Term
If a packet is a ___, the firewall will drop it. If it isn't, then the firewall passes it. This is called a ___. |
|
Definition
provable attack packet pass/deny decision |
|
|
Term
firewalls usually record information about each dropped packet in a ___. this is called ___ |
|
Definition
|
|
Term
a ___ sits at the boundary between the corporate site and external internet. |
|
Definition
|
|
Term
in ___ the firewall examines packets entering the network from the outside. in ___ the firewall filters packets when they are leaving the network. Why when leaving? |
|
Definition
ingress filtering egress filtering This prevents replies to probe packets from leaving the network. |
|
|
Term
What happens when a firewall becomes overloaded with traffic? What is the issue with this? |
|
Definition
It will drop the packets it can't process. Creates a self inflected DoS |
|
|
Term
At what speed must firewalls be able to handle incoming traffic? |
|
Definition
At wire speed, the maximum speed of data coming to each port. |
|
|
Term
What is the most important firewall filtering method? |
|
Definition
stateful packet inspection (SPI) |
|
|
Term
How do intrusion prevention systems stop attacks? |
|
Definition
It examines all layers in each packet and by examining complex relationships within streams of packets |
|
|
Term
what is Unified Threat Management (UTM)? |
|
Definition
they handle traditional firewall processing, antivirus filtering and spam filtering. |
|
|
Term
Do traditional firewalls do antivirus filtering and other application level malware filtering? |
|
Definition
|
|
Term
What are the filtering methods used for examining packets? |
|
Definition
stateful packet inspection filtering static packet filtering network address translation application proxy filtering intrusion prevention system filtering antivirus filtering |
|
|
Term
What is the primary inspection mechanism used by border firewalls? |
|
Definition
stateful packet inspection (SPI) |
|
|
Term
The earliest border firewalls used ___. Is this limited? |
|
Definition
static packet filtering it is extremely limited |
|
|
Term
___ looks at packets one at a time in isolation |
|
Definition
|
|
Term
why is static packet filtering limited |
|
Definition
It only examines one packet at a time. Many attacks can only be stopped by understanding a packet's place in a stream of packets. |
|
|
Term
static packet filter firewalls only look at what layer headers? Do they look at all fields in those headers? |
|
Definition
internet and transport layer headers no |
|
|
Term
What are some attacks a static packet filter firewall stops effectively? |
|
Definition
internet control message protocol (ICMP) echo messages
Spoofed source IP addresses |
|
|
Term
What are two peripheral uses for static packet filtering? |
|
Definition
border firewalls use static packet filtering as a secondary filtering mechanism
Some firms turn their border ROUTERS into static packet filtering firewalls by adding software. |
|
|
Term
Nearly all corporate border firewalls today use the ___ filtering method. |
|
Definition
Stateful Packet Inspection (SPI) |
|
|
Term
SPI focuses on ___, which are persistent conversations between different programs on different computers. |
|
Definition
|
|
Term
A ___ is a distinct phase in a connection between two applications |
|
Definition
|
|
Term
What are the states? Describe them |
|
Definition
Opening State: the two applications agree to open a connection
Ongoing communication state: for most connections, traffic is dominated by exchanges during this state. |
|
|
Term
How does stateful packet inspection (SPI) work? |
|
Definition
it changes its specific examination method depending on the current state. |
|
|
Term
The vast majority of packets are not part of what attempt |
|
Definition
|
|
Term
Stateful packet inspection is simple for packets that ___ attempt to open a connection. What is the consequence of this |
|
Definition
don't Nearly all packets are handled quickly, simply and inexpensively. |
|
|
Term
in networking is represented by it's ___, which designates a ___ on a specific computer. |
|
Definition
Socket Specific Program (Designated by a port number) |
|
|
Term
What is a connection? How many sockets does it consist of? |
|
Definition
It is a link between programs on different machines. 2, internal and external |
|
|
Term
in Stateful packet inspection (SPI), when a packet arrives that doesn't attempt to open a connection, the SPI firewall checks if it is part of a previously approved connection. What happens then? |
|
Definition
If it is part of an existing connection in the connection table, the packet is passed, usually without further filtering
if it isn't part of an existing connection in the connection table, it is dropped and logged. |
|
|
Term
Can SPI firewalls handle ICMP and UDP? |
|
Definition
|
|
Term
Withe SPI processing, it is very simple. IF the connection is in the table, ___ the packet. If not, ___ the packet. |
|
Definition
|
|
Term
By default, SPI firewalls permit all attempts to open a connection from an ___ host to an ___ host. |
|
Definition
|
|
Term
To specify exceptions to default rules, SPI firewalls have ___. |
|
Definition
access control lists for both internal and external connection opening attempts. |
|
|
Term
what is an Access control list (ACL)? |
|
Definition
a series of rules that are exceptions to the default behavior |
|
|
Term
ACL rules typically involve ___ or ___ ports. |
|
Definition
|
|
Term
What is a well known port number? (Not the specific numbers, but the definition) |
|
Definition
they designate specific applications running on the server. |
|
|
Term
what is the range of well known port numbers? |
|
Definition
|
|
Term
Firewall administrator's should always choose the access control list (ACL) rule that implements the policy, but also ___ |
|
Definition
minimizes openings through the firewall |
|
|
Term
in practice, attacks other than ___ rarely get through an SPI firewall unless the administrator creates an incorrect ___ |
|
Definition
application layer attacks Access Control List (ACL) |
|
|
Term
Network Address Translation (NAT) is used in firewalls that use ___ |
|
Definition
various types of examination methods as a second type of protection |
|
|
Term
What is a sniffer? What does it allow a hacker to do |
|
Definition
It is a program that captures packets and notes source IP addresses and port numbers. It allows an attacker to learn about the networks IP addresses and open port numbers without sending packets |
|
|
Term
How does Network Address Translation (NAT) work? |
|
Definition
It replaces a source IP addresses and port numbers with external (stand in) addresses and numbers. It keeps the original IP and socket numbers in a table. When it gets a response, it forwards to the proper host. |
|
|
Term
How does Network Address Translation (NAT) stop a sniffer? |
|
Definition
The sniffer can't learn about the private IPs or port numbers because they have been replaced. |
|
|
Term
___ allows applications that were not designed to work with Network Address Translation (NAT), work with it. What is the downside, if any? |
|
Definition
NAT traversal. There are several methods and all have limitations |
|
|
Term
Neither ___ nor ___ firewalls examine application messages |
|
Definition
static packet filter Stateful Packet Inspection (SPI) |
|
|
Term
What is the purpose of the ingress Access control lists (ACL) |
|
Definition
the default behavior is to drop all attempts to open a connection from the outside. The list can change the defaults. |
|
|
Term
a ___ explicitly filters application layer messages |
|
Definition
|
|
Term
How does a proxy firewall inspect application layer content? |
|
Definition
it collects all of the segments of an application message if it is fragmented, and then inspects the content. |
|
|
Term
Application proxies use application specific relaying, in which they act as both a client and a host when the packet arrives. Thus, the firewall needs a separate application proxy program for ___ |
|
Definition
each application protocol |
|
|
Term
Why can't application proxy firewalls be used as a main border firewall? |
|
Definition
Maintaining two connections for each client/server pair is highly processing intensive and can only handle a limited number of pairs. It can't handle the load. |
|
|
Term
In addition to their slow operation per packet, application proxy firewalls have another serious limitation. What is it? |
|
Definition
Only a few applications can be effectively proxied |
|
|
Term
There are two common uses of application proxy firewalls today. What are they? |
|
Definition
Protect internal clients from malicious external servers
sit between an internal server and external clients. |
|
|
Term
For HTTP, proxy programs can do several types of filtering. What are three of them? |
|
Definition
inspect the URL and compare it with a table of black listed URLs
Inspect scripts, and drop if needed, in downloaded webpages
Inspect the MIME type in an HTTP response |
|
|
Term
many firms drop any HTTP request message that uses the POST method in order to provide ___ |
|
Definition
|
|
Term
In addition to filtering the content of the application layer message, there are three other protections that application proxy firewalls offer: |
|
Definition
Internal IP address hiding: Hides IP addresses of internal hosts
Header destruction: Discards the internet and transport layer headers in the arriving packet
Protocol fidelity: Breaks connections when attempting to bypass aspects of the firewall |
|
|
Term
Stateful packet inspection (SPI) is being challenged by a new type of filtering which is ___ |
|
Definition
Intrusion Prevention System (IPS) filtering. |
|
|
Term
How does an intrusion detection system (IDS) work? |
|
Definition
It examines streams of packets to look for suspicious activities that indicate possible attacks |
|
|
Term
Can an intrusion detection system (IDS) drop a packet if it is merely suspicious? |
|
Definition
|
|
Term
Firewalls stop ___. IDSs identify ___ |
|
Definition
provable attacks suspicious packets that may or may not be part of attacks |
|
|
Term
What are two serious limitations of IDSs? |
|
Definition
too many false alarms
heavy processing requirements |
|
|
Term
What makes an IDS have heavy processing requirements |
|
Definition
Deep packet inspection: IDSs look at at all fields in the packet, including the IP header, TCP or UDP header and application message.
Packet Stream Analysis:it filters packet streams rather than individual packets |
|
|
Term
Instead of just identifying attacks, Intrusion prevention systems (IPS) will ___ |
|
Definition
stop some kinds of attacks |
|
|
Term
___ is much faster than ___, allowing IPSs to be used even when traffic volume is high. This is due to ___ |
|
Definition
Hardware filtering software filtering Application-specific integrated circuits (ASICs) |
|
|
Term
What do Intrusion prevention systems (IPS) do when they detect suspicious traffic at the high end of the attack identification confidence spectrum? |
|
Definition
Drop attack packets. This is dangerous but highly effective.
Bandwidth limitation: |
|
|
Term
what will an antivirus server look for? |
|
Definition
viruses worms trojan horses spam
phishing rootkits malicious scripts other malware. |
|
|
Term
What is a unified threat management (UTM) firewall? |
|
Definition
does traditional firewall filtering methods and antivirus |
|
|
Term
What are the types of firewalls? What is the job of each? |
|
Definition
Main border firewalls: it filters at the point where the corporate network connects to the internet
screening border routers: Static packet filtering software on the router to stop simple high volume attacks.
internal firewalls: controls traffic flowing between different parts of the firm's internal network
host firewalls: individual hosts - both clients and servers - firewalls |
|
|
Term
Border firewalls and internal firewalls are complex to set up because: |
|
Definition
they must protect a large number of client-server connections with different filtering needs. |
|
|
Term
|
Definition
a subnet that contains all of the servers and application proxy firewalls that must be accessible to the outside world. |
|
|
Term
Connections between the ___ and the internal subnet are dangerous. |
|
Definition
|
|
Term
What are the main hosts in the DMZ? |
|
Definition
Public servers
application proxy
firewalls
external DNS server |
|
|
Term
___ are high level statements to guide firewall implementers |
|
Definition
|
|
Term
Each firewall policy must be translated into an ___ that the firewall can understand |
|
Definition
ACL (Access control list) rule |
|
|
Term
___ are pre-packaged firewalls. |
|
Definition
|
|
Term
If a company has lots of firewalls it will use a ___. At the heart of this system is the ___ |
|
Definition
central firewall management system.
Firewall policy management server |
|
|
Term
based on policies, the ___ sends appropriate ACL rules to individual firewalls. There is no need for an admin to manually install rules on ___ |
|
Definition
central configuration system
each firewall |
|
|
Term
What fields are in a firewall policy database |
|
Definition
policy number source and destination service action track (logging) firewalls (which firewalls/routers should be sent to ACLs) |
|
|
Term
After firewall instillation and configuration, you must do ___ |
|
Definition
|
|
Term
___ is the most time consuming part of firewall administration |
|
Definition
|
|
Term
As more attacks will make it past border firewalls, it is increasingly important to harden ___ against attacks. |
|
Definition
|
|
Term
___ are new attacks that are made before signatures are defined |
|
Definition
|
|
Term
one way to address threats for which no signature exists is to use ___ |
|
Definition
|
|
Term
___ filters traffic passing between different parts of the site's internal network |
|
Definition
|
|