You are on page 1of 3

Luis Gutierrez Csc 116-01 Homework 6

Review Question
3. How is an application layer firewall different from a packet-filtering firewall? Why is an application layer firewall sometimes called a proxy server?

acket filtering firewall functions on the ! level and determines whether to allow or deny and packets "ased on the information in their packet heading and if this information violates a rule in the firewall settings. #pplication layer firewalls do the same thing as packet filtering firewalls "ut on the application level and with protocols such as $% & H%% & '(% & etc.
). How is static filtering different from dynamic filtering of packets? Which is perceived to offer improved security?

# dynamic filtering firewall can react to an emergent event and update or create rules to deal with that even& while static filtering firewalls allow entire sets of one type of packet to enter in response to authori*ed re+uests
,. What special function does a cache server perform? Why is this useful for larger organi*ations? # cache server is a proxy server that stores the most recently accesses we"pages in its internal cache. %he proxy server is setup to "e in the -(. or another unsecured area where it is exposed directly to the internet so that the actual we" server can "e placed in a secured area. /0. 1ist the five generations of firewall technology. Which generations are still in common use?

$irst generation firewalls& 'econd generation firewalls& %hird generation firewalls& $ourth generation firewalls& $ifth generation firewalls. (odern firewalls com"ine features from the 2 generations.
/3. What key features point up the superiority of residential3'4H4 firewall appliances over personal computer-"ased firewall software?

'ome '4H43residential firewalls include packet filtering& port filtering& and simple intrusion detection systems& and some can even restrict access to specific (#5 addresses. 6sers may "e a"le to configure port forwarding and ena"le outside users to access specific %5 or 6- ports on specific computers on the protected networks.
/). How do screened host architectures for firewalls differ from screened su"net firewall architectures? Which of these offers more security for the information assets that remain on the trusted network?

'creened host firewalls com"ine the packet filtering router with a separate& dedicated firewall& such as an application proxy server. %his approach allows the router to prescreen packets to minimi*e the network traffic and load on the internal proxy. %he architecture of screened su"net firewall provides a -(.. 'creened su"net firewalls offers more security than screen host firewall

Luis Gutierrez Csc 116-01 Homework 6


/2. What a sacrificial host? What is a "astion host?

'ince "astion host stands as a sole defender on the network perimeter& it is also commonly referred to as the sacrificial host.
/7. What is a -(.? !s this really an appropriate name for the technology& considering the function this type of su"net performs? -(. is a firewall configuration for securing local area network. !n a -(. configuration& most computers on the 1#8 run "ehind a firewall connected to a pu"lic network like the !nternet. 4ne or more computers also run outside the firewall& in the -(.. 90. What is a : 8? Why is it "ecoming more widely used?

# :irtual rivate 8etwork is a private and secure network connection "etween systems that uses the data communication capa"ility of an unsecured and pu"lic network. : 8s are popular since they are simple to set up and maintain. Exercise
/. 6sing the We"& search for software firewalls. ;xamine the various alternatives availa"le and compare their functionality& cost& features& and type of protection. 5reate a weighted ranking according to your own evaluation of the features and specifications of each software package.

Trend Micro Titanium Maximum Security 2014 ZoneAlarm Internet Security Suite 2013 Comodo ire!all "2013#

<)=.== <3=.== $R;;

3. 6sing $igure 7-/2& suppose management wants to create a server farm that is configured to allow a proxy firewall in the -(. to access an internal We" server >rather than a We" server in the -(.?. -o you foresee any technical difficulties in deploying this architecture? What advantages and disadvantages are there to this implementation? %his is a good solution to place the We" servers containing critical data inside the network and use proxy services from a -(. >screened network segment?. %his protects the We" servers themselves from compromise& and places proxies in the -(. to carry re+uests. %his also accomplishes two things@ it allows H%% traffic to reach the We" server& and it prevents non-H%% traffic from reaching the We" server. #dvantages are the 'creens We" server from external attacks and non-We" traffic -isadvantages@ 'lows We" response time& and increases traffic through the internal firewall.

Luis Gutierrez Csc 116-01 Homework 6


5ase 'tudy
/. What +uestions do you think Aelvin should have included on his slide to start the discussion? why there are differenes in opinion on internet architecture? what are the re+uirements to "reak the log Bam in the design issues? how to overcome the short comings in the design? what is the level of security need to "e implemented? how to achieve it? what is the cost of implementation ? 9. !f the +uestions to "e answered were "roken down into two categories& they would "e cost versus maintaining high security while keeping flexi"ility. Which is most important for '1'? %he most important aspect for se+uential la"el and supply company is maintaining high security while keeping the flexi"ility with reasona"le cost

You might also like