Preview

Overview of Firewalls

Powerful Essays
Open Document
Open Document
1576 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Overview of Firewalls
CNT-A290
Firewalls
Homework Assignment I
Spring 2013

Define, research and write an overview of the following:

Packet filtering firewalls OSI layers they work at. Advantages Disadvantages Network location placements

Overview of Packet filtering Firewalls
A packet-filtering firewall is a software or hardware firewall that is router and/or appliance based that is configured to monitor the incoming and outgoing packets. The packet-filtering firewall checks the information contained in the packets' TCP and IP headers based on which it accepts or denies packets. Most packet-filtering firewalls forward or deny a packet based on the packet's full association that consists of the Source address, the Destination address, the Application or protocol, the Source port number and the Destination port number. A packet-filtering firewall primarily operates only at the network layer or layer 3 of the OSI model.

Advantages: • low cost and low impact on network performance • speed • simplicity • flexibility • By prohibiting connections between specific Internet sources and internal computers, a single rule in packet filtering can help protect an entire network • can be used to shield internal IP addresses from external users when used in conjunction with network address translation
Disadvantages:
• Packet filter firewalls are less secure than application level firewalls because the packet filtering firewalls do not understand application layer protocols. • Packet filters do not inspect the payload of the packet. • Packet filtering firewalls cannot restrict access to protocol subsets for even the most basic services such as the PUT and ET commands in FTP • Packet filters are stateless since they do not keep application level information or information about a session • Packet filters have little or no audit event generation and alerting mechanisms

Stateful firewalls

Overview
The “stateful” firewall provides protection

You May Also Find These Documents Helpful

  • Powerful Essays

    1. Briefly explain how the Gufw internal Ubuntu host IP ststeful firewall can be used in a layered security strategy at the Workstation Domain level.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    1. Briefly explain how the Gufw internal Ubuntu host IP ststeful firewall can be used in a layered security strategy at the Workstation Domain level.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Multiple layers can be used to secure internal threats like keeping employees from accessing inappropriate material, update and patch workstations and run current anti-virus/malware on workstations daily. The layers also help mitigate external threats like hackers by using firewalls and shutting traffic out of the internal network.…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 9

    • 1048 Words
    • 5 Pages

    It accepts Layer 3 packets and decides the path by which to forward a frame to a host on a remote network.…

    • 1048 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    MGT220: Midterm Exam

    • 1999 Words
    • 8 Pages

    D. Firewalls are used to protect information in transit. Question 6 2 points Remote administration Trojans (RATs) are a class of backdoors that are extremely dangerous because they enable remote control over the infected machine. Save…

    • 1999 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 5 Problem Set 1

    • 522 Words
    • 3 Pages

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic…

    • 522 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    A hardware firewall is configured with two or more network interfaces typically placed between a corporate LAN and the WAN connection.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Gives system addressing and routing, and does so in such a manner as additionally to give a regular address space across numerous lower-level protocols. This makes conceivable the interconnection of systems that describes the Internet. The IP protocol works at this level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    | Access control allows the network to prevent outside access that is unauthorized and really watch what is happening on the network.…

    • 489 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. With this security plan being implemented, you can monitor inbound IP traffic anomalies and prevent malicious-intent traffic that may try to intrude and harm your system.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 33

    • 595 Words
    • 3 Pages

    Proxy server operates at the application layer of firewall, where both ends of the connection are forced to conduct session through the proxy. They operate by creating and running a process on the firewall that mirrors a service as if it were running on the host end, and thus centralize all the information transfer to the firewall for scanning.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    2. Which of the following mechanisms is most often used in firewall rules to allow traffic on to the network?…

    • 306 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    Software firewalls are installed on individual computers and they need sufficient configuration to be effective. Software firewalls contain a set of related programs, usually located at a network gateway server, that protect the resources of a private network from users on other networks or from internal users. Software firewalls allow application screening to verify the interaction between the requesting client and the requested resource.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    a. IP Stateful firewall inspection takes place in layer 4, when traffic attempts to traverse the firewall a requested a source port and a destination port pair become part of the session allowing the source to receive information. Stateful inspection firewalls solve the vulnerability of permitting all the high numbered…

    • 928 Words
    • 3 Pages
    Good Essays

Related Topics