2.1 Install and configure network components, both hardware and software-based, to support organizational security. Flashcards

1
Q

Firewall - ACL

A

In general, an access control list (ACL) is a table or data file that specifies whether a user or group has access to a specific resource on a computer or network.

Specifically to Firewall, its access control lists (ACLs) determines what is allowed in (in terms of traffic, data, applications, or whatever other terms for criteria you want to use) and what is left out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firewall - Application-based vs. Network-based

A

Application-based (Host-based)
A host-based firewall monitors traffic going in and out of a single host, such as a server or a workstation. It monitors traffic passing through the NIC and can prevent intrusions into the computer via the NIC. Many operating systems include software-based firewalls used as host-based firewalls. For example, Microsoft has included a host-based firewall on operating systems since Windows XP. Additionally, many third-party host-based firewalls are available.

Network-based
A network-based firewall is usually a dedicated system with additional software installed to monitor, filter, and log traffic. For example, Cisco makes a variety of different network-based firewalls. Many of them are dedicated servers with proprietary firewall software installed. A network-based firewall would have two or more network interface cards (NICs) and all traffic passes through the firewall. The firewall controls traffic going in and out of a network. It does this by filtering traffic based on firewall rules and allows only authorized traffic to pass through it. Most organizations include at least one network-based firewall at the border, between their intranet (or internal network) and the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Firewall - Stateful vs. Stateless

A

Stateless
A packet-filtering firewall, also known as a stateless firewall, can block or allow traffic (known as filtering traffic) based on the source or destination IP address and the source or destination port number

When configuring the packet-filtering firewall, you specify rules that control what type of traffic is allowed to pass through the firewall and what traffic is to be blocked. With packet-filtering firewalls, the rules can filter traffic based on source address, destination address, protocol, and source and destination port address.

Stateful
Packet-filtering firewalls look like a great type of firewall at first, but they are not all that intelligent because it is easy for a hacker to spoof a packet so that it meets the rules of the firewall.

For example, if you open port 80 on a packet-filtering firewall, any packets destined for port 80 will bypass the firewall. Like packet-filtering firewalls, a stateful packet inspection firewall can filter traffic based on the source and destination IP address or port number, but can also look at the context of the conversation and determine if the packet is supposed to be received at that point in the conversation. If the firewall receives a packet in the correct context of the conversation and the packet follows one of the rules, it allows the packet into the network.

Stateful packet inspection firewalls use rules to filter traffic as well, but they also are smart enough to know the context of the conversation.

An example of a stateful packet inspection firewall knowing about the context of a conversation is that if a hacker tries to send malicious commands to the firewall with a destination port of 80 and the hacker has not performed a three-way handshake first, the firewall says, “Nope, sorry, you are not allowed in because I don’t see that we have established a connection.”

Stateful packet inspection firewalls know that before TCP communication can occur, there needs to be a three-way handshake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Firewall - Implicit Deny

A

Any service not specifically allowed is implicitly denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewall

A

A firewall filters incoming and outgoing traffic for a single host or between networks. In other words, a firewall can ensure only specific types of traffic are allowed into a network or host, and only specific types of traffic are allowed out of a network or host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

VPN Concentrator

A

A VPN concentrator allows you to centralize your virtual private network (VPN) access by having all employees VPN into the network through the VPN concentrator, where you configure the authentication and encryption protocols. The VPN concentrator also supports high availability so that it is always available to answer VPN requests from clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VPN Concentrator - Remote Access vs. Site-to-site

A

Remote Access
When implementing your VPN solution, you can configure the VPN concentrator to allow clients to connect remotely to
the network.

Site-to-site
(Or) you could implement remote access where the VPN concentrators are used to connect from one site to another site (known as site-to-site) to allow entire offices to communicate over a secure connection. In this scenario, the client computers would not need to establish the VPN connection manually like they would in a client access scenario.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

VPN Concentrator - IPSec

A

Internet Protocol security (IPsec) as a method of encrypting data-in-transit.

(Continue on AH uses protocol #51 & ESP #50) The term protocol number might look like a typo, but it isn’t. AH and ESP are identified with protocol numbers, not port numbers.

A basic packet-filtering firewall can filter packets based on IP addresses, ports, and some protocols, such as Internet Control Message Protocol (ICMP) and IPsec. Packet filters use the protocol numbers to identify AH and ESP traffic.

IPsec uses Internet Key Exchange (IKE) over port 500 to authenticate clients in the IPsec conversation. IKE creates security associations (SAs) for the VPN and uses these to set up a secure channel between the client and the VPN server.

In short, IPsec is a secure encryption protocol used with VPNs. Encapsulating Security Payload (ESP) provides confidentiality, integrity, and authentication for VPN traffic. IPsec uses Tunnel mode for VPN traffic and can be identified with protocol ID 50 for ESP. It uses IKE over port 500. A full tunnel encrypts all traffic after a user has connected to a VPN. A split tunnel only encrypts traffic destined for the VPN’s private network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

VPN Concentrator - IPSec - Tunnel Mode

A

Tunnel mode encrypts the entire IP packet used in the internal network and is the mode used with VPNs transmitted over the Internet. The benefit is that the IP addressing used within the internal network is encrypted and not visible to anyone who intercepts the traffic. If someone does intercept the traffic, he can see the source IP address from the client and the destination address to the VPN server, but the internal IP address information remains hidden.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

VPN Concentrator - IPSec - Transport Mode

A

Transport mode only encrypts the payload and is commonly used in private networks, but not with VPNs. If traffic is transmitted and used only within a private network, there isn’t any need to hide the IP addresses by encrypting them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VPN Concentrator - IPSec - AH

Note: 2 for 2 - IA

A

IPsec includes an Authentication Header (AH) to allow each of the hosts in the IPsec conversation to authenticate with each other before exchanging data. AH provides authentication and integrity. AH uses protocol number 51

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VPN Concentrator - IPSec - ESP

Note: 3 for 3 - CIA

A

IPsec includes Encapsulating Security Payload (ESP) to encrypt the data and provide confidentiality. ESP includes AH so it provides confidentiality, authentication, and integrity. ESP uses protocol number 50.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VPN Concentrator - Split Tunnel vs. Full Tunnel

A

Imagine that Lisa connects to a company VPN server using IPsec from her home computer. The VPN is using ESP so all traffic in the tunnel is encrypted. Now, Lisa wants to do an Internet search on saxophones. Will her computer connect directly to the Internet for her search? Or will her computer make a connection through the VPN server first? It depends on how the VPN is configured.

Split Tunnel
In a split tunnel, a VPN administrator determines what traffic should use the encrypted tunnel. For example, it’s possible to configure the tunnel to only encrypt traffic going to private IP addresses used within the private network. If Lisa did an Internet search with the VPN server configured in a split tunnel configuration, her Internet search traffic will not go through the encrypted tunnel. Instead, her search will go directly to Internet sites via her ISP.

Full Tunnel
In a full tunnel, all traffic goes through the encrypted tunnel while the user is connected to the VPN. If Lisa was connected to the VPN and then tried to connect to a public web site, the traffic would first go through the encrypted tunnel and then out to the public web site from within the private network. If the private network routed Internet traffic through a unified threat management (UTM) device, Lisa’s traffic would go through the UTM device. The web site would send web pages back to the UTM device and the VPN server would encrypt it and send it back to Lisa via the encrypted tunnel.

As a reminder, a UTM device can perform URL filtering, malware inspection, and content inspection of all traffic sent through it. This is one of the reasons why an organization may choose to use a full tunnel for users connected to a VPN server. A disadvantage is that it can be slow. Not only is the Internet traffic taking an indirect route through the VPN server, but it’s also being encrypted and decrypted a couple of times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VPN Concentrator - TLS

A

Some tunneling protocols use Transport Layer Security (TLS) to secure the VPN channel. As an example, Secure Socket Tunneling Protocol (SSTP) encrypts VPN traffic using TLS over port 443. Using port 443 provides a lot of flexibility for many administrators and rarely requires opening additional firewall ports. It is a useful alternative when the VPN tunnel must go through a device using NAT, and IPsec is not feasible. OpenVPN and OpenConnect are two open source applications that can use TLS to create a secure channel. While this can also use Secure Sockets Layer (SSL), SSL has known weaknesses and TLS is the designated replacement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

VPN Concentrator - Always-on VPN

A

Some VPNs are always-on VPNs. They can be used with both site-to-site VPNs and remote access VPNs. When used with a site-to-site VPN, the two VPN gateways maintain the VPN connection. In contrast, some site-to-site VPNs use an on-demand connection. The VPN connection is only
established when a user connects to a remote system.

Several vendors have always-on VPNs for remote access VPNs. They attempt to create the VPN connection as soon as the user’s device connects to the Internet. For a home user, this might be right after the user turns on a desktop PC or laptop computer.

When configured on mobile devices, such as cell phones, the device will connect to the always-on VPN anytime the device connects to an Internet connection. As an example, if a user visits a coffee shop that has free Internet access and the user connects to the network, the device will automatically
connect to the always-on VPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NIPS/NIDS

A

Intrusion detection systems (IDSs) monitor a network and send alerts when they detect suspicious events on a system or network. Intrusion prevention systems (IPSs) react to attacks in progress and prevent them from reaching systems and networks.

NIDS
A network-based intrusion detection system (NIDS) monitors activity on the network. An administrator installs NIDS sensors or collectors on network devices such as routers and firewalls. These sensors gather information and report to a central monitoring server hosting a NIDS console. A NIDS is not able to detect anomalies on individual systems or workstations unless the anomaly causes a significant difference in network traffic. Additionally, a NIDS is unable to decrypt encrypted traffic. In other words, it can only monitor and assess threats on the network from traffic sent in plaintext or nonencrypted traffic. Finally, the biggest disadvantage of a NIDS is that it is passive, meaning it only detects attacks; to protect against, or prevent, these attacks, you need something active, you need a NIPS.

NIPS
A network intrusion prevention system (NIPS) is designed to inspect traffic and, based on its configuration or security policy, either remove, detain, or redirect malicious traffic that it becomes aware of. The NIPS (as well as the NIDS) is considered to be an application-aware device, meaning it can divine different types of packets, define what application they are based on, and ultimately permit or disallow that traffic on the network. More and more companies are offering NIPS solutions in addition to, or instead of, NIDS solutions. Examples of NIPS solutions include Check Point security appliances (https://www.checkpoint.com), and the aforementioned Snort, which is actually a NIDS/NIPS software package that should be installed on a dual-homed or multihomed server. Not only can a NIPS go above and beyond a NIDS by removing or redirecting malicious traffic, it can also redirect a recognized attacker to a single computer known as a padded cell, which contains no information of value and has no way out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

NIPS/NIDS - Signature-based

A

Overview:
Network traffic is analyzed for predetermined attack patterns. These attack patterns are known as signatures.

Detail:
Signature-based IDSs (also called definition based) use a database of known vulnerabilities or known attack patterns.

For example, tools are available for an attacker to launch a SYN flood attack on a server by simply entering the IP address of the system to attack. The attack tool then floods the target system with synchronizing (SYN) packets but never completes the three-way Transmission Control Protocol (TCP) handshake with the final acknowledge (ACK) packet. If the attack isn’t blocked, it can consume resources on a system and ultimately cause it to crash.

However, this is a known attack with a specific pattern of successive SYN packets from one IP to another IP. The IDS can detect these patterns when the signature database includes the attack definitions. The process is very similar to what antivirus software uses to detect malware. You need to update both IDS signatures and antivirus definitions from the vendor on a regular basis to protect against current threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

NIPS/NIDS - Heuristic/Behavioral

A

Overview:
Looks at the previous behavior of applications, executables, and/or the operating system and compares that to current activity on the system. If an application later behaves improperly, the monitoring system will attempt to stop the behavior. Requires a baseline.

Detail:
A behavior-based monitoring system looks at the previous behavior of applications, executables, and/or the operating system and compares that to current activity on the system. If an application later behaves improperly, the monitoring system will attempt to stop the behavior. This has advantages compared to signature-based and anomaly-based monitoring in that it can to a certain extent help with future events, without having to be updated.

However, because there are so many types of applications, and so many types of relationships between applications, this type of monitoring could set off a high amount of false positives. Behavior monitoring should be configured carefully to avoid the system triggering alarms due to legitimate activity.

More Details:
Heuristic analysis is often used in combination with behavior-based monitoring as it relates to antivirus software and IDS/IPS solutions. A heuristic in computer science is an algorithm that consistently performs quickly, and provides good results based on a set of rules. Heuristic analysis is designed to detect malicious behavior without uniquely identifying it (as is done in a signature-based system). It can find previously unknown malicious behavior by comparing it to known and similar malicious behavior. Then it “guesses” whether something is malicious or not. This can lead to low accuracy and a high percentage of false positives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

NIPS/NIDS - Anomaly

A

Overview:
Establishes a performance baseline based on a set of normal network traffic evaluations. Requires a baseline.

Detail:
An anomaly-based monitoring system (also known as statistical anomaly-based) establishes a performance baseline based on a set of normal network traffic evaluations. These evaluations should be taken when the network and servers are under an average load during regular working hours. This monitoring method then compares current network traffic activity with the previously created baseline to detect whether it is within baseline parameters. If the sampled traffic is outside baseline parameters, an alarm will be triggered and sent to the administrator (as long as the system was configured properly). This type of monitoring is dependent on the accuracy of the baseline. An inaccurate baseline increases the likelihood of obtaining false indicators, such as false positives. Normally, false positives are when the system reads a legitimate event as an attack or other error. This can happen with an improperly configured IDS or IPS solution. If too many false indicator alerts are received by the security administrator, then the IDS/IPS should be reconfigured and baselines recollected, and/or those types of false alarms should be disabled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

NIPS/NIDS - Inline vs. Passive

A

Passive
A passive IDS monitors for suspicious activity, and when it detects activity it considers suspicious, it simply logs the activity to a log file and sends notification to the administrator. It is important to understand that a passive IDS does nothing to try to protect the network from further suspicious activity. Note that a passive IDS configured this way is typically connected to a monitoring port or a network tap to allow the IDS to receive all network traffic.

Inline
An inline IPS is an IPS that is placed in the pathway of the packets so that the packets pass through the IPS to reach the destination. The benefit of this is that the IPS can take action such as block the traffic if it is suspicious traffic. Another benefit of an inline IPS is that if the IPS fails, then no packets can make it through the system until the IPS is fixed.

With a passive IDS that is simply receiving a copy of all data and monitoring the data, if the IDS fails, the traffic still reaches the destination but isn’t inspected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

NIPS/NIDS - In-band vs. Out-of-band

A

In the IDS and IPS context, in-band refers to an IPS that is placed inline, which means that the traffic must pass through it to make it to the destination systems. This allows the IPS to not only monitor but block the traffic if it is suspicious.

Out-of-band refers to an IDS/IPS that simply monitors traffic that travels through the network by having a copy of the traffic sent to it. In this scenario, the IDS can only trigger alerts or send notification to the administrator of the suspicious traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

NIPS/NIDS - Rules

A

When configuring the IDS, you configure rules to indicate the type of traffic that is considered suspicious and what action to take when that traffic is detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

NIPS/NIDS - Analytics

A

The analytics engine is the component of the IDS that does the analysis of the traffic collected. The analytics engine uses the rules you have configured on the IDS to determine what is considered suspicious traffic. The action in the rule tells the IDS how to respond to the suspicious traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

NIPS/NIDS - Analytics - False Positive

A

A false positive is when the IDS states there was suspicious activity (positive), but in reality, there was not (a false assumption). In simple terms, the IDS reports suspicious activity but none occurred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

NIPS/NIDS - Analytics - False Negative

A

A false negative is when the IDS does not see any suspicious activity, and again that was false—there really was some! In simple terms, the IDS fails to detect suspicious activity that actually occurred and thus doesn’t report it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Router

A

A router connects multiple network segments together into a single network and routes traffic between the segments. As an example, the Internet is effectively a single network hosting billions of computers.

Routers route the traffic from segment to segment. Because routers don’t pass broadcasts, they effectively reduce traffic on any single segment.

Segments separated by routers are sometimes referred to as broadcast domains. If a network has too many computers on a single segment, broadcasts can result in excessive collisions and reduce network performance. Moving computers to a different segment separated by a router can significantly improve overall performance.

Similarly, subnetting networks create separate broadcast domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Router - ACLs

A

Access control lists (ACLs) are rules implemented on a router (and on firewalls) to identify what traffic is allowed and what traffic is denied. Rules within an ACL provide rule-based management for the router and control inbound and outbound traffic.

Router ACLs provide basic packet filtering. They filter packets based on IP addresses, ports, and some protocols, such as ICMP or IPsec, based on the protocol identifiers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Router - Antispoofing

A

Attackers often use spoofing to impersonate or masquerade as someone or something else. In the context of routers, an attacker will spoof the source IP address by replacing the actual source IP address with a different one.

This is often done to hide the actual source of the packet. You can implement antispoofing on a router by modifying the access list to allow or block IP addresses. As an example, private IP addresses should only be used in private networks. Any traffic coming from the Internet using a private IP address as the source IP address is obviously an attempt to spoof the source IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Switch

A

A switch can learn which computers are attached to each of its physical ports. It then uses this knowledge to create internal switched connections when two computers communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Switch - Port Security

A

Port security includes disabling unused ports and limiting the number of MAC addresses per port. A more advanced implementation is to restrict each physical port to only a single specific MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Switch - Layer 2 vs. Layer 3

A

A traditional switch operates on Layer 2 of the Open Systems Interconnection (OSI) model. As discussed previously, a traditional switch (a Layer 2 switch) uses the destination MAC address within packets to determine the destination port. Additionally, a Layer 2 switch forwards broadcast traffic to all ports on the switch.

Routers operate on Layer 3 of the OSI model. They forward traffic based on the destination IP address within a packet, and they block broadcast traffic. A Layer 3 switch mimics the behavior of a router and allows network administrators to create virtual local area networks (VLANs). Because a Layer 3 switch forwards traffic based on the destination IP address instead of the MAC address, it is not susceptible to ARP-based attacks.

32
Q

Switch - Loop Prevention

A

Loop protection such as S(paning) T(ree) P(rotocols) or R(apid) STP is necessary to protect against switching loop problems, such as those caused when two ports of a switch are connected together.

33
Q

Switch - Flood Guard

A

Many switches include a flood guard to protect against MAC flood attacks. When enabled, the switch will limit the amount of memory used to store MAC addresses for each port. For example, the switch might limit the number of entries for any port to 132 entries. This is much more than you need for normal operation. If the switch detects an attempt to store more than 132 entries, it raises an alert.

The flood guard typically sends a Simple Network Management Protocol (SNMP) trap or error message in response to the alert. Additionally, it can either disable the port or restrict updates for the port. By disabling the port, it effectively blocks all traffic through the port until an administrator intervenes. If it restricts updates, the switch will use currently logged entries for the port, but ignore attempts to update it. All other ports will continue to operate normally.

Another flood guard supported by some switches is a setting for the maximum number of MACs supported by a port. Most ports will typically have this set to 1 to support only a single MAC address. However, consider a virtual machine (VM) running within a physical host. If the VM is set to bridged, it can access the network using the physical host’s NIC, but with the MAC address of the VM. In this scenario, the Maximum MAC setting should be set to 2.

34
Q

Proxy

A

Many networks use proxy servers (or forward proxy servers) to forward requests for services (such as HTTP or HTTPS) from clients. They can improve performance by caching content and some proxy servers can restrict users’ access to inappropriate web sites by filtering content. A proxy server is located on the edge of the network bordering the Internet and the intranet

35
Q

Proxy - Forward and Reverse Proxy

A

Forward
Most often, a proxy server is implemented as a forward proxy. This means that clients looking for websites, or files via an FTP connection, pass their requests through to the proxy.

Reverse
However, there is also a reverse proxy, where multiple HTTP or FTP servers use a proxy server and send out content to one or more clients. These HTTP and FTP servers could be located in a server farm or similar grouping, and the reverse proxy might also undertake the role of load balancer in this situation. A reverse proxy can act as another layer of defense for an organization’s FTP or HTTP servers.

36
Q

Proxy - Transparent

A

A transparent proxy will accept and forward requests without modifying them. It is the simplest to set up and use and it provides caching.

In contrast, a nontransparent proxy server can modify or filter requests. Organizations often use nontransparent proxy servers to restrict what users can access with the use of URL filters. A URL filter examines the requested URL and chooses to allow the request or deny the request.

37
Q

Proxy - Application/Multi-purpose

A

An application proxy is used for specific applications. It accepts requests, forwards the requests to the appropriate server, and then sends the response to the original requestor. A forward proxy used for HTTP is a basic application proxy. However, most application proxies are multipurpose proxy servers supporting multiple protocols such as HTTP and HTTPS.

38
Q

Load Balancer

A

A load balancer can optimize and distribute data loads across multiple computers or multiple networks. For example, if an organization hosts a popular web site, it can use multiple servers hosting the same web site in a web farm. Load-balancing software distributes traffic equally among all the servers in the web farm, typically located in a DMZ.

The term load balancer makes it sound like it’s a piece of hardware, but a load balancer can be hardware or software.

39
Q

Load Balancer - Scheduling

A

Specifies which algorithm will be used to send the request to one of the nodes. Scheduling uses a number of configuration values to determine which server to send the request to, such as round-robin, affinity, and CPU load.

40
Q

Load Balancer - Scheduling - Affinity

A

Some load balancers use source address affinity to direct the requests. Source affinity sends requests to the same server based on the requestor’s IP address

In other words, Controls whether all request from a client go to the same server in the load balancer or if each request can potentially be routed to a different server. Affinity essentially ties a client to a particular server.

41
Q

Load Balancer - Scheduling - Round-robin

A

Some load balancers simply send new requests to the servers in a round-robin fashion. The load balancer sends the first request to Server 1, the second request to Server 2, and so on.

42
Q

Load Balancer - Active-passive

A

There are two common configurations for
load balancing.

With an active/passive configuration, one system, called a node, handles all the work (the active node), while the other node (the passive node) is on standby, ready to take over if the active node fails. If the active node fails, the passive node becomes the active node and handles all the workload.

43
Q

Load Balancer - Active-active

A

With an active/active configuration, both nodes are online and able to handle requests, essentially splitting the workload. If one node fails, the other node handles all the workload until the failed node is recovered. With both configurations, more than two nodes can be included for extra redundancy.

44
Q

Load Balancer - Virtual IPs

A

With both of these setups, the load balancer has an IP address assigned to it (known as the virtual IP), and you configure all clients to send requests to the virtual IP. The virtual IP then forwards the request to an active node in the load balancer.

45
Q

Access Point

A

A wireless access point (AP) connects wireless clients to a wired network. However, many APs also have routing capabilities. Vendors commonly market APs with routing capabilities as wireless routers so that’s how you’ll typically see them advertised. Two distinctions are:
• All wireless routers are APs. These are APs with an extra capability—routing.
• Not all APs are wireless routers. Many APs do not have any additional capabilities. They provide connectivity for wireless clients to a wired network but do not have routing capabilities.

46
Q

Access Point - SSID

A

The service set identifier (SSID) identifies the name of the wireless network. You should change the SSID from the default name. Disabling SSID broadcast can hide the network from casual users, but an attacker can easily discover it with a wireless sniffer.

Some APs still come with default SSIDs, though most vendors have moved away from this practice. For example, the default SSID of some older Linksys APs is “Linksys.” Some newer APs force you to enter a name for the SSID when you first install it and do not include a default. From a defense-in-depth perspective, it’s a good idea to change the name of the SSID if a default is used. It simply gives attackers less information.

47
Q

Access Point - MAC Filtering

A

MAC filtering can restrict access to a wireless network to specific clients. However, an attacker can use a sniffer to discover allowed MAC addresses and circumvent this form of network access control. It’s relatively simple for an attacker to spoof a MAC address.

48
Q

Access Point - Signal Strength

A

You can not modify the gain of an antenna without changing its physical properties.

However, many wireless access points include a power setting that you can manipulate to increase or decrease the transmit power. Administrators sometimes reduce the power level to restrict access to a small area such as a conference room, or to prevent wireless users from connecting from the parking lot or somewhere else outside the building.

Similarly, administrators sometimes increase the power level to increase the range of the AP.

49
Q

Access Point - Band Selection/(Channel) Width

A

Wireless networks use two primary radio bands: 2.4 GHz and 5 GHz. However, wireless devices don’t transmit exactly on 2.4 GHz or 5 GHz. Instead, the two bands have multiple channels starting at about 2.4 GHz and 5 GHz. There isn’t a single standard that applies to every country, so you’ll find that the number of channels within each band varies from country to country.

50
Q

Access Point - Antenna Types and Placement

A

The most commonly used wireless antenna on both APs and wireless devices is an omnidirectional (or omni) antenna. Omnidirectional antennas transmit and receive signals in all directions at the same time. This allows wireless devices to connect to an AP from any direction.

Another type of antenna is a directional antenna. A directional antenna transmits in a single direction and receives signals back from the same direction. Because the power of the antenna is focused in a single direction, the directional antenna has greater gain than an omni antenna, and it can transmit and receive signals over greater distances. The directional antenna also has a very narrow radiation pattern, focusing the signal in a specific area.

When considering antenna placement, you should also configure the antenna orientation.

51
Q

Access Point - Fat vs. Thin

A

A fat AP, also known as a stand-alone, intelligent, or autonomous AP, includes everything needed to connect wireless clients to a wireless network. It typically includes features such as a routing component, NAT, DHCP, wireless security options, access control lists (ACLs), and more. If you’re running a wireless network at your home or in a small office network, you are probably using a fat access point. Fat APs must be configured separately from each other, which isn’t really a problem if you’re only configuring a single AP.

Consider a network that has a dozen APs spread around the organization. If these were all fat APs, administrators would need to configure each one separately, which is highly inefficient.

Enter the thin AP. A thin AP is a controller based AP, meaning that it isn’t a stand-alone AP, but rather an AP managed by a controller. Administrators use a wireless controller to configure and manage thin based APs. This streamlines the administration by consolidating it in one place.

52
Q

Access Point - Controller-based vs. Standalone

A

A fat AP is also known as a stand-alone AP and is managed independently. A thin AP is also known as a controller-based AP and is managed by a wireless controller. The wireless controller configures the thin AP.

53
Q

SIEM

A

A security information and event management (SIEM) system provides a centralized solution for collecting, analyzing, and managing data from multiple sources. They combine the services of security event management (SEM) and security information management (SIM) solutions.

A SEM provides real-time monitoring, analysis, and notification of security events, such as suspected security incidents.

A SIM provides long-term storage of data, along with methods of analyzing the data looking for trends or creating reports needed to verify compliance of laws or regulations.

54
Q

SIEM - Aggregation

A

Aggregation refers to combining several dissimilar items into a single item. A SIEM can collect data from multiple sources, such as firewalls, intrusion detection systems, proxy servers, and more. Each of these devices formats the logs differently. However, the SIEM can aggregate the data and store it in such a way that it is easy to analyze and search.

55
Q

SIEM - Correlation (Engine)

A

A correlation engine is a software component used to collect and analyze event log data from various systems within the network. It typically aggregates the data looking for common attributes. It then uses advanced analytic tools to detect patterns of potential security events and raises alerts. System administrators can then investigate the alert.

56
Q

SIEM - Automated Alerting and Triggers

A

A SIEM typically comes with predefined alerts, which provide notifications of suspicious events. For example, if it detects a port scan on a server, it might send an email to an administrator group or display the alert on a heads-up display. SIEMs also include the ability to create new alerts.

Triggers cause an action in response to a predefined number of repeated events. As an example, imagine a trigger for failed logons is set at five. If an attacker repeatedly tries to log on to a server using Secure Shell (SSH), the server’s log will show the failed logon attempts. When the SIEM detects more than five failed SSH logons, it can change the environment and stop the attack. It might modify a firewall to block these SSH logon attempts or send a script to the server to temporarily disable SSH. A SIEM includes the ability to modify predefined triggers and create new ones.

57
Q

SIEM - Time Synchronization

A

All servers sending data to the SIEM should be synchronized with the same time. This becomes especially important when investigating an incident so that security investigators know when events occurred. Additionally, large organizations can have locations in different time zones. Each of these locations might have servers sending data to a single centralized SIEM. If the server logs use their local time, the SIEM needs to ensure that it compensates for the time offset. One method is to convert all times to Greenwich Mean Time (GMT), which is the time at the Royal Observatory in Greenwich, London.

58
Q

SIEM - Event Deduplication

A

Deduplication is the process of removing duplicate entries. As an example, imagine 10 users receive the same email and choose to save it. An email server using deduplication processing will keep only one copy of this email, but make it accessible to all 10 users. Imagine a NIDS collects data from a firewall and a SIEM collects data from the NIDS and the firewall. The SIEM will store only a single copy of any duplicate log entries, but also ensure that the entries are associated with both devices.

59
Q

SIEM - Logs/WORM

A

A SIEM typically includes methods to prevent anyone from modifying log entries. This is sometimes referred to as write once read many (WORM). As logs are received, the SIEM will aggregate and correlate the log entries. After processing the logs, it can archive the source logs with write protection.

60
Q

DLP

A

Organizations today are looking for ways to implement data loss prevention (DLP) solutions, which are designed to prevent data leaking outside the organization. DLP involves a number of security controls to ensure that data is not leaked outside the organization either intentionally or accidentally.

61
Q

DLP - USB Blocking

A

You can disable the use of USB devices on a system so that users cannot copy data to a USB drive and take the data outside the organization. You can disable the USB devices via software configuration or even disable them at the hardware level within the BIOS settings.

62
Q

DLP - Cloud-based

A

Many cloud-based solutions offer the capability to create DLP policies to prevent the sharing of sensitive data. For example, Office 365 offers the capability to create DLP rules for different types of sensitive information such as financial data and health information. These rules can prevent users from e-mailing sensitive information, storing information in the cloud, or even sharing the information on the organization’s intranet.

63
Q

DLP - Email

A

An e-mail system represents the classic scenario for applying DLP. To prevent users from sending sensitive information in an e mail message, you can either use an e-mail system that has DLP policy features or purchase or subscribe to a service that provides DLP functionality for e-mail systems.

64
Q

NAC

A

Allowing remote access to your private network can expose your network to a significant number of risks from the clients. If a user logs on to a VPN with a malware infected computer, this computer can then infect other computers on the internal network. Network access control (NAC) methods provide continuous security monitoring by inspecting computers and preventing them from accessing the network if they don’t pass the inspection.

Most administrators have complete control over computers in their network. For example, they can ensure the clients have up-to-date antivirus software installed, operating systems have current patches applied, and their firewalls are enabled. However, administrators don’t have complete control of computers employees use at home or on the road.

NAC provides a measure of control for these other computers. It ensures that clients meet predetermined characteristics prior to accessing a network. NAC systems often use health as a metaphor, indicating that a client meets these predetermined characteristics. Just as doctors can quarantine patients with certain illnesses, NAC can quarantine or isolate unhealthy clients that don’t meet the predefined NAC conditions.

65
Q

NAC - Dissolvable vs. Permanent

A

Permanent
A permanent agent (sometimes called a persistent NAC agent) is installed on the client and stays on the client. NAC uses the agent when the client attempts to log on remotely. This is the most common implementation for corporate-owned devices, and for approved laptops and PCs that employees use to connect remotely.

Dissolvable
A dissolvable agent is downloaded and run on the client when the client logs on remotely. It collects the information it needs, identifies the client as healthy or not healthy, and reports the status back to the NAC system. Some dissolvable NAC agents remove themselves immediately after they report back to the NAC system. Others remove themselves after the remote session ends.

Dissolvable agents are often used on mobile devices when an organization has implemented a bring your own device (BYOD) policy. Employee-owned devices are inspected for health, but the organization doesn’t require users to install extra software on their devices.

66
Q

NAC - Host Health Checks

A

Administrators set predefined conditions for healthy clients and those that meet these preset conditions can access the network. The NAC system isolates computers that don’t meet the conditions. Common health conditions checked by a NAC are:
• Up-to-date antivirus software, including updated signature definitions
• Up-to-date operating system, including current patches and fixes
• Firewall enabled on the client

NAC systems use authentication agents (sometimes called health agents) to inspect NAC clients. These agents are applications or services that check different conditions on the computer and document the status in a statement of health. When a client connects to a NAC-controlled network, the agent reports the health status of the NAC client.

However, if a client doesn’t meet the health conditions mandated by the NAC server, the VPN server redirects the client to a remediation network (also called a quarantine network).

The remediation network includes resources the client can use to get healthy. For example, it would include current approved patches, antivirus software, and updated virus signatures. The client can use these resources to improve its health and then try to access the network again.

While NAC can inspect the health of VPN clients, you can also use it to inspect the health of internal clients. For example, internal computers may occasionally miss patches and be vulnerable. NAC will detect the unpatched system and quarantine it. If you use this feature, it’s important that the detection is accurate. A false positive by the NAC system can quarantine a healthy client, and prevent it from accessing the network.

Similarly, your organization may allow visitors or employees to plug in their mobile computers to live wall jacks for connectivity, or connect to a wireless network. NAC inspects the clients, and if they don’t meet health conditions, they may be granted Internet access through the network but remain isolated from any other network activity.

67
Q

NAC - Agent vs. Agentless

A

Many NAC vendors refer to dissolvable agents as an agentless capability, though this is somewhat of a misnomer. The NAC is still using an agent to inspect the client, but it is not installing the agent on the client.

68
Q

Mail Gateway

A

The mail gateway is the device or server that is placed in your DMZ that sends and receives e-mail for your organization. When people on the Internet send e-mail to employees within your organization, the mail is directed to the mail gateway within the DMZ.

At this point the mail gateway should do a virus scan and spam filter check on the message to ensure the message is a valid message clean of any viruses. Once the message passes the virus check and the spam filter, the mail gateway then forwards the message to your internal mail server.

Keep in mind there is typically a firewall between the DMZ and the internal network, so you will need to configure a rule on this firewall to allow mail traffic from the mail gateway to the internal mail server only.

69
Q

Mail Gateway - Spam Filter

A

A spam filter should be configured to check that the message is not a spam message polluting your users’ mailboxes with unwanted e-mail messages.

70
Q

Mail Gateway - DLP

A

Data loss prevention should be a feature that can be implemented on the mail gateway so that the mail gateway can ensure that outbound e-mails do not contain sensitive information such as financial or health records or any company secrets.

71
Q

Mail Gateway - Encryption

A

The mail gateway may implement server-to-server encryption with another mail server at another location within your company, or with a partnering company, so that messages to that company sent across the Internet are not sent in clear text.

72
Q

Bridge

A

The switch creates its own broadcast domain.
The router routes traffic between broadcast domains
The bridge connects two or more broadcast domains into one.

A network bridge connects multiple networks together and can be used instead of a router in some situations. As discussed previously, a router directs network traffic based on the destination IP address and a switch directs traffic to specific ports based on the destination MAC address. Similarly, a bridge directs traffic based on the destination MAC address.

73
Q

SSL/TLS Accelerators

A

SSL/TLS accelerators refer to hardware devices focused on handling Transport Layer Security (TLS) traffic.

TLS is the designated replacement for Secure Sockets Layer (SSL), but many people are familiar with SSL terminology so you’ll continue to see it, even if the only protocol it’s using is TLS.

TLS provides encryption for many different protocols, including Hypertext Transfer Protocol Secure (HTTPS). HTTPS uses a certificate and asymmetric encryption. The process of establishing the HTTPS session, negotiating the best security supported by both the client and the server, sharing encryption keys, and encrypting session data all take a lot of time and resources. By off-loading this to another hardware device, it frees up the primary computer’s resources, such as CPU power and RAM.

When using an SSL accelerator, it’s best to place it as close as possible to related devices. For example, if you’re using an SSL accelerator to off-load HTTPS sessions for a web server, place the SSL accelerator close to the web server.

74
Q

SSL Decryptors

A

Common setup:
Internet&raquo_space; SSL Decryptors&raquo_space; NIPS&raquo_space; The Rest of Organization Networks

Some organizations use SSL decryptors to combat many threats. For example, attackers are often using encryption to prevent inspection methods from detecting malware coming into a network.

75
Q

Media Gateway

A

A media gateway is a device that converts data from the format used on one network to the format used on another network. As an example, a VoIP gateway converts telephony traffic between traditional phone lines and an IP-based network. This allows users to make and receive phone calls using VoIP equipment and the gateway can translate the traffic and transmit the calls over a traditional phone line.

76
Q

Hardware Security Module

A

A hardware security module (HSM) is a removable or external device that can generate, store, and manage RSA keys used in asymmetric encryption. Many server-based applications use an HSM to protect keys.