Firewalls Flashcards

1
Q

What is a Firewall

A

A system or group of systems used to control access between two networks – a trusted network (Internal Private Network) & an untrusted network (Internet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Perimeter Defence (mcq)

A

Intercepts and controls traffic between networks with differing levels of trust, enforced with a network security policy

Log inter-network activity, and limit the exposure of an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Firewall Challenges

A

Detecting malware

Connections that do not go through the firewall

Unknown threats

Poorly trained firewall administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Stateful Packet Filtering (open ended)

A
  • Maintains an entry for each established connection
  • Packet filter based on profile of the entries
  • Keeps track of TCP sequence numbers to prevent attacks based on sequence numbers
  • Inspect data for protocols (FTP, IM, SIP) commands
  • Detects and drops packets that overload server
  • Disallow packets that has no connection to server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Stateful Packet Filtering drawbacks

A

Cannot prevent, Trojan, spyware, adware where an connection has been established from within the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Stateful Packet Filtering Solution

A

Deep Packet Inspection (DPI)
Examines also the data part of packet (content)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

One example of Web Application Firewall

A

ModSecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Web Application Firewall

A
  • Inspect request and response data (including HTTPS)
  • Increase information log (Credit card numbers, ID numbers, Passwords, Raw Transaction data)
  • Act as an inbound proxy to Webserver: Apache, IIS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does Web Application Firewall alert

A

SQL Injection
XSS
Buffer Overflow
Cookie Tampering
Abnormal Activities
etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Unified Threat Management (UTM)

A

Consolidates multiple security and networking functions all on one appliance. Popular with SMEs (Small Medium Enterprise)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Examples of Unified Threat Management (UTM)

A
  • Firewall
  • IDS/IPS
  • SIEM
  • Secure Web/Email Gateway
  • Remote Access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Unified Threat Management (UTM) Advantages

A
  • Browser based management
  • Short learning curve for security policy configuration
  • Localized software and documentation
  • By 2022, more than 50% of new SMB firewall deployment will tunnel web traffic to a cloud-based secure web gateway, up from less than 10% today.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application Firewall (Often called NGFW)

A

(ref image)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

4 Properties of Next generation firewall (NGFW)

A
  1. Application Awareness
    Does not assume a specific application is running on a specific port.
    Firewall can monitor traffic from layers 2 to 7 with greater granularity
    Eg: HTTP Port 80 assumed to be HTTP Traffic. Useful for bandwidth
    control (P2P)
  2. Identity Awareness
    Track the identity of the local traffic device and user,
    Typically using existing enterprise authentication systems
    (i.e. Active Directory, LDAP). Control the what a specific
    User or groups is allowed to send and receive
  3. Extra firewall Intelligence
    Optimized rule set and intelligence gathered from outside sources
    continually (Whitelist, blacklist, directory integration to block by
    identity)
  4. Integrated IPS
    Automatic correlation to IPS(To cover in PM) to suggest
    blocking of certain malicious websites. Eg: Block and address
    that is continually loading the IPS with bad traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Packet Filtering Rules (Two common strategies)

A

1) Build rules from most specific to most general. This is to ensure that
a general rule does not “override” a more specific but conflicting
rule.
2) Rules should be ordered such that the ones most often used are at
top of list. Done for performance reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

First 4 Best Practices

A

1) Deny all traffic by default, and only enable those services that are
needed.
2) Disable or uninstall any unnecessary services and software on the
firewall that are not specifically required.
3) Limit the number of applications that run on the firewall in order to
let the firewall do what it’s best at doing.
4) Run the firewall service as a unique user ID instead of administrator
or root.

17
Q

Last 4 Best Practices

A

5) Change the default firewall administrator or root password
6) Do not rely on packet filtering alone. Use stateful
inspection and application proxies if possible.
7 Ensure that physical access to the firewall is controlled.
8) Regularly monitor firewall logs.
9) Document all firewall rule changes.

18
Q

What is Packet filtering firewall

A

Stateless
- Filters packet content, Layer 3 and sometimes Layer 4 information
- Firewall makes decision based on packet header

19
Q

What is Stateful firewall

A

Stateful Inspection
- Monitors the state of connections, whether the connection is in an initiation, data transfer, or termination state
- Keep state information about transactions (Connection)

20
Q

What is Application gateway firewall

A

proxy firewall
Filters information at Layers 3, 4, 5 & 7