FIREWALLs

Description

hehe
nurdiyanazr
Mind Map by nurdiyanazr, updated more than 1 year ago
nurdiyanazr
Created by nurdiyanazr almost 9 years ago
174
0

Resource summary

FIREWALLs
  1. Defination
    1. Firewalls is a device that filter all trafic between a protected ('inside') network and a less trustworthy ('outside) network.
    2. Type
      1. Packet filtering gateaway

        Annotations:

        • - control access to packet based on packet address (source/destination), specific transport protocol - just see nametag but not ID (only IP but nit packet content) -  cannot choose between allowable TELNET and non-allowable ones - can block packets from ‘outside’ trying to disguise to be one from ‘inside’-> trying to forge an IP address
        1. Stateful inspection firewalls

          Annotations:

          • - Maintain state information between packet in an input stream - Can be used to thwart attack that are split across 2 or more packet
          1. Application proxies

            Annotations:

            • - a.k.a bastion host - it check the content of a packet and only allows action that are in the given guidelines - caching popular sites for easy retrieval - proxies can be tailored to specific requirements, like logging details of access
            1. Guards

              Annotations:

              • -add functionality to a proxy firewall until it starts to look like a guard - receives protocol data, interprets them and passes through - Sort of a twin of proxy firewall
              1. Personal firewalls

                Annotations:

                • -an application program that runs on a workstation to block unwanted traffic - The user decides who to trust and who not to
              2. Level
                1. Application

                  Annotations:

                  • - More advanced - Can make decisions based on the actual content of the packet (not just header) - Can contain extra authentication and do more logging - Acts as a proxy: must "understand" the application protocols used. Needs a proxy server for each application type such as HTTP, FTP, Telnet, etc.
                  1. Network

                    Annotations:

                    • - often in hardware - make decision based on the source, destination address and ports in individual packets - a specially configured router -very fast -transparent to user
                  Show full summary Hide full summary

                  Similar

                  CEH: IDS, Firewalls and Honeypots Test 1
                  amandarackham
                  CEH: IDS, Firewalls and Honeypots Test 2
                  amandarackham
                  HSC Economics
                  lydia le
                  The Great Gatsby: Chapter Summaries
                  Andrew_Ellinas
                  GCSE REVISION TIMETABLE
                  Joana Santos9567
                  AN ECONOMIC OVERVIEW OF IRELAND AND THE WORLD 2015/16
                  John O'Driscoll
                  The Circulatory System
                  Johnny Hammer
                  Repaso Revalida PR 2016
                  Rodrigo Lopez
                  1PR101 2.test - Část 14.
                  Nikola Truong
                  General Pathoanatomy Final MCQs (1-110)- 3rd Year- PMU
                  Med Student
                  ASSD & PSBD QUESTION 2018 200
                  Dhiraj Tamang