How Broadband Routers and Firewalls Work
Số trang: 2
Loại file: pdf
Dung lượng: 26.70 KB
Lượt xem: 10
Lượt tải: 0
Xem trước 2 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Many broadband routers and firewalls function primarily through the use of Network Address Translation (NAT) to hide the internal systems behind a single external IP address.
Nội dung trích xuất từ tài liệu:
How Broadband Routers and Firewalls WorkHow Broadband Routers and Firewalls WorkMany broadband routers and firewalls function primarily through the use of NetworkAddress Translation (NAT) to hide the internal systems behind a single external IPaddress. These so-called NAT routers or NAT firewalls do an adequate job of hidingresources from casual attack methods, but they do not perform advanced firewallfunctions; therefore, it is really a bit of a misnomer to call them firewalls, at least in thesense that firewalls such as the Cisco Secure PIX Firewall, Microsoft ISA Server, andCheck Point Firewall-1 products are considered firewalls. Rather, many broadbandrouters and firewalls are just NAT-based packet-filtering routers providing a degree ofprivacy, but they typically lack advanced firewall features such as stateful packetinspection (SPI), proxying of data, or deep packet inspection.Figure 5-1 shows the NAT process. Figure 5-1. How NAT Works [View full size image]The steps numbered in Figure 5-1 can be further explained as follows:1. The client initiates a connection to an external host (HostB).2. The broadband router/firewall receives the request and translates the request from the internal IP address to the address of the router/firewalls external interface. The router/firewall keeps track of this translation in a translation table.3. The packets are delivered to the external destination (HostB), which believes that the packets originated from the external IP address of the router/firewall. The external host (HostB) responds accordingly to the external IP address of the router/firewall.4. When the router/firewall receives the response from the external host, it checks its translation table for a matching outbound request.5. If it finds one, the router/firewall repackages the packet and delivers it to the internal host (HostA), which thinks that the response is from the external host (HostB).In addition, most broadband routers/firewalls are designed not to permit any unsolicitedpackets from an external host to be delivered to an internal host.Although this is generally an adequate level of protection for most home environments, itis important to understand that reliance on NAT alone to protect hosts is a false sense ofsecurity because NAT does not guarantee security in and of itself, as noted in RFC 2663Section 9.0. For example, NAT devices are as susceptible to targeted attacks, such asdenial-of-service (DoS) attacks, as non-NAT devices. NAT also provides for no actualfiltering of packets leaving the internal network; instead, it permits all outbound traffic aslong as it can be translated accordingly. Although it is a subtle difference, NAT providesmore privacy than it does security.Therefore, only when used in conjunction with other technologies can NAT serve as aneffective security mechanism. The best broadband routers/firewalls (for example, manyof the Linksys broadband firewalls) include application-level filtering, deep packetinspection, SPI, firewall hardening, and NAT.
Nội dung trích xuất từ tài liệu:
How Broadband Routers and Firewalls WorkHow Broadband Routers and Firewalls WorkMany broadband routers and firewalls function primarily through the use of NetworkAddress Translation (NAT) to hide the internal systems behind a single external IPaddress. These so-called NAT routers or NAT firewalls do an adequate job of hidingresources from casual attack methods, but they do not perform advanced firewallfunctions; therefore, it is really a bit of a misnomer to call them firewalls, at least in thesense that firewalls such as the Cisco Secure PIX Firewall, Microsoft ISA Server, andCheck Point Firewall-1 products are considered firewalls. Rather, many broadbandrouters and firewalls are just NAT-based packet-filtering routers providing a degree ofprivacy, but they typically lack advanced firewall features such as stateful packetinspection (SPI), proxying of data, or deep packet inspection.Figure 5-1 shows the NAT process. Figure 5-1. How NAT Works [View full size image]The steps numbered in Figure 5-1 can be further explained as follows:1. The client initiates a connection to an external host (HostB).2. The broadband router/firewall receives the request and translates the request from the internal IP address to the address of the router/firewalls external interface. The router/firewall keeps track of this translation in a translation table.3. The packets are delivered to the external destination (HostB), which believes that the packets originated from the external IP address of the router/firewall. The external host (HostB) responds accordingly to the external IP address of the router/firewall.4. When the router/firewall receives the response from the external host, it checks its translation table for a matching outbound request.5. If it finds one, the router/firewall repackages the packet and delivers it to the internal host (HostA), which thinks that the response is from the external host (HostB).In addition, most broadband routers/firewalls are designed not to permit any unsolicitedpackets from an external host to be delivered to an internal host.Although this is generally an adequate level of protection for most home environments, itis important to understand that reliance on NAT alone to protect hosts is a false sense ofsecurity because NAT does not guarantee security in and of itself, as noted in RFC 2663Section 9.0. For example, NAT devices are as susceptible to targeted attacks, such asdenial-of-service (DoS) attacks, as non-NAT devices. NAT also provides for no actualfiltering of packets leaving the internal network; instead, it permits all outbound traffic aslong as it can be translated accordingly. Although it is a subtle difference, NAT providesmore privacy than it does security.Therefore, only when used in conjunction with other technologies can NAT serve as aneffective security mechanism. The best broadband routers/firewalls (for example, manyof the Linksys broadband firewalls) include application-level filtering, deep packetinspection, SPI, firewall hardening, and NAT.
Tìm kiếm theo từ khóa liên quan:
công nghệ thông tin an ninh bảo mật fire wall tường lửa Fire wall fundamentals How Broadband Routers and Firewalls WorkTài liệu có liên quan:
-
52 trang 468 1 0
-
Top 10 mẹo 'đơn giản nhưng hữu ích' trong nhiếp ảnh
11 trang 367 0 0 -
96 trang 334 0 0
-
74 trang 329 0 0
-
Đồ án tốt nghiệp: Xây dựng ứng dụng di động android quản lý khách hàng cắt tóc
81 trang 321 0 0 -
Tài liệu dạy học môn Tin học trong chương trình đào tạo trình độ cao đẳng
348 trang 321 1 0 -
Báo cáo thực tập thực tế: Nghiên cứu và xây dựng website bằng Wordpress
24 trang 304 0 0 -
Tài liệu hướng dẫn sử dụng thư điện tử tài nguyên và môi trường
72 trang 303 0 0 -
EBay - Internet và câu chuyện thần kỳ: Phần 1
143 trang 297 0 0 -
64 trang 291 0 0