1/18
These flashcards cover key vocabulary and concepts related to firewalls and security as per the lecture notes for ITNET05.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Firewall
A system or group of systems that enforces an access control policy between networks.
Access Control Policy
A set of rules that dictate who can access or use resources on a network.
Packet Filtering Firewall
A firewall that permits or denies traffic based on Layer 3 and Layer 4 information.
Stateful Firewall
A firewall that tracks the state of active connections and makes decisions based on the state as well as the packet information.
Application Gateway Firewall
A firewall that filters information at multiple layers of the OSI model and acts as a proxy between clients and remote servers.
Next Generation Firewall (NGFW)
Advanced firewalls that integrate intrusion prevention and application awareness to block risky applications.
Demilitarized Zone (DMZ)
A firewall configuration that adds an additional layer of security by creating a zone between the internal network and the external internet.
Zone-Based Policy Firewalls (ZPF)
Firewalls that use the concept of zones to manage and control traffic flows between different network segments.
Intrusion Detection System (IDS)
A system that monitors network traffic for suspicious activity and alerts administrators.
Intrusion Prevention System (IPS)
A system that not only detects threats but also actively prevents them by blocking the traffic.
Access Control List (ACL)
A series of commands that control whether a device forwards or drops packets based on header information.
Network Time Protocol (NTP)
A protocol used to synchronize the clocks of networked devices to ensure accurate timestamps.
Virtual Private Network (VPN)
A private network that is created over a public network, using encryption to securely transmit data.
TACACS+
An authentication protocol that separates AAA services and encrypts the entire packet.
RADIUS
An authentication protocol that combines authentication and authorization but only encrypts passwords.
Malicious Traffic
Data packets that are intended to harm or exploit a network or device.
Log Analysis
The monitoring and analysis of logs generated by networking devices to troubleshoot and ensure security.
NetFlow
A Cisco technology that provides statistics on packets flowing through a router or switch.