What is another common name for a firewall box or a system placed directly between a trusted network and an untrusted one?

Firewalls

Dr.Errin W. Fulp, in Managing Information Security (Second Edition), 2014

2 Network Firewalls

Network firewalls (see checklist: “An Agenda For Action For Network Firewalls”) are a vital component for maintaining a secure environment and are often the first line of defense against attack. Simply stated, a firewall is responsible for controlling access among devices, such as computers, networks, and servers. Therefore the most common deployment is between a secure and an insecure network (for example, between the computers you control and the Internet), as shown in Figure 6.1.

What is another common name for a firewall box or a system placed directly between a trusted network and an untrusted one?

Figure 6.1. Example network consisting of an internal network (which is to be secured) and an external network (not trusted). The firewall controls access between these two networks, allowing and denying packets according to a security policy.

An Agenda for Action for Network Firewalls

The following checklist lists the major tasks for network firewalls (check all tasks completed):

_____1.

The use of network address translation (NAT) should be considered a form of routing, not a type of firewall.

_____2.

Organizations should only permit outbound traffic that uses the source IP addresses in use by the organization.

_____3.

Compliance checking is only useful in a firewall when it can block communication that can be harmful to protected systems.

_____4.

When choosing the type of firewall to deploy, it is important to decide whether the firewall needs to act as an application proxy.

_____5.

Management of personal firewalls should be centralized to help efficiently create, distribute, and enforce policies for all users and groups.

_____6.

In general, a firewall should fit into a current network’s layout. However, an organization might change its network architecture at the same time as it deploys a firewall as part of an overall security upgrade.

_____7.

Different common network architectures lead to very different choices for where to place a firewall, so an organization should assess which architecture works best for its security goals.

_____8.

If an edge firewall has a DMZ, consider which outward-facing services should be run from the DMZ and which should remain on the inside network.

_____9.

Do not rely on NATs to provide the benefits of firewalls.

_____10.

In some environments, putting one firewall behind another may lead to a desired security goal, but in general such multiple layers of firewalls can be troublesome.

_____11.

An organization’s firewall policy should be based on a comprehensive risk analysis.

_____12.

Firewall policies should be based on blocking all inbound and outbound traffic, with exceptions made for desired traffic.

_____13.

Policies should take into account the source and destination of the traffic in addition to the content.

_____14.

Many types of IPv4 traffic, such as that with invalid or private addresses, should be blocked by default.

_____15.

Organizations should have policies for handling incoming and outgoing IPv6 traffic.

_____16.

An organization should determine which applications may send traffic into or out of its network and make firewall policies to block traffic for other applications.

However, in response to the richer services provided over modern networks (such as multimedia and encrypted connections), the role of the firewall has grown over time. Advanced firewalls may also perform Network Address Translation (NAT), which allows multiple computers to share a limited number of network addresses (explained later in this chapter). Firewalls may provide service differentiation, giving certain traffic priority to ensure that data is received in a timely fashion. Voice over IP (VoIP) is one type of application that needs differentiation to ensure proper operation. This idea is discussed several times in this chapter, since the use of multimedia services will only continue to increase. Assuming that email and VoIP packets arrive at the firewall at the same time, VoIP packets should be processed first because the application is more susceptible to delays.

Firewalls may also inspect the contents (the data) of packets. This can be done to filter other packets (learn new connections), block packets that contain offensive information, and/or block intrusion attempts. Using the mail analogy again, in this case you open letters and determine what to accept based on what is inside. For example, you unfortunately have to accept bills, but you can deny credit-card solicitations.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124166882000064

Firewalls

Dr.Errin W. Fulp, in Computer and Information Security Handbook, 2009

1. Network Firewalls

Network firewalls are a vital component for maintaining a secure environment and are often the first line of defense against attack. Simply stated, a firewall is responsible for controlling access among devices, such as computers, networks, and servers. Therefore the most common deployment is between a secure and an insecure network (for example, between the computers you control and the Internet), as shown in Figure 21.1. This chapter refers to the secure network as the internal network; the insecure network is the external network.

What is another common name for a firewall box or a system placed directly between a trusted network and an untrusted one?

Figure 21.1. Example network consisting of an internal network (which is to be secured) and an external network (not trusted). The firewall controls access between these two networks, allowing and denying packets according to a security policy.

The purpose of the firewall and its location is to have network connections traverse the firewall, which can then stop any unauthorized packets. A simple firewall will filter packets based on IP addresses and ports. A useful analogy is filtering your postal mail based only on the information on the envelope. You typically accept any letter addressed to you and return any letter addressed to someone else. This act of filtering is essentially the same for firewalls.

However, in response to the richer services provided over modern networks (such as multimedia and encrypted connections), the role of the firewall has grown over time. Advanced firewalls may also perform Network Address Translation (NAT), which allows multiple computers to share a limited number of network addresses (explained later in this chapter). Firewalls may provide service differentiation, giving certain traffic priority to ensure that data is received in a timely fashion. Voice over IP (VoIP) is one type of application that needs differentiation to ensure proper operation. This idea is discussed several times in this chapter, since the use of multimedia services will only continue to increase. Assuming that email and VoIP packets arrive at the firewall at the same time, VoIP packets should be processed first because the application is more susceptible to delays.

Firewalls may also inspect the contents (the data) of packets. This can be done to filter other packets (learn new connections), block packets that contain offensive information, and/or block intrusion attempts. Using the mail analogy again, in this case you open letters and determine what to accept based on what is inside. For example, you unfortunately have to accept bills, but you can deny credit-card solicitations.

The remainder of this chapter provides an overview of firewall policies, designs, features, and configurations. Of course, technology is always changing, and network firewalls are no exception. However, the intent of this chapter is to describe aspects of network firewalls that tend to endure over time.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780123743541000212

Your Home Network

Denny Cherry, in The Basics of Digital Privacy, 2014

Network firewalls

Network firewalls are used to ensure that no one is able to connect to the home router. The router will have a variety of management services running on it such as the website that is used to configure the router among other services. Because the router is connected to the public Internet, we don’t want anyone being able to connect to the router and make any changes on it from the public Internet. Because of that, the router should be configured with the firewall on the router preventing any sort of network access to the router itself, which will typically be configured by the manufacturer of the router before the router is sold. Without having the firewall in place, an attacker could attempt to break into the router, and if they were successful, they would then be able to reconfigure the router to allow themselves access to one or more of the computers or devices on the home network.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128000113000035

Firewalls

Errin W. Fulp, in Computer and Information Security Handbook (Third Edition), 2013

22 Summary

Network firewalls are a key component of providing a secure environment. These systems are responsible for controlling access between two networks, which is done by applying a security policy to arriving packets. The policy describes which packets should be accepted and which should be dropped. The firewall inspects the packet header and/or the payload (data portion).

There are several different types of firewalls, each briefly described in this chapter. Firewalls can be categorized based on what they inspect (packet filter, stateful, or application), their implementation (hardware or software), or their location (host or network). Combinations of the categories are possible, and each type has specific advantages and disadvantages.

Placement of the firewall with respect to servers and internal computers is key to the way these systems will be protected. Often servers that are externally available, such as Web servers, will be located away from other internal computers. This is often accomplished by placing these servers in a DMZ. A different security policy is applied to these computers so the access between computers in the DMZ and the internal network is limited.

Improving the performance of the firewall can be achieved by minimizing the rules in the policy (primarily for software firewalls). Moving more popular rules near the beginning of the policy can also reduce the number of rules comparisons that are required. However, the order of certain rules must be maintained (any rules that can match the same packet).

Parallel firewalls can provide greater performance improvements. These systems consist of a load balancer and an array of firewalls, where all the firewalls in the array are identical. When a packet arrives at the system, it is sent to one of the firewalls in the array. The load balancer maintains short packet queues, which can provide greater system bandwidth and possibly a lower latency.

Regardless of the firewall implementation, placement, or design, deployment requires constant vigilance. Developing the appropriate policy (set of rules) requires a detailed understanding of the network topology and the necessary services. If either of these items change (and they certainly will), that will require updating the policy. Finally, it is important to remember that a firewall is not a complete security solution but is a key part of a security solution.

Finally, let us move on to the real interactive part of this chapter: review questions/exercises, hands-on projects, case projects, and optional team case project. The answers and/or solutions by chapter can be found in the Online Instructor's Solutions Manual.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128038437000740

Security

Soumitra Sengupta, in Practical Guide to Clinical Computing Systems (Second Edition), 2015

2.3.1 Network Level Controls

Network firewalls implement limited connectivity between an internal network and the Internet and networks of other partner organizations, permitting only the necessary communication and protecting against network probing and reconnaissance by external agents.

Network Intrusion Detection and Prevention Systems (IDPS) passively monitor network traffic, detect malicious activities, and, if activity is detected, create alerts and take active steps to eliminate the threat by either denying the malicious traffic, or logically removing the malicious computer from the network. IDPS can be signature based where network communication contents match a known pattern or signature of a known threat or attack.

A threat sometimes exploits a vulnerability that is yet to be identified or corrected by the manufacturer and a signature may not exist as yet. Such a threat is called a zero-day threat (or attack). IDPS can also be behavior based where network communication patterns are monitored against their usual, normal behavior. An aberration in behavior pattern may indicate malicious activity, typically exhibited by zero-day attacks.

Network access authentication implements a sign-on before a computer is permitted to logically join the internal network. It is more commonly used for wireless networks.

Virtual private networks implement an authenticated, encrypted, and limited communication from an external untrusted computer or network to an internal network, and are often used to connect from home and remote computers.

Network access control implements network access authentication as well as dynamic vulnerability scanning and detection when a computer joins a network, and if the joining computer is found to be vulnerable, then the computer is placed in a separate, quarantine network permitting only the remediation of the vulnerabilities such as downloading patches, implementing anti-virus software, etc.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124202177000055

Securing the Network

Denny Cherry, Thomas Larock, in Securing SQL Server, 2011

Server Firewalls

In addition to the network firewalls described within this chapter, the firewall on the Windows Operating System should also be enabled and configured to allow just the needed network connections. By installing and configuring the Windows firewall to block all unexpected network connections, if any unauthorized software is installed on the server that software won’t be able to be contacted. Ideally, any outbound network connections that aren’t expected should also be blocked so that any software installed can’t phone home. While legitimate software phoning home isn’t necessarily a problem, unauthorized software shouldn’t be allowed to phone home as it may be passing confidential data to the controller or the server may be part of a bot-net.

FAQ

Phoning Home

Phoning home is a phrase that is used to describe when an application makes network requests back to the person or company that has created the software. Both legitimate and illegitimate software can be configured to phone home, and sometimes for legitimate reasons. Legitimate software such as Windows will phone home in order to check for updates or to upload crash information looking for updates that could fix the problem.

Illegitimate software will usually try and phone home often, especially if the application is designed to be part of a bot-net. It would need to contact a computer under the control of the person who controls the bot-net. Once the application has made contact to the control computer, it would be able to receive commands to do anything that the bot-net operator wanted, including capturing data and uploading it to the bot-net operator.

Windows Firewall Inbound Rules

The most secure Windows firewall configuration option is to allow the needed inbound network connections such as TCP (Transmission Control Protocal) connections to the SQL (Structured Query Language) Server, UDP (User Datagram Protocol) connections to the SQL Server Browser, and SMB (Server Message Block) connections to the server’s network file shares. Most SQL Servers wouldn’t be running any other network software that would need to be contacted from outside the SQL Server's Windows Operating System. It is also usually a good idea to allow ICMP (Internet Control Message Protocol) packets through the firewall so that things like ping will work against the server, as this is a good way to see if the server has completed rebooting.

Windows Firewall Outbound Rules

A few outbound firewall rules must be in place for the operating system that is running the SQL Server to function correctly. These include:

DNS lookups to Active Directory DNS servers

Full access to Active Directory domain controllers (Not all port access is needed, but Active Directory requires a wide range of ports to be opened depending on the services running on each domain controller. These ports are specified in Table 1.2.)

Table 1.2. The TCP and UDP Ports Used for Active Directory Authentication

ApplicationProtocolPort Range
Active Directory 2003 and below TCP 1025–5000
Active Directory 2008 and up TCP 49152–65535
Active Directory with 2003 and 2008 domain controllers TCP 1025–5000 and 49152–65535
LDAP TCP and UDP 389
LDAP (SSL) TCP 636
Global Catalog TCP 3268
Kerberos TCP and UDP 88
DNS TCP and UDP 53
SMB over IP TCP 445
WINS UDP 137
WINS Replication TCP and UDP 42
DHCP UDP 67
SMB Network Shares TCP 445
Active Directory Web Services TCP 9389

Web access to the server running WSUS (Windows Server Update Service) or other patching servers

Network access to storage array if needed

Network file share access to company file servers (for installing software)

Access to other database servers on the company network as needed

Not all the ports shown in Table 1.2 will need to be allowed from every SQL Server to every domain controller. The ports that do need to be opened will depend on the domain configuration and the roles that the SQL Server will be performing. For example, if an SQL Server is also functioning as a domain controller (which is not recommended), then more ports will need to be opened in order to allow for Active Directory replication and authentication.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597496254100010

Firewalls

Dr.Errin W. Fulp, in Computer and Information Security Handbook (Second Edition), 2013

2 Contents

1.

Introduction

2.

Network Firewalls

3.

Firewall Security Policies

Rule-Match Policies

4.

A Simple Mathematical Model for Policies, Rules, and Packets

5.

First-Match Firewall Policy Anomalies

6.

Policy Optimization

Policy Reordering

Combining Rules

Default Accept or Deny?

7.

Firewall Types

Packet Filter

Stateful Packet Firewalls

Application Layer Firewalls

Nation-State Backed

8.

Host and Network Firewalls

9.

Software and Hardware Firewall Implementations

10.

Choosing the Correct Firewall

11.

Firewall Placement and Network Topology

Demilitarized Zones

Perimeter Networks

Two-Router Configuration

Dual-Homed Host

Network Configuration Summary

12.

Firewall Installation and Configuration

13.

Supporting Outgoing Services through Firewall Configuration

Forms of State

Payload Inspection

14.

Secure External Services Provisioning

15.

Network Firewalls for Voice and Video Applications

Packet Filtering H.323

16.

Firewalls and Important Administrative Service

17.

Protocols

Routing Protocols

Internet Control Message Protocol

Network Time Protocol

Central Log File Management

Dynamic Host Configuration Protocol

18.

Internal IP Services Protection

19.

Firewall Remote Access Configuration

20.

Load Balancing And Firewall Arrays

Load Balancing in Real Life

How to Balance the Load

Advantages and Disadvantages of Load Balancing

21.

Highly Available Firewalls

Load Balancer Operation

Interconnection of Load Balancers and Firewalls

22.

Firewall Management

23.

Summary

24.

Chapter Review Questions/Exercises

True/False

Multiple Choice

Exercise

Hands-On Projects

Case Projects

Optional Team Case Project

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780123943972001069

Securing the Network

Denny Cherry, in Securing SQL Server (Second Edition), 2013

Server Firewalls

In addition to the network firewalls described within this chapter, the firewall on the Windows Operating System should also be enabled and configured to allow just the needed network connections. Depending on the version of the Windows Operating System that is installed, the default state of the firewall will depend. On Windows Server 2003 the firewall is in a state which allows all network traffic to be passed from the server to the network and from the network to the server. On Windows Server 2008 and higher the firewall is configured by default to allow almost no data to be transferred from the computer to the network or from the network to the computer. By installing and configuring the Windows firewall to block all unexpected network connections, if any unauthorized software is installed on the server that software won’t be able to be contacted. Ideally, any outbound network connections that aren’t expected should also be blocked so that any software installed can’t phone home. While legitimate software phoning home isn’t necessarily a problem, unauthorized software shouldn’t be allowed to phone home as it may be passing confidential data to the controller or the server may be part of a bot-net.

FAQ

Phoning Home

Phoning home is a phrase that is used to describe when an application makes network requests back to the person or company that has created the software. Both legitimate and illegitimate software can be configured to phone home, and sometimes for legitimate reasons. Legitimate software such as Windows will phone home in order to check for updates or to upload crash information looking for updates that could fix the problem.

Illegitimate software will usually try and phone home often, especially if the application is designed to be part of a bot-net. It would need to contact a computer under the control of the person who controls the bot-net. Once the application has made contact to the control computer, it would be able to receive commands to do anything that the bot-net operator wanted, including capturing data and uploading it to the bot-net operator.

Windows Firewall Inbound Rules

The most secure Windows firewall configuration option is to allow the needed inbound network connections such as TCP (Transmission Control Protocol) connections to the SQL (Structured Query Language) Server, UDP (User Datagram Protocol) connections to the SQL Server Browser, and SMB (Server Message Block) connections to the server’s network file shares. Most SQL Servers wouldn’t be running any other network software that would need to be contacted from outside the SQL Server’s Windows Operating System. It is also usually a good idea to allow ICMP (Internet Control Message Protocol) packets through the firewall so that things like ping will work against the server, as this is a good way to see if the server has completed rebooting.

Windows Firewall Outbound Rules

A few outbound firewall rules must be in place for the operating system that is running the SQL Server to function correctly. These include:

DNS (Domain Name System) lookups to Active Directory DNS servers.

Full access to Active Directory domain controllers. (Not all port access is needed, but Active Directory requires a wide range of ports to be opened depending on the services running on each domain controller. These ports are specified in Table 1.2.)

Table 1.2. The TCP and UDP Ports Used for Active Directory Authentication

ApplicationProtocolPort Range
Active Directory 2003 and below TCP 1025–5000
Active Directory 2008 and up TCP 49152–65535
Active Directory with 2003 and 2008 domain controllers TCP 1025–5000 and 49152–65535
LDAP TCP and UDP 389
LDAP (SSL) TCP 636
Global catalog TCP 3268
Kerberos TCP and UDP 88
DNS TCP and UDP 53
SMB over IP TCP 445
WINS UDP 137
WINS replication TCP and UDP 42
DHCP UDP 67
SMB network shares TCP 445
Active Directory Web services TCP 9389

Web access to the server running WSUS (Windows Server Update Service) or other patching servers.

Network access to storage array if needed.

Network file share access to company file servers (for installing software).

Access to other database servers on the company network as needed.

Not all the ports shown in Table 1.2 will need to be allowed from every SQL Server to every domain controller. The ports that do need to be opened will depend on the domain configuration and the roles that the SQL Server will be performing. For example, if an SQL Server is also functioning as a domain controller (which is not recommended), then more ports will need to be opened in order to allow for Active Directory replication and authentication.

Special Requirements for Clustering

One of the most annoying things about Microsoft SQL Server comes when you have SQL Server configured in a Windows Cluster for high availability. The root cause of this annoyance is that various parts of the SQL Server application run as different EXE files which means that network communication doesn’t always come from the network connection that you think that it will. One of the most notorious parts of the SQL Server database engine to do this database mail feature was introduced in SQL Server 2005. E-mails sent from database mail and sent via a separate process are called databasemail90.exe and not from the actual sqlsrvr.exe process.

Due to this when the SQL Server process starts the database mail process (databasemail90.exe) the SQL Server would need to tell the database mail process which source IP Address to use for communication. However, the SQL Server does not do this so the database mail process doesn’t send it’s mail from the clustered IP Address. It uses the first IP Address on the network stack which has network access, which would be the IP Address of the clustered node and not the virtual IP Address. Because of this, this service as well as other potential service like the SQL Server Integration Services service will need access from the physical servers instead of the virtual IP Address. When configuring the firewall connections between the SQL Server cluster and the outside resources that they need access to this requirements needs to be taken into account.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597499477000010

Establishing Secure Enclaves

Eric Knapp, in Industrial Network Security, 2011

Host Firewalls

A host firewall works just like a network firewall, and acts as an initial filter between the host and any attached network(s). The host firewall will allow or deny inbound traffic based on the firewall’s specific configuration. Typically, host firewalls are session-aware firewalls that allow control over distinct inbound and outbound application sessions.

As with network firewalls, host firewalls should be configured according to the guidelines presented under “Firewall Configuration Guidelines”: starting with Deny All policies, and Allow rules should only be added for the specific ports and services used on that particular asset.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597496452000070

Implementing Security and Access Controls

Eric D. Knapp, Joel Thomas Langill, in Industrial Network Security (Second Edition), 2015

Selecting network security devices

At a minimum, some form of network firewall is usually required. Additional security—provided by IDS, IPS, and a variety of specialized and hybrid devices, such as Unified Threat Management (UTM) devices, Network Whitelisting devices, Application Monitors, and Industrial Protocol Filters—may be desired as well, depending upon the specific situation. Typically, the security level or criticality of the zone (see “Criticality”) dictates the degree of security that is required. Table 10.1 maps the criticality of a zone to required security measures of NERC CIP and NRC CFR 73.54, as well as recommended enhancements to improve security beyond regulatory requirements.

Table 10.1. Perimeter Security Requirements by Criticality

CriticalityRequired SecurityRecommended Enhancements
4 (highest) NRC CFR 73.54: Unidirectional Perimeter, NERC CIP 005: Firewall or IDS or IPS Application layer monitoring, Firewall, IDS and IPS
3 NRC CFR 73.54: Unidirectional Perimeter, NERC CIP 005: Firewall or IDS or IPS Application layer monitoring, Firewall, IDS and IPS
2 NERC CIP 005: Firewall or IDS or IPS Firewall and IDS and IPS
1 NERC CIP 005: Firewall or IDS or IPS Firewall and IPS
0 (lowest) NERC CIP 005: Firewall or IDS or IPS Firewall and IPS

Table 10.1 recommends that both a firewall and an IPS be used at each security perimeter. This is because firewalls and IPS devices serve different functions. Firewalls enforce what types of traffic are allowed to pass through the perimeter by what is called “shallow packet inspection.” Intrusion Prevention Systems on the other hand perform “deep-packet inspection” (DPI) by closely examining the traffic that is allowed through in order to detect “legitimate” traffic with malicious intent—that is, exploit code, malware, and so on—that is transferred over allowed paths. Using both devices together provides two mutual benefits: first, it allows the IPS to perform inspection of the “content” of all traffic allowed in through the firewall; second, the firewall limits the allowed traffic based on the defined parameters of the security zone, freeing the IPS to focus its resources on just that traffic and therefore enabling it to enforce a more comprehensive and robust set of IPS rules.

It is important to understand the distinction between “detection” and “prevention” in the context of intrusion prevention systems. Recall that the most important priorities of industrial networks are availability and performance. In other words, the network cannot tolerate accidental dropping of packets between hosts that are located on levels low within the ISA 95 model (i.e. Levels 1–3). This would occur if the security device generates a “false positive” and mistakenly interprets a valid packet as invalid and blocks it from reaching its destination. However, this may not necessarily be the case between industrial and business zones (i.e. Levels 3 and 4). This is the reason IDS is the preferred security appliance within industrial zones (placed “out-of-band” to network traffic) and IPS is used between industrial and business zones, or between semitrusted DMZs and untrusted business zones (placed “in-line” to all network traffic).

We have also learned that industrial protocols consist of common standards like Modbus and DNP3, but also depend heavily on vendor-specific proprietary protocols that have been optimized for a particular system. It is not common for major IT network security suppliers like Cisco, HP ProCurve, Juniper, Checkpoint, and others to offer solutions for industrial networks. So what options exist to implement advanced DPI analysis with industrial protocols? The answer is a new class of industrial security appliances that are industrial protocol aware and possess the capability to analyze and inspect both open and proprietary protocols. Companies supplying these devices include Tofino/Belden, Secure Crossing, ScadaFence, SilentDefense, and others. At the time this book was written, many other startups were in progress, and readers are encouraged to research the market thoroughly in order to fully understand all of the available options. In addition, OEM-branded solutions or recommended third-party solutions may be available from your control system vendors. Once an appropriate solution is selected and deployed, DPI can then be used to analyze specific industrial protocol functions. Figure 10.3 illustrates the increased security capability of firewalls, IDS/IPS devices, and application session monitoring systems.

What is another common name for a firewall box or a system placed directly between a trusted network and an untrusted one?

Figure 10.3. Relative capabilities of security devices to detect threats using DPI.

In the most critical areas, application-layer session monitoring provides a valuable and necessary level of assurance, as it is able to detect low-level protocol anomalies (such as a base64-encoded application stream inside of an HTTP layer 4 80/tcp session, used by many APTs and botnets) and application policy violations (such as an unauthorized attempt to write a new configuration to a PLC). However, unless monitoring very simple application protocols where the desired contents are distinctly packaged within a single packet or frame, the application session must be reassembled prior to monitoring as illustrated in Figure 10.4.

What is another common name for a firewall box or a system placed directly between a trusted network and an untrusted one?

Figure 10.4. Application session inspection vs. deep packet inspection.

The most stringent network security device may be the data diode, also referred to as a unidirectional gateway. A data diode is, very simply, a one-way network connection—often a physically restricted connection that uses only one fiber-optic strand from a transmit/receive pair. By only using TX optics on the source side, it is physically impossible for any digital communications to occur in a highly sensitive network area containing control system devices, while supervisory data may be allowed to communicate out of that highly secure zone into the SCADA DMZ or beyond. In certain instances, such as for the storage of highly sensitive documents, the diode may be reversed, such that information can be sent into a secure zone that is then physically prevented from communicating that information back outside of the zone. During this “flip” phase, the previous communication flow should be terminated to disable any ability for two-way communication to occur at any point in time through the gateway.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124201149000101

What is a firewall called?

A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.

What is firewall mention 2 names of firewall?

Five types of firewall include the following: packet filtering firewall. circuit-level gateway. application-level gateway (aka proxy firewall)

What are the 2 main types of firewall?

The most common firewall types based on methods of operation are: Packet-filtering firewalls. Proxy firewalls.

What is a firewall placed between?

In terms of computer security, a firewall is a piece of software. This software monitors the network traffic between the inside and outside. The firewall is placed between the network that is to be protected (trusted) and the outside network (less trusted) aka WAN or Internet.