CNS_Questions(unit-7)
CNS_Questions(unit-7)
A:
A firewall is a security system that monitors and controls incoming and outgoing network
traffic based on predefined rules. Its primary purpose is to prevent unauthorized access to or
from a private network, enforcing a barrier between a secure internal network and untrusted
external networks like the Internet.
A:
Packet-filtering firewalls operate at the network layer and filter traffic based on IP addresses,
ports, and protocols.
Example: A rule that blocks all incoming traffic on port 23 (Telnet) to prevent unauthorized
access. It does not inspect the data payload or keep track of connection states.
A:
A:
A DMZ (Demilitarized Zone) is a physical or logical subnetwork that separates an internal
LAN from untrusted networks, usually the Internet.
Uses:
A:
Also known as a proxy firewall, it operates at the application layer. It filters incoming traffic
for specific applications by examining the payload.
Advantages:
A:
A screened subnet uses two firewalls or routers to create a DMZ between the internal and
external networks.
Benefits:
Better segmentation.
Enhanced security for public servers.
Isolates the DMZ from internal systems even if compromised.
A:
A:
A:
A dual-homed host has two network interfaces: one connected to the internal network and the
other to the external network. It acts as a firewall by routing traffic through a secure host.
Advantage: No direct connection between internal and external networks.
10. Q: What are common firewall policies and how are they enforced?
A:
A:
Stateful inspection firewalls track the state of active connections, unlike stateless ones.
They:
A:
This configuration involves:
A:
Typical rule components include:
Source IP address
Destination IP address
Source/destination port
Protocol (TCP/UDP)
Action (Allow/Deny)
Direction (Inbound/Outbound) These determine which traffic is permitted or
blocked.
A:
In this policy, all traffic is blocked by default unless explicitly allowed by a rule. It:
A:
No state awareness.
Can’t inspect application-layer data.
Vulnerable to spoofing.
Difficult to manage large rule sets.
Poor user-level control.
16. Q: Define and differentiate between internal and external firewalls.
A:
External firewall: Sits between internal network and the Internet; filters
inbound/outbound traffic.
Internal firewall: Sits between internal network segments; provides segmentation,
isolates departments, or protects sensitive systems.
A:
Proxy firewalls intercept requests between a client and destination server.
Working:
A:
Modern firewalls integrate Intrusion Detection Systems (IDS) and Intrusion Prevention
Systems (IPS) to:
A:
Firewalls:
Permit or deny VPN tunnel initiation based on IP, port, and protocol.
Inspect and control encrypted VPN traffic (if capable).
Terminate VPN sessions (in some UTM firewalls).
Prevent VPN abuse by applying policies to tunneled data.
20. Q: Explain the concept of a “bastion host” and its importance in a DMZ.
A:
A bastion host is a hardened server that provides specific services to external users (e.g., web
server) while being isolated from the internal network.
Importance:
A:
Network Address Translation:
A:
UTM firewalls combine multiple security functions in one device:
Firewall
Antivirus
Intrusion prevention
VPN
Web filtering Advantages: centralized control, ease of deployment, and cost savings.
A:
Firewalls mitigate DoS by:
Rate-limiting traffic.
Dropping malformed packets.
Blocking IPs with excessive requests.
Integrating with IDS/IPS for real-time detection. They cannot fully stop large-scale
DDoS attacks without external help.
24. Q: Compare host-based and network-based firewalls.
A:
A:
Deep Packet Inspection (DPI) analyzes the actual data part (payload) of packets, not just
headers.
Benefits:
A:
Logging helps in:
27. Q: Explain Zero Trust security and how firewalls fit into this model.
A:
Zero Trust assumes no user or system is inherently trusted. Firewalls:
A:
Example: A company hosts a public web server.
A:
A transparent firewall operates at layer 2, passing traffic like a switch.
Benefits:
A:
Q1. Explain the key differences between packet filtering firewall and
application-level gateway.
Answer:
Packet filtering firewalls are fast and efficient but offer less security, while application-level
gateways provide more detailed inspection and control at the cost of performance.
Answer:
A Stateful Inspection Firewall (also called a dynamic packet filtering firewall) monitors the
state of active connections and makes decisions based on the context of traffic, rather than
individual packets.
Working:
Maintains a state table that tracks each connection (source/destination IP, port,
protocol, state).
Only allows packets that are part of a known active session.
Examines both header information and connection state.
Advantages:
Diagram:
pgsql
CopyEdit
+------------------+
| External Network |
+--------+---------+
|
v
+------------------------+
| Stateful Inspection FW |
| - Tracks connections |
| - Maintains state info |
+------------------------+
|
v
+------------------+
| Internal Network |
+------------------+
Answer:
A bastion host is a highly secured system specifically designed to withstand attacks, often
used in firewall configurations as a key defense point.
Use Case Example: In a screened subnet architecture, a bastion host may serve as a proxy
server between internal users and the Internet, enforcing strict access control and logging.
Answer:
Security
Architecture Interfaces Description
Level
Single-homed Simple host with firewall software connected to
1 Low
Bastion internal or external network
Dual-homed Host with two NICs; separates internal and
2 Medium
Bastion external networks
Includes a DMZ with a perimeter network,
Screened Subnet 3+ High
internal firewall, and bastion host
csharp
CopyEdit
Internet
|
[Perimeter Router]
|
[DMZ with Bastion Host]
|
[Internal Firewall]
|
Internal Network
The screened subnet offers the best protection, allowing limited access to public services
while isolating the internal network.
Answer:
A DMZ is a buffer zone between the internal network and the external (Internet) that hosts
public-facing services (web, DNS, mail servers) while isolating internal resources.
Security Benefits:
External users can access DMZ services without direct access to the internal network.
Even if DMZ servers are compromised, internal network remains protected.
Allows segmented monitoring and intrusion detection.
less
CopyEdit
Internet
|
[Edge Router]
|
+--------------+
| Firewall |
+--------------+
/ \
[DMZ] [Internal Network]
Web, Mail, Confidential Data,
DNS Servers HR, Finance Systems