1.2 Compare and contrast networking appliances, applications, and fucntions Flashcards
What is a router?
- Routes traffic between IP subnets.
- Routers inside of switches sometimes called “layer 3 switches”.
- Connects diverse network types (LAN, WAN)
What is a Switch?
- Bridging done in hardware;
- Forwards data based on data link address (MAC Address)
- Many ports and features
- Could be a multi-layer switch (includes layer 3 routing functionality)
What is a firewall?
- It filters traffic by TCP/UDP port number (traditional) or application (NGFW)
- Encrypts traffic (VPN between sites)
- Most can be labeled as layer 3 because they sit at ingress/egress of your network.
What is an Intrusion Detection System (IDS)?
Watches network traffic, but only detect and alert admin; will not provide “action” options.
What is an intrusion prevention system (IPS)?
Watches network traffic and will alarm, alert, or stop the malicious attack/action from happening (provide options for mitigation)
What is a load balancer?
- Distributes the load over multiple servers.
- Typically invisible to the end user.
- Found in web server/data base server farms.
- Provides high fault tolerance.
What is a proxy?
- It is a device that sits between the users and the external network.
- It receives the users request and sends the request on their behalf.
What is a Network-attached storage (NAS)?
- File-level access
- Networked appliances that contain one or more storage drives, often arranged into logical, redundant storage containers or RAID.
- Accompanying these devices are purpose-built hard disk drives.
- Connect to a shared storage device across the network.
What is a Storage Area Network (SAN)?
- Block-level access (change only the blocks of data that need it; not the whole file).
- Is solely dedicated to storage traffic, ensuring high-speed data transfer between servers and storage
- Looks and feels like a local storage device.
- More efficient at reading/writing files
What is an Access Point (AP)?
NOT a wireless router; it is a bridge that extends the wired network onto the wireless network; OSI Layer 2 device.
What is a controller?
- A hardware device or software program that manages or directs the flow of data between two entities
- They can be cards, microchips, or separate hardware devices.
What is a Wireless LAN Controller?
It is a centralized management of access points that allows you to deploy new access points, complete performance and security monitoring, configure and deploy changes to all sites, report on access point use.
What is a content delivery network (CDN)?
- It is designed to get data efficiently from one centralized point to an end user
- Geographically distributed caching servers (duplicates the data and users get it from local server).
What is a Virtual Private Network (VPN)?
- The ability to secure private data traversing a public network (encrypted communication on an insecure medium).
- Typically requires encryption/decryption access device that is often integrated into the firewall.
What is Quality of Service (QoS)?
- “Traffic shaping” or “packet shaping” to provide a higher level of service.
- Ability to control bandwidth usage or data rates.
- Allows you to set important application to have higher priorities than other apps.
What is Time to Live (TLL)?
- It is a way to give a system/service/application a timer on when to end/stop
- Wait until traversing a number hops, or wait until a certain amount of time elapses, then STOP (or DROP).
- Will utilize the DIG command to review TTL information (nslookup has been deprecated)
What layer is a router located at?
Layer 3
What layer does a switch operate at?
Layer 2 - Data Link Layer
- Layer 3 if it has routing capabilities built within hardware.
What types of actions make a load balancer properly function?
- TCP offload (Protocol overhead)
- SSL Offload (encryption/decryption)
- Caching (fast response)
- Prioritization (QoS)
What are some benefits for using a proxy?
- Caching information
- Access control
- URL filtering
- Content scanning
What are some examples where TTL could be used?
- Drop a packet caught in a loop.
- Clear a cache.
What is the difference for TTL in routing and for DNS lookup?
How it is viewed. Routing will utilize the counting back method and DNS lookup is counting the number of hops to the final destination.
What is concentrator?
- It is an encryption/decryption device that is often integrated into the firewall.
- Central connection point for all users accessing a VPN.