• LOGIN
  • No products in the cart.

Firewall Interview Questions And Answers

What Is Firewall?

A firewall is a hardware or software program mounted to provide security to the private networks linked to the internet.They can be carried out in each hardware and software, or a combination of both. All information coming into or leaving the Intranet passes via the firewall which permits only the information meeting the administrators’ rules to pass through it.

What are the types of firewalls?

  • Packet Filtering Firewall: This kind of Firewall detects packets and block unnecessary packets and makes network traffic release.
  • Screening Router Firewalls: It’s a software base firewall accessible in Router provides only light filtering.
  • Computer-based Firewall : It’s a firewall saved in server with an current Operating System like Windows and UNIX.
  • Hardware base Firewall: Its system like box allows strong security from public network. Mostly used by means of large networks.
  • Proxy Server: Proxy server approves all clients to access Internet with unique access limits. Proxy server has its very own firewall which filters the all packet from web server.

What can’t a firewall protect against?

Firewalls cannot protect against attacks that do not go through the firewall. Many firms that connect to the Internet are very concerned about proprietary facts leaking out of the organization through that route. Unfortunately for those concerned, a magnetic tape can simply as effectively be used to export data. Many companies that are terrified (at a management level) of Internet connections have no coherent policy about how dial-in access by using modems ought to be protected.

What is IP spoofing and how can it be prevented?

IP spoofing is a mechanism used by using attackers to obtain unauthorized access to a system. Here, the intruder sends messages to a pc with an IP address indicating that the message is coming from a relied on host. This is carried out by means of forging the header so it consists of a distinct address and make it appear that the packet was sent through a different machine. Prevention:-

  • Packet filtering: – to enable packets with recognized formats to enter the network
  • Using different routers and firewalls
  • Encrypting the session

What is DNS spoofing?

Assuming the DNS name of another device via both corrupting the name service cache of a victim system, or through compromising a domain name server for a valid domain.

What is a network firewall?

A firewall is a system or group of systems that enforces an access control policy between two networks. The true ability by which this is performed varies widely, however in principle, the firewall can be thought of as a pair of mechanisms: one which exists to block traffic, and the other which exists to allow traffic. Some firewalls place a increased emphasis on blocking traffic, while others emphasize enabling traffic.

Probably the most essential factor to recognize about a firewall is that it implements an access control policy. If you do not have a right thought of what type of access you prefer to permit or to deny, a firewall in reality may not assist you.

It’s additionally necessary to recognize that the firewall’s configuration, because it is a mechanism for enforcing policy, imposes its policy on everything in the back of it. Administrators for firewalls managing the connectivity for a massive number of hosts consequently have a heavy responsibility.

7.What are the fundamental resources in a firewall?

Service Critical Resource

Email

Disk I/O

Netnews Disk I/O

Web Host

OS Socket Performance

IP Routing Host OS Socket Performance

Web Cache

Host OS Socket Performance, Disk I/O

What is the difference between Gateway and Firewall?

A Gateway joins two networks together and a network firewall protects a network against unauthorized incoming or outgoing access. Network firewalls may be hardware devices or software programs.

Will IPSEC make firewalls obsolete?

IPSEC (IP Security) refers to a set of requirements developed by way of the Internet Engineering Task Force (IETF). There are many files that collectively outline what is known as “IPSEC” [4]. IPSEC solves two issues which have plagued the IP protocol suite for years: host-to-host authentication (which will let hosts know that they’re talking to the hosts they assume they are) and encryption (which will prevent attackers from being in a position to watch the traffic going between machines).

What is Defense in Depth?

 The security method whereby every device on the network is secured to the best possible degree. May be used in conjunction with firewalls.

What is the difference between router ACLs and Firewall ACLs?

Fundamental purpose:

Routers are designed to route traffic, not end it.

Firewalls are designed to look at and accept/reject traffic. But the both ACL are do the identical job. Depending upon our requirements we do our ACL configuration on it.

FireWall Training

A trace route command work across the firewall? why?

Trace route is primarily based on ICMP type 30 under Windows and UDP below NIX; trace route packets that would hit the firewall have to be dropped in a similar fashion any echo replay coming from inside the firewall must be limited outbound.

What Is Least Privilege?

Designing operational aspects of a device to function with a minimal quantity of system privilege. This reduces the authorization level at which various actions are carried out and decreases the chance that a system or user with high privileges might also be induced to perform unauthorized activity ensuing in a security breach.

What is synchronization and why is it important?

With respect to multithreading, synchronization is the capability to manage the access of more than one threads to shared resources. Without synchronization, it is viable for one thread to modify a shared object while any other thread is in the process of the usage of or updating that object’s value. This regularly leads to significant errors.

Can you define Packet filtering ?

Packet filtering is the method of passing or blocking packets at a network interface primarily based on source and destination addresses, ports, or protocols. The method is used in conjunction with packet mangling and Network Address Translation (NAT). Packet filtering is frequently part of a firewall program for protecting a local network from undesirable intrusion. The packet filter examines the header of every packet based on a particular set of rules, and on that basis, decides to stop it from passing (called DROP) or permit it to pass by (called ACCEPT).

Can you explain circuit level gateway?

The circuit level gateway firewalls work at the session layer of the OSI model. They monitor TCP handshaking between the packets to decide if a requested session is legitimate. And the data handed through a circuit level gateway, to the internet, seems to have come from the circuit level gateway. So, there is no way for a remote pc or a host to decide the internal private ip addresses of an organization, for example. This approach is also known as Network Address Translation where the private IP addresses originating from the distinctive clients inside the network are all mapped to the public IP address accessible via the web service provider and then sent to the outside world (Internet). This way, the packets are tagged with only the Public IP address (Firewall level) and the internal private IP addresses are no longer exposed to potential intruders.

Can you explain stateful inspection?

Stateful inspection, also known as dynamic packet filtering, is a firewall technology that monitors the state of active connections and makes use of this statistics to decide which network packets to permit via the firewall. Stateful inspection has mostly changed an older technology, static packet filtering. In static packet filtering, only the headers of packets are checked — which means that an attacker can once in a while get data via the firewall certainly via indicating “reply” in the header. Stateful inspection, on the other hand, analyzes packets down to the application layer. By recording session data such as IP addresses and port numbers, a dynamic packet filter can enforce a a lot tighter security posture than a static packet filter can.

What is Application level Gateway?

An application layer gateway (ALG) is a feature on ScreenOS gateways that enables the gateway to parse application layer payloads and take decisions on them. Although there are other ScreenOS features, such as deep inspection, in which the gateway inspects traffic at the application layer, ALGs are typically employed to support applications that use the application layer payload to communicate the dynamic Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) ports on which the applications open data connections. Such applications include the File Transfer Protocol (FTP) and various IP telephony protocols. The dynamic TCP, UDP, or other ports that are opened by the ScreenOS gateway to permit these data or secondary channels are referred to as pinholes, and are active strictly for the duration of activity on the data channel.

Can you explain the concept of demilitarized zone?

The concept of the DMZ, like many other network security concepts, used to be borrowed from military terminology. Geopolitically, a demilitarized zone (DMZ) is an location that runs between two territories that are opposed to one another or two opposing forces’ battle lines.

The DMZ likewise offers a buffer area that separates an internal network from the frequently hostile territory of the Internet. Sometimes it is known as a “screened subnet” or a “perimeter network,” however the cause remains the same.

What is bastion host?

A bastion host is a specialised computer that is intentionally exposed on a public network. From a secured network perspective, it is the only node exposed to the outdoor world and is consequently very susceptible to attack. It is placed outside the firewall in single firewall systems or, if a device has two firewalls, it is regularly placed between the two firewalls or on the public aspect of a demilitarized zone (DMZ).

The bastion host techniques and filters all incoming traffic and prevents malicious traffic from coming into the network, appearing a lot like a gateway. The most common examples of bastion hosts are mail, domain name system, Web and File Transfer Protocol (FTP) servers. Firewalls and routers can also turn out to be bastion hosts

What are types of firewall architecture?

Screening Router Architecture

Dual-Homed Host Architecture

Screened Host Architecture

Screened Subnet Architecture

Explain about Screening Router Architecture?

In this structure, a firewall consists of nothing greater than a screening router. Host on the Local Network and hosts on the Internet are allowed to communicate directly. The communication is limited to the kind that is allowed through a screening router. The security of the entire Local Network relies upon on the right ACL of the router and on the number of services permitted.

Explain screened subnet architecture?

   A screened subnet (also known as a “triple-homed firewall”) is a network structure that makes use of a single firewall with three network interfaces.

The cause of the screened subnet architecture is to isolate the DMZ and its publicly-accessible sources from the intranet, thereby focusing external attention and any feasible attack on that subnet. The architecture also separates the intranet and DMZ networks, making it more difficult to attack the intranet itself. When a properly configured firewall is mixed with the use of private IP addresses on one or each of these subnets, an attack will become a lot more difficult.

Explain the screened host architecture?

   Screened host architecture is a lower-security, lower-cost alternative to the screened subnet architecture mentioned in the previous sections. The screened host architecture is regularly used via very small web sites that are going through huge cost constraints.

In a screened host architecture, there is no perimeter net, no interior router, and often no bastion host per se. (Obviously, there is a host that the outside world talks to, however, this host is frequently no longer dedicated completely to that task.) What you have rather is a single router (most analogous to the exterior router in the dual-router screened subnet architecture) and a services host that gives Internet services to internal and external clients (and is regularly used for different tasks as well).

The router is there to protect and manage access to the internal net, and the services host is there to engage with the outside world, a lot like a bastion host. We name it a services host, instead of a bastion host, due to the fact it is frequently fulfilling many other roles. For example, it is possibly the mail server, Usenet news server, and DNS server for the site; it may possibly be a file server, print server, and so on, as well; it might even be the only machine the web site has.

Explain dual home architecture?

In this structure a firewall consists of Dual-Homed Host machine (machine having two or extra IP addresses every for particular physical port). One port of the machine connects to the Local Network and the different port/ports connect to the Internet. The IP datagram forwarding is turned off on the Dual-Homed Host machine, therefore there is no direct TCP/IP connection between the Local Network and the Internet.

You allow communication between Local Network and the Internet in either of two ways:

Users on the Local Network are given accounts on the Dual-Homed Host machine. In order to use Internet services the have to rlogin on the Dual-Homed Host machine. The fact that you enable accounts on the machine weakens its security significantly (it now relies upon on every user and consumer that have access to it, more correctly it depends on the users’ capability to select “strong” passwords). Once the outsider succeeds to rlogin on the Dual-Homed Host machine he/she can get entry to the entire Local Network.

Dual-Homed Host runs proxy program for every service you prefer to permit, for this reason there is no extra need for users to rlogin to the machine in order to access the Internet. They can communicate by using proxy software.

The only host that can be accessed and consequently attacked from the Internet is the Dual-Homed host machine. Thus it need to have a lot greater level of security than the ordinary host on the Local Network. The excessive logging and auditing of device state have to be performed, only secure software and necessary software installed and so on. This architecture is a lot more secure than the Screening Router Architecture. But nevertheless as soon as the Dual-Homed Host is subverted the whole Local Network is vulnerable to attack.

FireWall Online Training

What is Routing Protocols?

Routing protocols are used to help in reaching the fundamental cause of routing. They specify the routers the technique to communicate with each other. They assist the routers choose the best possible route between nodes. There are distinctive sorts of protocols such as link-state routing protocols, path vector protocols and distance vector routing protocols. These protocols stop routing loops to form or break if formed already. They assist to decide preferred routes from a sequence of hop costs.

What is Routing table?

A routing table stores the routes of the a number of nodes in a network. Nodes can be any electronic system linked to the network. The table is generally saved in a router or the network computer as a database or file. This data helps to found the best possible path. The routing table has at least three fields: the destination network id, cost of the path, next hop or address to send the packet.

What are some common attacks, and how can I protect my system against them?

Each site is a little different from every other in terms of what attacks are likely to be used against it. Some recurring themes do arise, though.

May 14, 2020
GoLogica Technologies Private Limited  © 2019. All rights reserved.