A set of configured pattern matching rules that are applied against the headers of packet traffic as it enters (inbound) or exits (outbound) the port of the device.
Traffic is either allowed (permitted) or filtered (denied) based on these configured rules.
Explicit Allow:
When packet traffic matches the permit statement of a configured ACL rule, it is considered matched and allowed to enter the network.
Explicit Deny:
When packet traffic matches the deny statement of a configured ACL rule, it is considered matched and filtered (discarded).
Implicit Deny:
If packet traffic fails to match configured permit or deny statements of configured ACL rules, the ACL fails closed, discarding all unmatched traffic by default.
Firewall Methodologies
Firewall Generations:
First Generation: Packet Filtering
Second Generation: Stateful Filtering
Third Generation: Application Filtering
NGFW (Next Generation Firewall)
Packet Filtering
Inspects packets between computers.
When a packet does not match the packet filter's set of filtering rules, the packet filter either:
Drops (silently discards) the packet; or
Rejects the packet (discards it and generates an Internet Control Message Protocol notification for the sender).
Operates up to layer 4 (transport layer) of the OSI model. Retains packets in ingress until enough information is available to make a judgment about its state.
Stateful vs Stateless
Stateful:
A stateful communication is one that remembers an exchange between two sources after that communication has ended.
Stateless:
A stateless communication is one that saves no information about the participants of a communication session.
Application-Level Gateway (Application Firewall):
Inspects traffic at the Application Layer. Detects unwanted applications attempting to bypass the firewall using a protocol on an allowed port
Web Application Firewall (WAF):
A specific type of application firewall used to protect servers (and their client sessions) from XSS and SQL injection, among other attacks, during HTTP sessions.
Perimeter Networks
Firewalls often connect three types of networks, categorized by the trust of those networks relative to the organization:
Internal Network
External Network
Demilitarized Zone (DMZ):
Also referred to as a Perimeter Network
The boundary between:
The Customer Edge (CE):
The private, locally managed-and-owned side of a network
The Provider Edge (PE):
The public, usually provider-managed side of a network
List the three most common hardware firewall network configurations:
2-Leg Configuration
A network security configuration where a single hardware firewall is used to protect the organization, as follows:
Internal Network >> Firewall >> Internet Edge (ISP)
3-Leg Configuration
A network security configuration where the DMZ is attached to a separate connection of the company firewall.
This means the firewall has three connections:
One to the company LAN
One to the DMZ
One to the Internet.
Back-to-Back Configuration
A network security configuration where two dedicated hardware firewalls are used to protect the organization, as follows: