Networking Protocols, Firewalls, and Security Measures: TCP/IP, OSI, Filtering Rules, VPNs

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/34

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

35 Terms

1
New cards

TCP/IP

Transmission Control Protocol/Internet Protocol; the suite of communication protocols used to connect network devices on the internet

2
New cards

OSI

Open Systems Interconnection; a conceptual model for standardizing communication functions, different from TCP/IP as it has 7 layers vs TCP/IP's 4

3
New cards

Layers of TCP/IP Reference Model

Application, Transport, Internet, Link (or Network Interface)

4
New cards

Application Layer (TCP/IP)

Provides an interface between end-user and network, supports application layer protocols such as HTTP, FTP, SMTP

5
New cards

Primary Objective of a Firewall

To protect a private network and its resources from attacks originating from external networks like the internet

6
New cards

Typical Location of a Firewall

At the boundary between a private data network (trusted) and external networks (untrusted)

7
New cards

Trusted vs Untrusted Network (Firewall Perspective)

Trusted: Private data network; Untrusted: External networks

8
New cards

Host Firewall

Protects an individual device, usually has a single network interface

9
New cards

Network Firewall

Protects an entire network of hosts and resources, placement depends on firewall type

10
New cards

Filtering Rules

Predetermined, predefined rules in firewalls used to decide whether to allow or block data packets

11
New cards

Addressing Scheme at Internet Layer

32-bit source/destination IP addresses (IPv4)

12
New cards

Addressing Scheme at Transport Layer

Source and destination Port addresses

13
New cards

Addressing Scheme at Link Layer

Source and destination MAC (hardware) addresses

14
New cards

Static Filtering Firewall

Uses a fixed set of rules loaded beforehand by the admin to filter network traffic

15
New cards

Dynamic Filtering Firewall

Can create or update rules in response to changing network situations, adapting at runtime

16
New cards

Filtering Router

A router that first applies filtering rules to incoming/outgoing network traffic before routing packets

17
New cards

Packet Filtering Firewall (PFF)

Operates at the Internet layer; inspects packet headers to decide allow/block; stateless (no memory of previous packets)

18
New cards

Stateless Firewall

Treats each packet independently, no awareness of previous packets, fast but vulnerable to spoofing

19
New cards

State-Aware (Stateful) Firewall

Remembers previously seen packets; decisions can depend on earlier traffic, better for detecting attacks

20
New cards

Spoofing Attack

An attacker pretends to be another user or device by falsifying data to gain unauthorized access

21
New cards

IP Spoofing

Falsifying an IP address in data packets to impersonate another device

22
New cards

DNS Spoofing

Supplying false DNS responses to divert traffic to malicious or unintended sites

23
New cards

Proxy Firewall / Application Layer Firewall

Runs on a dedicated machine called a proxy server, filters based on application protocols, operates at Application layer, creates a DMZ

24
New cards

DMZ (Demilitarized Zone)

A neutral zone between a private network and external networks; adds security by preventing direct access to internal resources

25
New cards

Circuit-Level Gateway

Operates at the Transport layer; filters based on source/destination port addresses; blocks all direct TCP connections between hosts in different networks

26
New cards

MAC Layer Firewall

Operates at the Link layer; filters traffic using source/destination MAC addresses; usually protects resources from insider threats within the local network

27
New cards

VPN (Virtual Private Network)

A secure tunnel created over a public network to allow remote, encrypted communication between private networks or remote hosts

28
New cards

VPN Transport Mode

Encrypts only the payload of the data packet; header remains in clear text

29
New cards

VPN Tunnel Mode

Encrypts both the payload and header of the data packet, providing full protection

30
New cards

Advantages of Packet Filtering Firewall

Fast processing, since only headers are examined; easy and efficient to implement

31
New cards

Disadvantages of Packet Filtering Firewall

Stateless (doesn't track sessions), vulnerable to spoofing and certain attacks

32
New cards

Advantages of Proxy Firewall

Provides more security by creating a DMZ, prevents direct access to internal servers

33
New cards

Disadvantages of Proxy Firewall

Protocol-dependent, usually limited to a single application protocol, may introduce delays

34
New cards

Filtering Rules Example

Rules may involve source IP, destination IP, service (HTTP, FTP, etc.), action (allow/deny), and direction (inbound/outbound)

35
New cards

Difference: Packet Filtering vs Proxy Firewall

Packet filtering firewalls operate at the Internet layer and filter based on IP information in header; Proxy firewalls operate at the Application layer filtering based on app protocols and run on dedicated proxy servers (2nd generation vs 1st generation firewall)