Show Home Subjects Expert solutions Create Log in Sign up Upgrade to remove ads Only SGD 41.99/year
Terms in this set (49)What is firewall? Providing a secured access b/t two networks. Standalone hardware device What are two types of firewall? Hardware firewall Mode of Operation A firewall that stands in between two networks will inspect a packet that is ready to pass between the networks and allow or block the packet based on the rules set for the firewall to operate General Firewall Features Port Control Negative effects of firewall Traffic bottlenecks - By forcing all network traffic to pass through the firewall, there is a greater chance that the network will become congested. Single point of failure - . In most configurations where firewalls are the only link between networks, if they are not configured correctly or are unavailable, no traffic will be allowed through. Increased management responsibilities - A firewall often adds to network management responsibilities and makes network troubleshooting more complex Viruses and Firewalls Firewalls cannot protect against viruses, so Anti-Virus software is needed for that purpose. what are 2 firewall layers of operation? Network Layer and Application Layer. Network Layer Makes decision based on the source, destination addresses, and ports in individual IP packets. What is the differences b/t static & Dynamic Filtering? Static Packet Filtering looks at minimal information in the packets to allow or block traffic between specific service ports. Dynamic Packet Filtering maintains a connection table in order to monitor requests and replies. What is stateful inspection? Compares certain key parts of the packet to a database of trusted information. What is Application Layer? They
are generally, hosts running proxy servers which perform logging and auditing of traffic through the network. What is proxy services? An application that mediates traffic between a protected network and the Internet. what is a hardware firewall? It is just a software firewall running on a dedicated piece of hardware or specialized device. What does hardware firewall do? It is a hardware device that filters the information coming through the internet connection into your private network or computer system. What do firewalls use? Firewalls use one or more of three methods to control traffic flowing in and out of the network:
What's packet filtering Packets are analyzed against a set of filters. Whats proxy service? Information from the Internet is retrieved by the firewall and then sent to the requesting system and vice versa. Whats state-full inspection? It compares certain key parts of the packet to a database of trusted information. Information traveling from inside to the outside is monitored for specific defining characteristics, then incoming information is compared to these characteristics. What does hardware firewall protects you from? Remote logins What is Software Firewall? Software firewalls are installed on your computer. what are Advantages of software firewall? Allow direct connection between client and host. what are Disadvantages of software firewall? Slow down network access dramatically. What are benefits of firewall? Prevent intrusion. What are port numbers? The Well Known Ports are those from 0 through 1023. What are some hardware firewall manufactures? DLink, Linksys, CISCO What are some software firewalls? Zone alarm, Microsoft Windows Firewall, MacAfee Security Suite, Norton Security Suite. Done with PPT 1 Next is PPT 2 what are Packets? discrete blocks of data; basic unit of data handled by a network. what's packet filter? hardware or software designed to block or allow transmission of packets based on criteria such as port, IP address, protocol. What is filtering? To control movement of traffic through the network perimeter. Understanding Packets and Packet Filtering: Packet filter inspects packet headers before sending packets on to specific locations within the network. Anatomy of a Packet Header: Packet-Filtering Rules Packet filtering: procedure by which packet headers are inspected by a router or
firewall to make a decision on whether to let the packet pass. Packet-Filtering Rules (continued) Drop all inbound connections; allow only outbound connections on Ports 80 (HTTP), 25 (SMTP), and 21
(FTP). Packet-Filtering Rules (continued) Set up an access list that includes all computers in the local network by name or IP address so communications can flow between them. What are 2 packet filtering methods? Stateless packet filtering Stateless Packet Filtering Determines whether to block or allow packets—based on several criteria—without regard to whether a connection has been established. Stateless Packet Filters A border router configured to pass or reject packets based on information in the header of each individual packet. Filtering by TCP or UDP Port Number Packet's source IP address. Problems with Stateless Filters Effectiveness of stateless filters is limited due to: Stateful Packet Filtering Performs packet filtering based on contents of the data part of a packet and the header. Filtering Based on Packet Content Stateful inspection Setting Specific Packet-Filter Rules Rules to filter potentially harmful packets. IP Chains Stateless packet filter. IPChains Commands Command Description -A Add rule to chain IPChains Command Options Command Option Description -s Source address of packet IPChains Targets System targets Description ACCEPT Let packet through IPChains- Chain Types IP input chain Done PPT 2 Next is PPT 3 Sets with similar termsNetwork+ Chapter 8 Firewalls30 terms mike_marino9 Network+ Firewall facts 8.1.210 terms Lee_DevineTEACHER CP3302 - Chap623 terms Marksy_010 CHP 7,8,9,10,11,12,13 FINAL124 terms hnguyen703 Sets found in the same folderChapter 833 terms Twhitman85PLUS Cryptography7 terms debianj Section 6.2 Network Hardware9 terms Lexasaurus 2.5.3 Troubleshooting Overview Practice Questions12 terms Robert_Garcia1PLUS Other sets by this creator(40-60) 100 Core Java20 terms tri92 200 java questions90 terms tri92 Data Structures50 terms tri92 prolog 40312 terms tri92 Other Quizlet setsRELIGION EXIT EXAM87 terms rhumm13PLUS BIO 1330 Bergh Exam 1 (Chpt 1-6)94 terms Maria_Benavides7 Psyc 110 UL Romero test 4 (ch9 and 12)48 terms Veronica-grace Related questionsQUESTION . You are setting up a wireless network. Which wireless standards would give the users over 40Mbps throughput? (Choose three.) 3 answers QUESTION The seven basic clues for recognizing a Hazardous Materials (HazMat) incident are potential sources, container shapes, marking and colors, labels and placards, shipping papers and facility documents, monitoring and detection equipment, and: 15 answers QUESTION 75. (029) When using a multimeter, which option should be used if the display is unreadable due to fluctuations? 7 answers QUESTION At the beginning of a telephone call placed through a Bluetooth headset with the Hands Free Profile, which device is initially the master? - 15 answers |