S17-Network Segmentation Flashcards
(87 cards)
Firewall
Uses a set of rules defining the types of traffic permitted or denied through the device
T/F A firewall can’t perform Network Address translation (NAT) and Port address translation (PAT)
False, some physical Firewall hardware sitting at the edge of your network can preform NAT and PAT functions
Packet-Filtering Firewall
Permits or denies traffic based on packet header
Stateful Firewall
Inspects traffic as part of a session can recognizes where the traffic originated
NextGen Firewall (NGFW)
combines basic firewall functions with advanced features like:
- deep packet inspection
- intrusion prevention
- application control
- Threat intelligence
- Layer 7 Inspection
to offer more robust protection against modern cyber threats. operates in L5, L6, L7
Deep Packet inspection (DPI)
NGFWS examine the data within network packets, not just the headers, to detect and block malicious content
intrusion Prevention System (IPS)
NGFWs actively monitor network traffic for suspicious activity and take steps to prevent or mitigate attacks.
Application Control
NGFWs can identify and control which applications are allowed to access the network, reducing the risk of unauthorized applications
Threat Intelligence
NGFWs often integrate with threat intelligence feeds, which provide information about the latest cyber threats, allowing them to better protect against them.
Layer 7 Inspection
NGFWS can operate at the application layer (Layer 7), allowing them to inspect the contents of network traffic and block malicious requests or payloads.
Access Control List (ACL)
List of permissions associated with a given system or network resource
Unified Threat Management (UTM) Device
combines firewall, Router, intrusion detection/prevention system, anti-malware, and other features into a single device
What are somethings you may want to block on your ACL?
- Requests from internal or private loopback addresses and multi Cast ranges
- incoming requests from local protocols
- Either block all Ipv6 traffic or allow it to authorized hosts/ports
Explicit Deny
Blocks matching traffic
Role-Based Access
Defines the privilege’s and responsibilities of admin users who control firewalls and their ACLs
Trusted Zone/Inside Zone
Intranet or LAN
Untrusted Zone/ Outside Zone
Internet or External network
Screened Subnet
often referred to as a Demilitarized Zone (DMZ) or perimeter network, is a network configuration that isolates public-facing servers from the internal network.
- semi-trusted zone
Internet-Facing Host
Any host that accepts inbound connections from the internet
What things should be placed in the screened subnet?
Anything that receives inbound traffic from the internet:
- Email server
- Web server
- Remote access servers
- Proxy servers
Bastion Host
Hosts or servers in the screened subnet which are not configured with any services that run on the local network
Jumpbox
Hardened server that provides access to other hosts within the screened subnet
How are action executed in an ACL?
IN a TOP - DOWN manner
how are rules positioned in an ACL?
More Specific rules toward the top , more generic rules towards the bottom