2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet456/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   452   453   454   455   456   457   458   459   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Firewalls
Firewalls
are essential tools in managing and controlling network traffic. A firewall is a 
network device used to filter traffic. It is typically deployed between a private network and 
a link to the internet, but it can be deployed between departments within an organization. 
Without firewalls, it would not be possible to prevent malicious traffic from the internet 
from entering into your private network. Firewalls filter traffic based on a defined set of 
rules, also called filters or access control lists. They are basically a set of instructions that 


488
Chapter 11 

Secure Network Architecture and Securing Network Components
are used to distinguish authorized traffic from unauthorized and/or malicious traffic. Only 
authorized traffic is allowed to cross the security barrier provided by the firewall.
Firewalls are useful for blocking or filtering traffic. They are most effective against 
unrequested traffic and attempts to connect from outside the private network and can 
also be used for blocking known malicious data, messages, or packets based on content, 
application, protocol, port, or source address. They are capable of hiding the structure and 
addressing scheme of a private network from the public. Most firewalls offer extensive log-
ging, auditing, and monitoring capabilities as well as alarms and basic intrusion detection 
system (IDS) functions.
Firewalls are typically unable to block viruses or malicious code (i.e., firewalls do not 
typically scan traffic as an antivirus scanner would) transmitted through otherwise autho-
rized communication channels, prevent unauthorized but accidental or intended disclosure 
of information by users, prevent attacks by malicious users already behind the firewall, or 
protect data after it passes out of or into the private network. However, you can add these 
features through special add-in modules or companion products, such as antivirus scanners 
and IDS tools. There are firewall appliances that are preconfigured to perform all (or most) 
of these add-on functions natively.
In addition to logging network traffic activity, firewalls should log several other events 
as well:

A reboot of the firewall

Proxies or dependencies being unable to start or not starting

Proxies or other important services crashing or restarting

Changes to the firewall configuration file

A configuration or system error while the firewall is running
Firewalls are only one part of an overall security solution. With a firewall, many of the 
security mechanisms are concentrated in one place, and thus a firewall can be a single point 
of failure. Firewall failure is most commonly caused by human error and misconfiguration. 
Firewalls provide protection only against traffic that crosses the firewall from one subnet 
to another. They offer no protection against traffic within a subnet (in other words, behind 
the firewall).
There are several basic types of firewalls, including static packet-filtering firewalls, 
application-level gateway firewalls, circuit-level gateway firewalls, and stateful inspection 
firewalls. There are also ways to create hybrid or complex gateway firewalls by combining 
two or more of these firewall types into a single firewall solution. In most cases, having a 
multilevel firewall provides greater control over filtering traffic. Regardless, we’ll cover the 
various firewall types and discuss firewall deployment architectures as well:

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   452   453   454   455   456   457   458   459   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish