If the packet is not a provable attack packet, the firewall passes the packet on to its destination.
This is called a __________.
Pass/deny decision
Firewalls usually record information about each dropped packet in a __________.
This process is called __________.
2. Logging
Many firms have ______ which filter traffic through different parts of the internal network.
Internal firewalls
The firewall which examines packets entering the network from the outside is called _________.
Ingress filtering
The firewall which examines packets leaving the network from the inside is called _________.
Egress filtering
Firewalls must be able to filter traffic at _____ which is the maximum speed of the lines that are connected to it.
Wire speed
What are the six types of filtering methods?
All main border firewalls use _____.
Stateful packet inspection (SPI)
What type of filtering looks at packets one at a time while isolated?
Static packet filtering
What types of attacks can ‘static packet filtering’ stop?
2. Packets that are spoofed with different IP addresses.
Static packet filtering is not used as a _____.
Main border firewall filtering mechanism.
“Nearly all” corporate border firewalls use the _____.
Stateful packet inspection (SPI) filtering method.
SPI focuses on _____ which are _____ b/w different programs on different computers.
2. Persistent conversations
A _____ is a distinct phase in a connection b\w two applications.
State
_____ uses specific examination methods depending on the _____ of the _____.
The vast majority of _____ are not a part of _____.
2. Connection-opening attempts
In SPI, if the _____ is part of an existing connection, the packet is passed, usually without further _____.
2. Filtering
In SPI, if the _____ is not part of an existing connection, the packet is _____ and _____.
_____ consist of a series of rules that are _____ to the default behavior.
2. Exceptions
A secondary type of protection used in firewalls is _____.
Network address translation (NAT)
What ranges from 1024 to 4999?
Ephemeral port numbers
The _____ firewall intercepts all _____ traffic and replaces source __ addresses and source ____ numbers with (stand-in) external versions.
What are some types of application proxy firewall protections?
Traditional firewalls don’t what?
Don’t do antivirus filtering.