Section 12 Perimeter Security Flashcards
Security devices focused on the boundary between the LAN and the WAN in your organization’s network.
Perimeter Security
- Software Based
- Hardware Based
- Embedded
Types of Firewalls
Inspects each packet passing through the firewall and accepts or rejects it based on the rules.
Packet Filtering
- Stateless
- Stateful
Types of Packet Filtering
Filters traffic based upon the ports being utilized and type of connection (TCP or UDP).
NAT Filtering
Conducts an in depth inspection based upon the application being used.
Application Layer Gateway
Operates at the session layer and only inspects the traffic during the establishment of the initial session over TCP or UDP.
Circuit Level Gateway
Traffic is allowed to enter or leave the network because there is an ACL rule that specifically allows it.
Explicit Allow
Traffic is denied the ability to enter or leave the network because there is an ACL rule that specifically denies it.
Explicit Deny
Traffic is denied the ability to enter or leave the network because there is no specific rule that allows it.
Implicit Deny
Firewall installed to protect your server by inspecting traffic being sent to a web application.
Web Application Firewall
- IP Proxy
- Caching Proxy
- Content File
- Web Security Gateway
Types of Proxy’s
Used to secure a network by keeping its machines anonymous during web browsing.
IP Proxy
Attempts to serve client requests by delivering content from itself without actually contacting the remote server.
Caching Proxy
Used in organizations to prevent users from accessing prohibited websites and other content.
Internet Content Filter