Question

13 What are the pros and cons of a software based firewall vs firewall device (physical...

13 What are the pros and cons of a software based firewall vs firewall device (physical device/equipment)

14 What are the best practices for rule development. How many rules, would be too many to regulate the firewall traffic.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

13)

Connecting your network to the Internet without a firewall is like leaving the front door of your office wide open when you leave on vacation. Chances are high that someone will eventually walk in and steal your valuables.

Many machines and software programs come equipped with firewall programs, but when you’re protecting sensitive data, it’s better to know what you’re getting -- and what you could have instead. A competent firewall will safeguard your business from attempts by hackers to steal confidential data, just as a locked front door deters thieves from ransacking your home. Small and mid-size business owners are increasingly opting to install firewalls for this reason, with 44 percent of such companies planning to purchase firewalls within the coming 12 months, according to a recent survey by Forrester Research, of Cambridge, Mass. The most important criteria for small and mid-size businesses is simple manageability, according to the report.

The good news is, there are just two basic types of firewalls to consider: hardware-based and software-based. Here is a rundown of how they work and why they may or may not work for you.

Hardware Firewalls (firewall device)

Hardware firewalls are integrated into the router that sits between a computer and an Internet modem. They typically use packet filtering, which means they scan packet headers to determine their source, origin, destination addresses, and whether the incoming traffic is related to an outgoing connection, such as a request for a website. This information is compared to a set of user-created rules that determine whether the packet should be forwarded or blocked. If you have a wired or wireless router installed, check it to see whether it already includes a hardware firewall. Most do.

The pros to a hardware firewall are:

  • A single hardware firewall can protect your entire network, which is a boon for companies with multiple computers.
  • Because they don't run on your computers, they don't affect system performance or speed.
  • Hardware firewalls work more efficiently for businesses that use a broadband Internet connection, such as DSL or cable modem.
  • A hardware firewall won't easily be disabled by malicious software, as software firewalls can be.
  • The cost of one hardware firewall to protect multiple computers may ultimately be lower than installing licensed software firewalls on each PC in the office.

The cons to a hardware firewall are:

  • Routers can be expensive, ranging upwards of several hundred dollars.
  • They may be more difficult to configure, especially for novices.
  • Hardware firewalls treat outgoing traffic from the local network as safe, which can be a hazard if malware, such as a worm, penetrates your network and attempts to connect to the Internet.

Software firewalls

Software firewalls are installed on individual computers. They intercept each request by the network to connect to the computer and then determine whether the request is valid. Software firewalls can also be configured to check suspicious outgoing requests.

The pros to a software firewall are:

  • Top-rated software firewalls cost less than $50, so they're a more economical choice for an office that has, say, fewer than four or so machines.
  • They're easier to configure than hardware routers. You can determine the level of protection you want with a few clicks during the installation process, and provide different security levels according to the machine or user. The highest level of security may block all cookies and JavaScript, which will cause some Web pages not to load or it may display them improperly. This is particularly true for members-only sites.
  • They’re flexible. You can specify which applications are allowed to connect to the Internet, thus reducing the possibility that malware will do so. A potential scenario where a software firewall would be advantageous is in the case of an e-mail worm that creates its own e-mail server, like the recent "MyDoom" worm, which may not be recognized by a router because of its trusted origin.
  • You can take it with you. A software firewall protects the computer it's installed on no matter where that computer is connected. This is an important feature for business travelers with laptops.

The cons to a software firewall are:

  • Software firewalls use more system resources, such as memory and disk space, than hardware firewalls, therefore dragging on your computer.
  • You must purchase a separate copy for each computer connected to the network, racking up charges fast.
  • Software firewalls can't be configured to mask your IP address. Instead, they close unused ports and monitor traffic to and from open ports.

14)

When you modify a firewall configuration, it is important to consider potential security risks to avoid future issues. Security is a complex topic and can vary from case to case, but this article describes best practices for configuring perimeter firewall rules.

Block by default

Block all traffic by default and explicitly allow only specific traffic to known services. This strategy provides good control over the traffic and reduces the possibility of a breach because of service misconfiguration.

You achieve this behavior by configuring the last rule in an access control list to deny all traffic. You can do this explicitly or implicitly, depending on the platform.

Allow specific traffic

The rules that you use to define network access should be as specific as possible. This strategy is referred to as the principle of least privilege, and it forces control over network traffic. Specify as many parameters as possible in the rules.

A layer 4 firewall uses the following parameters for an access rule:

  • Source IP address (or range of IP addresses)
  • Destination IP address (or range of IP addresses)
  • Destination port (or range of ports)

As many parameters as possible should be specified in the rule used to define network access. There are limited scenarios where any is used in any of these fields.

Specify source IP addresses

If the service should be accessible to everyone on the Internet, then any source IP address is the correct option. In all other cases, you should specify the source address.

It’s acceptable to allow all source addresses to access your HTTP server. It’s generally not acceptable to allow all source addresses to access your server management ports (22 for Linux SSH and 3389 for Windows RDP) or database (1433 for SQL Server, 1521 for Oracle, and 2206 for MySQL). Be as specific as practical about who can reach these ports. When it is impractical to define source IP addresses for network management, you might consider another solution like a remote access VPN as a compensating control to allow the access required and protect your network.

Specify the destination IP address

The destination IP address is the IP address of the server that runs the service to which you want to allow access. Always specify which server (or group of servers) can be accessed. Configuring a destination value of any is discouraged, because doing so could create future issues, such as a security breach or server compromise for a protocol that you might not intend to use on a server that might be accessible by default. However, destination IPs with a destination value of any can be used if there is only one IP assigned to the firewall, or if you want both public and servicenet access to your configuration.

Specify the destination port

The destination port corresponds to the service that needs to be accessed. This value of this field should never be any. The service that runs on the server and needs to be accessed is defined, and only this port needs to be allowed. For example, allowing all ports will greatly impact the security of the server by allowing a malicious entity to perform a dictionary attack to guess the password, as well as execute exploits for any port and protocol that is configured on the server.

Avoid using too wide a range of ports. If dynamic ports are used, firewalls sometimes provide inspection policies to securely allow them through.

Examples of bad configurations

This section describes bad examples of firewall rules, but also shows some alternative good rules to follow when configuring firewall rules.

permit ip any any - Allows all traffic from any source on any port to any destination. This is the worst type of access control rule. It contradicts both of the security concepts of denying traffic by default and the principal of least privilege. The destination port should be always specified, and the destination IP address should be specified when practical. The source IP address should be specified unless the application is built to receive clients from the Internet, such as a web server. A good rule would be permit tcp any WEB-SERVER1 http.

permit ip any any WEB-SERVER1 - Allows all traffic from any source to a web server. Only specific ports should be allowed; in the case of a web server, ports 80 (HTTP) and 443 (HTTPS). Otherwise, the management of the server is vulnerable. A good rule would be permit ip any WEB-SERVER1 http.

permit tcp any WEB-SERVER1 3389 - Allows RDP access from any source to the web server. It is generally a bad practice to allow everyone access to your management ports. Be specific about who can access the server management. A good rule would be permit tcp 12.34.56.78 3389 WEB-SERVER1 (where 12.34.56.78 is the IP address of the administrator’s computer on the Internet).

permit tcp any DB-SERVER1 3306 - Allows MySQL access from any source to the database. Database servers should never be exposed to the whole Internet. If you need database queries to run across the public Internet, specify the exact source IP address. A good rule would be permit tcp 23.45.67.89 DB-SERVER1 3306 (where 23.45.67.89 is the IP address of the host on the Internet that needs access to the database). A best practice would be to allow database traffic over a VPN and not in clear text across the public Internet.

Add a comment
Know the answer?
Add Answer to:
13 What are the pros and cons of a software based firewall vs firewall device (physical...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Thoughts and feedback on this? According to Cisco, a network device manufacturer, a firewall is a...

    Thoughts and feedback on this? According to Cisco, a network device manufacturer, a firewall is a security device that can analyze network traffic and determine if it needs to be blocked or allowed per predetermined rules.1 Most modern PC operating systems, as well as Wi-Fi routers, have a built-in firewall which is mostly suitable for a single endpoint or SOHO. Enterprise firewall appliances are more powerful and configurable than consumer-grade software-based firewalls, pfSense, for example, supports advanced features such as IDS/IPS,...

  • consider the feasibility of researching the topics below, what are some pros/cons and which study would...

    consider the feasibility of researching the topics below, what are some pros/cons and which study would be more feasible on that unit Rates of hand washing by CNAs on a hospital unit Rate of self-turning by patients on nursing unit (how many times per hour are patients turning themselves).

  • Matching: What are 4 fundamental activities in software processes? definition of the software function and operational...

    Matching: What are 4 fundamental activities in software processes? definition of the software function and operational constraints Answer 1Choose...software developmentsoftware evolutionsoftware specificationsoftware validation software is modified to reflect changing customer / market needs Answer 2Choose...software developmentsoftware evolutionsoftware specificationsoftware validation design and implementation of the software code Answer 3Choose...software developmentsoftware evolutionsoftware specificationsoftware validation process of ensuring the software meets the customer's requirements Answer 4Choose...software developmentsoftware evolutionsoftware specificationsoftware validation Please answer all parts of the question. Question 2 Answer saved Marked out...

  • Answer the following questions: 8. What percentage of the U.S. population are overweight?____________________ 9. The various...

    Answer the following questions: 8. What percentage of the U.S. population are overweight?____________________ 9. The various levels of insulin leads to the body storing excess sugar as fat and carbohydrates. T               F 10. In 2 sentences explain nurture vs nature. _____________________________________ _____________________________________________________________________________________________ _____________________________________________________ 11. Heredity does not play a role in development. T       F 12. Heredity is based on genetic makeup. T         F 13. What is cross-sectional research? (2 sentences) _____________________________ _____________________________________________________________________________________________ 14. One cell at conception contains a specific...

  • SCADA systems sit in between the cyber and physical world. What is one of the biggest...

    SCADA systems sit in between the cyber and physical world. What is one of the biggest threats to these systems? Connection to traditional networks Those darn aliens Reducing risk by integration Human machine interface What are some reasons that IoT devices are so susceptible to hacking? (select all that apply) They are so small Difficult to patch The sheer number of devices Poor software design What is the key capability that RTOS provides over traditional OSs. (select all that apply)...

  • Physical Security we will survey the security issues identified with the offices, that is, the framework...

    Physical Security we will survey the security issues identified with the offices, that is, the framework and utilities we requirement for our business, and how we can continue giving them at the same quality with no interference. It's implied that you ought to begin with an all around outlined occurrence reaction, calamity recuperation, and business congruity arrangement. In the event that you review the discourses from the security arranging module (part 4), excess is the catchphrase in all answers for...

  • 11- Based on what is known about the trends in physical inactivity, which person from the...

    11- Based on what is known about the trends in physical inactivity, which person from the list below is most likely to be sedentary? A- A male adolescent B- A college professor C- An older adult D- The owner of a multi-billion-dollar company 12- Which of the following complementary and alternative medicine(CAM)intervention is effective in treating chemotherapy-induced nausea? A- Aromatherapy B- Acupuncture C- Diaphragmatic breathing D- Visualization 13-The Surgeon General’s Report on Physical Activity and Health proposes that, in order...

  • provide positive feedback to post below responGraphic Rating Scale Method Provide the textbook definition for that...

    provide positive feedback to post below responGraphic Rating Scale Method Provide the textbook definition for that particular performance appraisal (from our current textbook or other valid resource). A scale that list a number of traits and range of performance for each. The employee is then rated by identifying the score that best describes his or her level of performance for each trait. Describe the pros and cons of the performance appraisal as identified in the textbook or other valid resource....

  • 1- Based on what is known about the trends in physical inactivity, which person from the...

    1- Based on what is known about the trends in physical inactivity, which person from the list below is most likely to be sedentary? A- A male adolescent B- A college professor C- An older adult D- The owner of a multi-billion-dollar company 2- Which of the following complementary and alternative medicine(CAM)intervention is effective in treating chemotherapy-induced nausea? A- Aromatherapy B- Acupuncture C- Diaphragmatic breathing D- Visualization 3-The Surgeon General’s Report on Physical Activity and Health proposes that, in order...

  • 1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80...

    1. What would these iptables rules do? iptables -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT iptables -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT Allow web server traffic Block web server traffic Force port 80 traffic to port 443 Allow traffic from both 80 and 443 using UDP protocols 2. Timestamps are important because can not be changed or deleted by attackers when configured properly, allows you to correlate events across the network can always...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT