Security-Firewall-s.pptx - Security Firewalls Topics I Fundamentals of firewalls II Types of firewalls A B C D Packet filtering firewall Stateful

Security-Firewall-s.pptx - Security Firewalls Topics I...

This preview shows page 1 - 7 out of 23 pages.

Security: Firewalls
Image of page 1
Topics I. Fundamentals of firewalls II. Types of firewalls A. Packet filtering firewall B. Stateful inspection firewalls C. Application proxy firewall D. Circuit level proxy firewall III. Firewall Basing A. Bastion host B. Host-based firewall C. Personal firewall IV. Firewall Configuration
Image of page 2
I. The Need For Firewalls Internet connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the Internet to establish a controlled link Can be a single computer system or a set of two or more systems working together Used as a perimeter defense Single choke point to impose security and auditing Insulates the internal systems from external networks
Image of page 3
Firewall Characteristics Design goals All traffic from inside to outside must pass through the firewall Only authorized traffic as defined by the local security policy will be allowed to pass The firewall itself is immune to penetration Design goals All traffic from inside to outside must pass through the firewall Only authorized traffic as defined by the local security policy will be allowed to pass The firewall itself is immune to penetration Techniques used by firewalls to control access and enforce the site’s security policy are: Service control Direction control User control Behavior control Techniques used by firewalls to control access and enforce the site’s security policy are: Service control Direction control User control Behavior control
Image of page 4
Firewall Capabilities And Limits Capabilities: Defines a single choke point Provides a location for monitoring security events Convenient platform for several Internet functions that are not security related Can serve as the platform for IPSec (VPN) Limitations: Cannot protect against attacks bypass ing firewall May not protect fully against internal threats Improperly secured wireless LAN can be accessed from outside the organization Laptop, PDA, or portable storage device may be infected outside the corporate network then used internally
Image of page 5
Image of page 6
Image of page 7

You've reached the end of your free preview.

Want to read all 23 pages?

  • Spring '16

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture