0% found this document useful (0 votes)
26 views14 pages

Unit 3 Info Sec

This document discusses security technologies like firewalls and VPNs. It describes different types of firewalls categorized by processing mode, generation, and structure. Firewalls can use packet filtering, application gateways, circuit gateways, or be hybrids. They filter network traffic based on IP addresses, ports, protocols, and direction. Packet filtering firewalls can be static, dynamic, or use stateful inspection. Application gateways act as a proxy for network requests. The best firewall architecture depends on an organization's objectives, abilities, and budget.

Uploaded by

ersourabh13
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views14 pages

Unit 3 Info Sec

This document discusses security technologies like firewalls and VPNs. It describes different types of firewalls categorized by processing mode, generation, and structure. Firewalls can use packet filtering, application gateways, circuit gateways, or be hybrids. They filter network traffic based on IP addresses, ports, protocols, and direction. Packet filtering firewalls can be static, dynamic, or use stateful inspection. Application gateways act as a proxy for network requests. The best firewall architecture depends on an organization's objectives, abilities, and budget.

Uploaded by

ersourabh13
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Unit 3:

Security Technologies: Firewalls & VPNs

Technical Control & Physical Design

Access Control
Mandatory access controls (MACs) - lattice-based access control Nondiscretionary controls - role-based Controls & task-based controls

Discretionary access controls (DACs)

all access control approaches rely on as the following mechanisms:


Identification Authentication Authorization Accountability

Firewalls
Firewalls can be categorized by processing mode, development era, or structure.

Firewall Processing Modes


packet-filtering firewalls, Application gateways, circuit gateways, MAC layer firewalls, and hybrids.

IP source and destination address Direction (inbound or outbound) Protocol (for firewalls capable of examining the IP protocol layer) Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) source and destination port requests (for firewalls capable of examining the TCP/UPD layer)

There are three subsets of packet-filtering firewalls: static filtering, dynamic filtering, and stateful inspection.

Application Gateways
The application firewall is also known as a proxy server since it runs special software that acts as a proxy for a service request.

Firewalls Categorized by Generation


First generation firewalls are static packet-filtering firewalls Second generation firewalls are application-level firewalls or proxy servers

Third generation firewalls are stateful inspection firewalls,


Fourth generation firewalls, which are also known as dynamic packet-filtering firewalls,

Fifth generation firewalls include the kernel proxy,

Firewalls Categorized by Structure


Commercial-Grade Firewall Appliances Commercial-Grade Firewall Systems Small Office/Home Office (SOHO) Firewall Appliances Residential-Grade Firewall Software

Firewall Architectures
The configuration that works best for a particular organization depends on three factors: The objectives of the network,

the organizations ability to develop and implement the architectures, and


the budget available for the function.

You might also like