Domain 2 Flashcards
Network Based FWs
Control the flow of the network/ Filters traffic via ports over Layer 4. Encrypt traffic between sites. Can proxy traffic. Most FW’s sit on the ingress/egress of the network.
Stateless
each packet is individually examined (Looks at ACL/Rules then allow or disallows traffic). Have to add two rules for traffic to go both ways. Rule -> and Rule
Stateful
Keeps track of traffic flows by adding each flow to a session table. Session table makes note of (source,dest,port,protocol) one way from (workstation) to (web server) and FW checks session table when going back from (web server) to (workstation). Everything within a valid flow is allowed. If a packet is not in the session table, it will get dropped.
NGFW
Performs deep packet inspection. Every packet must be analysed and categorised before making a security decision. Controls traffic flow based on application.
IPS
Identify application, uses signature based for the identified application.
Host based FW
Works with the OS and can manually select what applications you want to allow through the FW.
VPN Concentrator
Encrypt and decrypt traffic, commonly found in Firewalls.
Remote access VPN
Software connects to a VPN Concentrator. Host at a coffee shop sets up a VPN tunnel to the Concentrator. Concentrator decrypts the information and forwards on to the corporate network
SSL VPN
Connected over port 443 via SSL/TLS. Ran over a browser. No requirement for digital certificates. Usually remote access communications.
Full Tunnel
All traffic regardless of destination all passes through the tunnel.
Split Tunnel
If you need to communcate to a website which isnt apart of the corporate network, it will take the normal route because it doesn’t require getting encrypted therefore the traffic will fall outside the vpn tunnel.
Site2Site VPN
FW’s often act as VPN’s therefore take advantage of whats already there.
IPSec
Layer 3. Authentication and encryption for every packet. We provide confidentiality through the encrption and data intergrity by preventing people replaying traffic. There are two core protocols associated with IPSec. AH & ESP. Authentication Header & Encapsulation Security Payload.
When in Transport mode, is data encrypted or unencrypted?
Data is encrypted
When in Tunnel Mode is Data encrypted/Header and data or just header? Plus what happens to the entire packet?
Tunnel Mode: Header and Data is encrypted. Plus a new IP header on the front of the packet. This means if someone sees the IP header going through, they wont actually know what the IP destination is because all of that information is encrypted in the Tunnel.