Customized Network Security Firewall Solution and Implementation

Verified

Added on  2023/04/25

|33
|4910
|387
Project
AI Summary
Document Page
Running Head: NETWORK FIREWALL 1
Contents
Contents.....................................................................................................................................................1
Introduction...............................................................................................................................................2
Literature Review.......................................................................................................................................2
Methodology..............................................................................................................................................6
Requirement Gathering.............................................................................................................................7
Analysis....................................................................................................................................................20
Structural objectives of a firewall........................................................................................................21
Merits of having a Firewall...............................................................................................................22
DATA ANALYSIS........................................................................................................................................23
State Diagram...................................................................................................................................24
Use case diagram.............................................................................................................................25
Activity Diagram...............................................................................................................................26
Firewall Implementation steps........................................................................................................26
Quality Assurance................................................................................................................................28
Conclusion................................................................................................................................................33
References...............................................................................................................................................34
Appendix.................................................................................................................................................35
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORK FIREWALL
Introduction
Done
Literature Review
Firewalls are organized security segments that handle incoming and outgoing
system network traffic dependent on a lot of standards [1]. The procedure of
effectively designing a firewall is confounded and inclined to errors, and it intensifies
as the system complexity grows bigger. An inadequately designed firewall may result
in real security dangers; just because of a system firewall, an association's security
could be imperiled, and also because of an individual firewall, an individual PC's
security is compromised. A confirmed purpose behind ineffectively designed
firewalls, as pointed out in this writing, is the issue of usability. Our point is to
distinguish existing arrangements/solutions that aid professional and non-professional
clients to make and oversee firewall setup records and to examine the
recommendations in regard to ease of use. A precise review of the literature with
attention on the ease of use of firewall arrangement is introduced in this article. Its
primary objective is to investigate what has been done in this field is the recent past.
In the essential choice method, more than a thousand articles were recovered and after
that re-examined. The auxiliary choice drove us to 35 articles cautiously picked for
further examination, of which 14 articles were chosen and brought together. As
primary commitments, we propose a scientific classification of existing arrangements
just as a union and top to bottom talk about the best in class in firewall convenience.
Among the principle discoveries, we saw that there is a need for convenience
assessment or client studies to approve the proposed models. However, all articles are
Document Page
NETWORK FIREWALL
identified with the point of ease of use, none of them unmistakably characterizes it,
and just a couple really utilize ease of use structure standards as well as rules. In this
paper, we will deeply dive into the modern versions of secure firewalls that must be
implemented in the private and public sector in order to get rid of the ever-increasing
cases of cyber-attacks and computer insecurity. Different articles in the past have
reasoned that the firewall is better yet others additionally said that the open source
firewall can be made the same as paid firewall by adjusting the source code. Creators
have compressively considered the highlights of the open source firewall which could
keep the digital assaults which happen on the open source firewall in which they have
made a portion of the standards that would keep the section of the untouchables in the
system. With the goal that the vindictive exercises inside the system could be averted.
For the particular occasion, a Linux firewall has predominant exchange rate execution
and application-level sifting abilities. The Cisco 10s firewall is practically
predominant for system level separating, VPN abilities due to IPSEC, mix with a
heterogeneous multi-convention condition and versatile with help for PKI.
Concentrates have additionally investigated a few Linux extends in trial stages. At
last, the best firewall arrangement might be a blend of both application level and
system level parcel separating. This gives a premise to future trials working toward
general ends between open source executions versus general business usage. Fruitful
advancement of a standard must adjust the requests of reception and dimension of
appropriability. The reception of a standard pulls in providers of correlative resources,
for example, programming and administrations, which thus energizes further
selection. This can be accomplished by cross board innovation authorizing on great
terms, yet thusly, the support risks losing the capacity to suitable monetary rents from
the standard. We portrayed that, all primary security components of the task that was
Document Page
NETWORK FIREWALL
compelling for its prosperity. As we see, practically every one of them was notable
open source programming that can be connected rather than an excessive number of
restrictive and business apparatuses. No product cost, free accessible updates, source
code accessibility, extensive reports thus numerous different highlights can be
exceedingly enticing for entering open source world and using its functional and
supportive programming. In this paper, creators have actualized UTM on PFSense
open source firewall and after that, they have dealt with it as preliminary in
associations. In this paper, creator had characterized Network's security instrument
was the start with the something that can shield the inner system from the outside
getting to. Thus, the firewall is the best edge resistance which it creates to give the
security on the system's traffic. Firewall framework had engaged with system's
condition throughout the years from the straightforward strategy with just parcels
separating to the refined bundle monitors which can choose to permit or square the
traffic contingent upon the its motivation, sources and goals . A dynamic assessment
parcel technique is the best innovation among the others firewall's advances. It is a
decent or complete firewall framework for the system's traffic assurance. In this
paper, the creator have clarified the different deficiencies of the firewall like It can't
obliterate the assault source security.
It can’t resist virus attack
It can’t resist internal attacks
Own vulnerability
The response of useful services
And the future development trends of firewall
Development trend of packet filtering technology
Multistage filtering technology
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORK FIREWALL
Antivirus function of firewall
From the literature review we have seen that the various Companies are
using open source firewall. The list of open Source firewall areas follows.
Untangle PF Sense
IP Fire •
IP Cop •
Vy OS •
Smooth wall •
Endian •
Clear OS
• Zentyal •
IPtables •
UFW •
Murmur
•Configure Server Security firewall
Methodology
What follows is a description of the study in terms of the methods and
methodologies discussed. The study uses triangulation, although it is somewhat more
qualitative than quantitative. It assumes the philosophical viewpoint of realism and
uses the fundamental research method. The study is primarily an inductive one. A
cross-sectional survey, with a questionnaire directed at information security
researchers and professionals, constitutes the main research strategy and data
collection elements of the study.
Document Page
NETWORK FIREWALL
A public survey was done on different parties. We organized a list of questions
aimed at extracting specific data from a particular group of people. This was
conducted by phone, mail, via the internet, and even face-to-face interviews on busy
street corners and in malls. Our major aim in public survey was to increase knowledge
in the field of network security. Generally, survey research is often used to assess
thoughts, opinions, and feelings. Surveys can be specific and limited, or they can have
more global, widespread goals.
Requirement Gathering
In this segment, every one of the questions of research characterized in the
problem statement is examined. Every poll question is identified with one of the
research.
Questions
Q1.What precisely does it mean to "rupture a firewall"? What comprises a
firewall Configuration blunder? The venture plans to gather definitions by specialists
for these ideas, not least to see whether a built-up agreement as of now exists. The
proposed definitions are gathered with the accompanying poll questions.
Q2. How would you characterize a firewall setup configuration blunder? (Free
content reply).
Q3. How might you characterize the demonstration of "breaking a firewall"?
(Free content answer)
Firewalls versus services as Targets for Direct Attack.
Document Page
NETWORK FIREWALL
Do assailants typically even consider firewalls for a direct interference, or do they
target network administrations? The responses to this inquiry can give experiences
into how firewall security could be displayed. For the situation that firewalls are an
objective for attackers, it is critical to consider how much firewalls themselves are
impervious to attacks [4]. In the other case, firewall setup/configuration is of more
noteworthy significance. Especially significant are answers from entrance analyzers
who consistently break or evade firewalls. Answers to this inquiry are gathered
utilizing the survey question below.
Q4: Do aggressors intend in general straightforwardly to target firewalls or do
they tend to target uncovered system administrations? (Free content answer)
The Past and Future of Firewalls
Q5. How, if by any stretch of the imagination, has the job of firewalls changed as
of late, or will it change in the future? The inquiry attempts to decide how much past
investigations on firewall security are as yet applicable, or for to what extent they may
stay pertinent. Answers are gathered utilizing the accompanying survey questions.
Q6: Has the job of the firewalls changed amid the most recent 5 years? In what
way and why? (Free content answer)
Q7: Will the job of firewalls change as more organizations move to the
cloud/SDN-systems? In what way and why? (Free content answer)
Approach to Estimating Firewall Security
Would one be able to deal with assessing firewall security and ponder the
relationship between the firewall and the administrations it secures?
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORK FIREWALL
On the off chance that it is the case that network services as opposed to firewalls
are focuses for a direct assault, one ought to investigate approaches to demonstrate
firewall security in view of network services. To ponder this relationship, two
arrangements of answers are needed; one that decides the most much of the time
uncovered system administrations and another that decides the most as often as
possible helpless ones. The relationship between the two could then be considered.
Answers are gathered utilizing the poll questions below.
Q8: In your experience, which oraaanization’s benefits in corporate systems are
most as often as possible uncovered on the Internet? (Free content answer; list
benefits in slipping request of recurrence)
Q9: In your experience, which arrange benefits in corporate systems do most
oftentimes contain vulnerabilities? (Free content answer; list benefits in dropping
request of recurrence).
Firewall Configuration and Security Policies
How well do firewall designs coordinate the security strategies of the associations
in which they are sent?
One conceivable method for characterizing a firewall arrangement mistake
(which was one of the inquiries in Section 3.1.1) is as a befuddle between the firewall
arrangement, what's more, the association's security approach. Given this definition,
the venture gathering needs to ponder how very much designed firewalls will in
general be. Answers are gathered utilizing the accompanying survey questions. They
are basically a similar inquiry planned in an unexpected way.
Document Page
NETWORK FIREWALL
Q10: How good does the design of the average border firewall you have
experienced matching the association's security approach? (Answer is given as a
number running from 1-5, where 1 speaks to "A few Mismatches" and 5 speaks to
"Flawless Matches")
Q11: Approximately what level of border firewalls that you have experienced
have crisscrossed between their rule sets and the association's security strategy?
More research was conducted online on research monkey where the following
questions were answered.
Answers to the questionnaire in the Appendix are as shown below.
Document Page
NETWORK FIREWALL
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORK FIREWALL
Document Page
NETWORK FIREWALL
Document Page
NETWORK FIREWALL
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORK FIREWALL
Document Page
NETWORK FIREWALL
Document Page
NETWORK FIREWALL
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORK FIREWALL
Document Page
NETWORK FIREWALL
Document Page
NETWORK FIREWALL
Analysis
Having a network firewall implementation in an organization is for sure very
critical in this time of rapid technological advancements both in the black hat side of
security and the white-hat side. Any reputable company handling huge amounts of
information in-house and through the internet or any other third party data storage
company must have one or two attackers with ill intentions on the organization. Many
companies like CISCO, Amazon have made public their ways of making sure
customer information is well protected and also that all their systems are well
protected from common and uncommon security threats. Their documentation on this
clearly explains how they have implemented network firewalls to regulate and control
the kind of traffic that travels through all their public and private networks.
For this reason, having a network firewall implemented in small and large
enterprises is very important.
Structural objectives of a firewall
Each firewall has design objectives. In such a case that the firewalls do not
accomplish these plan objectives the firewall will be a tremendous security hazard to
an associations arrangement. As indicated by policies of security, just Authorized
traffic should go through the firewall. For instance;
All inbound and outbound traffic need to go through the firewall.
The firewall ought to be resistant to unauthorized penetration.
Four general methods of controlling access.
Control of services
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORK FIREWALL
Decides the kinds of Internet benefits that can be gotten to, inbound or
outbound Control of direction.
Decides the bearing in which specific administration demands are permitted
to stream
Client control
Controls access to an administration as per which client is endeavoring to get to it
Conduct control
Controls how specific administrations are utilized.
Merits of having a Firewall
A Company’s network or a home PC will have a number of favorable
circumstances when utilizing a firewall.
They are more financially savvy than anchoring every PC in the corporate system
since there are frequently just a single or a couple of firewall frameworks to focus on.
There are a few firewalls which can distinguish infections, Trojans, worms and
spyware and so on. However, there are Drawbacks of Using a Firewall regardless of
whether a firewall helps in keeping the system from intruders. However, whenever it
is not utilized legitimately, it would surely give a false impression that the system is
well protected. The main drawback of a firewall is when it is not able to keep the
system from attacks that come from within. They many times cannot secure against an
assault from an insider. Moreover, a firewall can't protect a system or pc from
Trojans, worms, viruses, and spyware which spread through USB drives, consumable
hard plate and floppy disks and the rest. They may limit the number of clients
Document Page
NETWORK FIREWALL
approved from getting to significant services. They never insure against assaults that
come indirectly.
DATA ANALYSIS
Considering all the data collected and presented in this paper, organizations
without firewall protection usually end up losing their data or compromising the
hardware products within their organization together with some of her associate
companies [7]. Taking note of some of the disadvantages of just implementing a
firewall without other security measures to ensure good security of infrastructure
within a company, the repercussions that occur when there isn’t any firewall is worse
than when there is one.
Various wellsprings of information were utilized to develop and refine the ACLs
utilized in the firewall. The goal was to stay away from administration blackout once
we went to default-deny. The System Administrators at that point gave the beginning
rundown of ports being used and metadata about which ought to be reachable over the
firewall from the intranet or Internet. This outline was refined utilizing Net flow
information from the core switch, which included unlisted ports. The Netflow
information additionally demonstrated that a few ports recorded were accepting no
real traffic and did not need to be uncovered past the datacenter. At last, after
frameworks were moved over to the server location, switch/firewall in 'allow and log'
mode, the firewall logs were investigated to refine the ACLs to their last state before
turning on default-deny.
Document Page
NETWORK FIREWALL
State Diagram
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORK FIREWALL
Use case diagram
Document Page
NETWORK FIREWALL
Activity Diagram
Firewall Implementation steps
It is very imperative that ParmatmaekSevak incorporates a firewall in their
information assurance arrangement. The following are three different ways to
guarantee that the firewall execution is fruitful:
1. Define security needs: Before introducing a firewall arrangement, it is useful to
initially characterize precisely the dimension of IT security vital for your association.
In the first place, look at any current arrangements and note what at present works,
what doesn't work, and what areas should be progressed. Next, approach the IT office
for data about information exchanges inside your organization's system – where are
the frail connections and what are the most sensitive territories requiring data
protection. Likewise, decide all points of access that should be anchored utilizing
endpoint protection strategies. At long last, since all things considered, there won't be
one answer to addressing every one of your issues, organize the rundown as far as
basic and non-basic, and incorporate budgetary limitations. A well-thoroughly
Document Page
NETWORK FIREWALL
considered internal specification will make ready to finding a firewall execution plan
that addresses your business' issues.
2. Research arrangements that coordinate the predefined needs: Only once a
business has characterized what it needs from a firewall/oversaw security
administration can they way toward investigating the start of its implementation.
Notwithstanding the services, try to examine each potential IT supplier's life span in
the business, history of adjusting customers, and their inside and out measure of
stability. Pick a merchant who has a notoriety for giving quality firewall usage and
proficient administration.
3. Installation, setup, and upkeep of the firewalls: Once a seller has been picked,
the last advance in setting up your firewall is the real usage. The IT supplier you have
picked will introduce the arrangement in your condition, covering the majority of the
zones you considered important in your earlier evaluation. Post-establishment, the
firewall will be kept up and overhauled with both manual and programed updates.
Input ought to be given consistently to guarantee that the firewall usage is executing
as expected.
The implementation of a Firewall is important for all organizations to ensure the
delicate information of their customers, merchants, and workers are safe. A cautiously
spread out arrangement including both your association's inward IT group and the IT
firewall supplier will guarantee that your business is fruitful in meeting its security
needs.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORK FIREWALL
Quality Assurance.
Build up a formal change method
Firewall standards should be upgraded for any new administrations and new
gadgets that are included. Before including or changing any firewall rules, a formal
change strategy ought to be set up for any new alterations. The accompanying
advances are a few rules for a change method process:
Have set up a process of change request for clients to ask for adjustments to a
particular firewall arrangement.
Have a survey procedure to examine these new alteration requests and decide
the best strategy for any practices of security.
A procedure to test the new alteration requests on the creation of firewall
rules
A process for the arrangement of the tried new alteration demands into
generation
A procedure to approve the new firewall settings to guarantee legitimate
working
A procedure to report the sum total of what changes have been followed
Blocking traffic naturally
Document Page
NETWORK FIREWALL
Begin obstructing all traffic as a matter of course and just enable explicit traffic to
recognized administrations. This methodology gives quality power over the traffic
and diminishes the likelihood of a break. This conduct can be accomplished by
arranging the last standard in an entrance control rundown to deny all traffic. This
should be possible unequivocally or certainly, contingent depending on the platform.
Set all unequivocal firewall leads first
At the highest point of the standard base, set the most unequivocal firewall rules.
This is the beginning stage where traffic is coordinated. A rule base is a set up of rules
that oversee what is and what isn't allowed through a firewall. Rule bases commonly
work with respect to the best down convention in which the main guideline in the
rundown plays out its activity first. This activity is done, with the goal that the traffic
allowed by the principal rule, will never be surveyed by the rest of the guidelines.
SANS Institute's Firewall Checklist, under Security Elements, suggests the
accompanying request for firewall standards:
1. Anti-spoofing channels
2. User allow rules (for example enable HTTP to open web server)
3. Management allow rules (for example SNMP)
4. Noise drops (for example dispose of OSPF and HSRP babble)
5. Deny and Alert (notify frameworks admin about traffic that is suspicious)
6. Deny and log (log remaining traffic for investigation)
Set express drop rules (Cleanup Rule)
Document Page
NETWORK FIREWALL
The fundamental reason for firewalls is to drop all traffic that isn't explicitly
allowed. As a defense to prevent excluded traffic from going through the firewall, put
an any-any-any drop rule (Cleanup Rule) at the base of every security zone setting.
This will give a catch-all component to capture traffic.
The firewall cleanup rule is characterized as:
Source = ANY
Goal = ANY
Administration/Application = ANY
Activity = DROP
Logging = Enabled
Evacuate "Acknowledge All" rules
This standard can make the traffic to the bottleneck (Bottleneck is an obliging
component that keeps a procedure or framework from achieving its full beneficial
potential.) This standard ought not to be a firewall strategy.
Audit logs
An implicit revealing device is fused in each firewall with a point by point data
about your traffic. This apparatus will help with examining logs searching for any
progressions or peculiarities that may imply changes to your firewall settings. In
upgrading your firewall, the logs' information will indicate which firewall rules are
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORK FIREWALL
not being utilized and which are being activated. The logs' information will likewise
demonstrate to you any "false positives" on traffic that shouldn't trigger security rules,
but rather it is doing as such anyway. You can change the firewall rules based on this
data to decrease the bogus positives and enhance benefit.
Firewall rules require exploring
Systems are always showing signs of change by increasing new clients and new
gadgets. New administrations and new applications are being implemented which
implies new firewall principles should be included. The old firewall standards should
be looked into and erased if essential. It is a best practice to set up an ordinary upkeep
calendar to make refreshed changes to the firewall rules.
Ensure the firewall gadget is modern/Updated
The firewall gadget ought to dependably be fully informed regarding patches and
firmware. In the event that it isn't, it is powerless against assaults and the firewall
standards will be futile.
Automation is undeniably the way to make updates on any firewall settings. Over
time, new innovations are made which require consistent updates to the firewalls
rules. Because of new advancements getting to be accessible, firewall administrators
will be overwhelmed with new firewall changes. The heads will require time and
assets to break down these new requests for modification and decide the best game-
plan for any security rehearses. This time requirement and absence of assets can pave
the way to obsolete, unused or excessively tolerant tenets. The firewall execution can
be degraded and can prompt expanded vindictive attacks.
Document Page
NETWORK FIREWALL
An automation answer for firewall upgrades is to help pursue the change
methodology. This can help forestall slip-ups to maintain a strategic distance from the
creation framework failures. This procedure can help with time to perform more
elevated functions to build a concrete security solution.
Conclusion
The technology of firewalls has overtime evolved since the days of packet filters
and network address translation. Any research that is made today comes up with the
technology of tomorrow’s firewall. It has been evident in this paper that by deploying
firewalls in series, we were able to significantly increase the difficulty of obtaining
unauthorized access to sensitive resources from the Internet. At the same time, each
firewall layer increased the design's complexity, contributing to the cost of deploying
and maintaining the infrastructure and increasing the likelihood that it will be
misconfigured. The network design appropriate for your environment depends on the
nature of your application and the risks that you are trying to mitigate by setting up a
security perimeter around your servers.
References
1. Atkinson, L., Dye, N.A., and Vorwaller, R., Amazon Technologies Inc,
2018. Managing network firewall configuration utilizing source lists. U.S. Patent
Application 10/116,698.
2. Bellovin, S.M. and Cheswick, W.R., 1994. Network firewalls. IEEE
communications magazine, 32(9), pp.50-57.
Document Page
NETWORK FIREWALL
3. Coss, M.J., Majette, D.L. and Sharp, R.L., Lucent Technologies Inc,
2000. Methods and apparatus for a computer network firewall with dynamic rule
processing with the ability to dynamically alter the operations of rules. U.S. Patent
6,154,775.
4. Escamilla, T., 1998. Intrusion detection: network security beyond the
firewall. John Wiley.
5. Shaio, S. and Van Hoff, A., Sun Microsystems Inc, 2003. Maintaining packet
security in a computer network. U.S. Patent 6,571,338.
6. Touboul, S., Cupp Computing AS, 2017. System and method for providing
network and computer firewall protection with dynamic address isolation to a device.
U.S. Patent 9,756,079.
7. Wool, A., 2004. A quantitative study of firewall configuration
errors. Computer, 37(6), pp.62-67.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
NETWORK FIREWALL
Appendix
Questionnaire
1.How many users used internet services in your organization?
2. Do you have network firewall implemented in your organization, what vendor
do you have?
1. How many Clustered firewall implemented in your organization for
redundancy ?
4. How many Network Engineer managing a firewall in your organization?
5.Does your firewall include the following Firewall features?
IP and port filtering, limiting network connections, create custom rules, NAT and
PAT, DHCP, URL blocking?
6. Has your organization had a security breach , during network changes ?
7. How do you know when a firewall configuration change causes downtime?
8. Is a firewall used to protect the network and limit traffic to that which is
required to conduct business?
9. In your word, Can you describe the firewall requirement for your organization?
meaning DHCP, NAT,IPSEC, PORT,IP Blocking etc.
10. Would you like buy the firewall as below?
11. What firewall challenge do you see more problematical?
12. Do you operate a VPN that allows remote access to your network? Dose
Current Firewall has VPN service?
Document Page
NETWORK FIREWALL
13. What is the key deciding factor in choosing a firewall security vendor?
14. Dose your organization willing to spend for firewall network protection? if
yes what is your budget?
2.
15. What features would you like to see in an Next Gen Firewall firewall?
(Select all above if that apply)
16. In your own words, what are the things that you like most about this new
future product?
17. What Kind of firewall you would like to buy?
18. Are you interested to buy the trial version of firewall, if we meet the your
business requirement.
chevron_up_icon
1 out of 33
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]