Please enable JavaScript.
Coggle requires JavaScript to display documents.
FIREWALL - Coggle Diagram
FIREWALL
What is Firewall?
A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules.
-
-
Firewall limitation
-
it cannot stop social engineering attacks or an unauthorized user intentionally using their access for unwanted purposes
-
-
-
a) Host-based (server and personal) firewall
- is basically firewall software running on a PC or file server. When running on a personal PC, this commonly is called a personal firewall. This typically is used to enhance your security solution or to provide additional protection to your desktop.
- A PC or server with firewall software running on it.
advantages
Protection Against Firewall Failure
- Adding another firewall of different design is helpful in case the primary firewall fails, because most likely the attack or problem that causes the primary firewall failure will not affect the host-based firewall similarly. Multiple firewalls do not offer increased protection against attacks directed at vulnerabilities in applications or operating systems.
Simplicity
- Configuring a host-based firewall is usually far simpler than configuring a perimeter firewall, because the host usually requires support for just a few protocols in order to function. Simplicity makes verification of the rule set simpler as well. (Complexity is the enemy of security.)
Protection Against a Wider Number of Threats
- The host-based firewall can protect against threats originating from within a corporate network, and can help mitigate the risks of badly configured software on a host.
Specificity
- A host-based firewall can be tuned to support a single set of applications and to block everything else. Perimeter firewalls are usually configured with a rule set designed to support many applications, and consequentially are much more likely to have exploitable weaknesses.
disadvantages
require specific configurations
- It is time consuming to configure host-based firewalls on many different servers. In some cases, it may not be practical to provide individualized configurations for every host.
c) Hybrid firewall
A hybrid firewall may consist of a pocket filtering combined with an application proxy firewall, or a circuit gateway combined with an application proxy firewall.
A combination of packet firewall and application firewall.
if they in parallel terms so only 1 of them will work.
b) Transparent firewall
- is a Layer 2 application that installs easily into an existing network without modifying the Internet Protocol (IP) address. The transparent firewall is not a routed hop but instead acts as a bridge by inspecting and moving network frames between interfaces.
- can be seen as a “stealth firewall” that supports outside and inside interfaces. With a transparent firewall, security equipment is connected to the same network on internal and external ports, with a separate virtual local-area network (VLAN) for each interface.
- filters IP traffic between a pair of bridged interfaces.
advantages
1) can deploy without modifying the existing network.
- There is no need to change your routing scheme, and there is no need to change default gateways on host machines.
Next Generation Firewall
A traditional firewall provides stateful inspection of network traffic. It allows or blocks traffic based on state, port, and protocol, and filters traffic based on administrator defined rules.
A next-generation firewall (NGFW) does this, and so much more. In addition to access control, NGFWs can block modern threats such as advanced malware and application-layer attacks.
-
PACKET FILTERING
Packet filtering firewalls operate inline at junction points where devices such as routers and switches do their work.
However, these firewalls don't route packets; rather they compare each packet received to a set of established criteria, such as the allowed IP addresses, packet type, port number and other aspects of the packet protocol headers.
DISADVANTAGE
Because traffic filtering is based entirely on IP address or port information, packet filtering lacks broader context that informs other types of firewalls
-
-
-
ADVANTAGE
-
-
-
Minimal effect on other resources, network performance and end-user experience
STATEFUL INSPECTION
State-aware devices not only examine each packet, but also keep track of whether or not that packet is part of an established TCP or other network session.
This offers more security than either packet filtering or circuit monitoring alone but exacts a greater toll on network performance.
ADVANTAGES
Monitors the entire session for the state of the connection, while also checking IP addresses and payloads for more thorough security
-
-
-
-
APPLICATION GATEWAY
This kind of device technically a proxy and sometimes referred to as a proxy firewall functions as the only entry point to and exit point from the network.
Application-level gateways filter packets not only according to the service for which they are intended as specified by the destination port but also by other characteristics, such as the HTTP request string.
ADVANTAGES
Examines all communications between outside sources and devices behind the firewall, checking not just address, port and TCP header information, but the content itself before it lets any traffic pass through the proxy
Provides fine-grained security controls that can, for example, allow access to a website but restrict which pages on that site the user can open
-
-