Posts

Showing posts from January, 2023

Azure commands

  Get-NetFirewallProfile | Format-Table Name, Enabled This is a PowerShell command that retrieves information about the firewall profiles on a Windows operating system and formats the output as a table with two columns: "Name" and "Enabled." The "Name" column displays the names of the firewall profiles (e.g. Domain, Public, Private) and the "Enabled" column displays the status of the firewall for each profile (either "True" or "False"). The command "Get-NetFirewallProfile" retrieves the information and "Format-Table" formats the output into a table.

Azure firewall is a stateful or stateless firewall ?

Azure Firewall is a stateful firewall. It keeps track of the state of the connections passing through it, and only allows traffic that is part of an established connection. The firewall uses a combination of network-level rules and application-level rules to control inbound and outbound traffic. When a connection is initiated, Azure Firewall creates a state table entry to track the connection. Incoming traffic that matches an established connection state is allowed through the firewall, while incoming traffic that does not match an established connection state is dropped. This stateful inspection provides an extra layer of security by ensuring that only legitimate traffic that is part of an established connection is allowed through the firewall. It also helps to protect against certain types of attacks, such as spoofing and replay attacks. It's important to note that Azure Firewall uses stateful rules, but it also has capabilities that makes it a next-gen firewall like FQDN filteri...

Azure Firewall

Image
 Introduction.  • Controlling outbound network traffic access is important • Firewall policies help in cutting down unauthorized access • Reduced scope of cyberattack • Recommended way to configure Azure Firewall • Policies work across regions and subscriptions What can be configured  There are three types of rules: DNAT Network Application DNAT rules DNAT rules allow or deny inbound traffic through the firewall public IP address(es). You can use a DNAT rule when you want a public IP address to be translated into a private IP address. The Azure Firewall public IP addresses can be used to listen to inbound traffic from the Internet, filter the traffic and translate this traffic to internal resources in Azure. Network rules Network rules allow or deny inbound, outbound, and east-west traffic based on the network layer (L3) and transport layer (L4). You can use a network rule when you want to filter traffic based on IP addresses, any ports, and any protocols. Application rul...

TCP/IP Flags

TCP, the Transmission Control Protocol, uses flags to control the flow of data between devices on a network. These flags are included in the header of each TCP segment, and are used to indicate the status of the connection and the type of data being transmitted. The following are the commonly used TCP flags: SYN (Synchronize): Used to initiate a new TCP connection. It is the first step in the three-way handshake process. ACK (Acknowledgment): Indicates that the receiving device has received the data and is acknowledging receipt. FIN (Finish): Indicates that the sender has finished sending data and is closing the connection. RST (Reset): Indicates that the connection is being reset. This can occur if there is an error or if the receiving device is unable to process the data. PSH (Push): Indicates that the data should be pushed to the receiving device immediately, rather than being buffered. URG (Urgent): Indicates that the data being sent is urgent and should be processed immediately. E...

Here are some common network security interview questions and answers:

What is a firewall and how does it protect a network? A firewall is a security device that monitors and controls incoming and outgoing network traffic based on a set of security rules and policies. Firewalls can be hardware-based or software-based and can be placed at the boundary of a network to protect it from unauthorized access, malware, and other cyber threats. What is the difference between a firewall and a router? A router is a device that connects multiple networks and forwards data packets between them, while a firewall is a security device that monitors and controls network traffic. Routers primarily focus on directing network traffic, while firewalls focus on securing that traffic. What is the difference between a software firewall and a hardware firewall? A software firewall is a program that runs on a computer and controls network traffic, while a hardware firewall is a physical device that sits between the network and the internet to control traffic. Hardware firewalls ty...

VMware HCX (Hybrid Cloud Extension) Points

A technology called VMware HCX (Hybrid Cloud Extension) makes it possible to move workloads across various vSphere environments and hybrid clouds.  The VMware HCX (Hybrid Cloud Extension) technology enables workload mobility and hybrid cloud deployments by extending your on-premises data center to the cloud. The following are some essential VMware HCX points:  HCX allows for the seamless migration of workloads between on-premises vSphere environments and VMware Cloud on AWS without the need for re-IP or reconfiguration of the workloads. HCX provides a unified management and orchestration platform for both on-premises and cloud-based vSphere environments, allowing for consistent policies and security across environments. HCX provides a high-speed, low-latency network extension between on-premises and cloud-based environments using the HCX Network Extension Tunnel (HCX NET). HCX enables the use of vSphere features such as vMotion, High Availability (HA), and Distributed Resource...