FIREWALL Flashcards

1
Q

Firewall-

A

like a bouncer in a club, allow or prevent on a club.

Allows good traffic and blocks/kills bad traffic. Want to protect privateinternal network from external harmful networks and users on the internet i.e public network

Firewall is a combination of hardware- software related program(hardware lets flow of packets in and out, software helps to analyze the packets).

  • secure barrier
  • firewalls filters traffic- filtering rules
  • security rules what is allowed and what is blocked.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Understand the role, functionality and restrictions of a packet firewall

A

Packet filtering firewall→

Filtering packets- operates on network layer and transport layer

Filters based on source and destination IP Addressses, TCP/UDP ports

  • There are all Static filtering rules
  • Security mechanism is cost effective.

Packet filtering firewall are still prone to attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do Packet filtering firewalls work→

A
  1. Examines IP Header- network layer
  2. and TCP/UDP headers- transport layer

-E.g allows TCP port 80, port 25-allows in and out(and blocks in and out)

-Can block network traffic management,
→Which traffic should be permitted?

Source IP Addresses(range)

Destination IP Addresses(range)

source port (or range)

Destination port(or range)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

→Where to place a firewall?

A

PC or host-based firewall-

-Computer

Be able to correctly place a firewall in an enterprise network

If mid-size to large network-

Proper firewall , router - packet filtering firewall.

firewall rules- lines of command(has precedence here)

For small size networks-

small computer has resources to protect too

internal network PCs, server, printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DMZ?

A

DMZ - demilitarized zone

logical or virtual location where internal and external network (with firewall) can be separated which can be protected by an external and interior router- between these routers is a DMZ. DMZ - can publish web servers, FTP server, DNS server(advertising systems in DMZ zone) - anyone can access any of the service-

less secure than internal network but still protected from direct access from external networks.

DMZ generally has two firewalls- internal and external firewall- b/w internal and external network. in DMZ zone can publish any services- www, STMP, DNS i.e web service, email, domains. external ppl can access., internal can access to but in a controlled fashion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to Filter outgoing traffic→

A

e.g -

prevent malicious software to send out data(can also control internal network to send to external)

block IP spoofing(in internal/external network, IP address range in expected, outsider can create a packet that is valid in our network). MAC address spoofing also exists.

  • block outbound traffic from critical network areas so it doesnt go to external public network
  • only allow outbound http traffic through a proxies -proxies are fixed in DMZ zone(application level gateways- a slow firewall) - three types of firewalls- packet filtering firewall (fast), circuit level firewall , application proxies. examine if payload has malicious code. APPLICATION PROXIES» other firewalls although are slow.

if encrypted cant examine proxies.

-deny outbound traffic help avoid infections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Proxies and NAT. (network address translation)

A

internal network has private class of addressess.these are not visible on the outside used NAT.

  • internal IP is private while external IP is public mapping is required.
  • Proxies is an application level gateway hide internal devices(mapping at application layer)
  • Proxies and NAT are added so that there is No direct access between internal and external network to secure functionalities,
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

→Why firewalls are not enough?

A

internal to external network requirements can evolve ,for e.g-

  • Social networks
  • Remote access(TeamViewer,etc)
  • Unified messaging(Skype,WeChat,etc)
  • Collaboration tools(Google Docs, drive, icloud,etc)

More difficulties-

Port hopping- When applications change port addresses during a session. security , extended coverages, subscribers, need to adapt.

Hiding in TLS encryption- TLS can mask application traffic(e.g- via TCP port 443 vs using port 80). can identify that they are using TLS and HTTPS .

Dont use standard ports.

Tunnel in other services- peer-to-peer file sharing or messenger running over HTTP.

Perimeter security has obvious constraints→

Firewalls- No protection in internal network

60-70% has more hacks.

IoT, mobile networks

cant control -VPN used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IDS and IPS

A

Intrusion Detection System(IDS)-

monitor network and system activities.

alert when potential malicious activity found

logs info on activites

IPS(Intrusion Prevention System)-1st step

block or stop malicious activities

E.g→

Monitoring actions

  • detect port scans(TCP and UDP)
  • detect OS fingerprinting attempts
  • buffer overflow
  • known malware
  • find abnormalities

Reactions(examples):

  • drop malicious packets and send alarm
  • block traffic from IP addresses
  • fragmentation(TCP segments cant identify exact length of malicious code) in packet streams
  • raise alerts for incident response teams.

IDS/IPS should also anamolgy-based detection(application profile/user profile) while signature-based detection(logs and monitoring)

-signature-based is fast, does not need a learning phase, generates less false positives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NGF and Problems?

A

Next-generation firewalls(NGF)

  • promise an integrated security approach
  • proxy for all traffic(even encrypted)- examine even encrypted data
  • very powerful security tool
  • spplication, services, users, roles,etc

NGF Problems

  • Policy rules is complex
  • Proxy for TLS etc can break end-to-end security (can crack)
  • Encapsulated encryption is still possible
  • Privacy issues
  • Single point of attack with full access to decrypted data.

Many ways to attack systems

-not all security issues are technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Virus Scanner-

A

Anti Virus scanner can efficiently prevent infections with known malware

  • unable to detect new malware.
  • need to keep updating. as company identifies newer the malicious code.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly