
programs, updates and all the peripheral units that you have connected on the
scanning workstation. The name of this program is “Belarc Advisor”.
And the output for the IBM Server is the following figure.
Figure 4: Main IBM Server Specification
Closing the Chapter about the hardware and software parts of a Test-Bed and going
to deeper specifications, we have to present the program that will help us arrange and
create the virtual machines for our imaginary network.
This program’s name is “VMware workstation” and the following Figure (5) will
help in its understanding.
Figure 5: VMware information
This Chapter contains all the necessary equipment (software and hardware) along
with the main idea and the know-how of this implementation.
22
3.3. Security Network Design
The final structure diagram of the network Test-Bed will be presented in this
Chapter.
Figure 6: Network Design Diagram
From figure 6 it is obvious that it has both some easy and some difficult parts for
being developed. This range of difficulties has to do with the experience and the
knowledge on some new methods and structures. But let’s see and collect some other
information first.
3.4. Network Details
Figure 6, represents a real network with 4 different subnets. Each subnet gives the
following main procedure:
a. User Network, where all users workstations through wireless or not take
access to the other 3 network places. The IP of this network is: 192.168.1.0
/24.
b. DMZ Web, where there is the main Web Server, this machine may react with
the User Network and the Internet. The IP for this network is: 192.168.2.0 /24
23
c. DMZ Email, where the central Email Server exists and interacts with the User
Network and the Internet. For this network we have the IP: 192.168.3.0 /24.
d.
The internet has nothing to contrast with all the other ways of connecting
methods. In this case, we have a router with a unique Username and
Password from a Provider, like for example Wind, OTE, HOL or Forthnet.
The internet providers give the access to communicate with other networks
not private but public in all over the world. The IP for this router is
192.168.82.1.
The CheckPoint Firewall can be directly connected with all the other 4 networks, in
this case, we need available 4 Ethernet network cards and the settings for these are:
Ethernet
Eth0
Eth1
Eth2
Eth3
Default Gateway
IP
192.168.82.122
192.168.1.1
192.168.2.1
192.168.3.1
192.168.82.1
Broadcast
192.168.82.255
192.168.1.255
192.168.2.255
192.168.3.255
Mask
255.255.255.0
255.255.255.0
255.255.255.0
255.255.255.0
Table 1: Networks
3.5. VMware Machines
In this section, we will present the characteristics of all the machines in the VMware
Workstation program.
There are Workstations in the User Network. Both machines work with Windows XP
professional with Service Pack 3. They have 1 processor, 512 MB memory and 20
Gbytes hard disk.
On the other side, there are 2 stations with similar specifications like the User’s
Network and each one of them will play the role of a Web and Email Server. Their
Operating System is Windows XP professional with Service Pack 3. They have the
minimum requirements for their job and more specific 1 processor, 512 Mb memory
and a 20 Gbytes available hard disk capacity.
The difficult part that I faced, were the configuration of the CheckPoint Firewall R70
because the operating System is in Red Hat Enterprise Linux 4. The process wasn’t
as tough as I was expecting, but it has some tricky ways of setting the Network
Adapters. This happens because the Linux image file of CheckPoint during the
installation has a wizard method of setting the network cards.
24
A useful snapshot of all the necessary settings in the CheckPoint virtual machine is
the following:
Figure 7: CheckPoint Virtual Machine
3.6. Encountered Problems
Last but not least, we have all the problems that we faced during the implementation.
As a final mark I could say that the installation of the CheckPoint either the
configuration was not easy. Now, I have a very positive status because I am in front
of the configuration of the rules, methods and generally final setting for update the
policy that we expect.
The most major problems that I faced were two:
1. The first one has to do with the license of CheckPoint software. Since the cost
of a working license is unaffordable for the purposes of the thesis, I used 6
trial license of a 30-day period. So if I couldn’t find this way, it could be
impossible to follow this method.
2. The second problem is the performance of my virtual machines and as a
result my central IBM server. This happened when all the VMware machines
are working together at the same time. There was not enough memory space
for a better performance and the hard drive was full. The only solution is to
configure one by one the machines without trying to start more than 3 of
them together.
25
“But what will happen in the final test when everything will be ready for the last test?”
This will be a real problem. That’s why this IBM machine has no chance even if
we extended the resources with 2 more GB of Ram Memory and 1 hard disk of
120 G-bytes for available hard space.
The only solution is a brand new machine which cost was affordable and it has
recommended part (hardware and software) characteristics. The following figure
will give finally the best environment for our virtual machines.
Figure 8: Main HP Workstation New Specifications
26
4. Network Security Policy
In this Chapter, we will try to work on a “real” step-by-step implementation of a
firewall model.
This won’t be as easy as it looks like because the following sections will describe the
phases along with the various methods that a firewall designer need to accomplish,
all the processes, till the end.
To design a firewall capable to secure an organization, you firstly need to scan and
record the network domain along with their policies. In our case, Chapter (3.2)
“Network Details” has already achieved something like that.
This step is so important because without that, the firewall designer is not able to
know:

The internal Zone

The external Zone

The Wireless Zone

The Group of Users

The Services
Before the description of the implementation process in Chapter 5, it is important to
add, analyze and describe some interesting information. This information is the
requirement settings that have to do with the general traffic relation or in other words:
«Who talks with whom? ».
Until now, generally speaking, the relations are:
a. The Internet with everyone but of course not directly, only through the
firewall.
b. The Web Server with the Internet and the User Network
c. The User Network with the Web Server only to port 80 for Internet, FTP and
port 443.
d. Email Server with Internet through POP3 and SMTP services and the User
Network.
27
Now that the preparation of the Test-Bed environment had been finished, it could be
helpful and more descriptive to focus and start the analysis through the following
figure.
Figure 9: Network Objects in “CheckPoint”
Figure (9) has all the requirement features – objects that will be useful and be the
start point to describe more specific our Test-Bed network security policy.
This figure will be the start connector for a better describe of the:
a) Groups and Nodes.
b) Networks.
c) Security Zone Objects
d) Basic Firewall Configuration & Policy Rules.
e) Extending Firewall Configuration
4.1. Groups and Nodes
After a full network scan and a good security policy design, it is time for register the
users of the organization and if it is possible to put them in group for a better
response time of encounter difficult situations. So, for the implementation we have:


1 Group and
3 Users or Nodes. Those are:
28
GROUP:
Internal_Nets: which include the internal networks 192.168.1.0/32, 192.168.2.0/32
and 192.168.3.0/32
NODES:
Srv_Mail_192.168.3.2 : Email Server with IP 192.168.3.2.
Srv_Web_192.168.2.2 : Web Server with IP 192.168.2.2.
Ws_192.168.1.2 : The only one Workstation in the Users subnet with IP 192.168.1.2.
4.2. Networks
One sub-category of Network Objects is Networks. This category plays a great role,
from the beginning of the firewall setup. It is critical to know from the beginning the
number of network interfaces that the organization’ Firewall will need to have for all
the necessary networks because one of the first steps during the setup – configuration
of CheckPoint firewall, has to do with this.
As a result, in this implementation the networks that will be required are:
Networks
IP
Admin-Users
192.168.1.0/32
DMZ_WebServer
192.168.2.0/32
DMZ_EmailServer
192.168.3.0/32
Internet
192.168.82.0/32
Table 2: Network Specifications
4.3.
Security Zone Objects
In CheckPoint, a security zone is a logical network object which brings forward all
the rules and interfaces with similar policy. This is a way of teaming and grouping a
great number of rules under a main network security zone. To group rules under
zones, make the security administrator to have a clear view of what is going on and
response swiftly. In our Test-Bed implementation our Standard Firewall Police has 6
Zones. Every zone has a main idea, moving from a general rule to more specific
points.
The traffic with an incoming or outgoing direction, to our network, is filtered through
all the security zones of firewall from top to bottom. This is a common working idea
like Cisco access-list policy. Every access-list goes to a specific interface inner or
outer of it and every packet passes through this list.
29
If a packet has a similarity with this rule, it follows the certain actions of the rule
otherwise it goes through the end till having something in common with one of them.
The following figure is a good example of all the above.
Figure 10: Example of an inbound Access-list
Our presentation will be continued with the zones and their additional rules that our
network and security administrator have finally created.
Figure 11: Test-Bed Smart Map
From figures No 6, 9 and 11 we have the structure of our implementation zones:

DMZ for Web Server

DMZ for Email Server

External Zone for Network_192.168.82.0/32

Internal Zone for Networks_192.168.1.0/32_192.168.2.0/32_192.168.3.0/32
Table 3: Zone Specification
From previews Chapters, it has been mentioned that DMZ plays the role of an
individual network with an extension security policy. Every DMZ rule work like a
separate for all their adding network object even if it is source or destination.
30
4.4. Basic Firewall Configuration & Policy Rules
Before continuing with the policies of our implementation Test-Bed environment, it
is good to introduce a capture image of our final Graphical User Interface
CheckPoint firewall. In Chapter 5, we will explain in more details the most important
steps of the implementation process.
But let’s see the sub-categories under the Basic Configuration.

Determination of Network Services

Determination of Internal services

Delimitation of Internal trusted Zones, LANs, DMZ and external network.

Access policy for each network area

Configure of Network Address Translation (NAT) and Access Lists (ACL).
For now, this figure presents all the numbered rules with their names, sources and all
the other information that is needed to complete all the used rules for a successful
secured organization. All off them implement the sub-categories of the Basic
configuration except the NAT option.
Figure 12: Capture Icon of Standard Firewall Policy
31
A detailed description of each rule from figure (12) is the following:
a. General ICMP Rule for all the Internal network, where all internal users and
specific the Group “Internal_Nets” (Figure 9) have the availability to accept
and answer to any echo-request from all the internal users.
This is rule number (1), the most general rule, without a specific section title.
b. Management Rules, where the access is permitted only in specific
Workstations to see and configure the Firewall settings for more and better
protection.
This is rule number (2) and it is developed in a way of providing security.
c. Firewall Protection Rules, where these rules have to do with the access
services from and to the firewall it self.
These are also rules number (3) to (5). To sum up all these three rules, we could say
that we stop for both directions any traffic that has to do with the firewall except the
Domain Name System (DNS) as a service. This exception is going to help with the
matching process of internet names with public IP addresses.
d. From LAN Rules, where in this group we have the aggregation of rules that
the Network of Users (192.168.1.0/32) have, in and out of the organization.
These rules are counting from number (6) to (9). The Network design diagram in
figure (6), wants to explain that Users from subnet 192.168.1.0/32 have access to all
the other networks except the internal, any time and with services like HTTP,
HTTPS, FTP and DNS and for Web and Email Server their additional services which
is HTTP for Web and SMTP for Mail. Any other service is getting a prohibit
reaction.
e. From Internet Rules, which rules have to do with the permission – restriction
of DMZ zones with the External Zone (Internet).
Both Web and Email Servers in their DMZ interfaces want proportionally their
Service Port open for right reaction and good corresponding. So, everyone has access
to the Web server only for HTTP service port 80 and something similar for the Email
server with SNMP service. For a better cooperation, we definitely need to permit
access from Email server to everyone for services DNS and SMTP.
32
f. Clean up Rule, which is the last but so important at the same time. This rule
implements one of the most essential ideas. It cuts and drops every other
uncategorized try.
-
But what about the NAT configuration?
The answer will come with the following image.
Figure 13: NAT structure
NAT is a service that transforms or in other words, hides the internal addresses
behind the Firewall. It gives a fake IP address and not the real internal one. As figure
(13) shows, all the internal network addresses are hided behind the firewall and the
Web Server behind an internal IP address for our virtual environment, in real
structure will be a public IP address.
4.5. Extending Firewall Configuration
From the beginning of this virtual implementation, a lot of situations were impossible
to be configured without a real medium. For example, the NAT translation of Web
and Email Servers can’t be real without a public IP.
As an extending firewall configuration we have enable the following:

Anti-spam & Mail

Antivirus & URL Filtering

QoS
None of the above could be proved unless we would try to receive a spam email or
trying to access a URL which is not permitted from our firewall list.
The following figures have been captured to underline how to modify in a proper
way those three extending firewall tools. The figure 14, shows the main control
33
window where all the available tool are ready to be modified. In the next one, you
have the successful status of updating the database with all the new information.
Figure 16 gives the settings for the HTTP protocol and 17 the URL filter Policy
about the denied and accepted URLs.
Figure 14
Figure 15
Figure 16
Figure 17
34
5. The Process of Implementation
We have to point out here that all the steps of a firewall configuration, from the first
one till the end, has to do with the success of the project accomplishment.
Of course, if everything goes as we were expecting and the design comes to an end,
the final structure will start a long variety of tests and debugs capable to bring in
surface all the wrong settings and the unsafe rules. This step which is a vital part of
this process will be succeeded only if the organization starts to work, in real time,
through the firewall.
It is definitely clear that firewall, to continue being part of the organization’s
protection chain against danger, must follow the circle of real life. The circle of life
has to do with the necessity of changing plans and settings to encounter any
dangerous changes. In other words, the firewall has to make changes whenever it is
necessary due to the threading plans of the outdoor medium.
So, in the following Chapter, it is time to introduce you, all the materials along with
the procedure that this thesis followed to give this CheckPoint firewall
implementation.
5.1. Brief description of the Virtual Machines
VMware software is the program that will create a Team of virtual machines and
make this implementation comes true. From Chapter (3), we saw the specification of
VMware workstation’s software and the diagram of the structure. So the following 4
figures have the specification of our 4 necessary machines. These are:
a) CheckPoint Firewall. (Figure 18)
b) Administrator’s Workstation. (Figure 19)
c) Web Server. (Figure 20)
d) Email Server. (Figure 21)
35
Figure 18: CheckPoint Firewall – Linux 4
Figure 19: Administrator’s Workstation – Windows XP – GUI of CheckPoint
Figure 20: Web Server – Windows XP + IIS
Figure 21: Mail Server – Windows XP – Ability Mail Server Software
36
All these virtual machines, with the settings of their peripherals, will work as a team
under a main building and cooperate like real organization unit.
Let’s see how to setup each machine, one by one.
5.2. The Setup of Virtual Machines
We will try to give a briefly description, starting in reverse this time. I captured of
the most important steps during the procedure setup of each machine and this will
give a clear manual configuration.
5.2.1. Mail Server
For the mail Server, the only useful information for this machine is that it works on
an operation system Windows XP and it only needs to setup a software Mail server
of your choice. In our structure we have downloaded and setup a trial version of a
software mail server with the name: “Ability Mail Server”. With this software and
some easy steps, your Mail Server is ready for action.
Figure 22: Email Server useful setup process
5.2.2. Web Server
For the Web Server things were easier. Windows XP have the ability to setup, after
installation of the Internet Information Services (IIS) which is a Windows
Component, a flexible and reliable Web Server. In our structure, we have uploaded a
simple web site of an imaginary company with the name “Infostore”.
37
Figure 23: Web Server useful setup process
Although we said that the introduction will be in reverse, here we will start first with
the setup of Firewall and after that the setup and configuration of the Graphical User
Interface of CheckPoint in the Administrator’s workstation. All these changes in the
writing order for one and only reason, to present how things happened in real time.
5.2.3. Firewall
The most important, useful and interesting part of this implementation starts during
this setup machine. I believe that it is the most important part of this manual. In the
following figures, will be represented the most important steps of the wizard setup
configuration.
Figure 24
Figure 25
38
Figure 26
Figure 27
Figure 28
From figure 24 – 28, we have some of the most important wizard steps of
CheckPoint setup. This has to do with some general information at the beginning like
some useful drivers and the available products that are available for setup. After that
we have to choose the type of Secure platform and the keyboard language which are
the final general information.
All the next steps have to do with more critical information like the IP address that
will have the primary network interface and the web based port that will listen. The
setup will end with an interesting and useful notification. This notification (figure 36)
has all the login information for the graphical interface through browser and this is:
https://192.168.1.1:4433
With:
Login name: admin and
Password: admin, for the first login time.
After the first installation login, the system wants you immediately install a new
login username & password. This is a security policy of CheckPoint.
For configure the CheckPoint platform we have 2 ways.
39
The first one is with telnet. Linux has a complicated language and need a lot of time
to learn it. But some times, it has more clear steps and if you get use to it, everything
can be configured really fast.
The other way is with the helpful graphical interface. This platform works with all
Windows versions and has a manageable, native medium.
5.2.4. Administrator’s Workstation
On this machine, the only thing that we are doing is to continue the process of the
Firewall configuration setup but through the workstation of the firewall
administrator. This machine even if it is one workstation like all the other, it has
something unique, something that change everything. But what is that?
It is the privilege of been the only one that has the credentials of access, manage and
read / write the platform of CheckPoint firewall. In the following steps we introduce
you this configuration.
Figure 29
Figure 30
In figures 29 and 30, we can see that after the new login name: admin and
password:fwadmin, we have access to a real time board status with all the available
information of CheckPoint R70 and the interface of the virtual machine, one for each
network.
Figure 31
Figure 32
40
Figure 33
Figure 34
From figure 31 – 34, we have the network configuration. In this area we are able to
change any IP address of our network interfaces and set up our Domain Name
System (DNS).
Figure 35
Figure 36
In figures 35 and 36, we have the list of all the GUI clients who have the
management of firewall machine, and the product category of setting all the available
and legal licenses.
For the license section we have to say something important. CheckPoint software
without a license, doesn’t work at all. Something like that makes it, one of the best
firewall equipment. All the licenses can be generated only by CheckPoint Web site
and only by authorized login users.
41
6. CheckPoint Smart Console R70 Programs
Figures number 37 – 40 that follow will take us to the real console of CheckPoint.
The only way of setting these consoles is via the website and the downloaded
instructions. That’s why it is necessary to follow these steps.
Figure 37
Figure 38
Figure 39
Figure 40
Something that we have to mention here and especially in figure 40 is the 3 most
important programs of CheckPoint. These are:
a. SmartDashboard
b. SmartView Tracker
c. SmartView Monitor
These programs are doing solid processes, which are management, debugging and
monitoring. The following figures give an idea of what each program is doing.
Of course, the power and the abilities of these programs can’t be understandable
through a captured video or a number of figures. Only with following a setup
procedure and a real time processes users could absolutely understand the program
practically.
42
6.1.Smart Dashboard
Figure 41
Figure 42
In figure 42 we are capable to modify and configure the tools that we want to add or
remove from CheckPoint platform. We have already analyzed all our policy rules in
Chapter (4.4) so let’s continue with the analysis of the other important programs.
6.2.SmartView Tracker
Figure 43
SmartView Tracker is a program that gives a debug of all the processes that come
and go in the CheckPoint firewall. It has a variety of filters and it works like a
storage database for past time history events. This is an undoubtedly necessary tool
for all the network administrators who use CheckPoint equipment.
43
6.3.SmartView Monitor
Figure 44
Finally, the SmartView Monitor is a helpful program that monitors the status of the
firewall in general, the hardware sections and the section of services and protocols.
Ever if it is not opened, all of the time, in front of the User’s screen, it works as a
background program and record everything, 24 hours a day. This is useful if we want
to know for example, what time a service stopped or what the process during an
update installation.
44
7. Summary, Conclusion and Future Directions
This thesis presents an effort to match 2 different views. The first one is the history
of firewall, what it is exactly, the complicated categories along with advantages and
disadvantages.
On the other part, it is the implementation of a Test-Bed environment. This was a
difficult task of this dissertation because I had to face tricky and sometimes
complicated conditions.
The design of this Test-Bed structure had to pass through and complete successfully
a number of tests and finally give correct results.
Along with the network details and the preparation of the VMware machines, a
parallel task was performing a research about the network security policy of our test
organization. The number of groups, nodes and networks has to be checked from the
beginning and without any mistakes.
Finally the CheckPoint Console R70 as a program can be categorized to a medium
difficulty software tool. A person with a network background and with the help of
CheckPoint adminGuides may have a chance to configure a firewall platform of a
small – medium organization.
All the implementation Chapters are trying to give all the creation procedure. It is
obvious that we can’t present all buttons and processes because this essay will never
come to an end.
This manual will provide all the needed information for the installation and
configuration of this Test-Bed environment.
As a future idea could be the extension of internal users in the wireless sector. The
best solution for this type of users is the creation of a new DMZ with a different
subnet IP address. Something like that will put all the wireless users in a policy with
better and more secure rules and zones because as we all know that wireless network
is more susceptible to intruders.
45
References
Ralph Troupe,Vitaly Osipov, Mike Sweeney, Woody Weaver, Charles E. Riley &
2002, Cisco Security Specialist’s Guide to PIX Firewalls, Syngress Publishing, Inc.
Umer Khan,
Darmohray Tina, 1913, ‘Firewalls and fairy tales’ , LOGIN, vol.30, no.1, pp. 20.
Robert J. Shimonski, Debra Littlejohn Shinder, Dr. Thomas W.Shinder & Anne
2003, Best Damn Firewall Book Period, Syngress Publishing, Inc
Carasik-Henmi,
West IT Solutions, 1980, SECURITY. [Online Image] Available from: http://westitsolutions.com
[accessed 19/3/2011].
Shutterstock, 2010, FIREWALL. [Online Image] Available from: http://www.faqs.org/photodict/phrase/9017/firewall.html [accessed 19/3/2011].
L. Morales, 2010, What is Network Security? Simplified Definition, Ezine articles,
http://ezinearticles.com/?What-is-Network-Security?-Simplified-Definition&id=4556878
Fortinet, 2000, Application Proxy, http://www.fortinet.com/solutions/firewall.html
Ariane Keller, 2006, Manual tc Packet Filtering and netem, ETH Zurich
ITSEC, 1991, Information Technology Security Evaluation Criteria (ITSEC), Luxembourg: Office for
Official
Publications
of
the
European
Communities,
Available
from:
http://www.ssi.gouv.fr/site_documents/ITSEC/ITSEC-uk.pdf [accessed 19/3/2011].
uCertify Articles, 2010, WHAT IS A CIRCUIT-LEVEL PROXY?.[Online web] Available from:
http://www.ucertify.com/article/what-is-a-circuit-level-proxy.html.
Stackpole B., 2004, “Application Layer Security Protocols for Networks”, in Tipton H. & Krause M.
(eds), Information Security Management Handbook, New York, CRC Press Company
Zygmunt J. Haas, Marc R. Pearlman, 2000
http://arnetminer.org/viewperson.do?naid=81805&keyword=Marc%20R.%20Pearlman#year2000
Habtamu A., 2000, “An Overview of Firewall Technologies”, Norwegian Computer Center
Netgear Inc, 2005, “Virtual private networking basics”, Santa Clara CA 95054 USA
Steven M. Bellovin , William R. Chiswick, 1994, Network Firewalls, IEEE Communications
Magazine
Ingham K., Forrest St., 2002, “History and Survey of Network Firewalls”, University of New Mexico
7_OSI Layers (2010) [Online image] Available from:
http://wahyu-note.blogspot.com/2010/09/model-jaringan-7-osi-layer.html [Accessed 1/10/ 11].
Vacca A. J., 2010, “Network and Security System”, Elsevier Inc.
Dejan S. Milojicic et all, 2003, “Peer-to-Peer Computing” HP Laboratories Palo Alto
Tiller J., 2004, “Message Authentication”, in Tipton H. & Krause M. (eds), Information Security
Management Handbook, New York, CRC Press Company
Yeng N., 2009, “Secure Computers and Network Systems”, Wiley
46
Wang, F., 2008, ‘Firewall systems: Performance and evolution’ .
Blanding S., 2004, “An Introduction to LAN/WAN Security”, in Tipton H. & Krause M. (eds),
Information Security Management Handbook, New York CRC Press Company.
Gregory, An., 2000, “Applying Communication Theories to the Internet”, Journal of Communication
Management.
Hosny, W., 2006, ’Key Additions in Firewalls’.
Cisco PT Guide to Firewalls, 2010.
Cisco System. (2008). Cisco PIX Firewall Release Notes Version 6.3(5).
Peter J. Welcher. (2002). Cisco PIX Firewall Basics.
Oskar_Andreasson(2001).Iptables_Tutorial_1.2.2_www.kiloxray.com/Linux/Iptables_Tutorial_1.2.pdf
Gonðcalves, Marcus.; Brown, Steven A..(2000). CheckPoint FireWall-1 : Administration Guide Site:
http://www.checkpoint.com .
Man Young Rhee, “Internet Security, Cryptographic principles, algorithms and protocols” Published
2003 by John Wiley & Sons Ltd, The Artium, Southern Gate, Chichester, West Sussex, England.
Richard A. Deal, “Cisco Firewall Security”: Published August 10, 2004 by Cisco Press.
Vitaly Osipov, Mike Sweeney, Woody Weaver, Charles E. Riley and Umer Khan, “Cisco Security
Specialist’s Guide to PIX Firewalls” : Published 2002 by Syngress Publishing, Inc.
Jim Noble, Doug Maxwell, Kyle X.Hourihan, Bobert Stephens, Barry J. Stiefel, Cherie Amon and
Chris Tobkin, “CheckPoint NG VPN-1/FireWall-1” :Published in 2003 by Syngress Publishing Inc.
Robert J. Shimonski, Debra Littlejohn Shinder, Dr. Thomas W.Shinder and Anne Carasik-Henmi,
“Best Damn Firewall Book Period” : Published 2003 by Syngress Publishing, Inc.
Habtamu Abie, Norwegian Computing Center, “An Overview of Firewall Technologies”: Published
January 2000.
Nong Ye, “Security Computer and Network Systems Modeling, Analysis and Design”: Published
2008 by Wiley.
“Cisco IOS Security Configuration Guide” Release 12.2: Published Corporate Headquarters Cisco
Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA.
47