Section 16.148 Configuring Firewalls Flashcards

Objective 3.2 Given a scenario, you must be able to apply security principles to secure enterprise architecture. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security

1
Q

Firewalls and Access Control Lists (ACLs)

Firewalls

A

Dedicated devices for using Access Control Lists (ACLs) to protect
networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firewalls and Access Control Lists (ACLs)

Access Control Lists (ACLs)

A

A rule placed on firewalls, routers, and network infrastructure devices

● Control the flow of traffic into and out of networks

● May define quality of service levels inside networks but are primarily used for network security in firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Configuring ACLs

A

■ A web-based interface or a text-based command line interface can be used

■ The order of ACL rules specifies the order of actions taken on traffic (top-down)

■ The first matching rule is executed, and no other ACLs are checked

■ Place the most specific rules at the top and generic rules at the bottom

■ Some devices support implied deny functions, while others require a “deny all” rule at the end

■ Actions taken by network devices should be logged, including deny actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACL Rules

A

Made up of some key pieces of information including

● Type of traffic
● Source of traffic
● Destination of traffic
● Action to be taken against the traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewall Types

Hardware-Based Firewall

A

A dedicated network security device that filters and controls network traffic at the hardware level

● Commonly used to protect an entire network or subnet by implementing ACLs and rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Firewall Types

Software-Based Firewall

A

A firewall that runs as a software application on individual devices, such as workstations

● Utilises ACLs and rules to manage incoming and outgoing traffic,
providing security at the software level on a per-device basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Watch this section before exam as setting up firewall example in the video will come up

A

Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly