This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Jean Maurice Rakotoarimanana Review Questions: Chapter6 1-What is the typical relationship among the untrusted network, the firewall, and the trusted network? The untrusted network is on the 'outside' of the Firewall, logically separating it from the trusted network (inside), which you want to keep safe. In this way, you can think of the Firewall as the outer gates of your protected network. 2-What is the relationship between a TCP and UDP packet? Will any specific transaction usually involve both types of packets? A TCP or UDP connection is uniquely identified by the following four items present in each message: source IP address- the address of the system that sent the packet, destination IP address- the address of the system that receives the packet, source port- the connection's port at the source system, and destination port- the connection's port at the destination system. 3-How is an application layer firewall different from a packet filtering firewall? Why is an application layer firewall sometimes called a proxy server? Packet filtering firewall allows only a particular packet with a particular source, destination, and port address to enter through the firewall. It does this by opening and closing doors in the firewall based on the information contained in the packet header, which makes dynamic packet filters an intermediate form, between traditional static packet filters and application proxies. Application firewall is frequently installed on dedicated computer, separate from the filtering router, but is commonly used in conjunction with a filtering router. It is called a proxy server since it runs special software that acts as proxy for a service request. 4-How is static filtering different from dynamic filtering of packets? Which is perceived to offer improved security? A dynamic filtering firewall can react to an emergent event and update or create rules to deal with that even, while static filtering firewalls allow entire sets of one type of packet to enter in response to authorized requests. 5-What is stateful inspection? How is state information maintained during a network connection or transaction? Stateful inspection keeps track of each network connection between internal and external systems using a state table. A state table track the state and context of each packet in the conversation by recording which station sent what packet and when. 6-What is circuit gateway, and how does it differ from the other forms of firewalls?...
View Full Document
- Spring '12