Perimeter Security Flashcards
Perimeter Security
Security devices focused on the boundary between the LAN and the WAN in your organization’s network
Firewalls
Firewalls screen traffic between two portions of a network
Types of Firewalls
§ Software
§ Hardware
§ Embedded
Packet Filtering
Firewall
§ Inspects each packet passing through the firewall and accepts or rejects it based on the rules
§ Stateless Packet Filtering
§ Stateful packet filtering tracks the requests leaving the network
Stateless Packet Filtering
Stateless firewalls are designed to protect networks based on static information such as source and destination
Stateful packet filtering
stateful firewalls filter packets based on the full context of a given network connection, stateless firewalls filter packets based on the individual packets themselves
NAT Filtering
Filters traffic based upon the ports being utilized and type of connection (TCP or UDP)
Circuit-Level gateway
Operates at the session layer and only inspects the traffic during the establishment of the initial session over TCP or UDP
Explicit Allow
Traffic is allowed to enter or leave the network because there is an ACL rule that specifically allows it
Explicit Deny
Traffic is denied the ability to enter or leave the network because there is an ACL rule that specifically denies it
Implicit Deny
Traffic is denied the ability to enter or leave the network because there is no specific rule that allows it
Layer 3 Firewall Blocks
IP addresses
Layer 4 Firewall Blocks
Ports
Web Application Firewall
§ Firewall installed to protect your server by inspecting traffic being sent to a web application
§ A WAF can prevent a XSS or SQL injection
Proxy Server
A device that acts as a middle man between a device and a remote server
IP Proxy
IP Proxy is used to secure a network by keeping its machines
anonymous during web browsing
Caching Proxy
- Attempts to serve client requests by delivering content from itself without actually contacting the remote server
- Disable Proxy Auto-Configuration (PAC) files for security
Internet Content Filter
Used in organizations to prevent users from accessing prohibited websites and other content
Web Security Gateway
A go-between device that scans for viruses, filters unwanted
content, and performs data loss prevention functions
Honeypot
A single computer (or file, group of files, or IP range) that might be attractive to an attacker
Honeynet
A group of computers, servers, or networks used to attract an attacker
Data Loss Prevention
§ Systems designed to protect data by conducting content inspection of data being sent out of the network
§ Also called Information Leak Protection (ILP) or Extrusion Prevention Systems (EPS)
§ DLP is used to ensure your private data remains secure
Network Intrusion Detection Systems
§ Attempts to detect, log, and alert on malicious network activities
§ NIDS use promiscuous mode to see all network traffic on a segment
Network Intrusion Prevention Systems
§ Attempts to remove, detain, or redirect malicious traffic
§ NIPS should be installed in-line of the network traffic flow
§ Should a NIPS fail open or fail shut?
§ NIPS can also perform functions as a protocol analyzer
Unified Threat Management
§ Combination of network security devices and technologies to provide more defense in depth within a single device
§ UTM may include a firewall, NIDS/NIPS, content filter, anti-malware, DLP, and VPN
§ UTM is also known as a Next Generation Firewall (NGFW)