Chapter 7 - 03 - Understand Different Types of Firewalls and their Role - 01_ocred.pdf

Full Transcript

Certified Cybersecurity Technician Network Security Controls — Technical Controls Exam 212-82 Module Flow Understand Different Types of Proxy Servers and their Benefits Discuss Security Benefits of Network Segmentation Discuss Fundamentals of VPN and its importance in Network Security Understand Dif...

Certified Cybersecurity Technician Network Security Controls — Technical Controls Exam 212-82 Module Flow Understand Different Types of Proxy Servers and their Benefits Discuss Security Benefits of Network Segmentation Discuss Fundamentals of VPN and its importance in Network Security Understand Different Types of Firewalls and their Role Discuss Other Network Security Controls Understand Different Types of IDS/IPS and their Role Discuss Importance of Load Balancing in Network Security Understand Different Types of Honeypots Antivirus/Anti-malware Software 0© 0 0 Discuss Essential Network Security Protocols Understand Various Copyright© by E L All Rights Reserved. Reproduction is Strictly Prohibited Understand Different Types of Firewalls and their Role This section describes firewall and different types of firewall technologies available. This includes packet filtering, stateful multilayer inspection, circuit-level gateway, application-level gateway, application proxy, network address translation (NAT), virtual private network (VPN), and next generation firewall (NGFW). Module 07 Page 757 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Network Security Controls - Technical Controls What is a Firewall? L3 Q ° Firewall is a software or - hardware, or a s‘“‘""l '""". ’ combination of both, which is generally used to separate a protected Beereiteryedtineacd network from an unprotected public Salnad’ 20202022 ‘ | Allowed Tratfic See——— Internet \ e Trafic s stopped because it S—— P NP Outto Intemet > Firewall Q It monitors and filters the incoming and outgoing traffic of the network and prevents unauthorized access to private networks What s R et A "’A“":‘:"s“::" DR B. —— R Allowed Traffic Firewall is a Firewall? A firewall is a software or hardware, or a combination of both, which is generally used to separate a protected network from an unprotected public network. A firewall is a secure, reliable, and trusted device placed in between private and public networks. It helps in protecting a private network from the users of a different network. It monitors and filters the incoming and outgoing traffic of the network and prevents unauthorized access to private networks. It has a set of rules for tracing the incoming and outgoing network traffic and is also responsible for allowing or denying traffic to pass through. These criteria are the rules and restrictions configured on the firewall and they may vary from one type of firewall to another. Generally, a firewall filters traffic based on the type of traffic, source or destination addresses, protocols, and ports. Module 07 Page 758 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Network Security Controls — Technical Controls Exam 212-82 Secure Private Internet Network Restricted Traffic Traffic is stopped because it does not meet specific criteria Allowed Traffic Out to Internet Firewall Only traffic from internet meeting specified criteriaare allowed to pass through Accessto Specific Resources @ < @ » Unknown Traffic Specified Allowed Traffic STITTIEEITIF TP Firewall Figure 7.42: Working of a firewall Typical use of firewalls: * To protect the private network applications and services on the internal network from the unauthorized traffic and the public network. = To restrict the access of the hosts on the private network and the services of the public network. = To support a network address translation, which helps in using private IP addresses and to share a single internet connection. Module 07 Page 759 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited.