Firewall Facts

Ace your homework & exams now with Quizwiz!

Network-based firewall configuration

-Most SOHO routers and access points include a firewall to protect your private network -By default, most SOHO routers allow all traffic on the private network to pass through the firewall. Responses to those outbound requests are typically also allowed. For example, a user browsing a Web site will receive the Web pages back from the Internet server. -You can configure individual port rules or exceptions to allow or deny specific ports. A common approach is to block all ports, then open only the necessary ports -Configuring port triggering to allow the firewall to dynamically open incoming ports based on outgoing traffic from a specific private IP address and port -Configure port forwarding to allow incoming traffic directed to a specific port to be allowed through the firewall and sent to a specific device on the private network

Post Office Protocol (POP3)

110 TCP

Internet Message Access Protocol (IMAP4)

143 TCP and UDP

File Transfer Protocol (FTP)

20 TCP 21 TCP

Secure Shell (SSH)

22 TCP and UDP

Telnet

23 TCP

Simple Mail Transfer Protocol (SMTP)

25 TCP

Remote Desktop Protocol (RDP)

3389 TCP

HTTP with Secure Sockets Layer (SSL or HTTPS)

443 TCP and UDP

Domain Name System (DNS)

53 UDP

HyperText Transfer Protocol (HTTP)

80 TCP

Firewall

A device or software running on a device that inspects network traffic and allows or blocks traffic based on a set of rules

Exceptions

By default, the firewall allows all outgoing Web traffic and responses but blocks all incoming traffic. You can configure exceptions to allows incoming traffic. In Windows Firewall, you can configure two exception types: (Next two terms are the exception types)

Port

Configuring an exception for a port and protocol (either TCP or UDP) keeps the port open all the time. -You must know both the port number and the protocol -Many services require multiple ports, so you must identify all necessary ports and open them -Ports stay open until you remove the exception

Program

Configuring an exception for a program automatically opens the ports required by the application only while the application is running. -You can select from a list know applications or browse and select another application -You do not need to know the port number used; the firewall automatically identifies the ports used by the application when it starts -After the application is stopped, the required ports are closed

access control list (ACL)

Filtering rules that firewalls use to identify allowed and blocked traffic. A rule identifies characteristics of the traffic, such as: -The interface the rule applies to -The direction of traffic (inbound or outbound) -Packet info such as the source or destination IP address or port number -The action to take when the traffic matches the filter criteria

network-based firewall

Inspects traffic as it flows between networks. For example, you can install a network based firewall on the edge of your private network that connects to the Internet to protect against attacks from Internet hosts. A network firewall is created by installing two interfaces on a central network device: one interface connects to the private network, and the other interface connects to the external network

host-based firewall

Inspects traffic received by a host. Use a host-based firewall to protect against attacks when there is no network-based firewall, such as when you connect to the Internet from a public location.


Related study sets

The Nervous System Chapter 10 A&P

View Set

Retirement Planning and Employee Benefits - Social Security

View Set

CCNAv2 - Module 14, Routing Concepts

View Set

Chapter 11: Health Problems of the Infant

View Set

Neurosensory and Musculoskeletal ATI

View Set

OB Module 11: Women's Health and Social Issues

View Set

Chapter 4: Internal Analysis: Resources, Capabilities, and Core Competencies

View Set