FIREWALLs

Description

hehe
nurdiyanazr
Mind Map by nurdiyanazr, updated more than 1 year ago
nurdiyanazr
Created by nurdiyanazr over 9 years ago
196
0
1 2 3 4 5 (0)

Resource summary

FIREWALLs
  1. Defination
    1. Firewalls is a device that filter all trafic between a protected ('inside') network and a less trustworthy ('outside) network.
    2. Type
      1. Packet filtering gateaway

        Annotations:

        • - control access to packet based on packet address (source/destination), specific transport protocol - just see nametag but not ID (only IP but nit packet content) -  cannot choose between allowable TELNET and non-allowable ones - can block packets from ‘outside’ trying to disguise to be one from ‘inside’-> trying to forge an IP address
        1. Stateful inspection firewalls

          Annotations:

          • - Maintain state information between packet in an input stream - Can be used to thwart attack that are split across 2 or more packet
          1. Application proxies

            Annotations:

            • - a.k.a bastion host - it check the content of a packet and only allows action that are in the given guidelines - caching popular sites for easy retrieval - proxies can be tailored to specific requirements, like logging details of access
            1. Guards

              Annotations:

              • -add functionality to a proxy firewall until it starts to look like a guard - receives protocol data, interprets them and passes through - Sort of a twin of proxy firewall
              1. Personal firewalls

                Annotations:

                • -an application program that runs on a workstation to block unwanted traffic - The user decides who to trust and who not to
              2. Level
                1. Application

                  Annotations:

                  • - More advanced - Can make decisions based on the actual content of the packet (not just header) - Can contain extra authentication and do more logging - Acts as a proxy: must "understand" the application protocols used. Needs a proxy server for each application type such as HTTP, FTP, Telnet, etc.
                  1. Network

                    Annotations:

                    • - often in hardware - make decision based on the source, destination address and ports in individual packets - a specially configured router -very fast -transparent to user
                  Show full summary Hide full summary

                  0 comments

                  There are no comments, be the first and leave one below:

                  Similar

                  CEH: IDS, Firewalls and Honeypots Test 2
                  amandarackham
                  British Empire
                  chloeeatsalot
                  Study Planner
                  indibharat
                  Driver's Exam
                  darrinmagnus
                  Algebra
                  Alex Maraio
                  Higher Level Economics
                  Jim hammerton
                  How to Develop the Time Management Skills Essential to Succeeding in IB Courses
                  nina.stuer14
                  B1 Revision
                  OmaimaE
                  Physics
                  Holly Bamford
                  AS Media Studies Terminology
                  Mourad