3.2 Firewall Types Flashcards

(6 cards)

1
Q

The universal security control

A
  • Standard issue– Home, office, and in your operating system
  • Control the flow of network traffic– Everything passes through the firewall
  • Corporate control of outbound and inbound data– Sensitive materials
  • Control of inappropriate content– Not safe for work, parental controls
  • Protection against evil– Anti-virus, anti-malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Network-based firewalls

A
  • Filter traffic by port number or application– OSI layer 4 vs. OSI layer 7– Traditional vs. NGFW firewalls
  • Encrypt traffic– VPN between sites
  • Most firewalls can be layer 3 devices (routers)– Often sits on the ingress/egress of the network– Network Address Translation (NAT) functionality– Authenticate dynamic routing communication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

UTM / All-in-one security appliance

A
  • Unified Threat Management (UTM) /– Web security gateway
  • URL filter / Content inspection– Malware inspection
  • Spam filter– CSU/DSU
  • Router, Switch – Firewall
  • IDS/IPS– Bandwidth shaper– VPN endpoint
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Next-generation firewall (NGFW)

A

The OSI Application Layer– All data in every packet
* Can be called different names– Application layer gateway– Stateful multilayer inspection– Deep packet inspection
* Requires some advanced decodes– Every packet must be analyzed and categorized
before a security decision is determined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

NGFWs

A
  • Network-based Firewalls– Control traffic flows based on the application– Microsoft SQL Server, Twitter, YouTube
  • Intrusion Prevention Systems– Identify the application– Apply application-specific vulnerability signatures to
    the traffic
  • Content filtering– URL filters– Control website traffic by category
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Web application firewall (WAF)

A
  • Not like a “normal” firewall– Applies rules to HTTP/HTTPS conversations
  • Allow or deny based on expected input– Unexpected input is a common method of exploiting
    an application
  • SQL injection– Add your own commands to an application’s SQL query
  • A major focus of Payment Card Industry Data Security
    Standard (PCI DSS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly