throbber
Internet and Web Security
`
`Building Internet
`
`0 REILLY®
`
`Elizabeth D. Zwicky, Simon Cooper
`& D. Brent Chapman
`
`Ex.1019
`CISCO SYSTEMS, INC. / Page 1 of 5
`
`

`

`Building Internet Firewalls, Second Edition
`by Elizabeth D. Zwick:y, Simon Cooper, and D. Brent Chapman
`
`Copyright © 2000 O'Reilly & Associates, Inc. All rights reserved.
`Printed in the United States of America.
`
`Published by O'Reilly & Associates, Inc., 101 Morris Street, Sebastopol, CA 95472.
`
`Editor: Deborah Russell
`
`Production Editor: Nancy Crumpton
`
`Production Coordinator: Madeleine Newell
`
`Cover Designer: Edie Freedman
`
`Printing History:
`
`April 1995:
`
`First Edition.
`
`November 1995:
`
`Minor corrections.
`
`June 2000:
`
`Second Edition.
`
`l,
`
`Nutshell Handbook, the Nutshell Handbook logo, and the O'Reilly logo are registered
`trademarks of O'Reilly & Associates, Inc. Java™ and all Java-based trademarks and logos are
`trademarks or registered trademarks of Sun Microsystems, Inc., in the United States and other
`countries. O'Reilly & Associates, Inc. is independent of Sun Microsystems.
`
`Many of the designations used by manufacturers and sellers to distinguish their products are
`claimed as trademarks. Where those designations appear in this book, and O'Reilly &
`Associates, Inc. was aware of a trademark claim, the designations have been printed in caps
`or initial caps. The association between the image of a Gothic doorway and the topic of
`Internet firewalls is a trademark of O'Reilly & Associates, Inc.
`
`While every precaution has been taken in the preparation of this book, the publisher assumes
`no responsibility for errors or omissions, or for damages resulting from the use of the
`information contained herein.
`
`Library of Congress Cataloging-in-Publication Data
`
`Zwick:y, Elizabeth D.
`Building Internet firewalls/ Elizabeth D. Zwick:y, Simon Cooper & D. Brent Chapman.--
`2nd ed. p. cm.
`ISBN 1-56592-871-7
`1. Computer networks--Security measures. 2. Internet (Computer network)--Security
`measures. I. Cooper, Simon. II. Chapman, D. Brent. III. Title.
`
`TK5105.59.Z85 2000
`005.8--dc21
`
`ISBN: 1-56592-871-7
`[Ml
`
`00-039954
`
`1101ool
`
`Preface ............
`
`1 Networ.
`
`1. WhylntE
`What Are·
`What Are
`WhoDo-Y
`How Can
`What Is ar
`Religious 1
`
`2. Internet
`Secure Ser
`The Work
`Electronic
`File Transl
`Remote A<
`Real-Time
`Naming a1
`AuthentiG
`Administr~
`Databases
`Games ....
`
`Ex.1019
`CISCO SYSTEMS, INC. / Page 2 of 5
`
`

`

`Why Internet
`Firewalls?
`
`It is scarcely possible to enter a bookstore, read a magazine or a newspaper, or lis(cid:173)
`ten to a news broadcast without seeing or hearing something about the Internet in
`some guise. It's become so popular that no advertisement is complete without a
`reference to a web page. While nontechnical publications are obsessed with the
`Internet, the technical publications have moved on and are obsessed with secu(cid:173)
`rity. It's a logical progression; once the first excitement of having a superhighway
`in your neighborhood wears off, you're bound to notice that not only does it let
`you travel, it lets a very large number of strangers show up where you are, and
`not all of them are people you would have invited.
`
`Both views are true: The Internet is a marvelous technological advance that pro(cid:173)
`vides access to information, and the .ability to publish information, in revolution(cid:173)
`ary ways. But it's also a major danger that provides the ability to pollute and
`destroy information in revolutionary ways. This book is about one way to balance
`the advantagesc'and the risks-to take part in the Internet while still protecting
`yourself.
`
`Later in this chapter, we describe different models of security that people have
`used to protect their data and resources on the Internet. Our emphasis in this
`book is on the network security model and, in particular, the use of Internet fire(cid:173)
`walls. A firewall is a form of protection that allows a network to connect to the
`Internet while maintaining a degree of security. The section later in this chapter
`called "What is an Internet Firewall?" describes the basics of firewalls and summa(cid:173)
`rizes what they can-and cannot-do to help make your site secure. Before we
`discuss what you can do with a firewall, though, we want to describe briefly why
`you need one. What are you protecting on your systems? What types of attacks
`and attackers are common? What types of security can you use to protect your
`site?
`
`3
`
`Ex.1019
`CISCO SYSTEMS, INC. / Page 3 of 5
`
`

`

`4
`
`Chapter I: Why Internet Firewalls?
`
`What Are You Trying to Protect?
`A firewall is basically a protective device. If you are building a firewall, the first
`thing you need to worry about is what you're trying to protect. When you con(cid:173)
`nect to the Internet, you're putting three things at risk:
`
`• Your data: the information you keep on the computers
`
`• Your resources: the computers themselves
`
`• Your reputation
`
`Your Data
`Your data has three separate characteristics that need to be protected:
`
`':I
`
`Secrecy
`You might not want other people to know it.
`
`Integrity
`You probably don't want other people"to change it.
`
`Availability
`You almost certainly want to be able to use it yourself.
`
`People tend to focus on the risks associated with secrecy, and it's true that those
`are usually large risks. Many organizations have soi;ne of their most important
`secrets-the designs for their products, financial records, or student records-on
`their computers. On the other hand, you may find that at your site it is relatively
`easy to separate the machines containing this kind of highly secret data from the
`machines that connect to the Internet. (Or you may not; you can't do Internet elec(cid:173)
`tronic commerce without having information about orders and money pass
`through Internet-accessible machines.)
`
`Suppose that you can separate your data in this way, and that none of the infor(cid:173)
`mation that is Internet accessible is secret. In that case, why should you worry
`about security? Because secrecy isn't the only thing you're trying to protect. You
`still need to worry about integrity and availability. After all, if your data isn't secret,
`and if you don't mind its being changed, and if you don't care whether or not any(cid:173)
`body can get to it, why are you wasting disk space on it?
`
`Even if your data isn't particularly secret, you'll suffer the consequences if it's
`destroyed or modified. Some of these consequences have readily calculable costs:
`if you lose data, you'll have to pay to have it reconstructed; if you were planning
`to sell that data in some form, you'll have lost sales regardless of whether the data
`is something you sell directly, the designs from which you build things, or the
`code for a software product. Intangible costs are also associated with any security
`
`WbatAre You Tr,
`
`incident. The r
`confidence, inv
`dence) in your
`organization.
`
`Computer st:
`because dett:
`find out tha1
`know. Even
`system or da
`the intruder <
`attack is a le
`appear to da
`bullet, restor
`doesn't appe
`yourself, woi
`The intruder
`making sure
`
`Although tt
`Chapter 27, l
`for detecting
`
`Your Resoi,
`Even if you ha-.
`ing system eve:
`other people ar
`from this use in
`want to charge
`puter time and
`they aren't goil
`your computin~
`
`Intruders often
`their intrusions
`argument.
`
`First, it's impos
`excess and use
`space and hou
`
`Ex.1019
`CISCO SYSTEMS, INC. / Page 4 of 5
`
`

`

`ternet Firewalls?
`
`What Are You Trying to Protect?
`
`5
`
`rewall, the first
`When you con-
`
`ed:
`
`:'s true that those
`r most important
`ient records-on
`site it is relatively
`:ret data from the
`t do Internet elec(cid:173)
`and money pass
`
`none of the infor(cid:173)
`should you worry
`1g to protect. You
`Llr data isn't secret,
`rhether or not any-
`
`)nsequences if it's
`ly calculable costs:
`you were planning
`>f whether the data
`,uild things, or the
`d with any security
`
`incident. The most serious is the loss of confidence (user confidence, customer
`confidence, investor confidence, staff confidence, student confidence, public confi(cid:173)
`dence) in your systems and data and, consequently, a loss of confidence in your
`organization.
`
`Has Your Data Been Modified?
`Computer security incidents are different from many other types of crimes
`because detection is unusually difficult. Sometimes, it may take a long time to
`find out that someone has broken into your site. Sometimes, you'll never
`know. Even if somebody breaks in but doesn't actually do anything to your
`system or data, you'll probably lose time (hours or days) while you verify that
`the intruder didn't do anything. In a lot of ways, a brute-force trash-everything
`attack is a lot easier to deal with than a break-in by somebody who doesn't
`appear to damage your system. If the intruder trashes everything, you bite the
`bullet, restore from backups, and get on with your life. But if the intruder
`doesn't appear to have done anything, you spend a lot of time second-guessing
`yourself, wondering what he or she might have done to your system or data.
`The intruder almost certainly has done something-most intruders will start by
`making sure that they have a way to get back in, before they do anything else.
`
`this book is primarily about preventing security
`Although
`incidents,
`Chapter 27, Responding to Security Incidents, supplies some general guidelines
`for detecting, investigating, and recovering from security incidents.
`
`Your Resources
`Even if you have data you don't care about-if you enjoy reinstalling your operat(cid:173)
`ing system every: week because it exercises the disks, or something like that-if
`other people are going to use your computers, you probably would like to benefit
`from this use in some way. Most people want to use their own computers, or they
`want to charge other people for using them. Even people who give away com(cid:173)
`puter time and disk space usually expect to get good publicity and thanks for it;
`they aren't going to get it from intruders. You spend good time and money on
`your computing resources, and it is your right to determine how they are used.
`
`Intruders often argue that they are using only excess resources; as a consequence,
`their intrusions don't cost their victims anything. There are two problems with this
`argument.
`
`First, it's impossible for an intruder to determine successfully what resources are
`excess and use only those. It may look as if your system has oceans of empty disk
`space and hours of unused computing time; in fact, though, you might be just
`
`Ex.1019
`CISCO SYSTEMS, INC. / Page 5 of 5
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket