2.4 Network Services Flashcards
1
Q
DNS server
A
- Domain Name System
– Convert names to IP addresses
– And vice versa - Distributed naming system
– The load is balanced across many different servers - Usually managed by the ISP or IT department
– A critical resource
2
Q
DHCP server
A
- Dynamic Host Configuration Protocol
– Automatic IP address configuration - Very common service
– Available on most home routers - Enterprise DHCP will be redundant
– Usually running on central servers
3
Q
File server
A
- Centralized storage of documents,spreadsheets, videos, pictures, and any other files
– A fileshare - Standard system of file management
– SMB (Server Message Block),
Apple Filing Protocol (AFP), etc. - The front-end hides the protocol
– Copy, delete, rename, etc.
4
Q
- Centralized storage of documents,spreadsheets, videos, pictures, and any other files
– A fileshare - Standard system of file management
– SMB (Server Message Block),
Apple Filing Protocol (AFP), etc. - The front-end hides the protocol
– Copy, delete, rename, etc.
A
File server
5
Q
Print server
A
- Connect a printer to the network
– Provide printing services for all network devices - May be software in a computer
– Computer is connected to the printer - May be built-in to the printer
– Network adapter and software - Uses standard printing protocols
– SMB (Server Message Block), IPP (Internet
Printing Protocol), LPD (Line Printer Daemon
6
Q
- Connect a printer to the network
– Provide printing services for all network devices - May be software in a computer
– Computer is connected to the printer - May be built-in to the printer
– Network adapter and software - Uses standard printing protocols
– SMB (Server Message Block), IPP (Internet
Printing Protocol), LPD (Line Printer Daemon
A
Print server
7
Q
Mail server
A
- Store your incoming mail – Send your outgoing mail
- Usually managed by the ISP or the IT department
– A complex set of requirements - Usually one of the most important services – 24 x 7 support
8
Q
- Store your incoming mail
– Send your outgoing mail - Usually managed by the ISP or the IT department
– A complex set of requirements - Usually one of the most important services – 24 x 7 support
A
Mail server
9
Q
Syslog
A
- Standard for message logging
– Diverse systems, consolidated log - Usually a central logging receiver
– Integrated into the SIEM (Security Information Event Manager) - You’re going to need a lot of disk space
– No, more. More than that.
10
Q
- Standard for message logging
– Diverse systems, consolidated log - Usually a central logging receiver
– Integrated into the SIEM (Security Information Event Manager) - You’re going to need a lot of disk space
– No, more. More than that.
A
Syslog
11
Q
Web server
A
- Respond to browser requests
– Using standard web browsing protocols - HTTP/HTTPS
– Pages are built with HTML, HTML5 - Web pages are stored on the server
– Downloaded to the browser
– Static pages or built dynamically in real-time
12
Q
- Respond to browser requests
– Using standard web browsing protocols - HTTP/HTTPS
– Pages are built with HTML, HTML5 - Web pages are stored on the server
– Downloaded to the browser
– Static pages or built dynamically in real-time
A
Web server
13
Q
Authentication server
A
- Login authentication to resources
– Centralized management - Almost always an enterprise service
– Not required on a home network - Usually a set of redundant servers
– Always available
– Extremely important service
14
Q
Spam
A
- Unsolicited messages
– Email, forums, etc. - Various content
– Commercial advertising
– Non-commercial proselytizing
– Phishing attempts - Significant technology issue
– Security concerns, resource utilization,
storage costs, managing the spam
15
Q
- Unsolicited messages
– Email, forums, etc. - Various content
– Commercial advertising
– Non-commercial proselytizing
– Phishing attempts - Significant technology issue
– Security concerns, resource utilization,
storage costs, managing the spam
A
Spam
16
Q
- Login authentication to resources
– Centralized management - Almost always an enterprise service
– Not required on a home network - Usually a set of redundant servers
– Always available
– Extremely important service
A
Authentication server
17
Q
Spam gateways
A
- Unsolicited email
– Stop it at the gateway before it reaches the user
– On-site or cloud-based
18
Q
- Unsolicited email
– Stop it at the gateway before it reaches the user
– On-site or cloud-based
A
Spam gateways
19
Q
All-in-one security appliance
A
- Next-generation firewall, Unified Threat Management (UTM) / Web security gateway
- URL filter / Content inspection
- Malware inspection
- Spam filter
- CSU/DSU (access to WAN)
- Router, Switch
- Firewall
- IDS/IPS (Intrusion Detection System, Intrusion Prevention System)
- Bandwidth shaper * VPN endpoint
20
Q
- Next-generation firewall, Unified Threat Management (UTM) / Web security gateway
- URL filter / Content inspection
- Malware inspection
- Spam filter
- CSU/DSU (access to WAN)
- Router, Switch
- Firewall
- IDS/IPS (Intrusion Detection System, Intrusion Prevention System)
- Bandwidth shaper * VPN endpoint
A
All-in-one security appliance
21
Q
Load balancers
A
- Distribute the load
– Multiple servers
– Invisible to the end-user - Large-scale implementations
– Web server farms, database farms - Fault tolerance
– Server outages have no effect - Very fast convergence
22
Q
- Distribute the load
– Multiple servers
– Invisible to the end-user - Large-scale implementations
– Web server farms, database farms - Fault tolerance
– Server outages have no effect - Very fast convergence
A
Load balancers
23
Q
Load balancer features
A
- Configurable load - Manage across servers
- TCP offload - Protocol overhead
- SSL offload - Encryption/Decryption
- Caching - Fast response
- Prioritization - QoS
- Content switching - Application-centric balancing
24
Q
- Configurable load - Manage across servers
- TCP offload - Protocol overhead
- SSL offload - Encryption/Decryption
- Caching - Fast response
- Prioritization - QoS
- Content switching - Application-centric balancing
A
Load balancer features
25
Proxy server
* An intermediate server
– Client makes the request to the proxy
– The proxy performs the actual request
– The proxy provides results back to the client
* Useful features
– Access control, caching, URL filtering, content scanning
26
SCADA / ICS
* Supervisory Control and Data Acquisition System
– Large-scale, multi-site Industrial Control Systems (ICS)
* PC manages equipment
– Power generation, refining,
manufacturing equipment
– Facilities, industrial, energy, logistics
* Distributed control systems
– Real-time information
– System control
– Requires extensive segmentation
– No access from the outside
27
* Supervisory Control and Data Acquisition System
– Large-scale, multi-site Industrial Control Systems (ICS)
* PC manages equipment
– Power generation, refining,
manufacturing equipment
– Facilities, industrial, energy, logistics
* Distributed control systems
– Real-time information
– System control
– Requires extensive segmentation
– No access from the outside
SCADA / ICS
28
* An intermediate server
– Client makes the request to the proxy
– The proxy performs the actual request
– The proxy provides results back to the client
* Useful features
– Access control, caching, URL filtering, content scanning
Proxy server
29
Legacy and embedded systems
* Legacy systems
– Another expression for “really old”
– May also be “really important”
– Learning old things can be just as important as
learning the new things
* Embedded systems
– Purpose-built device
– Not usual to have direct access to
the operating system
– Alarm system, door security, time card system
30
* Legacy systems
– Another expression for “really old”
– May also be “really important”
– Learning old things can be just as important as
learning the new things
* Embedded systems
– Purpose-built device
– Not usual to have direct access to
the operating system
– Alarm system, door security, time card system
Legacy and embedded systems
31
IoT (Internet of Things) devices
* Appliances
– Refrigerators
* Smart devices
– Smart speakers respond to voice commands
* Air control
– Thermostats, temperature control
* Access
– Smart doorbells
* May require a segmented network
– Limit any security breaches
32
* Appliances
– Refrigerators
* Smart devices
– Smart speakers respond to voice commands
* Air control
– Thermostats, temperature control
* Access
– Smart doorbells
* May require a segmented network
– Limit any security breaches
IoT (Internet of Things) devices
33
* Domain Name System
– Convert names to IP addresses
– And vice versa
* Distributed naming system
– The load is balanced across many different servers
* Usually managed by the ISP or IT department
– A critical resource
DNS server
34
* Dynamic Host Configuration Protocol
– Automatic IP address configuration
* Very common service
– Available on most home routers
* Enterprise DHCP will be redundant
– Usually running on central servers
DHCP server