chapter15 Flashcards
what are firewalls?
529
they are a combination of hardware and software, the hardware [part is a router, computer or a black box.
the software part is responsible for packets filtering.
network based firewall:
530
it protect a network of computers, normally used in big companies.
it is a combination of software and hardware.
Host based firewall:
530
it is Implemented on a single computer and it protect only that computer.
it is a software firewall.
what do Access control lists do?
531
they are sets of rules used by the firewall to determines which traffic can pass through it.
2 main types of ACL what are they?
532
Standard ACL and Extended ACL.
Standard ACL:
532
it filters based on source address only. You can filter a source network or a source host, but you cannot filter based on the destination of a packet, the particular protocol being used such as the Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), or on the port number. You can permit or deny only source traffic.
Extended ACL:
533
Extended IP ACLs check both the source and destination packet addresses. They can also check for specific protocols, port numbers, and other parameters, which allow administrators more flexibility and control.
evaluat haders
what is DMZ?
534
DeMilitarized Zone and acts as a buffer area between outside users (the internet) and a private (local or wide area network) server. DMZs accepts internet traffic such as DNS, FTP and Web servers and email server.
DMZ can be placed outside of the firewall or inside which mean between the firewall and the network.
what is a proxy server?
538
A Proxy server is an intermediary machine, between a client ( internal host) and the actual server ( external hosts), which is used to filter or cache requests made by the client.
what are some types of proxy server?
539
IP proxy
web proxy
FTP proxy
SMTP proxy
IP proxy
539
- it hide the IP addresses of all the devices on the internal network by exchanging its IP address for the address of any station.
- they are called network address translation ( NAT )
web proxy
539
also called HTTP proxy, it processes HTTP requests on behalf of the sending workstation.
- when the requested page is returned the proxy server caches a copy of it locally for next use.
- it increase the network security by filtering out content.
FTP proxy
540
FTP (File Transfer Protocol) is used to send files from one computer to a different computer. The FTP server can be a resource that keeps files on the same network or on a different network.
SMTP proxy
540
use the SMTP-proxy to control email messages and email content. The proxy scans SMTP messages for any unsecure materials and block it.
stateful Network layer firewall:
541
it keeps track of the established connection passing through it, so when another packet is received that is part of a current state that packet is passed without checking the ACL