Submitted by: Submitted by maperlman
Views: 30
Words: 26837
Pages: 108
Category: Other Topics
Date Submitted: 03/17/2015 09:23 PM
CISS25 Network Security – Firewall
By: Jim Gau
Page 1 / 160
Rev. 20
Revised: September 10, 2014
PIX simulation: http://www.chinaitlab.com/www/experiment/lab10.asp
Topic 1-3: Introduction to Cisco ASA Firewall
Network attacks generally fit into the three categories: 1. Reconnaissance attacks: search Internet, find and describe two reconnaissance tools. 2. Access attacks: list and describe three types of access attacks. 3. DoS attacks: list and describe three kinds of DoS attacks. Firewall and security domains: 1. Firewall system can be a single device or devices providing specific traffic filtering to achieve the desired security control. 2. Security domains are such as DB domain, Web domain, Mail domain, Parner DMZ domain, etc. 3. The concept of protecting network resources by partitioning of network into security domains and implementing boundary firewall filtering. 4. Security domains are separated by physical or logical VLAN, Multi Protocol Label Switching (MPLS) VPNs. 5. Traffic flows through physical or logical domains through firewall. 6. Discuss the design of firewall and security domains and compare the physical and logical separation. Firewall technologies (Research the following firewall technologies): 1. Layer 3 or 4 stateless packet filtering. Cisco router IOS ACLs in router or VLAN ACLs are some examples. 2. Stateful packet filtering with application inspection and control. 3. Application Proxy firewall. PIX and ASA include embedded Operating System (Finesse). The OS is self-contained in the device and resident in ROM and Flash. You cannot accidentally leave an unnecessary service running, since the firewall has all its services turned to only the features appropriate for a security device. PIX/ASA has been tested for ICSA Labs’ firewall certification and ISO’s Common Criteria EAL4 certification. ASA (Adaptive Security Algorithm) is a mechanism to determine if packets should be passed through the firewall. PIX/ASA evaluates packet...