
An Internet firewall is like a newly divorced person: It's happy to be
out on the network but won't let anybody get too close. In this day and
age, you'll want to run a background check before you enter a relationship
with one of these devices, and that's just what we did, checking out 13
products designed to control access to TCP/IP networks.
Products from vendors Livingston Enterprises, Inc. and Network Systems
Corp. (NSC) excel at low-end, router-based firewalls for sites with simple
security policies.
If you want to tinker with their insides, you'll be most interested in
firewalls from Trusted Information Systems, Inc. (TIS) and Network-1
Software and Technology, Inc. These products are the ultimate in
do-it-yourself kits.
Those of you who want an easy-to-configure product will be happiest
with systems from Digital Equipment Corp. and CheckPoint Software
Technologies, Ltd. CheckPoint is also a clear leader in managing multiple
firewalls from a single interface and mixing packet filtering and
application proxying technologies.
Border Network Technologies, Inc. provides the most complete
all-in-one solution, a combination firewall and Internet server that kills
many birds with a single box.
The application proxy firewall from Milkyway Networks Corp. showed the
most innovative features, while Harris Computer Systems Corp., IBM, Secure
Computing Corp. and SOS Corp. all turned in credible results.
For high-powered and speedy network address translation (NAT), Network
Translation, Inc. managed to combine NAT and some firewall features into a
powerful and easy-to-configure package.
In our last review of firewalls (NW, July 31, 1995, page 1), we found
products that fit into textbook categories of packet filter, circuit
gateway or application proxy. (For a more complete discussion of these
categories, see the related stories on Network World Fusion.) Today, among
products we looked at that were introduced or significantly revised since
then, almost all are a hybrid of different firewall technologies and
techniques.
Firewall routers
The combination router/firewall systems built into Livingston's
Firewall IRX and NSC's The Security Router are primarily network routers
that also include firewall functionality. Both of these augment the
functions of simple routers by providing a way to log security-related
information such as attacks to a local host. These products can also do
limited filtering on other protocols. Livingston's Firewall IRX is limited
to NetWare's IPX protocol, while NSC's Security Router can also handle
AppleTalk, DECnet, XNS and VINES.
Firewall IRX is limited to filtering and monitoring network traffic,
while The Security Router also provides secure IP tunnels.
The main distinguishing characteristic of these two products is their
lack of state information; that is, they cannot decide to pass or drop
traffic flowing through them based on past information. This restricts the
complexity and power of the security policies these products can support,
particularly with connectionless protocols such as User Datagram Protocol
(UDP).
Firewalls also need state information to work with certain TCP
protocols, such as File Transfer Protocol (FTP), that use two connections
for data transfer. Firewall IRX and The Security Router examine each packet
individually without any knowledge of packets that have been seen before.
For example, it isn't possible to permit Domain Naming System (DNS)
responses - which use connectionless UDP - to pass through the firewall
only in response to DNS queries. If you're making heavy use of UDP-based
services, such as Network File System (NFS), that you want to extend into
the Internet, a stateless firewall won't work for you.
A variation on the router-as-firewall approach is an innovative
firewall from Network-1 Software and Technology. FireWall/Plus does not
route packets; instead, it bridges them across two Ethernet interfaces and
appears invisible to any higher level protocols. FireWall/Plus examines
each Ethernet frame it receives and decides to pass or drop the frame based
on content in the frame itself - such as frame type, media access control
address or subfield, or length - or in higher level protocol data in the
frame.
FireWall/Plus can be used for simple filtering of non-TCP/IP protocols
but has the greatest utility for protocols that operate on top of IP
because it includes prewritten rules for most IP-based protocols and
security scenarios. FireWall/Plus handles not just traditional TCP and UDP
but also other protocols that run over IP, such as the Open Shortest Path
First routing protocol. FireWall/Plus can also maintain some types of state
information to securely handle protocols such as DNS, NFS and FTP.
Private Internet Exchange (PIX) from Network Translation is a special
type of packet-filtering router. It performs NAT and also has many security
features built in. PIX helps organizations hide their internal IP
addresses. PIX security features include some state information for
protocols such as FTP, rules based on TCP/IP protocol flavor - such as
Telnet, Simple Mail Transfer Protocol or Network News Transport Protocol
(NNTP) - and IP tunneling.
Flexibility of filters
CheckPoint's Firewall-1, Harris' CyberGuard Firewall and IBM's
Internet Connection Secured Network Gateway (SNG) use a combination of
techniques, including application proxies, circuit-level gateways and
simple IP-based packet filters to implement a network security policy.
These three products allow network managers the greatest flexibility to
support a completely open internal environment with no software changes on
client systems.
Because of their concentration on packet filtering techniques,
Firewall-1, CyberGuard and SNG are strongest in that area, although they
all support either application proxies, circuit gateways or both.
TIS' Gauntlet Internet Firewall comes from a company with a long
history of firewall research. Gauntlet includes the second generation of
TIS' free tool kit with a simple integrated administrative user interface
and other proprietary tools. TIS is unique in providing full source code
with its software.
SOS' Brimstone Firewall Package is more a collection of public tools
than original software, although SOS does add some proprietary pieces, most
notably in the user interface and monitoring areas. SOS' main contribution
has been to collect, package, document and certify the products in its
firewall. However, its tool kit approach encourages network managers to
modify the firewall.
If you don't want to learn the ins and outs of Unix or network
security and safe firewall configuration, check out Milkyway's Black Hole,
Digital's Firewall for Unix, Secure Computing's Sidewinder and Border's
BorderWare Firewall Server.
These products all simplify the task of building a firewall by
reducing the possible options. They depend on application-level proxies and
circuit gateways to lock down the most commonly used TCP/IP applications.
Other limitations have been put in place to simplify the administrative
user interface. For example, all but Milkyway's Black Hole strictly limit
the number of IP interfaces (usually Ethernet cards) supported. This in
turn significantly simplifies the user interface.
These products also link other common system management tasks, such as
backups, reporting and logging, and system configuration into a single user
interface, freeing you, in principle, from having to descend to the
squirrelly passageways of the Unix command line.
Interfaces and orientation
The largest market for firewalls is in protecting corporate networks
from public networks such as the Internet. An Internet-oriented firewall
typically has two LAN interfaces, one for the insecure side (sometimes
called 'dirty' or 'red') of the network and one for the secure side
(sometimes called 'clean' or 'blue'). All of the firewalls we looked at
support at least two LAN interfaces; a few can support only two.
A restricted configuration with only two interfaces has a big
advantage for a part-time security manager: The user interface can be very
explicit about what is being allowed and what is being filtered. For
example, in Network-1's FireWall/Plus, the inside network is shown with an
angel icon, while the outside network is shown as a devil. Digital's
Firewall for Unix, Secure Computing's Sidewinder, Network Translation's
PIX, TIS' Gauntlet and Harris' CyberGuard share the same configuration
restriction: two interfaces, with a heavy orientation toward Internet
environments.
Border's BorderWare allows three interfaces, but with the same
strictly defined roles: one is dirty and insecure; one is clean and
internal; and one is for Internet-accessible servers that are not to be
trusted, a subnet often called a demilitarized zone or a lobby.
For more complex environments with multiple firewalls, organizations,
LANs or other webs of trust and distrust, two interfaces are not
sufficient. The problem with more interfaces, of course, is that more
complex management interface and configuration options offer greater
opportunities to build a firewall with other-than-intended security
policies.
Milkyway's Black Hole, IBM's SNG, CheckPoint's Firewall-1 and SOS'
Brimstone all support multiple interfaces, all but IBM on a SPARC platform.
Firewall-1's multiple-interface philosophy extends even further than
the limits of a single hardware platform. Its administrative user interface
lets a set of Firewall-1 systems and routers with many LAN and WAN
interfaces be managed as a single entity with a single security policy and
logging point. Brimstone provides a similar, although less comprehensive,
capability.
Getting out through the firewall
Each firewall we tested has a slightly different way of handling
access through the firewall. In general, external access to internal
services is simply turned off; the firewall acts as a one-way valve,
letting users inside originate traffic going out but preventing any outside
traffic from getting in. Some firewalls provide special holes that allow
particular systems on the outside to connect to particular systems on the
inside, such as an external NNTP feed to an internal Usenet news server.
If all you want is a one-way valve, then almost any firewall will
support your security policy. If you have a more complex security policy,
you need to be a little more discriminating.
We divided the products into two rough categories: ones that are
fundamentally IP address-based and ones that are fundamentally user
authentication-
based. Products in the first category generally care most about what IP
address a particular user is coming from and don't have strict
authentication requirements. Products in the second category keep a strict
tie between users and access through the firewall and are generally
considered to be harder for illegitimate users to get around. There are
also hybrid products that do a little of both or mix multiple techniques;
these tend to be the most attractive. (See Network World Fusion for a
related story, Authentication methods.)
Digital's Firewall for Unix and Border's BorderWare have the most
restrictive access requirements: All authenticated access must use a
onetime password mechanism. For example, if you want to give vendors
temporary access through your firewall to diagnose a problem, you have to
either set them up with a handheld token or have them call while someone
who has a token can generate the proper response to the onetime password
challenge. All the other authenticating firewall vendors also allow the
less secure reusable passwords.
If your policy distrusts all outsiders and trusts most insiders, then
IP-based filtering may be sufficient. It is nonintrusive, so users will see
little, if any, change in how they use the Internet. For traffic
originating from inside your network, this kind of filtering works pretty
well.
IP-based filtering for outside users who wish to come into your
network is another story; this is asking for trouble. As the Internet is
security-free, no IP addresses can be trusted because they can be easily
changed or spoofed. User authentication doesn't necessarily help, since a
malicious attacker could conceivably 'hijack' an existing TCP session,
given the right circumstances and access.
Products that have no user-based authentication and rely on IP
addresses - along with other criteria, such as service requested - to
decide whether to allow traffic through the firewall include the routers we
tested: Livingston's Firewall IRX, NSC's Security Router, Network
Translation's PIX and Network-1's FireWall/Plus.
Digital's Firewall for Unix and Border's BorderWare are slight
variations on this theme: All internal users are filtered based on IP
address when sending outgoing traffic, and external users attempting to get
in must be authenticated using a onetime password scheme.
Secure Computing's Sidewinder has a more limited and obscure approach.
Sidewinder filters based on IP address but can use authentication for
traffic originating from World-Wide Web browsers, such as Netscape
Communications Corp.'s Netscape Navigator.
Other products let a user poke a temporary hole for a particular IP
address for some period of time. For example, if you want to establish a
telnet connection through the firewall, you must first authenticate
yourself with a user name and password to the firewall itself. Once the
firewall sees a valid user name and password coming from a particular IP
address, it allows access.
The best example of this technique is Milkyway's Black Hole. Proxies
built into Black Hole detect unauthorized traffic and request
authentication before letting the traffic pass through. This is
particularly nice for protocols such as HyperText Transfer Protocol (HTTP)
and Gopher because the firewall authentication is relatively nonintrusive.
As an alternative to using semitransparent authentication, users could
specifically telnet to the firewall to open up their hole (and to later
close it).
When a tighter handle is necessary, firewalls such as TIS' Gauntlet
and SOS' Brimstone require authentication for each and every TCP access
through the firewall. This means that each telnet or FTP command stops at
the firewall for a user name and password before being passed through.
Gauntlet can also operate in transparent mode, which doesn't require
authentication by internal users.
This model runs into a problem with protocols such as HTTP, which can
open up hundreds of TCP sessions as users click from page to page.
Authenticating each of those sessions would be impractical, so the
alternatives offered are to either allow such traffic unfettered and
unauthenticated, or simply disallow all such sessions.
IBM's SNG, CheckPoint's Firewall-1 and Harris' CyberGuard are all
hybrid systems that allow a combination of techniques. All offer IP-based
filtering, as well as per-connection authentication for telnet and FTP
sessions. Firewall-1 also allows authenticated temporary holes such as
those provided by Black Hole, although the technique is less flexible and
not as well integrated.
Incoming access to network services, such as Web, SMTP and DNS
servers, varies from vendor to vendor. Firewalls such as TIS' Gauntlet,
Digital's Firewall for Unix, Secure Computing's Sidewinder and SOS'
Brimstone prohibit any direct access, requiring everything to pass
nontransparently through the firewall. These products expect
Internet-accessible services to be outside of the firewall.
Although this can increase the security of a domain, it also raises
problems. For example, most Unix-based firewalls use sendmail as their mail
system, a program notoriously difficult to configure. When an organization
wants to use a real electronic mail backbone, the firewall gets in the way
by providing a difficult-to-track stopping point for messages into and out
of the network. For example, a bug in Digital's Firewall for Unix mail
implementation prevented us from sending many kinds of mail from strictly
compliant mail agents through the firewall, something we were unable to
work around because we couldn't disable the mail proxy.
Other firewalls allow limited access - for example, to allow
connecting incoming NNTP packets to a single system inside the firewall.
Packet-filtering firewalls are the most generous, giving you the
flexibility to identify internal systems that are available directly from
the outside world.
Most circuit-gateway firewalls implicitly provide a restricted NAT
function. For example, Digital's Firewall for Unix, Secure Computing's
Sidewinder, TIS' Gauntlet, Border's BorderWare and SOS' Brimstone all have
nonnegotiable NAT: Nothing outside gets to see IP addresses inside the
firewall.
The king of NAT is Network Translation's PIX, which combines NAT and
some firewall functions such as filtering rules. PIX allows static mapping
of IP addresses, which lets you designate specific and controlled holes
through the NAT hardware. PIX can also use a pool of IP addresses to
randomly and dynamically give access to systems inside the firewall trying
to get out. PIX's NAT includes adaptive security, which prevents a
potential intruder from trolling for insecure systems by randomly picking
addresses and trying to connect to them.
Milkyway's Black Hole, IBM's SNG, CheckPoint's Firewall-1 and Harris'
CyberGuard all have some optional NAT functionality.
Managing firewalls
Early adopters of firewall technology were, of necessity, both
security and operating system experts. Public domain tool kits became the
base on which highly customized firewall systems were built. Fortunately,
this level of expertise and homegrown modification is no longer necessary.
Several of the firewalls we tested provide excellent user interfaces, which
allow any network manager to easily configure a firewall securely.
Digital's Firewall for Unix has the best thought-out and most powerful
management interface of all the products we examined. The firewall and
operating system are managed using Netscape Navigator on a locally attached
X Window System display, which makes configuration modifications simple.
Digital also includes all of its documentation on-line as hypertext, which
is a tremendous help.
Border's BorderWare also has an easy-to-use interface. Because the
interface is screen-based via curses, a Unix-based screen library, rather
than X Window-based, it has fewer frills, but it was seldom difficult to
understand.
Both of these products employ a single interface to handle operating
system and firewall configuration tasks, something we appreciated. Writing
this review exposed us to seven Unix flavors, so not having to deal with
the nitty-gritty of network configuration on each operating system was a
blessing.
A close runner-up is CheckPoint's Firewall-1, which also uses X Window
but has a more opaque interface. Some of this complexity is due to the
product's wider range of capabilities; that is, many things you can do in
Firewall-1 are not possible in Firewall for Unix or BorderWare.
Milkyway's Black Hole and IBM's SNG also have competent X Window-based
management interfaces, but they're more difficult to use than the others.
Both made up for this with good documentation, Milkyway's on paper and
IBM's on-line.
TIS' Gauntlet, Secure Computing's Sidewinder and Harris' CyberGuard
provide screen (curses) based management interfaces that are also simple
enough to use. However, all of these required us to dip into Unix more than
we liked for command-line configuration of either firewall or operating
system options. Sidewinder's interface was rather unstable: It crashed
several times while we attempted to configure the software.
Even worse, when we were forced to manually edit a configuration file
- because the documentation told us to - a single misplaced space in a file
made the firewall unusable and took more than two hours to recover from.
Command-line interfaces on NSC's Security Router and Livingston's
Firewall IRX were also unexciting, although the types of operations
required made them easy enough to configure. In this case, though, the
margin for error was significantly higher. These systems require far more
expertise and knowledge of network security than most of the other
firewalls.
Our worst experiences were with the management interfaces on SOS'
Brimstone and Network-1's FireWall/Plus. Both of these need significant
human reengineering before they'll be ready for mere mortals. FireWall/Plus
hinted at amazing power and a fascinating command language, but the design
of the firewall was such that only an expert could feel comfortable and
then only after a lot of practice and testing.
Documentation generally followed user interface in terms of
thoughtfulness and completeness. Milkyway and SOS get special kudos for
including a separate user manual for end users inside and outside the
firewall, while Digital and IBM had the best on-line documentation.
Reporting, logging and alarms
One basic requirement of firewalls is that they squeak when pressure
is applied. If someone is probing a network for weaknesses, a good firewall
should log the attempt and provide an immediate alarm should the attack be
serious. You may also want the firewall to provide general reports of
TCP/IP traffic for capacity planning and other administrative purposes.
The only product we looked at that provides no logging, reporting or
alarm capabilities is Network Translation's PIX. Livingston's Firewall IRX
and NSC's Security Router are only a little better. They provide logging
information - via the network - to a host; it's up to you to write custom
software to set alarm conditions. Neither router provides traffic
statistics for general reports.
The best alarm, logging and reporting capabilities were in TIS'
Gauntlet, Digital's Firewall for Unix and Secure Computing's Sidewinder.
These three products provide good all-around capabilities to capture
statistics, notice problem situations and generate readable logs of probes
and attacks.
Digital's reports are outstanding. With the product's hypertext
documents, you can drill down through reporting data using the supplied
Netscape browser to see more information about how the firewall is being
used. Digital's alarm conditions are comprehensive. Firewall for Unix moves
from a green state, as shown by the background on the user interface,
through yellow, orange and red, with different actions occurring at each
time. Firewall for Unix's ability to intelligently shut down some or all
traffic flowing through it in response to a probe was a unique feature.
If summary reports are not important, the logging and alarm facilities
in IBM's SNG, CheckPoint's Firewall-1 and Harris' CyberGuard are all
satisfactory. Network-1's FireWall/Plus looked as if it had good reporting
capabilities, but it crashed every time we tried to generate a report.
We found Milkyway's Black Hole, SOS' Brimstone and Border's BorderWare
difficult to set up and manage for alarms. It was not obvious how to best
configure the firewall to alert us when something bad was happening.
Other features
Firewalls come with a variety of additional bells and whistles to
assist the security manager. Some are simple yet valuable additions, such
as time-of-day rules. Others are more specialized, such as encrypted IP
tunnels, and may not be useful in all environments. For more on these
features, see Tunneling and encryption on Network World Fusion.
Network managers interested in restricting Internet access to
off-hours can use time-of-day and day-of-week rules to enable, for example,
unrestricted outgoing Web access after hours while keeping the lid on it
during the day.
Milkyway's Black Hole has the most complete time-based access
controls, including time-of-day, day-of-week, day-of-month, week-of-year
and month-of-year rules. Digital's Firewall for Unix, Network-1's
FireWall/Plus, Border's BorderWare and SOS' Brimstone also have time-based
rules, with somewhat less flexibility.
Our favorites
After looking at 13 products, we came to the conclusion that no one
product is appropriate for all security environments. However, we did have
some favorites among the crowd.
For a low-cost entry into the firewall market, Livingston's Firewall
IRX router is hard to beat. For about $3,000, you get a simple firewall
that does what Cisco Systems, Inc., Bay Networks, Inc. and 3Com Corp.
routers don't: It makes a racket when someone tries to break in. The simple
addition of logging facilities makes it worthwhile to use the Firewall IRX
as a replacement for your Internet connection router.
We also liked the power of NSC's Security Router, but this product
clearly fits another niche - one where multiple parts of a large
organization need restricting routers between them. For a company that
needs some internal security to keep the manufacturing department's
programmers out of the accounting department's system, Security Router fits
the bill.
Network-1's FireWall/Plus is for the true network expert. You need to
really understand TCP/IP and Ethernet to properly configure the
FireWall/Plus, but you can do things with it that no other firewall lets
you do, including easy filtering of unusual IP protocols, IPX, AppleTalk,
DECnet, and even less popular protocols such as Digital's Local Area
Transport or Local Area VAX Cluster. Like Security Router, FireWall/Plus is
most appropriate for sites with a simple security policy or for internal
protection.
Similarly, Network Translation's PIX isn't a general-purpose firewall,
but, in certain situations, it can provide firewall-like functions and
solve addressing problems.
CheckPoint's Firewall-1 remains a favorite, even if security czars
don't like packet filters as much as application proxy gateways. In our
first review, this was a clear leader. The competition has come a long way
since then, and, in reponse, CheckPoint has added a few knobs so it can say
its product does everything. It's fundamentally a good product with a
fantastic management interface.
Firewall-1 also offers what no other firewall has: centralized
configuration and administration of multiple firewalls from a single point.
If your network requires multiple firewalls, Firewall-1 is a must-buy.
If you want a firewall but don't want to play with Unix, you should
definitely investigate Digital's Firewall for Unix. The best management
interface of all the firewalls we looked at makes this easy to configure.
The reporting capabilities are also great.
Although there are limitations on the possible configurations,
Firewall for Unix hits squarely in the middle of most corporate
requirements for an Internet gateway system.
Managers who like the all-in-one approach need to look at Border's
BorderWare Firewall Server. This is the ultimate black box: It comes up
running firewall, FTP, Gopher, Web, News, Post Office Protocol, SMTP and
Telnet gateways. For midsize companies that don't want to fool around,
BorderWare is an excellent choice.
Of the remaining application proxies, Milkyway's Black Hole is our
favorite. With a generally clear management interface, you can make the
Black Hole do almost anything you want - act as a NAT, handle multiple
interfaces, require authentication, be transparent and support Internet
access by inside users with more finesse than any other product.
TIS' Gauntlet, although fundamentally old technology, has an advantage
all its own: source code. If you like to play with software, Gauntlet is
the ultimate foundation on which to build your own firewall and therefore
the product of choice for many security experts.
We didn't have any complaints about Secure Computing's Sidewinder,
IBM's SNG, SOS' Brimstone or Harris' CyberGuard, but they didn't stand out
like some of the others. IBM's IP tunneling is well thought-out, and both
Harris' and Secure's 'secure' Unix looked like they would be invaluable
in some environments. In the absence of specific requirements, though, they
wouldn't make it to our short list.Steps for making the right selection