FIREWALLs

Description

hehe
nurdiyanazr
Mind Map by nurdiyanazr, updated more than 1 year ago
nurdiyanazr
Created by nurdiyanazr over 8 years ago
164
0

Resource summary

FIREWALLs
  1. Defination
    1. Firewalls is a device that filter all trafic between a protected ('inside') network and a less trustworthy ('outside) network.
    2. Type
      1. Packet filtering gateaway

        Annotations:

        • - control access to packet based on packet address (source/destination), specific transport protocol - just see nametag but not ID (only IP but nit packet content) -  cannot choose between allowable TELNET and non-allowable ones - can block packets from ‘outside’ trying to disguise to be one from ‘inside’-> trying to forge an IP address
        1. Stateful inspection firewalls

          Annotations:

          • - Maintain state information between packet in an input stream - Can be used to thwart attack that are split across 2 or more packet
          1. Application proxies

            Annotations:

            • - a.k.a bastion host - it check the content of a packet and only allows action that are in the given guidelines - caching popular sites for easy retrieval - proxies can be tailored to specific requirements, like logging details of access
            1. Guards

              Annotations:

              • -add functionality to a proxy firewall until it starts to look like a guard - receives protocol data, interprets them and passes through - Sort of a twin of proxy firewall
              1. Personal firewalls

                Annotations:

                • -an application program that runs on a workstation to block unwanted traffic - The user decides who to trust and who not to
              2. Level
                1. Application

                  Annotations:

                  • - More advanced - Can make decisions based on the actual content of the packet (not just header) - Can contain extra authentication and do more logging - Acts as a proxy: must "understand" the application protocols used. Needs a proxy server for each application type such as HTTP, FTP, Telnet, etc.
                  1. Network

                    Annotations:

                    • - often in hardware - make decision based on the source, destination address and ports in individual packets - a specially configured router -very fast -transparent to user
                  Show full summary Hide full summary

                  Similar

                  CEH: IDS, Firewalls and Honeypots Test 1
                  amandarackham
                  CEH: IDS, Firewalls and Honeypots Test 2
                  amandarackham
                  Organic Chemistry
                  Ella Wolf
                  KEE1
                  harrym
                  20 Study Hacks To Improve Your Memory
                  jen.sch.ca
                  Physics 1A - Energy
                  Zaki Rizvi
                  GCSE REVISION TIMETABLE
                  neharaniga
                  The Skeleton and Muscles
                  james liew
                  2PR101 1.test - 1. část
                  Nikola Truong
                  Část 3.
                  Gábi Krsková
                  MAPA MENTAL DISEÑO GRAFICO
                  Lizbeth Domínguez