Firewall Facts Flashcards
Firewall
- Software or hardware based network security system that allows or denies network traffic according to a set of rules
Network based firewall
- Is installed on the edge of a private network or network segment
Network based firewall facts
- Are considered hardware firewalls - even though they use a combination of hardware and software to protect the network from Internet attacks
Host based firewall
- Installed on a single computer in a network
Host based firewall facts
- Almost all host-based firewalls are software firewalls
- Can be used to protect a computer when no network-based firewall exist(e.g. when connected to a public network)
- Less expensive and easier to use than network-based firewalls, but the don’t offer the same level of protection or customization
ACL’s
- Filtering rules to identify allowed and blocked traffic
ACL characteristics of traffic
- The interface the rule applies to
- The direction of traffic (inbound or outbound)
- Packet information such as the source of destination IP address or port number
- The action to take when the traffic matches the filter criteria
Does firewall offer protection against all attacks
No example email spoofing
Packet Filtering Firewall
- Makes decisions about which network traffic t allow by examining information in the IP packet header such as source and destination addresses, ports, and service protocols
Packet Filtering Firewall Facts
- Uses ACLs or filter rules to control traffic
- Operates at OSI Layer 3 (Network layer)
- Offers high performance because it examines only the addressing information in the packet header
- Can be implemented using features that are included in most routers
- Is a popular solution because it is easy to implement and maintain, has a minimal impact on system performance and is fairly inexpensive
Stateless firewall
- Packet filtering firewall is considered stateless because it examines each packet and uses rules to accept or reject it w/o considering whether the packet is part of a valid and active session
Circuit- level proxy
- Makes decisions about which traffic to allow based on virtual circuits or sessions
Circuit-level proxy facts
- Operates at OSI Layer 5 (Session)
- Keeps a table of known connections and sessions. Packets directed to known sessions are accepted
- Verifies that packets are properly sequenced
- Ensures that the TCP 3-way handshake process occurs only when appropriate
- Does not filter packets. Instead it allows or denies sessions
Stateful firewall
- CLP is considered a stateful firewall because it keeps track of the state of a session.
- CLP can filter traffic that uses dynamic ports because the firewall matches the session information for filtering and not the port numbers.
- CLP are slower than PFF but if only the session state is being used for filtering a CLP can be faster after the initial session information has been identified.
Application level gateway
- Is cable of filtering based on information contained within the data portion of a packet
Application level gateway facts
- Examines the entirety of the content being transferred(not just individual packets)
- Operates at OSI Layer 7 (Application layer)
- Understands. or interfaces with the application layer protocol
- Can filter based on user group and data (e.g. URLs within an HTTP request)
- Is the slowest form of firewall because entire messages are reassembled at the Application layer
Proxy server
- Is an example of an application level gateway
* Is a device that stands as an intermediary between a secure private network and the public
Proxy server can be configured to:
- Control both inbound and outbound traffic
- Increased performance by caching frequently accessed content. Content is retrieved from the proxy cache instead of the original server
- Filter content and restrict access depending on the user or specific website
- Shield or hide a private network
Name the two types of Proxy Servers
- Forward Proxy Server
- Reverse Proxy Server
- Oftentimes reverse proxies work transparently meaning that clients requesting specific resources don’t know they are using a reverse proxy to access a server
Forward Proxy Server
- Handles requests from inside a private network out to the Internet
Reverse Proxy Server
- Handles requests from the Internet to a server located inside a private network.
- Can perform load balancing authentication and caching
Unified Threat Management (UTM) Device
- Combines multiple security features into a single network appliance
UTM security features:
- Firewall
- VPN
- Ant-spam
- Anitvirus
- Load balancing
UTM (Pros and Cons)
- By combining serval services into one appliance, UTM devices make managing network security easier
- But they also introduce a single point of failure
- If the UTM fails security is lost
- UTM devices aren’t as robust as other devices made for a specific use