Uses a set of rule defining the types of traffic permitted or denied through the device | Software/Hardware, virtual/physical, host-based/network-based
Firewall
Permits or denies traffic based on packet header
Packet-Filtering Firewall
Inspects traffic as part of a session and recognizes where the traffic originated
Stateful Firewall
Combine ACLs and permit and deny statements of a packet-filtering firewall with stateful firewall capabilities for security
Conducts deep packet inspection and packet filtering
NextGen Firewall (NGFW)
Set of rules applied to router interfaces that permit or deny certain traffic
Access Control List (ACL)
Switch - MAC address
Router - IP address
Firewall - IP address or port
Combines firewall, router, intrusion detection/prevention system, anti-malware, and other features into a single device
Unified Threat Management (UTM) Device
Permit or Deny
Layer 4 Protocol
Source IP
Destination IP
Destination Port
ACL number & Direction of Traffic
List of permissions associated with a given system or network resource
Access Control List (ACL)
Blocks matching traffic
Explicit Deny
Blocks traffic to anything not explicitly specified
Implicit Deny
Defines the privileges and responsibilities of administrative users who control firewall and their ACLs
Role-Based Access
A: A list of permissions that controls what traffic is allowed or denied for a system or network resource.
A: Routers, Layer 3 switches, and firewalls (any packet-filtering device).
A: Top to bottom — the first matching rule is applied.
A: Put specific rules at the top and generic rules at the bottom.
A: Blocking SSH for one IP = specific (top). Blocking all IPs using port 110 = more generic (middle). Blocking all traffic = most generic (bottom).
A: Traffic with private, loopback, multicast, or experimental source IP ranges (because they are spoofed).
A: Protocols used only locally, such as ICMP, DHCP, OSPF, SMB, and similar.
A: Either block all IPv6 or allow only authorized hosts/ports, because many systems run IPv6 by default.
A: A reverse subnet mask; 0 = match, 255 = ignore (opposite of normal subnet mask).
A: “www” refers to port 80 (HTTP).