Introduction to Firewalls & Basic ASA Configuration
next-generation
A _____ firewall is a hardware or software-based network security system that is able to detect and block sophisticated attacks by enforcing security policies at the application level, as well as at the port and protocol level.
firewall
A _____ is a system or group of systems that manages access between two or more networks, where one network is trusted and the others are less trusted.
forward proxy
A _____ is an Internet-facing proxy used to retrieve from a wide range of sources.
reverse proxy
A _____ is usually an Internet-facing proxy used as a front-end to control and protect access to a server on a private network. It also commonly performs tasks such as load-balancing, authentication, decryption or caching.
stateful, connection
A _____ packet filter firewall maintains state information in a state table, referred to as a _____ table.
application-level proxy
An _____ firewall is a security device that intercepts users' communications. It understands and interprets the commands of the application protocol it is providing proxy services for. It is particularly memory and CPU intensive.
higher, lower
By default, a Cisco ASA allows traffic to flow from a _____ security boundary to a _____ security boundary (including return traffic). Also, all ICMP packets going through the appliance are denied unless specifically permitted.
blank
The default Cisco ASA password is _____.
packet filter
With _____ firewalls, traffic is examined based solely on values found in the packet's header and are implemented by means of statically configured firewall rules.
*do*
You can execute any ASA command regardless of the current configuration mode, so the _____ command is unnecessary unlike in IOS.
q
You can interrupt the output of a *show* command by simply using the '_____' key.
Application proxies/application gateway
_____ firewalls are devices that operate as intermediary agents on behalf of clients that are on a private or protected network.
Context-aware
_____ firewalls provide granular control of applications, comprehensive user identification, and location-based control.
Cut-through Proxy (CTP)
_____ is used to authenticate Telnet, HTTP, and FTP connections.
Sequence Number Randomization (SNR)
_____ is used to secure TCP connections.