Please enable JavaScript.
Coggle requires JavaScript to display documents.
8.5.5 (3) (Packet Filtering Firewalls (disadvantage (if a single packet…
8.5.5 (3)
-
Firewall Issues
• A false sense of security may exist if management feels that no further security checks and controls are needed on the internal network
(i.e., the majority of incidents are caused by insiders, who are not controlled by firewalls).
-
-
-
• Monitoring activities may not occur on a regular basis (i.e., log settings not appropriately applied and reviewed)
-
• Most firewalls operate at the network layer; therefore, they do not stop any application-based or input-based attacks.
Examples of such attacks include SQL injection and buffer-overflow attacks. Newer-generation firewalls are able to inspect traffic at the application layer and stop some of these attacks.
Application Firewall Systems
Both application firewall systems employ the concept of bastion hosting in that they handle all incoming requests from the Internet to the corporate network, (bastion-group that defends the principal)
-
Types
-
application-level and
could be an appliance or sit atop hardened (tightly secured) OSs, such as Windows or UNIX. They work at the application level of the OSI model.
application-level gateway firewall is a system that analyzes packets through a set of proxies—one for each service (e.g., HTTP proxy for web traffic, FTP proxy)
-
, application-based firewall systems are set up as "proxy servers" to act on the behalf of someone inside an organization’s private network.
proxy server then sends the information from the Internet server to the computer inside the corporate network.
-
Advantages
provide security for commonly used protocols and generally hide the internal network from outside untrusted networks
-
-
Stateful Inspection Firewalls
A stateful inspection firewall keeps track of the destination IP address of each packet that leaves the organization’s internal network. KAHA JAA RAHI HO?
Whenever the response to a packet is received, its record is referenced to ascertain and ensure that the incoming message is in response to the request that went out from the organization.
done by mapping the source IP address of an incoming packet with the list of destination IP addresses that is maintained and updated
Advantage
control the flow of IP traffic by matching information contained in the headers of connection-oriented or connectionless IP packets at the transport layer,
-
provides a greater degree of efficiency when compared to typical CPU-intensive, full-time application firewall systems’ proxy servers,
disadvantage
they can be relatively complex to administer, compared to the other two types of firewalls.
-
-
-
-
Unlike application gateways, circuit-level gateways monitor TCP data packet handshaking and session fulfillment of firewall rules and policies. A proxy server is a security barrier between internal and external computers, while a circuit-level gateway is a virtual circuit between the proxy server and internal client.
#