Why is it important that every firewall on your network have the same security

protocols? 6. What fundamental firewall function was developed first? 7. Why was Network Address Translation originally developed? 8. Why cant hackers attack computers inside a Network Address Translator directly? 9. How do proxies block malformed TCPIP packet attacks? Answers 1. Firewalls are derived from routers.

2. The most important border security measure is to control every crossing.

3. Your effective border security is the lowest common denominator amongst the policies

enforced by your various firewalls. 4. A DMZ is a network segment with a relaxed security policy where public servers are partitioned away from the interior of the network. 5. Its better to deny by default because a new protocol used by a Trojan horse may crop up that you arent aware of that would then have free access to your network if you only blocked known threats. 6. Packet filtering was the original firewall function. 7. NAT was originally developed to conserve public IP addresses.

8. Theres no way to address computers directly since the public address connection has to use

the IP address of the NAT itself.

9. Malformed TCPIP packet attacks are blocked by terminating and regenerating the TCPIP

connection for all protocols that flow through them. Terms to Know • application-layer proxy • border gateway • circuit-layer switch • content blocking • demilitarized zone • firewall • Network Address Translation NAT • packet filter • proxy server • source routing • stateful inspection • stateless packet Filters • transparent • tunneling • Virtual Private Network • virus scanning

Chapter 6: Virtual Private Networks

Overview Virtual Private Networks provide secure remote access to individuals and businesses outside your network. VPNs are a cost-effective way to extend your LAN over the Internet to remote networks and remote client computers. VPNs use the Internet to route LAN traffic from one private network to another by encapsulating and encrypting unrestricted LAN traffic inside a standard TCPIP connection between two VPN-enabled devices. The packets are unreadable by intermediary Internet computers because they are encrypted and they can encapsulate or carry any kind of LAN communications, including file and print access, LAN e-mail, and clientserver database access. Think of a VPN as a private tunnel through the internet between firewalls within which any traffic can be passed securely. Virtual Private Networks A packet stream that is encrypted, encapsulated, and transmitted over a non-secure network like the Internet. Pure VPN systems do not protect your network-they merely transport data. You still need a firewall and other Internet security services to keep your network safe. However, most modern VPN systems are combined with firewalls in a single device. Virtual Private Networking Explained Virtual Private Networks solve the problem of direct Internet access to servers through a combination of the following fundamental components: • IP encapsulation • Cryptographic authentication • Data payload encryption encapsulation The insertion of a complete network layer packet within another network layer packet. The encapsulated protocol may or may not be the same as the encapsulating protocol, and may or may not be encrypted. All three components must exist in order to have a true VPN. Although cryptographic authentication and data payload encryption may seem like the same thing at first, they are actually entirely different functions and may exist independently of each other. For example, Secure Socket Layer SSL performs data payload encryption without cryptographic authentication of the remote user, and the standard Windows logon performs cryptographic authentication without performing data payload encryption. Secure Socket Layer SSL A public key encryption technology that uses certificates to establish encrypted links without exchanging authentication information. SSL is used to provide encryption for public services or services that otherwise do not require identification of the parties involved but where privacy is important. SSL does not perform encapsulation.