D-Link DFL-2500 User Guide - Page 31

functionality of a firewall does not normally provide such protection.

Page 31 highlights

12 Chapter 3. Firewall Principles apart from better written software, is to disable such services or limiting surfing to less sensitive computers. • HTML pages that link in the contents of local files when they are opened without scripts. Such pages can, often with the help of unsuspecting local users who are lured into "helping" the page by clicking on a button, send the linked file onwards to an unknown Internet server. • Documents sent by email that contain hostile scripts which are activated once the document is opened. Possible ways to protect your system against this form of attack include avoiding using browser-based email software or disabling scripting and introducing mail gateways that can block scripts and other executable code. • Buffer overruns, which firewalls only rarely provide protection against. Buffer overruns can occur in any application, with a net result of intruders being able to coax protected computers into executing any command. Here, the only solution is to ensure that only well-written applications, which are specifically designed to be immune to this form of attack are installed and used. Unfortunately, most current software is not written with this problem in mind. At the time of writing, we are of the opinion that this poses the greatest technical threat of all forms of network-based attack, as almost all software is susceptible to buffer overruns. • Viruses and Trojan horses. A firewall can of course be connected to virus scanners, mail gateways and other similar devices in order to increase security, but it should be noted that the fundamental functionality of a firewall does not normally provide such protection. • Even if the firewall is connected to a virus scanner, it is possible that attacking viruses could be so well hidden that the scanner would be unable to detect them. In addition, a virus scanner can only detect viruses it recognizes. If somebody designs a virus specifically for attacking your systems or those of a small group of people, or if the trojan or virus in question has not been in circulation long enough for it to become well known, the virus scanner will not recognize it. At present, the most common targets for data-driven attacks are: • Public servers such as mail servers, DNS servers and web servers. Web servers are clearly over-represented in this category due to their enormous complexity. D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

12
Chapter 3. Firewall Principles
apart from better written software, is to disable such services or
limiting surfing to less sensitive computers.
HTML pages that link in the contents of local files when they are
opened without scripts. Such pages can, often with the help of
unsuspecting local users who are lured into ”helping” the page by
clicking on a button, send the linked file onwards to an unknown
Internet server.
Documents sent by email that contain hostile scripts which are
activated once the document is opened. Possible ways to protect your
system against this form of attack include avoiding using
browser-based email software or disabling scripting and introducing
mail gateways that can block scripts and other executable code.
Buffer overruns, which firewalls only rarely provide protection against.
Buffer overruns can occur in any application, with a net result of
intruders being able to coax protected computers into executing any
command. Here, the only solution is to ensure that only well-written
applications, which are specifically designed to be immune to this
form of attack are installed and used. Unfortunately, most current
software is not written with this problem in mind. At the time of
writing, we are of the opinion that this poses the greatest technical
threat of all forms of network-based attack, as almost all software is
susceptible to buffer overruns.
Viruses and Trojan horses. A firewall can of course be connected to
virus scanners, mail gateways and other similar devices in order to
increase security, but it should be noted that the fundamental
functionality of a firewall does not normally provide such protection.
Even if the firewall is connected to a virus scanner, it is possible that
attacking viruses could be so well hidden that the scanner would be
unable to detect them. In addition, a virus scanner can only detect
viruses it recognizes. If somebody designs a virus specifically for
attacking your systems or those of a small group of people, or if the
trojan or virus in question has not been in circulation long enough for
it to become well known, the virus scanner will not recognize it.
At present, the most common targets for data-driven attacks are:
Public servers such as mail servers, DNS servers and web servers.
Web servers are clearly over-represented in this category due to their
enormous complexity.
D-Link Firewalls User’s Guide