Firewalls and Tunnels Flashcards
What is the purpose of a firewall?
To filter network traffic based on predefined policies, separating trusted and untrusted networks.
What are the two main firewall strategies?
Default-deny: Block all traffic unless explicitly allowed.
Default-allow: Allow all traffic except what is explicitly blocked.
Name three reasons why firewalls are necessary.
- Prevent unauthorized access to vulnerable services.
- Control outgoing traffic and data exfiltration.
- Log network activity for troubleshooting and forensics.
What is stateless filtering?
Filtering packets based on static rules without maintaining connection state.
How do stateful firewalls work?
They track the state of active connections and make decisions based on the context of packets in a session.
What are application-level firewalls?
Firewalls that filter traffic specific to applications, such as HTTP-level filtering for URLs or ads.
What is a host-based firewall?
A firewall installed on individual devices to protect them from local threats or unauthorized access.
Why might a firewall need dynamic updates?
To respond to ongoing threats like DDoS attacks or handle protocols with dynamically negotiated ports.
What are the limitations of stateless firewalls?
They cannot track connection states, making them ineffective for dynamic or fragmented traffic.
What does ACK scanning reveal about firewalls?
It can determine if a stateless firewall is in use by observing the response to out-of-sync ACK packets.
What does Network Address Translation (NAT) do?
Remaps private IP addresses to a single public IP address for internet access, effectively acting as a default firewall.
How does NAT differ from stateful firewalls?
NAT modifies packet headers for address translation but does not fully track higher-layer states like stateful firewalls.
What does a Virtual Private Network (VPN) do?
Creates encrypted tunnels over untrusted networks to securely connect remote hosts to private networks.
Name three common VPN technologies.
- PPTP: Layer 2, now considered insecure.
- IPsec: Layer 3, OS-level support, transparent to applications.
- SSL: Application-layer, used by OpenVPN.
What are the risks of using third-party VPN services?
They can monitor traffic, monetize user data, and are subject to local laws.