Kinds of Firewall
https://bit.ly/2LHzfzP

Kinds of Firewall

Have you ever stopped to think about what it would be like to get home and discover had your property invaded? or you leave your car in a parking lot and upon returning to search you find out that it was broken into? This type of concern also occurs in information technology environments. Nowadays independently of the branch in which one works the use of the technology of information is fundamental, for example, information storage of clients, generation of invoices, sending of data or budget. These are some of the many situations that we can mention to exemplify the use of technology in the human being's daily life. Most companies have a proprietary data center or cloud to maintain and support servers that publish applications, store database, and provide some kind of online service. There is usually great concern about the integrity, confidentiality, and availability of this data. Depending on the industry, any loss or leakage of data can trigger a negative reputation on the companies and revenue.


At some point in your life, you may have wondered what tools these companies use to try to keep their customers' environment, servers, and data protected from theft. In the early days of information technology, we had as the initial basis of an environment what we call a firewall. This tool went through three generations. The first one came in the 1980s and was based on packet data filtering, with a simple methodology, limited but with a relevant level of security. Working with header analysis with has much information about the package, such as source/destination IP address, size, type of service and other characteristics. Based on this header information and with the established rules, the package is released (for outgoing or incoming network), these actions or attempts can also be registered in a file that we call log. The second generation was developed in the '90s and had the premise of the session state analysis because the TCP transport protocol was oriented by a state table of connections, the packet filters were not effective enough if they did not observe these characteristics. Also known as a stateful firewall, it works by storing the state of connections and filters based on that state. There are three states for a connection: new (new connections), established (established connections), and related connections.

  • Example Stateful Firewall:
No alt text provided for this image


  • Example: Stateless Firewall:
No alt text provided for this image

The third-generation firewall based on the work of Gene Spafford (co-author of Practical Unix and Internet Security), Marcos Ranum (founder of TIS) and Bill Cheswick. Also known as an application firewall. With the diversity of services offered through the internet, the HTTP protocol has become the basis for many applications such as portals and e-commerce. The HTTP protocol was responsible for a significant number of applications, opening space up for new applications to be developed using their own protocols and communication ports. The truth is that the internet has grown so much that it has become a great hub of communication and business platform. This way, the services offered by the internet, which are quite representative, tended to grow. As a consequence of these developments, controlling access by addresses, ports, and protocols, no longer met the needs of some security policies. This type of firewall brought the concept of layer 7 analysis (application), where the solutions were able to identify behavior patterns, not only in the headers but also in the data area of the packages, and to establish which type of application is linked.


A Simple example of the topology of a Web Application Firewall

No alt text provided for this image


Carlos Henriques

Linux | Shell | Shellscript | Bash | Docker | KVM | Kubernetes | Git | Debian | Ubuntu | RHEL | AWS | DevOps | SRE | GitHub | GitLab | Raspberry Pi | ESP32 | ESP8266 | Magalu Cloud | Arduino | Eletr?nica | Python

5 年

Só lembrando que o netfilter disp?e de um módulo o L7-filter. A muito que n?o o acompanho e n?o sei a quantas o projeto está. Mas é uma op??o bem interessante para a prote??o de esta??es Linux em redes que n?o possuam um L7.

回复
Lucas Gon?alves Correia

SRE DevOps Tech Lead na Thomson Reuters | Professor | DevOps Engineer | Cybersecurity Engineer | Linux Engineer

5 年

Parabéns Zoziel Pinto F.

Alexandre Carvalho

Lead Solution Architect | Cybersecurity Engineer

5 年

Great article, congratulations my friend.

Anderson Gomes

Technical Account Manager at Fortinet

5 年

Excellent article. keep going in this way.

Victor G.

Cyber Security Analyst | Pentester at Calian

5 年

Wonderful!?

要查看或添加评论,请登录

Zoziel P.的更多文章

  • From the Zero to Malware Discovery

    From the Zero to Malware Discovery

    Hello people, I was with some time, and I decided to made an analysis using some tools that I commented last post…

    29 条评论
  • Windows Analysis Tips and Tools

    Windows Analysis Tips and Tools

    Hi people, I found some old notes, but useful that I use during an incident, and I decided to share these tools and…

    14 条评论
  • Ransomware is not just a threat, it's a crisis waiting to happen...

    Ransomware is not just a threat, it's a crisis waiting to happen...

    Although I haven't posted anything here, I wanted to share my thoughts on my favorite wicked malware: ransomware. To…

    21 条评论
  • Analyzing Steal Bank Account with Malicious PDF

    Analyzing Steal Bank Account with Malicious PDF

    Hi everyone, as have time I don't post anything, I decided to write one more analysis about stolen bank accounts and…

    11 条评论
  • Analise de arquivos maliciosos - Exemplo 01

    Analise de arquivos maliciosos - Exemplo 01

    English Version O intuito dessa série de artigos é exibir analises de exemplos de arquivos maliciosos que apresentei…

    13 条评论
  • Malicious file analysis - Example 01

    Malicious file analysis - Example 01

    My objective with this series of articles is to show an analysis of examples of malicious files that I presented during…

    3 条评论
  • Analisando ataques de phishing que usam PDFs maliciosos

    Analisando ataques de phishing que usam PDFs maliciosos

    Todos os dias nós recebemos muitos ataques de phishing com documentos(Word, Excel) ou PDFs maliciosos. Resolvi dar uma…

    11 条评论
  • Analyzing Phishing attacks that use malicious PDFs

    Analyzing Phishing attacks that use malicious PDFs

    Portuguese version Every day everybody receives many phishing attacks with malicious docs or PDFs. I decided to take a…

    8 条评论
  • PowerShell Introduction

    PowerShell Introduction

    I wrote this article to show a brief introduction about how to use PowerShell daily. Many professionals work…

    9 条评论
  • Carreira em Cybersecurity

    Carreira em Cybersecurity

    English Version Fala galera sempre escrevo artigos, compartilho posts de alguns sites que acompanho e acho relevante…

    10 条评论

社区洞察

其他会员也浏览了