Firewall Facts Flashcards
1
Q
Firewall
A
- Software or hardware based network security system that allows or denies network traffic according to a set of rules
2
Q
Network based firewall
A
- Is installed on the edge of a private network or network segment
3
Q
Network based firewall facts
A
- Are considered hardware firewalls - even though they use a combination of hardware and software to protect the network from Internet attacks
4
Q
Host based firewall
A
- Installed on a single computer in a network
5
Q
Host based firewall facts
A
- Almost all host-based firewalls are software firewalls
- Can be used to protect a computer when no network-based firewall exist(e.g. when connected to a public network)
- Less expensive and easier to use than network-based firewalls, but the don’t offer the same level of protection or customization
6
Q
ACL’s
A
- Filtering rules to identify allowed and blocked traffic
7
Q
ACL characteristics of traffic
A
- The interface the rule applies to
- The direction of traffic (inbound or outbound)
- Packet information such as the source of destination IP address or port number
- The action to take when the traffic matches the filter criteria
8
Q
Does firewall offer protection against all attacks
A
No example email spoofing
9
Q
Packet Filtering Firewall
A
- Makes decisions about which network traffic t allow by examining information in the IP packet header such as source and destination addresses, ports, and service protocols
10
Q
Packet Filtering Firewall Facts
A
- Uses ACLs or filter rules to control traffic
- Operates at OSI Layer 3 (Network layer)
- Offers high performance because it examines only the addressing information in the packet header
- Can be implemented using features that are included in most routers
- Is a popular solution because it is easy to implement and maintain, has a minimal impact on system performance and is fairly inexpensive
11
Q
Stateless firewall
A
- Packet filtering firewall is considered stateless because it examines each packet and uses rules to accept or reject it w/o considering whether the packet is part of a valid and active session
12
Q
Circuit- level proxy
A
- Makes decisions about which traffic to allow based on virtual circuits or sessions
13
Q
Circuit-level proxy facts
A
- Operates at OSI Layer 5 (Session)
- Keeps a table of known connections and sessions. Packets directed to known sessions are accepted
- Verifies that packets are properly sequenced
- Ensures that the TCP 3-way handshake process occurs only when appropriate
- Does not filter packets. Instead it allows or denies sessions
14
Q
Stateful firewall
A
- CLP is considered a stateful firewall because it keeps track of the state of a session.
- CLP can filter traffic that uses dynamic ports because the firewall matches the session information for filtering and not the port numbers.
- CLP are slower than PFF but if only the session state is being used for filtering a CLP can be faster after the initial session information has been identified.
15
Q
Application level gateway
A
- Is cable of filtering based on information contained within the data portion of a packet