CIS4360_Chapter_09 Flashcards
List 3 design goals for a firewall?
All traffic must pass through the firewall
Only authorized traffic as defined by the local security policy will be allowed to pass
The firewall itself is immune to penetration
List four characteristics of a firewall that control access and enforce security
IP Address and Protocol Values
Application Protocols
User Identity
Network Activity
How does a Firewall use IP Address and Protocol values to control access?
Used to control access based on source IP or destination addresses and port numbers
How does a Firewall use Application Protocols to control access?
Controls access based on the basis of authorized application protocol data
How does Firewall use user identity to control access?
controls access based on user identity and authentication
How does a Firewall use network Activity to control access?
Controls access baed on considerations such as time or request. I.E number of request or interval between requests.