Page 382 - StudyBook.pdf
P. 382

366    Chapter 6 • Infrastructure Security: Devices and Media

                 Packet filtering has both benefits and drawbacks. One of the benefits is speed.
             Since only the header of a packet is examined and a simple table of rules is
             checked, this technology is very fast.A second benefit is ease of use.The rules for
             this type of firewall are easy to define and ports can be opened or closed quickly. In
             addition, packet-filtering firewalls are transparent to network devices. Packets can
             pass through a packet-filtering firewall without the sender or receiver of the packet
             being aware of the extra step.A major bonus of using a packet-filtering firewall is
             that most current routers support packet filtering.
                 There are two major drawbacks to packet filtering:

                  ■   A port is either open or closed.With this configuration, there is no way of
                      simply opening a port in the firewall when a specific application needs it
                      and then closing it when the transaction is complete.When a port is open,
                      there is always a hole in the firewall waiting for someone to attack.

                  ■   The second major drawback to pack filtering is that it does not under-
                      stand the contents of any packet beyond the header.Therefore, if a packet
                      has a valid header, it can contain any payload.This is a common failing
                      point that is easily exploited.

                 To expand on this, since only the header is examined, packets cannot be filtered
             by user name, only IP addresses.With some network services such as Trivial File
             Transfer Protocol (TFTP) or various UNIX “r” commands, this can cause a
             problem. Since the port for these services is either open or closed for all users, the
             options are either to restrict system administrators from using the services, or invite
             the possibility of any user connecting and using these services.The operation of
             this firewall technology is illustrated in Figure 6.1.
                 Referring to Figure 6.1 the sequence of events is as follows:

                  1. Communication from the client starts by going through the seven layers of
                      the OSI model.
                  2. The packet is then transmitted over the physical media to the packet-fil-
                      tering firewall.
                  3. The firewall works at the network layer of the OSI model and examines
                      the header of the packet.
                  4. If the packet is destined for an allowed port, the packet is sent through the
                      firewall, over the physical media, and up through the layers of the OSI
                      model to the destination address and port.





          www.syngress.com
   377   378   379   380   381   382   383   384   385   386   387