2.3 Flashcards
What is a multilayer switch used for?
- It’s a switch (layer 2) and router (layer 3) in the same physical device
- Each function is separate (switching still operates at layer 2 and routing operates in layer 3)
What is a wireless network used for?
- Wireless networking is pervasive
- Your access point may far away from where we use the network.
- Configurations may change at any moment
- network should be invisible to your users.
What is a wireless LAN controller used for?
- Centralized management of WAPs (device is alsocalled “pane of glass”)
- Deploy new access points
- Performance and security monitoring
- Configure and deploy changes.
- Report om access point use
- Usually a propriety system and gets paired with the access points.
What is a load balancer used for?
- Distribute the load
- Used for Large-scale implementations (Web server farms, database farms)
- Fault Tolerant (Server outages have no effect)
- Provides TCP offload for protocol overhead (handshake)
- SSL offload for encryption/decryption
- It uses caching for faster response
- Prioritization (QoS)
- Content switching in application level
What are IDS and IPS used for?
(Intreusion Detection System/Intrusion Prevention System)
- To watch the network traffic.
- Specifically look for intrusions and vulnerabilities
- 2 Types:
a. Detection (Alarm or alert)
b. Prevention (Stop it before it gets into the network.
What technologies do IDS and IPS used for identification?
- Signature based
- Anomaly-based
- Behavior-based
- Heuristics (use AI)
What is a proxy used for?
- A security device that sits between the users and external network.
- Receives the user requests and sends the request on their behalf
- Useful for caching info, access control, URL filtering, content scanning
- Applications need to know how to use the proxy
- Some proxies are invisible.
What is an Application proxy used for?
- Most proxies in use are application proxies
- A proxy may only know one application (like HTTP)
- Many proxies are multipurpose proxies (Like HTTP, HTTPS, FTP)
What is a VPN Concentrator used for?
- It’s a device we would install onto our network that would allow us to support VPNs, or Virtual Private Networks.
- Encrypts the data going to a public network.
- Most are built into firewalls.
- Used with a client software (Ex: Kimia VPN)
What is a remote access VPN used for?
- On-demand access from a remote device which means software connects to a VPN concentrator.
- Some software can be configured as always-on
What is a AAA framework used for?
- Identification (usually the username)
- Authentication (Password and other authentication factors)
- Authorization (based on username and password, what access does the use have?)
- Accounting (Resources used: login time, data sent and received, logout time.)
What does RADIUS stand for?
Remote Authentication Dial-in User Service [A more common AAA protocols (not just for dial-in)] and available on almost any server operating system
What is a RADIUS used for?
Centralize authentication for users for:
- Routers, switches, firewalls
- Server authentication
- Remote VPN access
- 802.1X network access
What is UTM / All-in-one security appliance?
Unified Threat Management / Web security gateway
What is a UTM used for?
- URL filter / Content inspection
- Malware inspection
- Spam filter
- CSU / DSU
- Router ,Switch
- Firewall
- IDS / IPS
- Bandwidth shaper
- VPN endpoint