2.3 Explain the purposes and use cases for advanced networking devices. Flashcards

1
Q

Multilayer switches

A

• A switch (Layer 2) and router (Layer 3) in the same physical device

• Layer 2 router?
• Switching still operates at OSI Layer 2, routing still
operates at OSI Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wireless LAN controllers

A
  • Centralized management of WAPs
  • Deploy new access points
  • Performance and security monitoring
  • Configure and deploy changes to all sites
  • Report on access point use
  • Usually a proprietary system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Balancing the load

A
  • Distribute the load
  • Large-scale implementations
  • Fault tolerance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Load balancer

A
  • Configurable load
  • Manage across servers
  • TCP offload
  • SSL offload
  • Caching
  • Content switching
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IDS and IPS

A

• Intrusion Detection System / Intrusion Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

• Intrusions

A
  • Exploits against operating systems, applications, etc.

* Buffer overflows, cross-site scripting, other vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

• Detection vs. Prevention

A
  • Detection – Alarm or alert

* Prevention – Stop it before it gets into the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identification technologies

A
  • Signature-based
  • Anomaly-based
  • Behavior-based
  • Heuristics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Proxies

A

• Sits between the users and the external network
• Receives the user requests and sends the request
• Useful for caching information, access control,
URL filtering, content scanning
• Some proxies are invisible (transparent)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Application proxies

A
  • Most proxies in use are application proxies
  • A proxy may only know one application, i.e., HTTP
  • Many proxies are multipurpose proxies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VPN concentrator

A

• Virtual Private Network
Concentrator - Often integrated into a firewall
• Many deployment options
• Used with client software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Remote access VPN

A
  • On-demand access from a remote device

* Software connects to a VPN concentrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AAA framework

A
  • Identification - This is who you claim to be
  • Authentication - Prove you are who you say you are
  • Authorization • Based on your identification and authentication,

• Accounting -• Resources used: Login time, data sent and received, logout time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RADIUS (Remote Authentication Dial-in User Service)

A
  • One of the more common AAA protocols
  • Centralize authentication for users
  • RADIUS services available on almost any server operating system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

UTM / All-in-one security appliance

A
  • Unified Threat Management (UTM) / • URL filter / Content inspection
  • Malware inspection
  • Spam filter• CSU/DSU
  • Router, Switch , Firewall • IDS/IPS• Bandwidth shaper
  • VPN endpoint
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Next-generation Firewalls (NGFW)

A
  • The OSI Application Layer 7
  • Application layer gateway
  • Deep packet inspection
  • Stateful multilayer inspection

• Requires some advanced decodes

17
Q

VoIP technologies

A
  • PBX (Private Branch Exchange)
  • Connects to phone provider network
  • Analog telephone lines to each desk
18
Q

VoIP PBX

A

• Integrate VoIP devices with a corporate phone switch

19
Q

VoIP Gateway

A

• Convert between VoIP protocols and

20
Q

Content filtering

A
  • Control traffic based on data within the content
  • Corporate control of outbound and inbound data
  • Control of inappropriate content
  • Protection against evil
21
Q

• Protection against evil

A

• Anti-virus, anti-malware