Prestige 662HW Series User’s Guide
Firewalls
11-1
Chapter 11
Firewalls
This chapter gives some background information on firewalls and introduces the Prestige
firewall.
11.1 Firewall Overview
Originally, the term
firewall
referred to a construction technique designed to prevent the spread of fire
from one room to another. The networking term “firewall” is a system or group of systems that
enforces an access-control policy between two networks. It may also be defined as a mechanism used
to protect a trusted network from an untrusted network. Of course, firewalls cannot solve every
security problem. A firewall is
one
of the mechanisms used to establish a network security perimeter
in support of a network security policy. It should never be the
only
mechanism or method employed.
For a firewall to guard effectively, you must design and deploy it appropriately. This requires
integrating the firewall into a broad information-security policy. In addition, specific policies must be
implemented within the firewall itself.
11.2 Types of Firewalls
There are three main types of firewalls:
♦
Packet Filtering Firewalls
♦
Application-level Firewalls
♦
Stateful Inspection Firewalls
11.2.1 Packet Filtering Firewalls
Packet filtering firewalls restrict access based on the source/destination computer network address of a
packet and the type of application.
11.2.2 Application-level Firewalls
Application-level firewalls restrict access by serving as proxies for external servers. Since they use
programs written for specific Internet services, such as HTTP, FTP and telnet, they can evaluate
network packets for valid application-specific data. Application-level gateways have a number of
general advantages over the default mode of permitting application traffic directly to internal hosts:
Information hiding prevents the names of internal systems from being made known via DNS to
outside systems, since the application gateway is the only host whose name must be made known to
outside systems.
Robust authentication and logging pre-authenticates application traffic before it reaches internal hosts
and causes it to be logged more effectively than if it were logged with standard host logging. Filtering
rules at the packet filtering router can be less complex than they would be if the router needed to filter
application traffic and direct it to a number of specific systems. The router need only allow application
traffic destined for the application gateway and reject the rest.
Summary of Contents for Prestige 662HW Series
Page 26: ......
Page 28: ......
Page 36: ......
Page 54: ......
Page 56: ......
Page 64: ......
Page 84: ......
Page 100: ......
Page 116: ......
Page 128: ......
Page 150: ......
Page 154: ......
Page 162: ......
Page 168: ......
Page 194: ......
Page 196: ......
Page 200: ......
Page 208: ......
Page 214: ......
Page 216: ......
Page 230: ......
Page 242: ......
Page 244: ......
Page 252: ......
Page 258: ......
Page 262: ......
Page 266: ......
Page 272: ......
Page 286: ......
Page 290: ......
Page 310: ......
Page 328: ......
Page 352: ......
Page 358: ......
Page 362: ......
Page 374: ......
Page 376: ......
Page 394: ......
Page 398: ......
Page 400: ......
Page 410: ......
Page 444: ......
Page 452: ......