Firewall rulebases often contain hundreds or even thousands of rules, so one of the most important responsibilities of a firewall administrator is to manage that rulebase, paying particular attention to configuration errors. Learn about common firewall configuration errors and proper firewall management techniques.
- [Instructor] Network firewalls play an important role…in an organization's overall security posture.…They protect the parameter of the network,…blocking any traffic…that is not explicitly authorized on that network.…Firewalls keep potential attackers at bay,…limiting the possibility…that attackers will gain unauthorized access…to a protected network.…The basic function of a firewall is actually quite simple,…each time someone outside the protected network…attempts a new connection into the protected network…the firewall consults a list of rules maintained…by the administrator.…
If it finds a rule that matches the description…of the attempted connection…it then follows the action specified by that rule.…If the firewall doesn't have explicit instructions…for the situation it finds itself in…the firewall follows the default Deny principle…and blocks the traffic.…For example, we might have a firewall rule-base…for a simple network that contains these three rules:…allow web traffic to a web server on Port 80,…allow SMTP email traffic to the email server on Port 25,…
Learn about communication and networking best practices, including TCP/IP networking, network security devices, and secure network design and management. Instructor and cybersecurity expert Mike Chapple also includes coverage of converged protocols, network encryption, and wireless networking. You can find Mike's companion study books for this series at the Sybex test prep site and review the complete CISSP Body of Knowledge at https://www.isc2.org/cissp-domains/default.aspx.
- IP addressing
- Switches and routers
- Content distribution networks
- Designing secure networks
- Specialized networking
- Managing secure networks
- Working with virtualized networks like SDNs
- Detecting and preventing network attaches
- Transport encryption
- Wireless networking
- Host security
Skill Level Advanced
CISSP Cert Prep: 2 Asset Securitywith Mike Chapple58m 11s Advanced
1. TCP/IP Networking
2. Network Security Devices
3. Designing Secure Networks
4. Specialized Networking
5. Secure Network Management
6. Virtualized Networks
Port isolation1m 47s
7. Network Attacks
8. Transport Encryption
9. Wireless Networking
10. Host Security
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.