Firewalls: General Principles & Configuration (In Linux)
Firewalls: General Principles & Configuration (In Linux)
Firewalls: General Principles & Configuration (In Linux)
Overview
Configuration
IPTables
IPChains
Firewalls that can examine information at more than one layer is more
thorough and effective
A firewall that works with layers 2 and 3 does deal with specific users
A firewall at application layer like an application-proxy gateway firewall
can enforce user authentication as well as logging events to specific users.
Types of Firewalls
Packet Filters
Stateful Inspection Firewalls
Application-proxy Gateway Firewalls
Dedicated proxy servers
Hybrid Firewalls
Network Address Translation (NAT)
Packet Filters
Boundary Router
Boundary Router
Example
Weaknesses
As they don't examine upper-layer data, they cannot prevent attacks that
employ application specific vulnerabilities or functions
Disadvantages
Proxy servers can also accept outbound traffic from internal systems
Three techniques
Sample Table
Hiding NAT
Other Firewalls
DMZ
DMZ