Professional Documents
Culture Documents
Firewalls (Gatekeepers) !
IP address spoofing
fake source address to be trusted
add filters on router to block
source routing attacks
attacker sets a route other than default
block source routed packets
tiny fragment attacks
split header info over several tiny packets
either discard or reassemble before check
Introduction
What is a Firewall?
a choke point
Types of Hosting
Bastion Host
(machines solely hosting firewalls)
Host-Based Firewalls
(on machines hosting servers)
Personal Firewalls
(on machines of individual users)
Personal Firewalls
Distributed
Firewalls
(3 regions: External
DMZ, Internal DMZ, and
Internal protected
network with VPN)
Summary
have considered:
firewalls