Chapter 03 - Fundamentals of Firewall 1
Chapter 03 - Fundamentals of Firewall 1
FUNDAMENTALS of
Firewall (1)
Packet Accepted or
Reject Based on firewall
configuration
Packet filter
Application gateway
Circuit level gateway
Stateful packet inspection
Disadvantages:
No authentication
Does not track packets
Does not look at the packet data just the header
Disadvantages:
Requires more system resources
Due to time it takes to authenticate user
Once connection is made, packets are not checked
Not the most secure firewall
Need to purchase special device / software to
control authentication process.
Not the most secure firewall
Product examples:
Teros provides an AG for web servers
The Firebox from Watchguard Technologies
User 1
192.XX.XX.XX
User 2 192.XX.XX.XX
User 3
192.XX.XX.XX
Traffic from the Internet can only reach the bastion host;
they cannot reach the internal network.
The main problem with the single homed bastion host is that
if the packet filter route gets compromised then the entire
network will be compromised.
© 2006 by Pearson Education, Chapter 3 Fundamentals of Firewalls 26
Inc.
Dual homed bastion host
Bastion host has two network cards- one is used for internal
connection and the second one is used for connection with
the router.
In this case, even if, the router got compromised, the internal
network will remain unaffected since it is in the separate
network zone.
Internal NIC
External NIC
Router-Based Firewall
Using a Firewall:
Configure it properly
Consider a consultant for initial setup
Review logs periodically for anomalies
Utilize statistics for baseline performance