LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 03-19-2009, 07:15 AM   #1
priyadarshan
Member
 
Registered: Feb 2009
Location: Ahmedabad, Gujarat, India
Posts: 197

Rep: Reputation: Disabled
Question IPS vs Firewall


I posted a thread on this topic.... But I could not get the satisfactory answer... and the discussion too routed to wrong side.....

So again I am asking some of the questions which make me worry..... This time I am going more lucidly and simply.......


(1) Why IPS is needed iff firewall is already there to prevent attacks.....
Some may say that firewall dont check over Transport layer..... which IPS do....

But todays firewall are much more sophosticated and they check till 7 th and last application layer.... This is called Deep Packet Investigation....

So why is there need to deploy firewall???


This is my most annoying question.....

Humbly saying, I will ask more questions only when I get satisfactory answers.... because discussion gets diverted when too many questions are there.........
 
Old 03-19-2009, 08:18 AM   #2
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,667
Blog Entries: 4

Rep: Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945Reputation: 3945
If you are already deploying an IPS, you probably do not need (and maybe do not want) to deploy a firewall also.

This Wikipedia article says ...
Quote:
The role of an IPS in a network is often confused with access control and application-layer firewalls. There are some notable differences in these technologies. While all share similarities, how they approach network or system security is fundamentally different.

An IPS is typically designed to operate completely invisibly on a network. IPS products do not typically claim an IP address on the protected network but may respond directly to any traffic in a variety of ways. (Common IPS responses include dropping packets, reseting connections, generating alerts, and even quarantining intruders.) While some IPS products have the ability to implement firewall rules, this is often a mere convenience and not a core function of the product. Moreover, IPS technology offers deeper insight into network operations providing information on overly active hosts, bad logons, inappropriate content and many other network and application layer functions.

Application firewalls are a very different type of technology. An application firewall uses proxies to perform firewall access control for network and application-layer traffic. Some application-layer firewalls have the ability to do some IPS-like functions, such as enforcing RFC specifications on network traffic. Also, some application layer firewalls have also integrated IPS-style signatures into their products to provide real-time analysis and blocking of traffic. Application firewalls do have IP addresses on their ports and are directly addressable. Moreover, they use full proxy features to decode and reassemble packets. Not all IPS perform full proxy-like processing. Also, application-layer firewalls tend to focus on firewall capabilities, with IPS capabilities as add-on. While there are numerous similarities between the two technologies, they are not identical and are not interchangeable.
 
Old 03-19-2009, 08:55 AM   #3
priyadarshan
Member
 
Registered: Feb 2009
Location: Ahmedabad, Gujarat, India
Posts: 197

Original Poster
Rep: Reputation: Disabled
Thanks sundialsvcs, I wanna ask now my another question.......

(2) Iff I am deploying both- Firewall (By IPTABLES) and IPS (By SNORT) than where should I deploy it???.........I mean weather I put IPS before Firewall or after Firewall???
 
Old 03-19-2009, 09:23 AM   #4
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
Quote:
Originally Posted by priyadarshan View Post
Thanks sundialsvcs, I wanna ask now my another question.......

(2) Iff I am deploying both- Firewall (By IPTABLES) and IPS (By SNORT) than where should I deploy it???.........I mean weather I put IPS before Firewall or after Firewall???
I'd put the FW at the perimeter and the IPS after the firewall. That way the load is scaled and the IPS can focus more on the internal application threats, which is probably the bigger worry (IMO). If you put the IPS before the FW or in place of the FW, you'll have to worry about if the IPS will be overloaded (I've seen it happen).

What IPS are you considering (vendor-wise)? What FWs are you asking about? What are you looking to block/route? How big is the network you're looking to protect? What content are you looking to protect?

Regarding your initial comments, the reason the answers were detailed and possibly confused you is because there is no simple answer. The answers will usually involve details. I'd rather have too much info on security than not enough. You can always pick what answers are pertinent to your needs and work with what you think are the best answers.

Last edited by unixfool; 03-19-2009 at 09:29 AM.
 
Old 03-19-2009, 09:43 AM   #5
priyadarshan
Member
 
Registered: Feb 2009
Location: Ahmedabad, Gujarat, India
Posts: 197

Original Poster
Rep: Reputation: Disabled
Hmmm Thanks....

But I am using windows and debian as virtual OS... I have configured a virtual IP 192.168.1.9 in it.

and I have blocked the packets coming to my virtual Debian by,

sudo iptables -A INPUT -i eth0 -j DROP
sudo iptables -A OUTPUT -o eth0 -j DROP

and then I started snort by
sudo snort -i eth0 -dv

But I got packet impressions on consoole.....which means that IPS is capturing packets before it reaches to firewall....

So by default IPS is before FW??????????????????????????????????????????????
 
Old 03-19-2009, 10:01 AM   #6
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
Quote:
Originally Posted by priyadarshan View Post
Hmmm Thanks....

But I am using windows and debian as virtual OS... I have configured a virtual IP 192.168.1.9 in it.

and I have blocked the packets coming to my virtual Debian by,

sudo iptables -A INPUT -i eth0 -j DROP
sudo iptables -A OUTPUT -o eth0 -j DROP

and then I started snort by
sudo snort -i eth0 -dv

But I got packet impressions on consoole.....which means that IPS is capturing packets before it reaches to firewall....

So by default IPS is before FW??????????????????????????????????????????????
I'd assumed that the FW and IDS were dedicated machines. I believe that it's going to be difficult (if not impossible) to split FW and IPS duties from one shared machine, unless you buid a virtual machine onto the virtual machine.

I ran into the same issue with Linode. They are my vhost. I run apache and have iptables and snort running on that server. Linode uses UML to provide hosting services. Part of my issue is that the FW and snort have to run on the same interfaces. If you could get dedicated interfaces for routing traffic, you could also dedicate an interface for sniffing/blocking. Unfortunately, Linode only offers one dedicated interface. They do offer IPs, but they alias those IPs to the dedicated interface.

I'm thinking your hosting provider may be the same way. The only way around this (and I may be wrong) is to purchase another account or run another virtual instance.
 
Old 03-19-2009, 02:21 PM   #7
salasi
Senior Member
 
Registered: Jul 2007
Location: Directly above centre of the earth, UK
Distribution: SuSE, plus some hopping
Posts: 4,070

Rep: Reputation: 897Reputation: 897Reputation: 897Reputation: 897Reputation: 897Reputation: 897Reputation: 897
Quote:
Originally Posted by priyadarshan View Post
I posted a thread on this topic.... But I could not get the satisfactory answer... and the discussion too routed to wrong side.....
One of the reasons for that is that you do not seem to know the terminology well enough so that others understand the question that you ask in the way that you apparently want them to.

Quote:
(2) Iff I am deploying both- Firewall (By IPTABLES) and IPS (By SNORT) than where should I deploy it???
Firstly note that snort is better known as and IDS than an IPS; although there is one mode in which snort can act as an IPS, this is not, traditionally, the mode in which it has been most used.

So, assuming that we are talking about the right mode of snort, note
Quote:
It receives packets sent from the Netfilter firewal
from http://openmaniak.com/inline.php (and for netfilter, read iptables if you like).
 
Old 03-19-2009, 05:48 PM   #8
unixfool
Member
 
Registered: May 2005
Location: Northern VA
Distribution: Slackware, Ubuntu, FreeBSD, OpenBSD, OS X
Posts: 782
Blog Entries: 8

Rep: Reputation: 158Reputation: 158
He wants Snort's IPS functionality, which would make it an IPS (Sourcefire actually markets their IPS solution as an official IPS), but to argue this would risk confusing him and taking the thread on a tangent.
 
Old 03-20-2009, 12:44 AM   #9
priyadarshan
Member
 
Registered: Feb 2009
Location: Ahmedabad, Gujarat, India
Posts: 197

Original Poster
Rep: Reputation: Disabled
Ya I know that snort --enable-inline makes it working as IPS..... In that manner only I am asking
 
Old 03-20-2009, 01:03 AM   #10
jschiwal
LQ Guru
 
Registered: Aug 2001
Location: Fargo, ND
Distribution: SuSE AMD64
Posts: 15,733

Rep: Reputation: 682Reputation: 682Reputation: 682Reputation: 682Reputation: 682Reputation: 682
I think that the original OP is confusing the host firewall with the perimeter firewall, and even putting snort inside the host instead of between the firewall and the LAN switch.
 
Old 03-20-2009, 02:14 AM   #11
priyadarshan
Member
 
Registered: Feb 2009
Location: Ahmedabad, Gujarat, India
Posts: 197

Original Poster
Rep: Reputation: Disabled
I am talking about perimeter firewall...... Especially concerning UTM machine...... Means suppose that I have my private network and I am using UTM (Unified Threat Module) machine which contains Firewall with Deep packet Investigation feature and an IPS too......and lot more other tools like proxy server, anti virus, anti spyware etc.

I am talking about that terminology.....
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Firewall for Public IPs Machines saifurab Linux - Security 5 06-07-2007 10:39 AM
router/firewall for static ips and mult machines racerx7 Linux - Networking 3 07-08-2006 01:38 AM
firewall with private ips samg Linux - Security 7 06-02-2006 06:41 PM
Firewall lets ips which are not in the firewall ... why ? sys7em Linux - Networking 2 06-30-2005 12:50 PM
Firewall - filter for public IPs caremaker Linux - Networking 6 01-09-2004 12:17 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 03:18 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration