Question

Security Technology What are the types of firewalls that can be employed on the network? At...

Security Technology

  1. What are the types of firewalls that can be employed on the network? At what level they operate and how they can help protect the organization?
  2. When you configure a firewall, name some of the best practices for setting up the rules?
  3. Discuss the differences between different Firewall architectures and the provide a recommendation on when you use each architecture?
  4. How does NAT and PAT help in protecting the network with the use of the Firewall?
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Firewall is categorised into three basics types:

1.packet filter(stateless and stateful)

2.Applivation level gateway

3.Circuit level gateway.

These three categories, however,are not mutually exclusive.Modern firewalls have a mix of abilities that may place them in more than one of the three categories.

Firewall is a network device that isolates organization’s internal network from larger outside network/Internet. It can be a hardware, software, or combined system that prevents unauthorized access to or from internal network.

All data packets entering or leaving the internal network pass through the firewall, which examines each packet and blocks those that do not meet the specified security criteria.

Deploying firewall at network boundary is like aggregate the security at a single point.It is analogous to locking an apartment at the entrance and not necessarily at each door.This way they can help in protecting the organizations.

A computer firewall attempts to prevent computer viruses from spreading to your computer and to prevent unauthorized users from accessing your computer. A firewall exists between your computer and the network. It determines which services on your computer remote users on the network can access. A properly configured firewall can greatly increase the security of your system. It is recommended that you configure a firewall for any Red Hat Enterprise Linux system with an Internet connection.

  • Establish a formal change procedure
  • Block traffic by default
  • Set all explicit firewall rules first
  • Set explicit drop rules (cleanup rule)
  • Remove "accept all" rules
  • Audit logs
  • Firewall rules need reviewing
  • Make sure the firewall device is up to date
  • Automation is the key to update any firewall settings

Packet-filtering firewalls allow or block the packets mostly based on criteria such as source and/or destination IP addresses, protocol, source and/or destination port numbers, and various other parameters within the IP header.

The decision can be based on factors other than IP header fields such as ICMP message type, TCP SYN and ACK bits, etc.

Packet filter rule has two parts −

  • Selection criteria − It is a used as a condition and pattern matching for decision making.

  • Action field − This part specifies action to be taken if an IP packet meets the selection criteria. The action could be either block (deny) or permit (allow) the packet across the firewall.

Packet filtering is generally accomplished by configuring Access Control Lists (ACL) on routers or switches. ACL is a table of packet filter rules.

As traffic enters or exits an interface, firewall applies ACLs from top to bottom to each incoming packet, finds matching criteria and either permits or denies the individual packets.

Stateless firewall is a kind of a rigid tool. It looks at packet and allows it if its meets the criteria even if it is not part of any established ongoing communication.

Hence, such firewalls are replaced by stateful firewalls in modern networks. This type of firewalls offer a more in-depth inspection method over the only ACL based packet inspection methods of stateless firewalls.

Stateful firewall monitors the connection setup and teardown process to keep a check on connections at the TCP/IP level. This allows them to keep track of connections state and determine which hosts have open, authorized connections at any given point in time.

They reference the rule base only when a new connection is requested. Packets belonging to existing connections are compared to the firewall's state table of open connections, and decision to allow or block is taken. This process saves time and provides added security as well. No packet is allowed to trespass the firewall unless it belongs to already established connection. It can timeout inactive connections at firewall after which it no longer admit packets for that connection.

Application Gateways

An application-level gateway acts as a relay node for the application-level traffic. They intercept incoming and outgoing packets, run proxies that copy and forward information across the gateway, and function as a proxy server, preventing any direct connection between a trusted server or client and an untrusted host.

The proxies are application specific. They can filter packets at the application layer of the OSI model.

Application-specific Proxies

An application-specific proxy accepts packets generated by only specified application for which they are designed to copy, forward, and filter. For example, only a Telnet proxy can copy, forward, and filter Telnet traffic.

If a network relies only on an application-level gateway, incoming and outgoing packets cannot access services that have no proxies configured. For example, if a gateway runs FTP and Telnet proxies, only packets generated by these services can pass through the firewall. All other services are blocked.

Application-level Filtering

An application-level proxy gateway, examines and filters individual packets, rather than simply copying them and blindly forwarding them across the gateway. Application-specific proxies check each packet that passes through the gateway, verifying the contents of the packet up through the application layer. These proxies can filter particular kinds of commands or information in the application protocols.

Application gateways can restrict specific actions from being performed. For example, the gateway could be configured to prevent users from performing the ‘FTP put’ command. This can prevent modification of the information stored on the server by an attacker.

Transparent

Although application-level gateways can be transparent, many implementations require user authentication before users can access an untrusted network, a process that reduces true transparency. Authentication may be different if the user is from the internal network or from the Internet. For an internal network, a simple list of IP addresses can be allowed to connect to external applications. But from the Internet side a strong authentication should be implemented.

An application gateway actually relays TCP segments between the two TCP connections in the two directions (Client ↔ Proxy ↔ Server).

For outbound packets, the gateway may replace the source IP address by its own IP address. The process is referred to as Network Address Translation (NAT). It ensures that internal IP addresses are not exposed to the Internet.

Circuit-Level Gateway

The circuit-level gateway is an intermediate solution between the packet filter and the application gateway. It runs at the transport layer and hence can act as proxy for any application.

Similar to an application gateway, the circuit-level gateway also does not permit an end-to-end TCP connection across the gateway. It sets up two TCP connections and relays the TCP segments from one network to the other. But, it does not examine the application data like application gateway. Hence, sometime it is called as ‘Pipe Proxy’.

A NAT firewall works by allowing internet traffic to pass through the gateway if a device on the private network requested it Any unsolicited requests or data packets are discarded, preventing communication with potentially dangerous devices on the internet.If inbound internet traffic doesn't have a private ip address to forward to beyond the gateway,the NAT firewall knows the traffic is unsolicited and should be discarded.

Many systems referred to as NAT firewalls are actually PAT firewalls.PAT stands for Port Address Translation.Similar to NAT, it enables a network gateway with one IP address to represent many computers.The difference is that each device is assigned a port number instead of a private ip address.

Add a comment
Know the answer?
Add Answer to:
Security Technology What are the types of firewalls that can be employed on the network? At...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Information technology (IT) infrascruture security policies are represented in many types of policy documents, depending on...

    Information technology (IT) infrascruture security policies are represented in many types of policy documents, depending on the organization’s network and infrastructure needs. These differences stem from different cyber security risks. They also present organizations with different choices to define and make in their security policies. 1. What are some best practices organizations can observe when creating and maintaining domain policies? 2. LAN security policies often center on issues concerning connectivity; this includes determining how devices adhere to the network. What...

  • Thoughts and feedback on this? According to Cisco, a network device manufacturer, a firewall is a...

    Thoughts and feedback on this? According to Cisco, a network device manufacturer, a firewall is a security device that can analyze network traffic and determine if it needs to be blocked or allowed per predetermined rules.1 Most modern PC operating systems, as well as Wi-Fi routers, have a built-in firewall which is mostly suitable for a single endpoint or SOHO. Enterprise firewall appliances are more powerful and configurable than consumer-grade software-based firewalls, pfSense, for example, supports advanced features such as IDS/IPS,...

  • 1- It is advisable to have more than of form of defence, justify the advantages and...

    1- It is advisable to have more than of form of defence, justify the advantages and disadvantages of that approach? 2- In what case you would recommend a screening router firewall architecture over screened host architecture? 3- You need to implement defence in depth for your entire organization. Your management is interested in deploying intrusion prevention systems. Your goal is to protect. 1) All the traffic flowing through a network 2) Endpoints from intrusions. Analyse the technologies you will be...

  • 8. Which of the following is true about firewalls and their ability to adapt in a...

    8. Which of the following is true about firewalls and their ability to adapt in a network? a. Firewalls can interpret human actions and make decisions outside their programming. b. Because firewalls are not programmed like a computer, they are less error prone s. Firewalls are flexible and can adapt to new threats aFirewalls deal strictly with defined patterns of measured observation 9 Which of the following is a reason organization use intrusion detection system? To collect data. To deter...

  • Can someone help me with the following problems please? 1. How can a security framework assist...

    Can someone help me with the following problems please? 1. How can a security framework assist in the design and implementation of a security infrastructure? What is information security governance? Who in the organization should plan for it? 2 What are the issues associated with adopting a formal framework or model? 3. What benefit can a private, for-profit agency derive from best practices designed for federal agencies? 4. What are the differences between a policy, a standard, and a practice?...

  • Question 26 (1 point) In Lab 1 (Exploring Encryption), what did you need to configure on...

    Question 26 (1 point) In Lab 1 (Exploring Encryption), what did you need to configure on the server or on the client? Question 26 options: Only (a) and (b) (c) The client's public key (a), (b), and (c) (a) The server's certificate (b) Enable TLS on the server Save Question 27 (1 point) The following question is Lab 2 related (Ports and Firewalls). At what point does the HTTP daemon service actively begin listening for traffic on the network? Question...

  • Please choose 5 questions from 20 and answer them. 1. How can a security framework assist...

    Please choose 5 questions from 20 and answer them. 1. How can a security framework assist in the design and implementation of a security infrastructure? What is information security governance? Who in the organization should plan for it? 2. Where can a security administrator find information on established security frameworks? 3. What is the ISO 27000 series of standards? Which individual standards make up the series? 4. What are the issues associated with adopting a formal framework or model? 5....

  • Joe, a new network engineer, is working on the redesign of ABC Enterprise. He has identified...

    Joe, a new network engineer, is working on the redesign of ABC Enterprise. He has identified the organizational needs and created the infrastructure summary report. He is in the process of developing the architectural models for the organization when he begins to become overwhelmed as he contemplates the role of security services within the architecture. What advice can you offer Joe? In your initial response, include the following: Describe how the modular approach may help Joe. Identify the modules or...

  • Product integration is a vital part of product development and the main focus and research problem...

    Product integration is a vital part of product development and the main focus and research problem is to understand what factors influence the possibilities to achieve efficient and effective product integration. The characteristics of efficient product integration are that unnecessary work is avoided and delays due to integration problems are prevented. Effective product integration is achieved if problems related to the interaction between components are captured, and the planned functionality for a specific integration is achieved. Other important matters related...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT