Xem mẫu
Firewall Fundamentals and Network Address Translation
© 2012 Cisco and/or its affiliates. All rights reserved. 1
Ethics
• The information security profession has a number of formalized codes:
– International Information Systems Security Certification Consortium, Inc (ISC)2 Code of Ethics
– Computer Ethics Institute (CEI)
– Internet Activities Board (IAB)
– Generally Accepted System Security Principles (GASSP)
© 2012 Cisco and/or its affiliates. All rights reserved. 2
Contents
This chapter teaches firewall concepts, technologies, and design principles.At the end of this chapter, you will be able to do the following:
• Explain the operations of the different types of firewall technologies
• Describe firewall technologies that historically have played, and still play, a role in network access control and security architectures
• Introduce and describe the function and building blocks of Network Address Translation
• List design considerations for firewall deployment
• Describe guidelines for firewall ruleset creation
© 2012 Cisco and/or its affiliates. All rights reserved. 3
Introducing Firewall Technologies
• Afirewall protects network devices from intentional, hostile intrusions that could threaten information assurance (availability, confidentiality, and integrity) or lead to a denial-of-service (DoS) attack.
• Afirewall can protect a hardware device or a software program running on a secure host computer.
• This chapter introduces the firewall technologies that Cisco uses in routers and security appliances.
© 2012 Cisco and/or its affiliates. All rights reserved. 4
Firewall Fundamentals
Afirewall is a pair of mechanisms that perform these two separate functions, which are set by policies:
• One mechanism blocks bad traffic.
• The second mechanism permits good traffic.
Firewall: Enforcing Access Control
© 2012 Cisco and/or its affiliates. All rights reserved. 5
...
- tailieumienphi.vn
nguon tai.lieu . vn