Firewall And Filtering
Our data infrastructure is constantly being attacked by hackers. Network administrators are being challenged on a daily basis to defend their intranet and other systems on the Internet. As a network administrator for Andrew’s Biometrics Corp (ABC), you face the following problem.
ABC has a series of load balanced Web servers that provide information about the organization, advertise products, process online orders, and allow customers to make payments. These systems need to be protected from denial-of-service attacks. There are many types of firewalls on the market today. Legacy firewalls tend to filter packets based on protocol types or IP addresses. Most recent firewalls can function on top of the application layer of the TCP/IP model and filter packets-based content.
Research a minimum of two industry resources (e.g., National Institute for Standards & Technology [NIST], Institute of Electrical and Electronic Engineers [IEEE], Internet Engineering Task Force [IETF], etc.) on this topic. (Access the MISM Credible Resource GuideLinks to an external site. for assistance with finding appropriate credible professional resources.) Using the concept of a Demilitarized Zone (DMZ) and relevant diagrams, explain the design of your network and how you would segment it. Examine various firewall types and select the appropriate firewall to best protect the computing infrastructure of ABC. It is critical to manage the traffic in and out from the Internet and protect the internal digital resources, including customer data. Access your virtual lab environment and create a diagram using Visio to visually represent the proposed firewall layout. Include the diagram as an image within your document.
Sample Solution
Introduction
Andrew's Biometrics Corp (ABC) is a company that specializes in biometric security solutions. The company has a series of load balanced Web servers that provide information about the organization, advertise products, process online orders, and allow customers to make payments. The company's data infrastructure is constantly being attacked by hackers, and network administrators are being challenged on a daily basis to defend their intranet and other systems on the Internet.
Problem Statement
ABC needs to protect its load balanced Web servers from denial-of-service attacks. Traditional firewalls are not effective at mitigating these types of attacks, as they typically filter packets based on protocol types or IP addresses. ABC needs a firewall that can filter packets based on content, as well as one that can understand the state of active network connections.
Industry Resources
- National Institute for Standards & Technology (NIST): NIST Cybersecurity Framework (CSF)
- Institute of Electrical and Electronic Engineers (IEEE): IEEE Standard for Information Technology - Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Networks - Specific Requirements - Part 3: CSMA/CD Access Method and Physical Layer Specifications
- Internet Engineering Task Force (IETF): RFC 5735 - Network Security with IPsec
- Packet-filtering firewall: Packet-filtering firewalls filter packets based on source and destination IP addresses, port numbers, and protocols.
- Stateful inspection firewall: Stateful inspection firewalls keep track of active network connections and use this information to make decisions about whether or not to allow traffic.
- Application-layer firewall: Application-layer firewalls inspect the content of packets to determine whether or not to allow traffic.
- Security: The solution must be effective at protecting the company's Web servers from denial-of-service attacks and other threats.
- Performance: The solution must not have a significant impact on the performance of the company's network.
- Scalability: The solution must be able to scale to meet the needs of the company as it grows.
- Cost: The solution must be cost-effective.
- Deploy a NGFW in the DMZ.
- Configure the NGFW to allow traffic to the Web servers.
- Configure the NGFW to block all other traffic to the DMZ.
- Configure the NGFW to inspect the content of packets and block those that contain malicious content.
- Configure the NGFW to keep track of active network connections and use this information to make decisions about whether or not to allow traffic.