2 - Firewall/DMZ Flashcards

1
Q

Firewall

A

Integrated colleciton of security mesaures that prevent unauthorised access to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

A Firewall can/is:

A
  • Security Gateway
  • Traffic Control Device
  • Packet Filtering
  • Routing
  • ENforce security policy
  • Loggin
  • Secure the net from external attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firewalls are not/cannot:

A
  • Be the only security
  • Not an auth/remote access server
  • Cannot see the content of encrypted packets
  • Cannot see all traffic if positioned incorrectly
  • Not a malicious code scanner
  • Not an IDS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Firewall Ingress/Egress filtering

A

Monitoring and filtering directional inbound/outbound traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Packet filtering

A

Examines network protocol headers and parameter.s

Stateless (rules) or stateful (conneciton states)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Content Filtering

A

Focuses on network protocol payloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

4 Firewall risks and disadvantages

A
  • Central point of attack.
  • Can degrade system performance
  • May restrict legitimate users
  • Does not provide data integrity and confidentiality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Firewall rules

A

An instruction set that indicates what actions a firewall should take

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Firewall rule structure

A
  • Protocol
  • Src Address
  • Src Port
  • Target Address
  • Target Port
  • Action
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why log?

A
  • Validate rules
  • Historical and reactive tracking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WHat data to log?

A
  • Connections
  • Traffic to successfully traverse through the firewall
  • Configuration Chagnes
  • Firewall system access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

General rule for what protocols to allow

A

Allow encrypted protocols and only allow unencrypted for users that require it with sufficient training.

If it is internal you might allow it but again, risk assess.`

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DMZ Design

A

Segregate devices etc based on risk.
Isolate certain services + functions.
Adds additional security layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DMZ

A

A zone with an intermediate trust level, between the internet and trusted internal network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DMZ Architecture

A

Uses firewall to restrict access from internet to private LAN.

Single or dual firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DMZ single firewall

A

At least 3 network interfaces:

1st: External net
2nd: internal net
3rd: DMZ

16
Q

DMZ Dual Firewall

A

First firewall (frontend) configured to allow traffic destined to DMZ only
Second (backend) allows DMZ to internal.

17
Q

DMZ single vs dual

A

Cost
More rules and isngle point failure with single.

18
Q

RFC 1918

A

Address Allocation for Private Internets.

Most recommended for firewall configuration

19
Q

Private VLAN in DMZ

A

If one DMZ server is compromised, then can be used to access other DMZ servers.

Use VLANs to separate servers in the DMZ.

20
Q

DMZ general rules

A

Traffic to DMZ is authorised.
Traffic from the DMZ is prohibited/denied.
Traffic from internal to external is authorised but not in return.