FIREWALLs

Description

hehe
nurdiyanazr
Mind Map by nurdiyanazr, updated more than 1 year ago
nurdiyanazr
Created by nurdiyanazr about 9 years ago
183
0

Resource summary

FIREWALLs
  1. Defination
    1. Firewalls is a device that filter all trafic between a protected ('inside') network and a less trustworthy ('outside) network.
    2. Type
      1. Packet filtering gateaway

        Annotations:

        • - control access to packet based on packet address (source/destination), specific transport protocol - just see nametag but not ID (only IP but nit packet content) -  cannot choose between allowable TELNET and non-allowable ones - can block packets from ‘outside’ trying to disguise to be one from ‘inside’-> trying to forge an IP address
        1. Stateful inspection firewalls

          Annotations:

          • - Maintain state information between packet in an input stream - Can be used to thwart attack that are split across 2 or more packet
          1. Application proxies

            Annotations:

            • - a.k.a bastion host - it check the content of a packet and only allows action that are in the given guidelines - caching popular sites for easy retrieval - proxies can be tailored to specific requirements, like logging details of access
            1. Guards

              Annotations:

              • -add functionality to a proxy firewall until it starts to look like a guard - receives protocol data, interprets them and passes through - Sort of a twin of proxy firewall
              1. Personal firewalls

                Annotations:

                • -an application program that runs on a workstation to block unwanted traffic - The user decides who to trust and who not to
              2. Level
                1. Application

                  Annotations:

                  • - More advanced - Can make decisions based on the actual content of the packet (not just header) - Can contain extra authentication and do more logging - Acts as a proxy: must "understand" the application protocols used. Needs a proxy server for each application type such as HTTP, FTP, Telnet, etc.
                  1. Network

                    Annotations:

                    • - often in hardware - make decision based on the source, destination address and ports in individual packets - a specially configured router -very fast -transparent to user
                  Show full summary Hide full summary

                  Similar

                  CEH: IDS, Firewalls and Honeypots Test 1
                  amandarackham
                  CEH: IDS, Firewalls and Honeypots Test 2
                  amandarackham
                  Art Movements
                  Julia Lee
                  River Processes and Landforms
                  1jdjdjd1
                  Women in Nazi Germany - Flashcards
                  Louisa Wania
                  Ionic Bondic Flashcards.
                  anjumn10
                  TOEFL Practice
                  aliking
                  Poppies - Jane Weir
                  Jessica Phillips
                  GCSE REVISION TIMETABLE
                  nimraa422
                  Germany 1918-39
                  Cam Burke
                  Testing for ions
                  Joshua Rees