SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
1
WWW.Prohackers.in
“The Complete Questionnaires
about Firewall”
By:
-Vishal Kumar
(CEH, CHFI, CISE, MCP)
info@prohackers.in
prorataallotment@hotmail.com
2
WWW.Prohackers.in
 What is a Firewall?
Firewall is a device that is placed between a trusted and an untrusted network. It
deny or permit traffic that enters or leaves network based on pre-configured
policies. Firewalls protect inside networks from unauthorized access by users on an
outside network. A firewall can also protect inside networks from each other for
example by keeping a Management network separate from a user network.
 What is the difference between Gateway and Firewall?
A Gateway joins two networks together and a network firewall protects a network
against unauthorized incoming or outgoing access. Network firewalls may be
hardware devices or software programs.
 Firewalls work at which Layers?
Firewalls work at layer 3, 4 & 7.
 What is the difference between Stateful & Stateless Firewall?
Stateful firewall – A Stateful firewall is aware of the connections that pass
through it. It adds and maintains information about a user’s connections in a state
table, referred to as a connection table. It than uses this connection table to
implement the security policies for users connections. Example of stateful firewall
are PIX, ASA, Checkpoint.
Stateless firewalls – (Packet Filtering) Stateless firewalls on the other hand, does
not look at the state of connections but just at the packets themselves.
 What information does Stateful Firewall Maintains?
Stateful firewall maintains following information in its State table:-
1.Source IP address.
2. Destination IP address.
3. IP protocol like TCP, UDP.
4. IP protocol information such as TCP/UDP Port Numbers, TCP Sequence Numbers,
and TCP Flags.
 How can we allow packets from lower security level to higher security level
(Override Security Levels)?
We use ACLs to allow packets from lower security level to higher security level.
3
WWW.Prohackers.in
 What is the security level of Inside and Outside Interface by default?
Security Level of Inside interface by default is 100. Security Level of Outside
Interface by default is 0.
 Explain DMZ (Demilitarized Zone)?
If we need some network resources such as a Web server or FTP server to be
available to outside users we place these resources on a separate network behind
the firewall called a demilitarized zone (DMZ). The firewall allows limited access to
the DMZ, but because the DMZ only includes the public servers, an attack there
only affects the servers and does not affect the inside network.
 How does a firewall process a packet?
When a packet is received on the ingress interface, Firewall checks if it matches
an existing entry in the connection table. If it does, protocol inspection is carried
out on that packet.
If it does not match an existing connection and the packet is either a TCP-SYN
packet or UDP packet, the packet is subjected to ACL checks. The reason it needs
to be a TCP-SYN packet is because a SYN packet is the first packet in the TCP 3-
way handshake. Any other TCP packet that isn’t part of an existing connection is
likely an attack.
If the packet is allowed by ACLs and is also verified by translation rules, the
packet goes through protocol inspection.
 What are the values for timeout of TCP session, UDP session, ICMP session?
TCP session – 60 minutes
UDP session – 2 minutes
ICMP session – 2 seconds
 Explain TCP Flags?
While troubleshooting TCP connections through the Firewall, the connection flags
shown for each TCP connection provide information about the state of TCP
connections to the Firewall.
 What are the different types of ACL in Firewall?
1.Standard ACL
2.Extended ACL
4
WWW.Prohackers.in
3.Ethertype ACL (Transparent Firewall)
4.Webtype ACL (SSL VPN)
 What is Transparent Firewall?
In Transparent Mode, Firewall acts as a Layer 2 device like a bridge or switch and
forwards Ethernet frames based on destination mac-address.
 What is the need of Transparent Firewall?
If we want to deploy a new firewall into an existing network it can be a complicated
process due to various issues like IP address reconfiguration, network topology
changes, current firewall etc. We can easily insert a transparent firewall in an
existing segment and control traffic between two sides without having to
readdress or reconfigure the devices.
 Explain Ether-Type ACL?
In Transparent mode, unlike TCP/IP traffic for which security levels are used to
permit or deny traffic all non-IP traffic is denied by default. We create Ether-
Type ACL to allow NON-IP traffic. We can control traffic like BPDU, IPX etc. with
Ether-Type ACL.
 What is Policy NAT?
Policy NAT allows you to NAT by specifying both the source and destination
addresses in an extended access list. We can also optionally specify the source and
destination ports. Regular NAT can only consider the source addresses, not the
destination address.
In Static NAT it is called as Static Policy NAT.
In Dynamic NAT it is called as Dynamic Policy NAT.
 Give the order of preference between different types of NAT?
1. Nat exemption.
2. Existing translation in Xlate.
3.Static NAT
– Static Identity NAT
– Static Policy NAT
– Static NAT
5
WWW.Prohackers.in
– Static PAT
4. Dynamic NAT
– NAT Zero
– Dynamic Policy NAT
– Dynamic NAT
– Dynamic PAT
 What is the difference between Auto NAT & Manual NAT?
Auto NAT (Network Object NAT) – It only considers the source address while
performing NAT. So, Auto NAT is only used for Static or Dynamic NAT. Auto NAT
is configured within an object.
Manual NAT (Twice NAT) – Manual NAT considers either only the source address
or the source and destination address while performing NAT. It can be used for
almost all types of NAT like NAT exempt, policy NAT etc.
Unlike Auto NAT that is configured within an object, Manual NAT is configured
directly from the global configuration mode.
 Give NAT Order in terms of Auto NAT & Manual NAT?
NAT is ordered in 3 sections.
Section 1 – Manual NAT
Section 2 – Auto NAT
Section 3 – Manual Nat After-Auto
6
WWW.Prohackers.in
Thanks for reading this presentation
Please give us your feedback at
info@prohackers.in
asttitvakanoujia@hotmail.com
Your feedback is most valuable for us for improving the presentation
You can also suggest the topic on which you want the presentation
Website: www.prohackers.in
FB page: www.facebook.com/theprohackers2017
Join FB Group: www.facebook.com/groups/group.prohackers/
Watch us on: www.youtube.com//channel/UCcyYSi1sh1SmyMlGfB-Vq6A
***Thanks***

More Related Content

PPT
Comparison between-rpc-rmi-and-webservices-son-1228374226080667-8
PPTX
Firewall
PPT
01 Data Mining: Concepts and Techniques, 2nd ed.
PPTX
Local beam search example
PPTX
Big Data Analytics with Hadoop
PPTX
DATA WAREHOUSING
PPTX
Ground Breakers Romania: Oracle Autonomous Database
PPTX
Cisco nexus series
Comparison between-rpc-rmi-and-webservices-son-1228374226080667-8
Firewall
01 Data Mining: Concepts and Techniques, 2nd ed.
Local beam search example
Big Data Analytics with Hadoop
DATA WAREHOUSING
Ground Breakers Romania: Oracle Autonomous Database
Cisco nexus series

What's hot (20)

PPTX
Lecture #01
PPT
Introduction to XML
PPTX
Data mining tools overall
PDF
Introduction to linked data
PPTX
Knowledge representation In Artificial Intelligence
PDF
Proposal to supply, installation and testing of CCTV Camera
PPTX
First order logic
PPTX
Next generation of data scientist
PPTX
directory structure and file system mounting
PPT
Deep Web
PPTX
Chapter 7 - Wireless Network Security.pptx
PPT
Data Mining: Concepts and Techniques — Chapter 2 —
PPTX
Prolog & lisp
PPT
Freenet
PDF
Information Storage and Retrieval : A Case Study
PPTX
Index Structures.pptx
PDF
Big Data Visualization
PPTX
Control Strategies in AI
PPTX
Big Data Tutorial | What Is Big Data | Big Data Hadoop Tutorial For Beginners...
Lecture #01
Introduction to XML
Data mining tools overall
Introduction to linked data
Knowledge representation In Artificial Intelligence
Proposal to supply, installation and testing of CCTV Camera
First order logic
Next generation of data scientist
directory structure and file system mounting
Deep Web
Chapter 7 - Wireless Network Security.pptx
Data Mining: Concepts and Techniques — Chapter 2 —
Prolog & lisp
Freenet
Information Storage and Retrieval : A Case Study
Index Structures.pptx
Big Data Visualization
Control Strategies in AI
Big Data Tutorial | What Is Big Data | Big Data Hadoop Tutorial For Beginners...
Ad

Similar to The Complete Questionnaires About Firewall (20)

PPTX
ASA Firewall Interview- Questions & Answers
DOCX
A firewall is a network security device.
PPTX
PPSX
Firewall & its Services
PPT
Firewall
DOCX
PPTX
Firewall presentation
PPTX
Lec # 13 Firewall.pptx
PPT
Firewall protection
PPT
PPTX
Firewalls by Puneet Bawa
PPSX
SwitchSecurity SwitchSecurity SwitchSecurity SwitchSecurity
PPS
Internetworking With Pix Firewall
PPT
Tech 101: Understanding Firewalls
PPTX
Firewall
DOCX
Firewall configuration
PPTX
Cyber security tutorial2
PDF
Cyber Security Notes Unit 5 for Engineering
PDF
Principles of Information Security 6th Edition Whitman Solutions Manual
ASA Firewall Interview- Questions & Answers
A firewall is a network security device.
Firewall & its Services
Firewall
Firewall presentation
Lec # 13 Firewall.pptx
Firewall protection
Firewalls by Puneet Bawa
SwitchSecurity SwitchSecurity SwitchSecurity SwitchSecurity
Internetworking With Pix Firewall
Tech 101: Understanding Firewalls
Firewall
Firewall configuration
Cyber security tutorial2
Cyber Security Notes Unit 5 for Engineering
Principles of Information Security 6th Edition Whitman Solutions Manual
Ad

More from Vishal Kumar (20)

PDF
Threat Hunting Procedures and Measurement Matrice
PDF
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
PDF
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
PDF
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
PDF
Exploiting Client-Side Vulnerabilities and Establishing a VNC Session
PPTX
Auditing System Password Using L0phtcrack
PPTX
Dumping and Cracking SAM Hashes to Extract Plaintext Passwords
PPTX
Fundamental of Secure Socket Layer (SSL) | Part - 2
PDF
The Fundamental of Electronic Mail (E-mail)
PPTX
Fundamental of Secure Socket Layer (SSl) | Part - 1
PPTX
The Fundamental of Secure Socket Layer (SSL)
PPTX
Hawkeye the Credential Theft Maalware
PPTX
Deep understanding on Cross-Site Scripting and SQL Injection
PPTX
Owasp top 10 security threats
PPTX
Exploiting parameter tempering attack in web application
PPTX
Mirroring web site using ht track
PPTX
Collecting email from the target domain using the harvester
PPTX
Information gathering using windows command line utility
PPTX
Introduction ethical hacking
PPTX
Social engineering
Threat Hunting Procedures and Measurement Matrice
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
Exploiting Client-Side Vulnerabilities and Establishing a VNC Session
Auditing System Password Using L0phtcrack
Dumping and Cracking SAM Hashes to Extract Plaintext Passwords
Fundamental of Secure Socket Layer (SSL) | Part - 2
The Fundamental of Electronic Mail (E-mail)
Fundamental of Secure Socket Layer (SSl) | Part - 1
The Fundamental of Secure Socket Layer (SSL)
Hawkeye the Credential Theft Maalware
Deep understanding on Cross-Site Scripting and SQL Injection
Owasp top 10 security threats
Exploiting parameter tempering attack in web application
Mirroring web site using ht track
Collecting email from the target domain using the harvester
Information gathering using windows command line utility
Introduction ethical hacking
Social engineering

Recently uploaded (20)

PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Pre independence Education in Inndia.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
master seminar digital applications in india
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
VCE English Exam - Section C Student Revision Booklet
human mycosis Human fungal infections are called human mycosis..pptx
PPH.pptx obstetrics and gynecology in nursing
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Complications of Minimal Access Surgery at WLH
Final Presentation General Medicine 03-08-2024.pptx
Microbial disease of the cardiovascular and lymphatic systems
Microbial diseases, their pathogenesis and prophylaxis
Anesthesia in Laparoscopic Surgery in India
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
O7-L3 Supply Chain Operations - ICLT Program
Pre independence Education in Inndia.pdf
01-Introduction-to-Information-Management.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
master seminar digital applications in india
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Renaissance Architecture: A Journey from Faith to Humanism
STATICS OF THE RIGID BODIES Hibbelers.pdf
RMMM.pdf make it easy to upload and study
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
VCE English Exam - Section C Student Revision Booklet

The Complete Questionnaires About Firewall

  • 1. 1 WWW.Prohackers.in “The Complete Questionnaires about Firewall” By: -Vishal Kumar (CEH, CHFI, CISE, MCP) info@prohackers.in prorataallotment@hotmail.com
  • 2. 2 WWW.Prohackers.in  What is a Firewall? Firewall is a device that is placed between a trusted and an untrusted network. It deny or permit traffic that enters or leaves network based on pre-configured policies. Firewalls protect inside networks from unauthorized access by users on an outside network. A firewall can also protect inside networks from each other for example by keeping a Management network separate from a user network.  What is the difference between Gateway and Firewall? A Gateway joins two networks together and a network firewall protects a network against unauthorized incoming or outgoing access. Network firewalls may be hardware devices or software programs.  Firewalls work at which Layers? Firewalls work at layer 3, 4 & 7.  What is the difference between Stateful & Stateless Firewall? Stateful firewall – A Stateful firewall is aware of the connections that pass through it. It adds and maintains information about a user’s connections in a state table, referred to as a connection table. It than uses this connection table to implement the security policies for users connections. Example of stateful firewall are PIX, ASA, Checkpoint. Stateless firewalls – (Packet Filtering) Stateless firewalls on the other hand, does not look at the state of connections but just at the packets themselves.  What information does Stateful Firewall Maintains? Stateful firewall maintains following information in its State table:- 1.Source IP address. 2. Destination IP address. 3. IP protocol like TCP, UDP. 4. IP protocol information such as TCP/UDP Port Numbers, TCP Sequence Numbers, and TCP Flags.  How can we allow packets from lower security level to higher security level (Override Security Levels)? We use ACLs to allow packets from lower security level to higher security level.
  • 3. 3 WWW.Prohackers.in  What is the security level of Inside and Outside Interface by default? Security Level of Inside interface by default is 100. Security Level of Outside Interface by default is 0.  Explain DMZ (Demilitarized Zone)? If we need some network resources such as a Web server or FTP server to be available to outside users we place these resources on a separate network behind the firewall called a demilitarized zone (DMZ). The firewall allows limited access to the DMZ, but because the DMZ only includes the public servers, an attack there only affects the servers and does not affect the inside network.  How does a firewall process a packet? When a packet is received on the ingress interface, Firewall checks if it matches an existing entry in the connection table. If it does, protocol inspection is carried out on that packet. If it does not match an existing connection and the packet is either a TCP-SYN packet or UDP packet, the packet is subjected to ACL checks. The reason it needs to be a TCP-SYN packet is because a SYN packet is the first packet in the TCP 3- way handshake. Any other TCP packet that isn’t part of an existing connection is likely an attack. If the packet is allowed by ACLs and is also verified by translation rules, the packet goes through protocol inspection.  What are the values for timeout of TCP session, UDP session, ICMP session? TCP session – 60 minutes UDP session – 2 minutes ICMP session – 2 seconds  Explain TCP Flags? While troubleshooting TCP connections through the Firewall, the connection flags shown for each TCP connection provide information about the state of TCP connections to the Firewall.  What are the different types of ACL in Firewall? 1.Standard ACL 2.Extended ACL
  • 4. 4 WWW.Prohackers.in 3.Ethertype ACL (Transparent Firewall) 4.Webtype ACL (SSL VPN)  What is Transparent Firewall? In Transparent Mode, Firewall acts as a Layer 2 device like a bridge or switch and forwards Ethernet frames based on destination mac-address.  What is the need of Transparent Firewall? If we want to deploy a new firewall into an existing network it can be a complicated process due to various issues like IP address reconfiguration, network topology changes, current firewall etc. We can easily insert a transparent firewall in an existing segment and control traffic between two sides without having to readdress or reconfigure the devices.  Explain Ether-Type ACL? In Transparent mode, unlike TCP/IP traffic for which security levels are used to permit or deny traffic all non-IP traffic is denied by default. We create Ether- Type ACL to allow NON-IP traffic. We can control traffic like BPDU, IPX etc. with Ether-Type ACL.  What is Policy NAT? Policy NAT allows you to NAT by specifying both the source and destination addresses in an extended access list. We can also optionally specify the source and destination ports. Regular NAT can only consider the source addresses, not the destination address. In Static NAT it is called as Static Policy NAT. In Dynamic NAT it is called as Dynamic Policy NAT.  Give the order of preference between different types of NAT? 1. Nat exemption. 2. Existing translation in Xlate. 3.Static NAT – Static Identity NAT – Static Policy NAT – Static NAT
  • 5. 5 WWW.Prohackers.in – Static PAT 4. Dynamic NAT – NAT Zero – Dynamic Policy NAT – Dynamic NAT – Dynamic PAT  What is the difference between Auto NAT & Manual NAT? Auto NAT (Network Object NAT) – It only considers the source address while performing NAT. So, Auto NAT is only used for Static or Dynamic NAT. Auto NAT is configured within an object. Manual NAT (Twice NAT) – Manual NAT considers either only the source address or the source and destination address while performing NAT. It can be used for almost all types of NAT like NAT exempt, policy NAT etc. Unlike Auto NAT that is configured within an object, Manual NAT is configured directly from the global configuration mode.  Give NAT Order in terms of Auto NAT & Manual NAT? NAT is ordered in 3 sections. Section 1 – Manual NAT Section 2 – Auto NAT Section 3 – Manual Nat After-Auto
  • 6. 6 WWW.Prohackers.in Thanks for reading this presentation Please give us your feedback at info@prohackers.in asttitvakanoujia@hotmail.com Your feedback is most valuable for us for improving the presentation You can also suggest the topic on which you want the presentation Website: www.prohackers.in FB page: www.facebook.com/theprohackers2017 Join FB Group: www.facebook.com/groups/group.prohackers/ Watch us on: www.youtube.com//channel/UCcyYSi1sh1SmyMlGfB-Vq6A ***Thanks***