Objective 5a Flashcards
The control of traffic coming into or leaving a network
Boundary Protection
Physical or logical sub-network to act as buffer space between internal network and outside
DMZ Architectures
Routes traffic either to DMZ or to inside of network, processes all inbound/outbound traffic for a network
Single Firewall Implementation
Networks inside of other networks, essentially creates multiple boundaries
Enclave
Most popular and important tool used to secure networks, screens network traffic to prevent unauthorized access between networks
IP Firewalls
Software based layer of protection for traffic in and out of single host
Host Based Firewall (Can also be called Application Firewall)
Monitors traffic passing through the NIC
Host Based Firewall
Blocks or allows traffic based on source or destination IP address, protocol, and source or destination port number
Packet Filtering Firewall (Also known as Stateless Inspection Firewall)
Filters traffic based on source or destination IP address, protocol, and source or destination port number
Stateful Packet Inspection Firewall
Features of both packet filtering and stateful packet inspection firewall
Application-Level Firewall
Refers to computer hardware, software, and networks performing functions traditionally performed by telephone equipment
Telephony Firewall