Podcast
Questions and Answers
Which of the following best describes a packet according to the text?
Which of the following best describes a packet according to the text?
- A detailed report of network errors and warnings.
- A collection of various network protocols.
- A continuous stream of data without specific boundaries.
- A discrete block of data that is a basic unit handled by a network. (correct)
Packet filtering involves examining the entire content of a packet, not just its header.
Packet filtering involves examining the entire content of a packet, not just its header.
False (B)
What two parts does each packet consist of?
What two parts does each packet consist of?
header and data
A ______ acts like a 'doorman,' reviewing the packet header before sending it to a specific location within the network.
A ______ acts like a 'doorman,' reviewing the packet header before sending it to a specific location within the network.
Which of the following network devices is commonly used for packet filtering?
Which of the following network devices is commonly used for packet filtering?
Operating systems do not include built-in utilities for filtering packets.
Operating systems do not include built-in utilities for filtering packets.
What is the main function of software firewalls in relation to packets?
What is the main function of software firewalls in relation to packets?
Firewall ______ are standalone hardware and software devices with self-contained components.
Firewall ______ are standalone hardware and software devices with self-contained components.
Which part of a packet contains information typically read only by computers?
Which part of a packet contains information typically read only by computers?
The 'data' portion of a packet is what end users typically see.
The 'data' portion of a packet is what end users typically see.
What is the main role of lower-networking protocols in the context of packets?
What is the main role of lower-networking protocols in the context of packets?
The Internet Header Length describes the length of the header in ______-bit words.
The Internet Header Length describes the length of the header in ______-bit words.
What does the 'Type of Service' field in an IP packet indicate?
What does the 'Type of Service' field in an IP packet indicate?
The 'Time to Live' (TTL) field in a packet is measured in seconds.
The 'Time to Live' (TTL) field in a packet is measured in seconds.
What does the 'Protocol' field identify within the data portion of a packet?
What does the 'Protocol' field identify within the data portion of a packet?
Each packet sent and received across the Internet is encoded into ______.
Each packet sent and received across the Internet is encoded into ______.
If the Time to Live (TTL) is an 8-bit value, what is the maximum number of hops a packet's life can represent?
If the Time to Live (TTL) is an 8-bit value, what is the maximum number of hops a packet's life can represent?
Packet filters always examine packet headers and the entire content before making a decision.
Packet filters always examine packet headers and the entire content before making a decision.
What is the primary action of an 'allow' rule in packet filtering?
What is the primary action of an 'allow' rule in packet filtering?
According to common packet-filtering practices, ICMP redirect or echo (ping) messages are typically ______.
According to common packet-filtering practices, ICMP redirect or echo (ping) messages are typically ______.
For a small-scale, software-only personal firewall, what should be set up to allow communications between computers on a local network?
For a small-scale, software-only personal firewall, what should be set up to allow communications between computers on a local network?
Stateless packet filtering maintains a record of the state of a connection.
Stateless packet filtering maintains a record of the state of a connection.
What is compared against the header data in stateless filtering to determine if a packet should be forwarded?
What is compared against the header data in stateless filtering to determine if a packet should be forwarded?
The ______ flag indicates that the destination computer has received packets that were previously sent.
The ______ flag indicates that the destination computer has received packets that were previously sent.
Which IP header criteria is used to allow only certain computers or devices to access your network resources?
Which IP header criteria is used to allow only certain computers or devices to access your network resources?
Filtering by TCP or UDP port number is also known as IP address filtering.
Filtering by TCP or UDP port number is also known as IP address filtering.
What is the general management protocol for TCP/IP diagnosed by ICMP?
What is the general management protocol for TCP/IP diagnosed by ICMP?
If a packet arrives at the firewall from an external network but contains an IP address that is inside the protected network, the firewall should send a(n) ______.
If a packet arrives at the firewall from an external network but contains an IP address that is inside the protected network, the firewall should send a(n) ______.
How does a stateful packet filter improve upon stateless packet filtering?
How does a stateful packet filter improve upon stateless packet filtering?
Stateful packet inspection verifies the packet data itself, not just the headers.
Stateful packet inspection verifies the packet data itself, not just the headers.
What does a proxy gateway look at in a packet to decide which application should handle it?
What does a proxy gateway look at in a packet to decide which application should handle it?
A specialty firewall will scan the bodies of emails and web pages or pages seeking ______ or other offensive content.
A specialty firewall will scan the bodies of emails and web pages or pages seeking ______ or other offensive content.
What three actions should be established with packet-filter rules to ensure a solid firewall?
What three actions should be established with packet-filter rules to ensure a solid firewall?
Best practice allows for a direct firewall device from a public network.
Best practice allows for a direct firewall device from a public network.
What kind of data is routed through a well-configured SMTP gateway via a firewall?
What kind of data is routed through a well-configured SMTP gateway via a firewall?
HTTP traffic should be prevented from reaching internal networks via implementation of some form of ______ or DMZ architecture
HTTP traffic should be prevented from reaching internal networks via implementation of some form of ______ or DMZ architecture
Within the rules that cover multiple variations, what type of packets should be blocked from getting to the internal LAN?
Within the rules that cover multiple variations, what type of packets should be blocked from getting to the internal LAN?
The Internet Control Message Protocol (ICMP) packets cannot be altered
The Internet Control Message Protocol (ICMP) packets cannot be altered
What is the best way to prevent changes to your routing tables?
What is the best way to prevent changes to your routing tables?
Rules that enable web traffic cover standard http traffic on tcp port ______.
Rules that enable web traffic cover standard http traffic on tcp port ______.
Match the following ICMP rules with their descriptions:
Match the following ICMP rules with their descriptions:
Flashcards
What are Packets?
What are Packets?
Discrete blocks of data, the basic unit handled by a network.
What is a Packet Filter?
What is a Packet Filter?
Hardware or software that controls the transmission of information packets based on defined criteria, either allowing or blocking them.
What does a Packet Filter do?
What does a Packet Filter do?
A device that reviews the packet header to determine its destination within the network.
What are Routers?
What are Routers?
Signup and view all the flashcards
What are Operating Systems used for?
What are Operating Systems used for?
Signup and view all the flashcards
What are Software Firewalls?
What are Software Firewalls?
Signup and view all the flashcards
What are Firewall Appliances?
What are Firewall Appliances?
Signup and view all the flashcards
What is the Anatomy of an IP Packet?
What is the Anatomy of an IP Packet?
Signup and view all the flashcards
What is the Header of a Packet?
What is the Header of a Packet?
Signup and view all the flashcards
What is the Data of a Packet?
What is the Data of a Packet?
Signup and view all the flashcards
IP Packet: Version
IP Packet: Version
Signup and view all the flashcards
IP Packet: Header Length?
IP Packet: Header Length?
Signup and view all the flashcards
IP Packet: Type of Service?
IP Packet: Type of Service?
Signup and view all the flashcards
IP Packet: Total Length?
IP Packet: Total Length?
Signup and view all the flashcards
IP Packet: Identification?
IP Packet: Identification?
Signup and view all the flashcards
IP Packet: Information Flags?
IP Packet: Information Flags?
Signup and view all the flashcards
IP Packet: Fragment Offset?
IP Packet: Fragment Offset?
Signup and view all the flashcards
IP Packet: Time To Live (TTL)
IP Packet: Time To Live (TTL)
Signup and view all the flashcards
IP Packet: Protocol?
IP Packet: Protocol?
Signup and view all the flashcards
IP Packet: Header Checksum?
IP Packet: Header Checksum?
Signup and view all the flashcards
IP Packet: Source IP Address?
IP Packet: Source IP Address?
Signup and view all the flashcards
IP Packet: Destination IP Address?
IP Packet: Destination IP Address?
Signup and view all the flashcards
How are packets encoded?
How are packets encoded?
Signup and view all the flashcards
"Allow" Rules
"Allow" Rules
Signup and view all the flashcards
"Deny" Rules
"Deny" Rules
Signup and view all the flashcards
Common Packet Filtering Rule
Common Packet Filtering Rule
Signup and view all the flashcards
Software Firewalls with Access List?
Software Firewalls with Access List?
Signup and view all the flashcards
Local network trusted zone?
Local network trusted zone?
Signup and view all the flashcards
Stateless Packet Filtering
Stateless Packet Filtering
Signup and view all the flashcards
When is stateless packets useful?
When is stateless packets useful?
Signup and view all the flashcards
IP header criteria filtering?
IP header criteria filtering?
Signup and view all the flashcards
What does the ACK flag indicate?
What does the ACK flag indicate?
Signup and view all the flashcards
Source IP address?
Source IP address?
Signup and view all the flashcards
Destination IP address?
Destination IP address?
Signup and view all the flashcards
Protocol
Protocol
Signup and view all the flashcards
TCP/ UDP port number filtering?
TCP/ UDP port number filtering?
Signup and view all the flashcards
ICMP
ICMP
Signup and view all the flashcards
Firewalls in ICMP?
Firewalls in ICMP?
Signup and view all the flashcards
Fragmentation Flags?
Fragmentation Flags?
Signup and view all the flashcards
What does ACK flags filters offer?
What does ACK flags filters offer?
Signup and view all the flashcards
What are Suspicious packets?
What are Suspicious packets?
Signup and view all the flashcards
Study Notes
Overview
- Chapter 5 is about Packet Filtering
- Describes packets and how packet filtering works
- Explains different packet filtering approaches
- How to configure specific filtering rules based on business requirements
Introduction
- Packets are discrete blocks of data
- Packets are the basic unit of data handled by a network
- Network traffic is broken down into packets for network transmission
- Packets are reassembled at the destination
- Packet filters are software or hardware that allows or blocks transmission of data packets based on defined criteria
Understanding Packets and Packet Filtering
- Packet filtering acts like a doorman by reviewing the packet header
- Then it sends the packet to a specific location within the network
Packet-Filtering Devices
- Routers are typical packet filters
- Operating systems have built-in utilities to filter packets at the TCP/IP stack level
- Software firewalls are mostly enterprise-level programs that filter packets
- Firewall appliances are standalone hardware and software that have self-contained components
Anatomy of a Packet
- Packets are part of Transport Control Protocol/Internet Protocol (TCP/IP)
- TCP/IP transmits data in small, manageable chunks
- Packets start as messages developed by high-level protocols
- High-level messages are formatted into usable datasets
- Lower-networking protocols break packets into frames, which are coded as electronic pulses on the media
- Packets consist of a header and data
- The header contains information normally read by computers
- The data is the part seen by end users
- An IP packet header has several elements
- Indicates the IP version
- Internet Header Length describes the header in 32-bit words
- Type of Service indicates which of four service options is used to transmit the packet:
- Minimize delay
- Maximize throughput
- Maximize reliability
- Minimize cost
- 16-bit Total Length field indicates the packet's total length
- 16-bit Identification value aids in dividing the data stream into packets
- 3-bit Information Flags value indicates if the packet is a fragment or not
- Fragment Offset indicates where the fragment belongs in the sequence of fragments for reassembly purposes if data is a fragment
- 8-bit Time to Live (TTL) identifies the maximum time the packet can remain in the system before being dropped
- Protocol identifies the IP protocol used in the packet's data portion
- Header Checksum sums all 16-bit values in the packet header for a single value
- Source IP Address is the address of the computer or device that sent the IP packet
- Destination IP Address is the address of the computer or device that is to receive the IP packet
- Options can contain a security field and source routing fields
- The Data section that part that end users actually see
- Trailer or footer contains data to indicates the end of the packet; this is optional
Technical Details: The Binary Connection
- Packets sent and received online are encoded into binary (1s and 0s)
- Time to Live (TTL) is an 8-bit value
- In binary, a packet can live between 00000001 and 11111111, from 1 to 255 hops (device transfers)
Packet-Filtering Rules
- "Allow" rules permits a packet to pass
- "Deny" rules cause a packet to be dropped
- Packet filters only examine packet headers
- Common packet filtering rules are:
- Drop all inbound connections except connection requests for configured servers
- Eliminate packets bound for all ports that should not be available to the Internet
- Filter out any ICMP redirect or echo (ping) messages
- Drop all packets that use the IP header source routing feature
- A small-scale, software-only personal firewall should set up an access list with local network computers by name or IP address to allow communication between them
- An easy way to identify computers on the local network is to put them in a trusted zone
- All traffic using a protocol can be blocked on certain ports
- Specific ports or programs can be added to only enable required functionalities
Packet-Filtering Methods
- Stateless packet filtering reviews packet header content
- It allows or drops packets based on whether a connection has been established between an external and internal host
- Stateful packet filtering maintains a record of a connection's state and can make informed decisions
- Packet filtering uses contents of the data part of a packet and the header to make decisions
Stateless Packet Filtering
- Stateless packet filters are useful for blocking all traffic from a subnet or network
- Filtering on IP header criteria compares header data to a rule base and forwards it if a rule is matched
- Acknowledgement (ACK) flag:
- Indicates a receiving computer has received the packets that were sent
- Can be used to determine connection status
- Filtering can also be based on Destination IP address
- Which enables external hosts to connect to public DMZ servers, but not internal LAN hosts.
- The IP Protocol ID field for filtering is the Internet Group Management Protocol (IGMP).
- That enables a computer to identify its multicast
- Filtering by TCP or UDP port number helps filter a wide variety of information and is known as port or protocol filtering
- Internet Control Message Protocol (ICMP) is a general management protocol
- Used to diagnose communication problems and communicate certain status information
- Firewalls or packet filters must be able type, and based on message, whether an ICMP packet should pass or not
- TCP or UDP port number appears in fragments numbered 0
- Firewalls should reassemble fragmented packets to make the admit/drop decision
- Firewalls can be set to allow packets with the ACK bit set to 1 for only the specified ports and direction
- Suspicious inbound packets can be filtered that arrive at the firewall from an external network but contains an IP address that is inside the network
- firewalls can be set to send alert message
- Many default rules applies to all protocols and ports
Stateful Packet Filtering
- Stateful filters do everything a stateless filter can
- It can maintain a record of connect state
- Powerful enterprise firewalls do stateful packet filtering
- Current connections are listed in a state table
- Stateful packet filtering inspects only header information with no verification of content.
- It may allow traffic bound for well-known ports while blocking other ports
Filtering Based on Packet Content
- Some traffic uses packets that are difficult to filter reliably
- Stateful inspection examines contents of packets and headers
- Proxy gateway directs data to the correct application
- Specialty firewalls look at the body of e-mail messages or Web pages for offensive content
Setting Specific Packet Filter Rules
- Establish filter rules to control traffic to resources
- Block potentially harmful packets
- Pass packets that contain legitimate traffic
Best Practice Firewall Rules
- Ensure firewalls are not directly accessible from a public network
- Simple Mail Transport Protocol (SMTP) data should pass through a firewall, but be routed to a well-configured SMTP gateway
- Deny all Internet Control Message Protocol (ICMP) data
- Block Telnet access to all internal servers from public networks
- HTTP traffic needs to be prevented from reaching internal networks, proxy access or DMZ architecture needs to be implemented
- All firewall rules should be tested before placing them into production use.
Rules That Cover Multiple Variations
- Packet-filter rules should account for all possible ports and variations within a protocol
- Rules created and modified as a result of trial and error
- Firewalls and two routers are typical of used LAN, blocking potentially harmful packets from getting to the internal LAN
- Rules allow Web, FTP, and email
Rules for ICMP Packets
- ICMP packets are easily forged and used to redirect other communications
- Packet Internet Groper (a ping) determines if a host is unreachable
- Need to establish specific ICMP commands
- Rules to send and receive needed ICMP packets
- Blocking those that open internal hosts to intruders
Rules That Enable Web Access
- Standard HTTP traffic on TCP Port 80 and Secure HTTP (HTTPS) traffic on TCP Port 443 can be covered via rules
- Rules for Internet-accessible Web server are described in Table 5-4
Rules That Enable DNS
- Users must be able to resolve FQDNs
- DNS enables use of UDP Port 53 or TCP Port 53 for attempts to connection
- Rules enable external clients to access computers in own network using same TCP and UDP ports; as described in table 5-5
Technical Details: DNS
- DNS has structure for organizing Internet names associated with IP addresses
- Facilitates easy remembrance of site locations for HTTP, FTP, and other services
- DNS Works through a set of servers
- Root servers store the base address
- Provides the IP address of the primary name server for the organization registered with that domain name
- Name servers also know the location of any specific devices associated with the tertiary name service
Rules That Enable FTP
- FTP transactions can be either active or passive
- FTP Supports two separate connections:
- TCP Port 21: FTP control port
- TCP 20: FTP data port
- FTP Client can establish a connection with the FTP server at any port above 1023
- With Table 5-6, specify the FTP server IP address
Rules That Enable E-Mail
- Difficult to set up firewalls for e-mail, since a large variety of e-mail protocols exist
- Configuration in Table 5-7 uses POP3 and SMTP for inbound and outbound e-mail
- Assess whether your organization needs to accept incoming e-mail messages and whether users can access external mail services
Summary
- Packets are the basic units of data over a network
- Packet filtering can be done by a variety of hardware devices and software firewalls
- Packet-filtering devices evaluate information in packet headers and compare it to established rules per network usage policy
- Stateless packet filtering is the simplest packet-filtering method by only reviewing the packet header for decisions
- Stateful packet filtering maintains the state of a connection for more sophisticated analysis
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.