Chapter 15 Flashcards
is used to create a security zone that allows public traffic but the traffic is isolated from the company private network. p528
demilitarized zone (DMZ)
this type of firewall is that it’s designed to protect an entire network of computers instead of just one system, and it’s usually a combination of hardware and software. p530
network-based firewall
This type of firewall is usually a software implementation, because you don’t need any additional hardware in your personal computer to run it. p530
host-based firewall
The first line of defense for any network that’s connected to the Internet is what we call? p531
access control lists (ACLs)
an ACL applied to a protocol is referred to as a what? p532
distribution list
what are the two types of ACLs.p532-33
Standard ACLs
Extended ACLs
what is a standard ACLs p532
These use only the source IP address in an IP packet as the condition test, so all decisions regarding a packet will be based on the source IP address.
what is a extended ACLs p533
Extended ACLs go the distance and evaluate lots of the other fields in the Layer 3 and 4 headers of an IP packet.
what does the Inbound ACLs do. p533
When an ACL is applied to inbound packets on an interface, those packets are processed through the ACL before being routed to the outbound interface. Any packets that are denied won’t be routed because they’ll be discarded before the routing process is completed.
what does the Outbound ACLs do. p533
When an ACL is applied to outbound packets on an interface, those packets are routed to the outbound interface and then processed through the ACL before being queued.
protects data on the inside of a firewall; and because TCP/IP is what the Internet runs on, most external attacks take direct aim at this protocol stack. p534
Protocol switching
Firewalls use dynamic packet filtering to ensure that the packets they forward match sessions initiated on their private side by something called a _______ or _______ which keeps track of all communication sessions between stations from inside and outside the firewall. p537
dynamic state list
state table
what is a proxy services. p538
an internal client sends a request to an external host on the Internet. That request will get to the proxy server first, where it will be examined, broken down, and handled by an application that will create a new packet requesting information from the external server.
what are some the proxy server types. p539-40
IP proxy
Web (HTTP) proxy
FTP proxy
SMTP proxy
what does an IP proxy do. p539
An IP proxy hides the IP addresses of all the devices on the internal network by exchanging its IP address for the address of any requesting station.