Chapter 6 - Firewalls Flashcards
If the packet is not a provable attack packet, the firewall passes the packet on to its destination.
This is called a __________.
Pass/deny decision
Firewalls usually record information about each dropped packet in a __________.
This process is called __________.
- Log file
2. Logging
Many firms have ______ which filter traffic through different parts of the internal network.
Internal firewalls
The firewall which examines packets entering the network from the outside is called _________.
Ingress filtering
The firewall which examines packets leaving the network from the inside is called _________.
Egress filtering
Firewalls must be able to filter traffic at _____ which is the maximum speed of the lines that are connected to it.
Wire speed
What are the six types of filtering methods?
- Stateful packet inspection filtering.
- Static packet filtering.
- Network address translation.
- Application proxy filtering.
- Intrusion prevention system filtering.
- Antivirus filtering.
All main border firewalls use _____.
Stateful packet inspection (SPI)
What type of filtering looks at packets one at a time while isolated?
Static packet filtering
What types of attacks can ‘static packet filtering’ stop?
- Internet Control Message Protocol (ICMP) echo messages.
2. Packets that are spoofed with different IP addresses.
Static packet filtering is not used as a _____.
Main border firewall filtering mechanism.
“Nearly all” corporate border firewalls use the _____.
Stateful packet inspection (SPI) filtering method.
SPI focuses on _____ which are _____ b/w different programs on different computers.
- Connections
2. Persistent conversations
A _____ is a distinct phase in a connection b\w two applications.
State
_____ uses specific examination methods depending on the _____ of the _____.
- Stateful packet inspection
- State
- Connection