Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Firewall introduction
Day-1
Introduction to network firewall
Firewall is security device (can be software/hardware) system designed to protect
unauthorized access to or from private network. Firewall does it by enforcing access
control policies (ACLs)
All the messages that pass through the firewall are examined and either allowed or
denied, depending on whether they meet the specified traffic classification criteria.
Notes : -
As an analogy, you can think of firewall as security guard at main gate of your society that
ensures only authorized person has access to facility. Based on traffic classification and
inspection criteria, firewalls can be classified as
Jot down few more details about packet filter firewalls including limitations
Jot down few more details about application gateway/proxy firewalls including limitations
Based on traffic flow, deployment mode and traffic processing proxies can be of different types
Forward proxy
A regular caching proxy server is a server which listens on a separate port (e.g. 3128) and the
clients (browsers) are configured to send requests for connectivity to that port.
Reverse proxy
A reverse proxy is totally different in its usage because it is used for the benefit of the web server
rather than its clients
Transparent proxy
Is configured in such a way that it eliminates client side (browser side) configuration. Typically the
proxy server resides on the gateway and intercepts the WWW requests (port 80, 443 etc.) from the
clients
Pen down few limitations for proxy / application gateway
Stateful Inspection examines a packet header, and also the contents of the packet up through the
application layer, to determine more about the packet than just source and destination. Stateful
firewalls
1. Maintain the context about active session and use the state information for packet processing
2. Implement bi-directional policies
3. Uses best of Proxy and Packet filtering features.
4. Allows filter to handle dynamic protocols such as FTP.
Next gen firewall prevents threats in real time embedded across applications,
Checkpoint follows industry standard 3-tier architecture that allows various checkpoint components to
communicate in secure manner. Checkpoint firewall has three components
1. Smart console
2. Security management
3. Security gateway
Smart console
It is a set of GUI applications that allows security administrators to configure and manage the global
security policy for the entire organization.
The Security Management Server contains the global security policy for an organization. This policy
is defined using the Smart Dashboardhowever; the policy is actually saved on the Security
Management Server.
Security gateway
They are nothing but the firewalls you have always known. Security Gateways are installed/located
where the security rules must be applied
Standalone
Distributed deployment
test