Understanding Firewalls Quiz

StrikingSatellite avatar
StrikingSatellite
·
·
Download

Start Quiz

Study Flashcards

18 Questions

How many levels of defense does the 'screened subnet firewall configuration' offer?

Two levels

What is a key feature of a firewall based on the text?

Imposes restrictions on network services

In the 'screened subnet firewall configuration', what entities are separated from the internal network?

Information servers and modems

Which of the following is NOT a limitation of a firewall as discussed in the text?

Can protect against all types of attacks

What does the outside router in the 'screened subnet firewall configuration' advertise to the Internet?

The existence of the screened subnet

What is a key function of packet filters in a firewall system?

Examine each IP packet and permit/deny based on rules

What is the general model for access control discussed in the text?

Access matrix

Which of the following attacks is mentioned as a risk to packet filters in the text?

IP address spoofing

In access control, how can the access matrix be decomposed?

By rows as access control lists

What is a common limitation of packet filters in terms of examining IP packets?

They do not consider the context of the IP packet

What role does the reference monitor play in computer systems according to the text?

A controlling element in both hardware and software

What is a countermeasure mentioned in the text to address IP address spoofing attacks?

Blocking source routed packets

What security feature do stateful packet filters provide that traditional packet filters do not?

Examine each IP packet in context

Which type of firewall requires separate proxies for each service?

Application Level Gateway

What is the primary function of a Circuit Level Gateway?

Limit which TCP connections are allowed

In the 'screened host firewall, single-homed bastion configuration', what forces an intruder to generally penetrate two separate systems to compromise internal security?

Application-level filtering

What is a key characteristic of a Bastion Host?

Runs circuit/application level gateways and provides externally accessible services

Why does the 'screened host firewall, dual-homed bastion configuration' physically separate the external and internal networks?

To ensure security by making it necessary to compromise two separate systems

Study Notes

Firewall Configurations

  • The "screened subnet firewall configuration" is the most secure, with two packet-filtering routers, one between the bastion host and the Internet, and the other between the bastion host and the internal network, creating an isolated subnetwork.

  • This configuration offers several advantages, including:

    • Two levels of defense to thwart intruders
    • The outside router advertises only the existence of the screened subnet to the Internet, making the internal network invisible
    • The inside router advertises only the existence of the screened subnet to the internal network, preventing systems on the inside network from constructing direct routes to the Internet

Access Control

  • A system identifies a user and determines what resources they can access
  • The general model is that of an access matrix, with:
    • Subject: active entity (user, process)
    • Object: passive entity (file or resource)
    • Access right: way object can be accessed
  • The access matrix can be decomposed into:
    • Columns: access control lists
    • Rows: capability tickets

Reference Monitor

  • The reference monitor is a controlling element in the hardware and operating system of a computer

Firewalls

  • A firewall is a choke point of control and monitoring that interconnects networks with differing trust levels
  • Firewalls impose restrictions on network services, allowing only authorized traffic
  • Firewalls can:
    • Audit and control access
    • Implement alarms for abnormal behavior
    • Implement VPNs using IPSec
  • Firewalls must be immune to penetration

Firewall Limitations

  • Firewalls cannot protect from attacks bypassing them (e.g., utility modems, trusted organizations, trusted services)
  • Firewalls cannot protect against internal threats
  • Firewalls cannot protect against the transfer of all virus-infected programs or files due to the huge range of operating systems and file types

Packet Filters

  • Packet filters are the simplest and fastest firewall component
  • They examine each IP packet and permit or deny according to rules, restricting access to services (ports)
  • Possible default policies can be set

Attacks on Packet Filters

  • IP address spoofing: fake source address to be trusted
    • Countermeasure: add filters on the router to block source routing attacks
  • Tiny fragment attacks: split header info. over several tiny packets
    • Countermeasure: discard or reassemble before checking

Stateful Packet Filters

  • Stateful packet filters examine each IP packet in context, keeping track of client-server sessions and checking each packet's validity
  • They are better able to detect bogus packets out of context

Application Level Gateway (or Proxy)

  • Application level gateways have application-specific gateways/proxies
  • They have full access to the protocol and validate user requests as legal
  • They can log/audit traffic at the application level
  • Separate proxies are needed for each service

Circuit Level Gateway

  • Circuit level gateways relay two TCP connections, imposing security by limiting which connections are allowed
  • Once created, they usually relay traffic without examining contents
  • They are typically used when trust internal users, allowing general outbound connections

Bastion Host

  • A bastion host is a highly secure host system that runs circuit/Application level gateways or provides externally accessible services
  • It is potentially exposed to "hostile" elements, hence it is secured to withstand this
  • It has a hardened O/S, essential services, and extra authentication, and may support two or more net connections
  • It may be trusted to enforce policy of trusted separation between these net connections

Test your knowledge on firewalls with this quiz covering the definition, functions, and features of firewalls. Learn about choke points of control, monitoring, restrictions on network services, authorized traffic, and more.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Firewalls and Network Security Quiz
5 questions
Firewalls and Network Security
16 questions
Use Quizgecko on...
Browser
Browser