CSCI 4541 Lecture Notes - Lecture 10: Network Address Translation, Network Packet, Wireless Lan

133 views5 pages

Document Summary

Inserted between the premises network and the internet to establish a controlled. Can be a single computer system or a set of two or more systems together. Single choke point to impose security and auditing. Insulates the internal systems from external networks. All traffic from inside to outside must pass through firewall. Only authorized traffic as defined by the local security policy will be allowed to pass. The firewall itself is immune to penetration. Techniques used by firewalls to control access and enforce the site"s security policy are: Ex: only certain services are allowed to run on a network. Ex: only certain addresses within a range will be allowed to access certain applications, or visibility in the system. Note: all ports between 0 and 1023 are assigned to well-known services (ssh - 22, https: 443, http: 80, etc). Ex: cap the amount of bandwidth a specific service uses. Defines a single choke point (simplifies security management.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents