Loading [MathJax]/jax/output/HTML-CSS/fonts/TeX/fontdata.js

FIREWALLs

Description

hehe
nurdiyanazr
Mind Map by nurdiyanazr, updated more than 1 year ago
nurdiyanazr
Created by nurdiyanazr about 9 years ago
176
0
1 2 3 4 5 (0)

Resource summary

FIREWALLs
  1. Defination
    1. Firewalls is a device that filter all trafic between a protected ('inside') network and a less trustworthy ('outside) network.
    2. Type
      1. Packet filtering gateaway

        Annotations:

        • - control access to packet based on packet address (source/destination), specific transport protocol - just see nametag but not ID (only IP but nit packet content) -  cannot choose between allowable TELNET and non-allowable ones - can block packets from ‘outside’ trying to disguise to be one from ‘inside’-> trying to forge an IP address
        1. Stateful inspection firewalls

          Annotations:

          • - Maintain state information between packet in an input stream - Can be used to thwart attack that are split across 2 or more packet
          1. Application proxies

            Annotations:

            • - a.k.a bastion host - it check the content of a packet and only allows action that are in the given guidelines - caching popular sites for easy retrieval - proxies can be tailored to specific requirements, like logging details of access
            1. Guards

              Annotations:

              • -add functionality to a proxy firewall until it starts to look like a guard - receives protocol data, interprets them and passes through - Sort of a twin of proxy firewall
              1. Personal firewalls

                Annotations:

                • -an application program that runs on a workstation to block unwanted traffic - The user decides who to trust and who not to
              2. Level
                1. Application

                  Annotations:

                  • - More advanced - Can make decisions based on the actual content of the packet (not just header) - Can contain extra authentication and do more logging - Acts as a proxy: must "understand" the application protocols used. Needs a proxy server for each application type such as HTTP, FTP, Telnet, etc.
                  1. Network

                    Annotations:

                    • - often in hardware - make decision based on the source, destination address and ports in individual packets - a specially configured router -very fast -transparent to user
                  Show full summary Hide full summary

                  0 comments

                  There are no comments, be the first and leave one below:

                  Similar

                  CEH: IDS, Firewalls and Honeypots Test 2
                  amandarackham
                  Biological Molecules Definitions
                  siobhan.quirk
                  Contract Law
                  Tim Mitchell
                  Hitler's rise to Chancellorship Jan '33
                  Simon Hinds
                  9 History- The Treaty of Versailles
                  melgallagher
                  English Language Key Terms
                  emilyralphs
                  GCSE Biology Unit 1 AQA
                  Archie Clay
                  Creating a revision planner using Calender
                  justin@migs
                  maths notes
                  grace tassell
                  PSBD New Edition
                  Aafnai Sathi