Network Security Defences Flashcards
Do ALL hosts connected to Internet have a unique global IP Address?
Depends;
- Private IP network is an IP network that is not directly connected to the Internet
- IP addresses in a private network can be assigned arbitrarily
What is NAT? What does it do?
- NAT is a router function designed for IP address conversion
- It enables Private Networks that use unregistered IP addresses to connect to Internet.
- It allows connecting two networks together and translates the private (not globally unique) addresses in the internal network into globally unique addresses, before packets are forwarded to another network.
What is the security advantage of NAT?
Hides computers IP addresses port numbers and their connections in internal
networks.
What are the benefits of a Network Firewall?
- It restricts people to entering at one carefully controlled point
- It prevents attackers from getting close to other defences
- It restricts people to leaving at one carefully controlled point
- It monitors incoming and outgoing network traffic and permits, or blocks
network packets based on a set of security rules.
Firewall Configuration what is White listing?
Default DENY, Everything that is not explicitly permitted is denied.
What can a Firewall can do with a Packet?
- The firewall forwards the packet. Allow/Permit
- The firewall deletes the packet and does not forward it. Delete
- Other options include to log that a certain type of packet appeared,
to inform the admin, etc.
Firewall Configuration what is Blacklisting?
Default PERMIT, Everything that is not explicitly forbidden is permitted
How can a firewall gain information for its decision?
it can only use the packet and the data in its header fields
What are 3 Types of Firewalls?
- Stateless Firewalls (uses Stateless Packet Filtering)
- Stateful Firewalls (uses Stateful Packet Filtering)
- Application-layer firewalls
What is a stateless Firewall?
- Allow or block IP packets based on their IP header fields and TCP/UDP port numbers.
- Packet filter is defined as a rule table
- Each rule consist of conditions and an action
- For each packet, the first matching rule is applied
- The firewall keeps no state
- The filtering decision is made separately for every packet, and does not take
into account any earlier decisions made on related packets.
What are the packer filtering rule options?
- Inbound:
- Outbound:
- Either
What is the difference between TCP and UDP?
TCP = Transmission Control Protocol - session and connection between two parties
- *UDP** =User DatagramProtocol - No need to open / close connections
- Just transmit / broadcast /receive some data
Why are the risks withstateless firewalls?
- Since the firewall does not keep state, it doesn’t “remember” whether a telnet
flow is already established, and what source port number the client selected.
Admin makes a rule allowing a client computer on an internal network to talk to a
DNS server outside the firewall.
He would tell the firewall to allow UDP packets from that host, with source ports
1024 to 65535 destined to destination host 1.2.3.4 on destination port 53.
This rule works fine, but what happens when the DNS server responds?
To allow the response, you need a rule to allow UDP packets from source port 53 to
destination ports 1024 to 65535.
The problem with allowing those UDP packets is that attackers could talk to any UDP service on a port between 1024 and 65535, as long as they use a source port of 53!
What are the Pros and Cons of a stateless firewall?
Pros;
- Simpler to implement, less complexity
- Highest performance
Challanges;
- limitations in protecting Private Networks
- Limitation in supporting UDP
Stateless filtering can still be found, e.g., in routers, but these devices should not be perceived as “real” firewalls, should only be used in internal network.