FIREWALLS!!!!!!!!!!!!! Flashcards
Firewalls
Selectively filters and blocks traffic between networks by looking at packets. Sometimes re-routes packets
Network-based Firewall
Between two private networks (LAN)/between private (LAN) and public network (WAN)
Host-based firewall
Software on local machine
Stateless Inspection Packet Filtering
Firewall examined each packet if it was its own stand alone entity… Risky if packets are out of order
Stateful Inspection Packet Filtering
Firewall has the capability to tell if a packet is part of an existing connection
Common Firewall filters
deny/allow IP ranges source and dest ports flags in TCP header Web filtering Content Filtering
Application Aware Firewalls
Operates at application layer
Unified Threat Management
Strategy that combines multiple layers of security appliances and technologies into a single safety net (combo of firewalls and intrusion detection)
*DMZ (Demilitarized Zone)
Network segment (or zone) that allows servers to be publicly accessible from the internet Still have a less restrictive firewall in the front
bastion hosts
host directly connected to the internet
TCP Connect Scan
Completes 3-way handshake (command: nmap)
TCP FIN Scan
Sends request to close nonexistent connection
TCP Null Scan
No flags set, see what target machines responds back with
TCP ACK Scan
Looks to see if stateless inspection is what the firewall is using
pfSense
Firewall we use in lab :)
Proxy service
acts as an intermediary between external and internal networks
proxy server
Manages security at Application Layer
Why do we have proxy servers?
To keep internal network addresses private
Cache files
Access resources from the Internet for a client machine
Forward proxy
passes unmodified requests and responses. Retrieves information from web for client machines
Reverse proxy (surrogate proxy)
Sits in front of web server and receives requests as if it is the web server
Caches and load balances
keyhole
web proxy, http, https, ftq
Full SSL Inspection/HTTPS Interception
Intercepts SSL/TLS traffic between client and server (man in the middle attack) by using a middlebox connection to web server as if it were the client
Next-Gen Firewalls
enforce based on URL, SRC/DEST, User, User Group, Ports