Firewall Facts Flashcards
Firewall
- Software or hardware based network security system that allows or denies network traffic according to a set of rules
Network based firewall
- Is installed on the edge of a private network or network segment
Network based firewall facts
- Are considered hardware firewalls - even though they use a combination of hardware and software to protect the network from Internet attacks
Host based firewall
- Installed on a single computer in a network
Host based firewall facts
- Almost all host-based firewalls are software firewalls
- Can be used to protect a computer when no network-based firewall exist(e.g. when connected to a public network)
- Less expensive and easier to use than network-based firewalls, but the don’t offer the same level of protection or customization
ACL’s
- Filtering rules to identify allowed and blocked traffic
ACL characteristics of traffic
- The interface the rule applies to
- The direction of traffic (inbound or outbound)
- Packet information such as the source of destination IP address or port number
- The action to take when the traffic matches the filter criteria
Does firewall offer protection against all attacks
No example email spoofing
Packet Filtering Firewall
- Makes decisions about which network traffic t allow by examining information in the IP packet header such as source and destination addresses, ports, and service protocols
Packet Filtering Firewall Facts
- Uses ACLs or filter rules to control traffic
- Operates at OSI Layer 3 (Network layer)
- Offers high performance because it examines only the addressing information in the packet header
- Can be implemented using features that are included in most routers
- Is a popular solution because it is easy to implement and maintain, has a minimal impact on system performance and is fairly inexpensive
Stateless firewall
- Packet filtering firewall is considered stateless because it examines each packet and uses rules to accept or reject it w/o considering whether the packet is part of a valid and active session
Circuit- level proxy
- Makes decisions about which traffic to allow based on virtual circuits or sessions
Circuit-level proxy facts
- Operates at OSI Layer 5 (Session)
- Keeps a table of known connections and sessions. Packets directed to known sessions are accepted
- Verifies that packets are properly sequenced
- Ensures that the TCP 3-way handshake process occurs only when appropriate
- Does not filter packets. Instead it allows or denies sessions
Stateful firewall
- CLP is considered a stateful firewall because it keeps track of the state of a session.
- CLP can filter traffic that uses dynamic ports because the firewall matches the session information for filtering and not the port numbers.
- CLP are slower than PFF but if only the session state is being used for filtering a CLP can be faster after the initial session information has been identified.
Application level gateway
- Is cable of filtering based on information contained within the data portion of a packet
Application level gateway facts
- Examines the entirety of the content being transferred(not just individual packets)
- Operates at OSI Layer 7 (Application layer)
- Understands. or interfaces with the application layer protocol
- Can filter based on user group and data (e.g. URLs within an HTTP request)
- Is the slowest form of firewall because entire messages are reassembled at the Application layer
Proxy server
- Is an example of an application level gateway
* Is a device that stands as an intermediary between a secure private network and the public
Proxy server can be configured to:
- Control both inbound and outbound traffic
- Increased performance by caching frequently accessed content. Content is retrieved from the proxy cache instead of the original server
- Filter content and restrict access depending on the user or specific website
- Shield or hide a private network
Name the two types of Proxy Servers
- Forward Proxy Server
- Reverse Proxy Server
- Oftentimes reverse proxies work transparently meaning that clients requesting specific resources don’t know they are using a reverse proxy to access a server
Forward Proxy Server
- Handles requests from inside a private network out to the Internet
Reverse Proxy Server
- Handles requests from the Internet to a server located inside a private network.
- Can perform load balancing authentication and caching
Unified Threat Management (UTM) Device
- Combines multiple security features into a single network appliance
UTM security features:
- Firewall
- VPN
- Ant-spam
- Anitvirus
- Load balancing
UTM (Pros and Cons)
- By combining serval services into one appliance, UTM devices make managing network security easier
- But they also introduce a single point of failure
- If the UTM fails security is lost
- UTM devices aren’t as robust as other devices made for a specific use
UTM devices are best suited for:
- Offices where space limits don’t allow for multiple security appliance
- Satellite offices that need to be managed remotely. Configuration changes need to be made on only one device rather than multiple devices
- Smaller businesses that wouldn’t benefit from the robust features provided by specific security appliance
Using zones in a firewall
- Each zone identifies a collection of users who have similar access needs
- Firewalls are configured at the edge of these zones to filter incoming and outbound traffic
- EX. you can define a zone hat includes all hosts on your private network protected from the Internet and you can define another zone within your network for controlled access to specific servers that hold sensitive information
Next Generation Firewall (NGFW)
- Combines a traditional firewall with other network device filter functionalities like an application firewall
Next Generation Firewall (NGFW) features:
- Is application-aware
- Tracks the state of traffic based on layers 2 - 7
- Utilizes an intrusion protection system (IPS)
- Tracks the identity of the local traffic device and user (LDAP, RADIUS, and Active Directory)
- Can be used in bridged and routed modes
- Utilizes external intelligence sources