Preview

Overview of Firewalls

Powerful Essays
Open Document
Open Document
1576 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Overview of Firewalls
CNT-A290
Firewalls
Homework Assignment I
Spring 2013

Define, research and write an overview of the following:

Packet filtering firewalls OSI layers they work at. Advantages Disadvantages Network location placements

Overview of Packet filtering Firewalls
A packet-filtering firewall is a software or hardware firewall that is router and/or appliance based that is configured to monitor the incoming and outgoing packets. The packet-filtering firewall checks the information contained in the packets' TCP and IP headers based on which it accepts or denies packets. Most packet-filtering firewalls forward or deny a packet based on the packet's full association that consists of the Source address, the Destination address, the Application or protocol, the Source port number and the Destination port number. A packet-filtering firewall primarily operates only at the network layer or layer 3 of the OSI model.

Advantages: • low cost and low impact on network performance • speed • simplicity • flexibility • By prohibiting connections between specific Internet sources and internal computers, a single rule in packet filtering can help protect an entire network • can be used to shield internal IP addresses from external users when used in conjunction with network address translation
Disadvantages:
• Packet filter firewalls are less secure than application level firewalls because the packet filtering firewalls do not understand application layer protocols. • Packet filters do not inspect the payload of the packet. • Packet filtering firewalls cannot restrict access to protocol subsets for even the most basic services such as the PUT and ET commands in FTP • Packet filters are stateless since they do not keep application level information or information about a session • Packet filters have little or no audit event generation and alerting mechanisms

Stateful firewalls

Overview
The “stateful” firewall provides protection

You May Also Find These Documents Helpful

  • Powerful Essays

    1. Briefly explain how the Gufw internal Ubuntu host IP ststeful firewall can be used in a layered security strategy at the Workstation Domain level.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    1. Briefly explain how the Gufw internal Ubuntu host IP ststeful firewall can be used in a layered security strategy at the Workstation Domain level.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Multiple layers can be used to secure internal threats like keeping employees from accessing inappropriate material, update and patch workstations and run current anti-virus/malware on workstations daily. The layers also help mitigate external threats like hackers by using firewalls and shutting traffic out of the internal network.…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 9

    • 1048 Words
    • 5 Pages

    It shields the upper layer protocol from being aware of the physical medium to be used in the communication.*…

    • 1048 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    a) Firewalls: Controls the traffic flow between a trusted network and an untrusted network. Usually firewalls are used to protect the boundaries of a network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Problem Set 1

    • 522 Words
    • 3 Pages

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    A hardware firewall is configured with two or more network interfaces typically placed between a corporate LAN and the WAN connection.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    The 5-layer model serves essentially the protocols regarded as Transmission Control Protocol (TCP) as well as Internet Protocol (IP), or mutually, TCP/IP. The User Datagram Protocol (UDP) is likewise served by this particular model. The 5-layer model was produced alongside with these protocols, anteceding the 7-layer model, and is from time to time known as the TCP Model.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    This domain needs strict security controls given the risks and threats of connecting to the internet. This domain is where all data travels into and out of the IT infrastructure. A security solution for unauthorized access through the LAN-to-WAN domain is to apply strict security monitoring controls for intrusion detection and prevention.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. With this security plan being implemented, you can monitor inbound IP traffic anomalies and prevent malicious-intent traffic that may try to intrude and harm your system.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    Proxy server operates at the application layer of firewall, where both ends of the connection are forced to conduct session through the proxy. They operate by creating and running a process on the firewall that mirrors a service as if it were running on the host end, and thus centralize all the information transfer to the firewall for scanning.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic on to the network?…

    • 306 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    Software firewalls are installed on individual computers and they need sufficient configuration to be effective. Software firewalls contain a set of related programs, usually located at a network gateway server, that protect the resources of a private network from users on other networks or from internal users. Software firewalls allow application screening to verify the interaction between the requesting client and the requested resource.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    MIS 320 Midterm

    • 3629 Words
    • 12 Pages

    A firewall is a combination of hardware and software that controls the flow of incoming and outgoing network traffic. Firewalls prevent unauthorized users from accessing internal networks. They protect internal systems by monitoring packets for the wrong source or destination, or by offering a proxy server with no access to the internal documents and systems, or by restricting the types of messages that get through, for example, e-mail. Intrusion detection systems monitor the most vulnerable points or “hot spots” in a network to detect and deter unauthorized intruders. These systems often also monitor events as they happen to look for security attacks in progress. Sometimes they can be programmed to shut down a particularly sensitive part of a network if it receives unauthorized traffic.…

    • 3629 Words
    • 12 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    a. IP Stateful firewall inspection takes place in layer 4, when traffic attempts to traverse the firewall a requested a source port and a destination port pair become part of the session allowing the source to receive information. Stateful inspection firewalls solve the vulnerability of permitting all the high numbered…

    • 928 Words
    • 3 Pages
    Good Essays

Related Topics