Security Chapter 5
Security Chapter 5
3. Application layer gateways (ALGs) — The ALG firewall forces all client applications on
workstations protected by the firewall to use the firewall itself as a gateway. The firewall then
handles packets for each protocol differently.
Every client program needs to be set up to use a proxy, and not all can do so. Also, the
firewall must have an ALG for each type of protocol that can be used.
The distinct advantage is obviously that application proxy firewalls are considered to
be very secure.
4. Network address translation (NAT) — Firewalls using NAT and/or port address translation
(PAT) completely hide the network protected by the firewall by translating the outgoing packets
to use different addresses.
In most implementations there is a single, public IP address used for the entire network.
• IPS technologies are differentiated from IDS technologies by one characteristic: IPS
technologies can respond to a detected threat by attempting to prevent it from succeeding.
• They use several response techniques, which can be divided into the following groups:
The IPS stops the attack itself.
The IPS changes the security environment.
The IPS changes the attack’s content.
Common Detection Methodologies
• IDPS technologies use many methodologies to detect incidents. signature-based, anomaly-
based, and stateful protocol analysis.
• Most IDPS technologies use multiple detection methodologies, either separately or integrated,
to provide more broad and accurate detection.
5.4 Virtual Private network
• VPN stands for Virtual Private Network (VPN), that allows a user to connect to a private
network over the Internet securely and privately.
• VPN creates an encrypted connection that is called VPN tunnel, and all Internet traffic and
communication is passed through this secure tunnel.
• Virtual Private Network (VPN) is basically of 2 types:
1. Remote Access VPN: Remote Access VPN permits a user to connect to a private network and
access all its services and resources remotely.
• The connection between the user and the private network occurs through the Internet and
the connection is secure and private.
• Remote Access VPN is useful for home users and business users both.
2. Site to Site VPN: A Site-to-Site VPN is also called as Router-to-Router VPN and is commonly
used in the large companies. Companies or organizations, with branch offices in different
locations, use Site-to-site VPN to connect the network of one office location to the network at
another office location.
• Intranet based VPN: When several offices of the same company are connected using Site-to-
Site VPN type, it is called as Intranet based VPN.
• Extranet based VPN: When companies use Site-to-site VPN type to connect to the office of
another company, it is called as Extranet based VPN.
n ks !
Th a
an y
M