08.02.2015 Views

Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...

Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...

Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Network Devices 49<br />

Firewall Features<br />

As firewalls have evolved, additional feature sets have been developed for these<br />

devices such as:<br />

■<br />

■<br />

■<br />

■<br />

Encryption mechanisms.<br />

Caching for Web services.<br />

Virtual private network functionality.<br />

Content filtering from applets, scripts, and components.<br />

Demilitiarized Zone<br />

In computer security, the demilitiarized zone (DMZ) is a neutral network segment<br />

where systems accessible to the public Internet are housed, which offers some<br />

basic levels of protection against attacks. The creation of these DMZ segments is<br />

usually done in one of two ways:<br />

■ Layered DMZ implementation The systems are placed between two firewall<br />

devices with different rule sets, which allows systems on the Internet to<br />

connect to the offered services on the DMZ systems, but prevents them from<br />

connecting to the computers on the internal segments of the organization’s<br />

network.<br />

■ Multiple interface firewall implementation This method involves adding a<br />

third interface to the firewall and placing the DMZ systems on that network<br />

segment.<br />

The role of the firewall in each of these scenarios is to manage the traffic between<br />

the network segments. The basic idea is that other systems on the Internet<br />

are allowed to access only the services of the DMZ systems that have been<br />

made public. In this way, systems are exposed only to attacks against the services<br />

that they offer and not to underlying processes that may be running on<br />

them.<br />

Access Control Lists<br />

Access control lists (ACLs) are used to control access to specific resources on a<br />

device or network. An ACL resides on a computer or network device and is a<br />

table with information on which specific rights have been granted. The operating<br />

system or network device uses the ACL to determine whether an allowed or denied<br />

privilege is granted.<br />

Proxy Server (Caching Appliances)<br />

A proxy server is a server that performs a function on behalf of another system,<br />

typically browser-based requests to and from the Internet. The users perform<br />

actions as they normally would but will submit the request to the proxy server.<br />

The proxy server will then transmit the request and receive the results often times<br />

caching these results for later use.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!