Where to place ACLs?
Standard: as close to destination as possible.
Extended: as close to source as possible.
Which layers do packet filter and stateful firewalls operate at?
Packet filter: layers 3 and 4
Stateful : layers 3, 4 and 5
Discuss reflexive ACLs
Allows IP traffic from sessions originating from their network while blocking outside traffic from coming in.
Router examines outside traffic and makes a temporary ACL to allow it.
Discuss dynamic ACLs
Authenticates a user and permits that user and associated traffic through the firewall.
Discuss common firewall properties
Discuss the protective measures if a firewall
Discuss limitations of a firewall
- end use can be restricted by policies
Discuss firewall design practice
Stateful vs stateless
Stateless: ACLs filter traffic based on source and destination IP, tcp and UDP port numbers, tcp flags, icmp types/codes.
Stateful; inspection remembers the state if requests, stores them in a session table, tracking each connection. It detects if applications need more traffic steams and dynamically allows them. Monitors the state if connections, initiating, data transfer or terminated.
Disadvantages of packet filtering firewalls
Advantages of packet filtering firewalls
Uses for packet filtering firewalls
Stateful firewalls
Improvements if stateful over packet filter firewalls
- recognises dynamic apps that need extra connections or access through the firewall
Zone-based firewalls
Zone types
Public-dmz
Dmz-private
Private-dmz
Private-public
Benefits of zone based
Actions of ZPF
Inspect: automatically allow return traffic and icmp messages. Handles prosper establishment of data sessions.
Pass: like permit in an ACL. Doesn’t track the state of sessions. Only allows in one direction a similar corresponding policy must be applied in the opposite directions to allow traffic two way.
Drop: like deny in an ACL. Log option available
Ips/ids signature types.
Atomic: one packet required
Composite: many packets required
Atomic signatures
Composite signature
iDS vs IPS
IDS: passive , promiscuous.
IPS: active, inline. Latency packet loss etc
Five steps of setting up a GRE tunnel.
Authentication header