-

Firewalls

Dieses Thema enthält die folgenden Abschnitte:

General information on firewalls

A firewall is a system component which protects individual computers, IT systems and ICS networks from attacks and data corruption/misuse. Firewalls can prevent or restrict the spread of malware.
The firewall is installed at a suitable system boundary. i.e., zone boundary in our context. It analyzes the inbound and outbound data traffic and detects unauthorized access based on the properties of the network packet. Network packets that are not allowed are blocked by the firewall.

By eliminating all of the communication options that are not technically necessary, many attacks to your network would not even be possible. In addition, industrial integrity monitoring helps you detect and halt the impact of changes and manipulations to Windows-based systems, such as controllers, operator interfaces or PCs, in good time.

The following figure shows an example with an mGuard firewall/router and 1:1 NAT as well as integrity monitoring.

Configurable firewall features

For configuration purposes, each firewall offers a corresponding user interface where rules and exceptions for blocking and passing must be defined. Such rules are, for example:

Hinweis
Some of the feature mentioned below are only supported by so-called Next Generation Firewalls (NGFW).

Stateless and stateful firewalls

Firewalls that support Stateful Packet Inspection are referred to as stateful firewalls. The difference between stateless and stateful firewalls is described in the following.

A "classical" stateless firewall inspects ingoing network packages based on filtering rules which have been defined for inbound and outbound traffic by an administrator. For that purpose, it inspects, for example, only the source and destination IP address of network packets. Since the permitted data traffic must be configured for both transmission directions, it is not possible to determine which of the communication partners (peers) initiated the connection. As this is static information, such a firewall is referred to as stateless firewall. If an inbound data packet matches the conditions for passing, the stateless firewall guides it into the network (according to defined rules). Otherwise, i.e, if a packet cannot be identified, it is rejected.

In contrast, a stateful firewall controls the network traffic on a more comprehensive basis and is therefore more restrictive. For that purpose, it inspects the entire state of the existing network connections by considering state information from past communications.
For example, a stateful firewall also considers the connection state by analyzing the data transfer on the transport layer (which is the 4th layer of the OSI model). This way, it inspects the complete context of the network and decides dynamically on each current communication attempt.

Usually, a stateful firewall inspects five properties of IP headers: source address, destination address, source port, destination port, protocol. On this inspection basis, it is able to detect the following:

A stateful firewall works according to the handshake principle and takes the times into account at which data packets are expected and received (timeouts are possible).

Any permitted connections (packets) are entered in a dynamic state table allowing connection tracking. Since NAT gateways must assign port numbers dynamically, they require state tables and are therefore always stateful.

Conclusion: Stateful firewalls provide a higher level of protection than stateless firewalls. Therefore, they are the current state of the art. Stateless firewalls are hardly available on the market anymore.
However, they require a higher hardware performance due to their operating principle. This makes them more vulnerable to DDoS attacks.

Integrated and dedicated firewalls

A firewall can be installed on a separate hardware unit (which is then referred to as dedicated firewall) or it can be a software component which is installed within the unit to be protected (integrated firewall).

Figure 1: Integrated firewall

An integrated firewall, as shown in Figure 1, offers cost advantages but is more vulnerable to attacks, depending on the quality of the main system implementation. If many different components with integrated firewalls are to be used, all possible variants must be administered and maintained. If the main system is successfully attacked, the firewall can be infiltrated as well.

Figure 2: Dedicated firewall

A dedicated firewall as a stand-alone device (Figure 2) requires a targeted investment but allows selection independent of the other automation components. In addition, there are the following advantages of dedicated firewalls over integrated firewalls:

Firewall(s) protecting the Demilitarized Zone (DMZ)

The DMZ is a buffer zone between the ICS and other networks. This other network can be a public one or, for example, an internal office network. See section "Special zone: DMZ" for details.

A DMZ can be protected by one or two firewalls:

The DMZ firewall(s) must control the data flow as follows:

Blacklists and whitelists

Blacklists and whitelists pursue opposing strategies. Therefore, usually only one of the two lists is used, but not both together.

Weitere Infos
For detailed information on the management settings for the firewall used refer to the respective user manual or the online help of the corresponding configuration software.