2.3 Explain the purposes and use cases for advanced networking devices. Flashcards
Multilayer switches
• A switch (Layer 2) and router (Layer 3) in the same physical device
• Layer 2 router?
• Switching still operates at OSI Layer 2, routing still
operates at OSI Layer 3
Wireless LAN controllers
- Centralized management of WAPs
- Deploy new access points
- Performance and security monitoring
- Configure and deploy changes to all sites
- Report on access point use
- Usually a proprietary system
Balancing the load
- Distribute the load
- Large-scale implementations
- Fault tolerance
Load balancer
- Configurable load
- Manage across servers
- TCP offload
- SSL offload
- Caching
- Content switching
IDS and IPS
• Intrusion Detection System / Intrusion Prevention
• Intrusions
- Exploits against operating systems, applications, etc.
* Buffer overflows, cross-site scripting, other vulnerabilities
• Detection vs. Prevention
- Detection – Alarm or alert
* Prevention – Stop it before it gets into the network
Identification technologies
- Signature-based
- Anomaly-based
- Behavior-based
- Heuristics
Proxies
• Sits between the users and the external network
• Receives the user requests and sends the request
• Useful for caching information, access control,
URL filtering, content scanning
• Some proxies are invisible (transparent)
Application proxies
- Most proxies in use are application proxies
- A proxy may only know one application, i.e., HTTP
- Many proxies are multipurpose proxies
VPN concentrator
• Virtual Private Network
Concentrator - Often integrated into a firewall
• Many deployment options
• Used with client software
Remote access VPN
- On-demand access from a remote device
* Software connects to a VPN concentrator
AAA framework
- Identification - This is who you claim to be
- Authentication - Prove you are who you say you are
- Authorization • Based on your identification and authentication,
• Accounting -• Resources used: Login time, data sent and received, logout time
RADIUS (Remote Authentication Dial-in User Service)
- One of the more common AAA protocols
- Centralize authentication for users
- RADIUS services available on almost any server operating system
UTM / All-in-one security appliance
- Unified Threat Management (UTM) / • URL filter / Content inspection
- Malware inspection
- Spam filter• CSU/DSU
- Router, Switch , Firewall • IDS/IPS• Bandwidth shaper
- VPN endpoint