Learn how to download and install Firewall Builder to manage firewall rules.
- [Instructor] It's not unusual in modern networks…for firewalls to accumulate vast numbers of rules.…Being able to have a way to document and manage these rules…is important for network and security administrators.…Using a tool, such as Firewall Builder, doesn't change…the way in which firewalls operate, but it does provide…a simple way of expressing rules to make it much easier…to see how the rule set operates, and it allows…all firewall rules across the enterprise network…to be accessed from one place.…
Firewall Builder includes a range of Linux…and Cisco firewall platforms, and provides…a validation function to check for invalid rules,…and issues, such as rule shadowing where a rule…will never be executed due to a prior rule.…Part of the pen tester's role is to check firewall rule sets…and determine whether they provide…open pathways to a target network.…Even if the firewall isn't currently being managed…using Firewall Builder, existing rule sets can be imported…to allow validation and review…more effectively than at the command line.…
Released
2/15/2017Note: Learning about ethical hacking for perimeter defenses is part of the Evading IDS, Firewalls, and Honeypots competency from the Certified Ethical Hacker (CEH) body of knowledge.
- Understanding firewalls
- Applying the basics of the Windows Firewall
- Using advanced features in the Windows Firewall
- Reviewing firewall logs
- Understanding Linux iptables
- Setting up an iptables firewall
- Managing rules with Firewall Builder
- Setting up a Cisco PIX firewall
- Creating a secure enclave
- Installing GNS3
- Understanding web application firewalls
- Protecting API services with the WSO2 gateway
- Running the Cowrie honeypot
- Detecting intrusions with Security Onion
Share this video
Embed this video
Video: Managing rules with Firewall Builder