2.3 - Configuring a SOHO Firewall Flashcards

1
Q

Firewall and DMZ ports

A
• Every SOHO router is also a firewall
• No external device can directly access the internal
network
• This normally can’t be disabled
• DMZ ports can be configured to
allow unrestricted access
• This is almost always a bad idea
• Consider creating more specific port forwarding rules
• Or perhaps don’t allow any access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NAT (Network Address Translation)

A

• It is estimated that there are over 20 billion devices
connected to the Internet (and growing)
• IPv4 supports around 4.29 billion addresses
• The address space for IPv4 is exhausted
• There are no available addresses to assign
• How does it all work?
• Network Address Translation
• This isn’t the only use of NAT
• NAT is handy in many situations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Configuring NAT

A

• For SOHO devices, this is automatic
• Source NAT, also called PAT (Port Address Translation)
• All internal devices are translated to
a single external address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Port forwarding

A

• 24x7 access to a service hosted internally
• Web server, gaming server, security system, etc.
• External IP/port number maps to an internal IP/port
• Does not have to be the same port number
• Also called Destination NAT or Static NAT
• Destination address is translated from a
public IP to a private IP
• Does not expire or timeout
• Port forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

UPnP (Universal Plug and Play

A

• Allows network devices to automatically
configure and find other network devices
• Zero-configuration
• Applications on the internal network can
open inbound ports using UPnP
• No approval needed
• Used for many peer-to-peer (P2P) applications
• Best practice would be to disable UPnP
• Only enable if the application requires it
• And maybe not even then

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Whitelist/blacklist

A
  • Content filtering, IP address ranges
  • Or a combination
  • Whitelisting
  • Nothing pass through the firewall unless it’s approved
  • Very restrictive
  • Blacklisting
  • Nothing on the “bad list” is allowed
  • Specific URLs
  • Domains
  • IP addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

MAC filtering

A
• Media Access Control
• The “hardware” address
• Limit access through the physical hardware address
• Keeps the neighbors out
• Additional administration with visitors
• Easy to find working MAC addresses
through wireless LAN analysis
• MAC addresses can be spoofed
• Free open-source software
• Security through obscurity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wireless channels and encryption

A
• Configure for the highest encryption possible
• WPA2-AES
• Choose WPA2 over WPA
• WEP is not an appropriate option
• Check your devices
• Not all of them may allow for the highest encryption
• Use an open frequency
• Some access points will
automatically find good frequencies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Managing Qos (Quality of Service)

A
  • Change the priority of your traffic
  • Voice is high, World of Warcraft is low
  • Or vice-versa
  • Prioritize applications, ports, or MAC addresses
  • A feature of high-end SOHO routers
  • Be careful
  • You could accidentally cause applications to slow down
How well did you know this?
1
Not at all
2
3
4
5
Perfectly