Lesson 11 - Network Security - Firewall

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/16

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards

Firewalls

-Control the flow of network traffic to prevent bad traffic from passing through the network

-Integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system

2
New cards

Firewall Policies

Filter incoming or outgoing traffic through a set of rules

3
New cards

Accepted

Packet is permitted through the firewall

4
New cards

Rejected

Packet is not allowed through the firewall, informs the source that the packet was rejected

5
New cards

Dropped

Packet is not allowed through with no indication of firewall

6
New cards

Blocklist(Deny)

Packets are dropped or rejected only if they fit the rules defined in a blocklist

7
New cards

Safelist(Approved)

Packets are dropped or rejected unless they are specifically allowed by the firewall

8
New cards

Stateless Firewall (Packet Filters)

If packet matches the packets filter’s set of rules, the packet filter will drop or accept it

-Applies rules based on source and destination IP ports

9
New cards

Stateful Filters

Maintains a record of all connections passing through it and can determine if a packet is either the start of a new connection or is an invalid packet

-Only allow inbound TCP packets that are in response to a connection initiated from within the internal network

10
New cards

Application Layer

Examines the data stored at the application layer of inbound and outbound packets, applies rules based on these contents

11
New cards

Modern Firewalls

-Mostly stateful

-Include more layers of network stack to enable filtering

-Go beyond inspecting IP and port numbers, identify traffic flows based on the applications

12
New cards

Tunneling Protocol

Communication between a client and server is automatically encrypted so that useful eavesdropping is infeasible

13
New cards

Secure Shell (SSH)

Provides secure access for users and automated processes, interactive and automated file transfers issuing remote commands

14
New cards

IPsec

Defines a set of protocols to provide confidentiality and authenticity for IP packets in network layer

15
New cards

Transport Mode

Additional IPsec header information is inserted before the data of the original packet, and only the payload of the packet is encrypted or authenticated

16
New cards

Tunnel Mode

A new packet is constructed with IPsec header information, and the entire original packet, including its header, is encapsulated as the payload of the new packet

17
New cards

VPNS

Allows private networks to be safely extended over long physical distances by making use of a public network as means of transport