Section 16.148 Configuring Firewalls Flashcards
Objective 3.2 Given a scenario, you must be able to apply security principles to secure enterprise architecture. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security
Firewalls and Access Control Lists (ACLs)
Firewalls
Dedicated devices for using Access Control Lists (ACLs) to protect
networks
Firewalls and Access Control Lists (ACLs)
Access Control Lists (ACLs)
A rule placed on firewalls, routers, and network infrastructure devices
● Control the flow of traffic into and out of networks
● May define quality of service levels inside networks but are primarily used for network security in firewalls
Configuring ACLs
■ A web-based interface or a text-based command line interface can be used
■ The order of ACL rules specifies the order of actions taken on traffic (top-down)
■ The first matching rule is executed, and no other ACLs are checked
■ Place the most specific rules at the top and generic rules at the bottom
■ Some devices support implied deny functions, while others require a “deny all” rule at the end
■ Actions taken by network devices should be logged, including deny actions
ACL Rules
Made up of some key pieces of information including
● Type of traffic
● Source of traffic
● Destination of traffic
● Action to be taken against the traffic
Firewall Types
Hardware-Based Firewall
A dedicated network security device that filters and controls network traffic at the hardware level
● Commonly used to protect an entire network or subnet by implementing ACLs and rules
Firewall Types
Software-Based Firewall
A firewall that runs as a software application on individual devices, such as workstations
● Utilises ACLs and rules to manage incoming and outgoing traffic,
providing security at the software level on a per-device basis
Watch this section before exam as setting up firewall example in the video will come up
Windows