3.2 Given a scenario, implement secure network architecture concepts. Flashcards

1
Q

Zones/Topologies

A

Firewalls allow the network administrator to divide the network into different network segments known as zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Zones/Topologies - DMZ

A

The DMZ is an area between two firewalls (typically referred to as external and internal firewalls) that allows selected traffic from the Internet to pass through the external firewall into systems within the DMZ. The purpose of the internal firewall is to not allow any traffic originating from the Internet to pass through it. The DMZ is where you place any servers that need to be reached by the general public, such as a web server, SMTP server, FTP server, or DNS server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Zones/Topologies - Extranet

A

An extranet zone includes servers that you want to make accessible to selected organizations via the Internet or other public
zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Zones/Topologies - Intranet

A

The firewall placed in front of the private LAN ensures that no traffic from any other network is sent through the firewall to the private LAN. Note that this zone could be called the private zone, private LAN, or intranet zone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Zones/Topologies - Wireless

A

The wireless network could be placed in a network zone of its own, which gives the firewall administrator the opportunity to control which zones the wireless client can access. For example, you may not want the wireless network to access the intranet or extranet zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Zones/Topologies - Guest

A

The guest zone is designed for visitors to your office location. Visitors typically do not need access to the private network or even the extranet zone; they typically just need Internet access to check e-mail and surf the Internet. You can create a guest zone that has access to the public Internet zone, but does not have access to any of the other zones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Zones/Topologies - Honeynets

A

Sun Tzu famously wrote in The Art of War, “All warfare is based on deception,” and “Know your enemies.” Cyberwarfare is occurring daily and security professionals on the front lines of network and system attacks recognize that these attacks mimic warfare in many ways. Honeypots and honeynets provide these professionals with some additional tools to use in this war.

A honeynet is a group of honeypots within a separate network or zone, but accessible from an organization’s primary network. Security professionals often create honeynets using multiple virtual servers contained within a single physical server. The servers within this network are honeypots and the honeynet mimics the functionality of a live network.

Honeypots and honeynets attempt to divert attackers from live networks. They give security personnel an opportunity to observe current methodologies used in attacks and gather intelligence on these attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Zones/Topologies - NAT

A

Many firewall solutions provide network address translation (NAT), which allows you to use a private address range on the inside of the network that is then translated to a public address used on the NAT device.

This is accomplished by the NAT device having one of its interfaces connected to the Internet (known as the public interface), while the other interfaces are connected to the private network (known as private interfaces).

The public interface is connected to the Internet and gets an IP address (a public IP address). The other interfaces on the NAT device are assigned private addresses, and all systems inside the network have a private address in that same range.

When someone on the private network tries to surf the Internet, for example, the packet first goes from the client computer to the NAT device, which switches the private source IP address of the packet to the IP address of the public interface on the NAT device. The packet is then sent out on the Internet so that as far as anyone on the Internet is concerned, it is the NAT device surfing the Internet. The rest of the systems remain hidden on the private network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Zones/Topologies - Ad hoc

A

Ad hoc networking involves a topology with no central server or device to create the network; you simply connect two devices together, such as two laptops on the fly, to create a network. A good example of this is an ad hoc wireless network where there is no wireless access point, just two laptops with wireless network cards that connect directly with one another so that the laptop users can share information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Segregation/Segmentation/Isolation

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Segregation/Segmentation/Isolation - Physical

A

One way to implement control on communication is to break your
network up into multiple physical network segments. A network segment can be created in a few different ways depending on what your goals are. For
example:

Multiple collision domains
If your goal is to have multiple collision domains, then you can segment the traffic by using a bridge, switch, or router. Each interface on each of these devices creates a collision domain, which is a group of systems that can have their data collide with one another.
Each of these collision domains is also known as a network segment, with the security benefit being that a hacker monitoring traffic while on a network segment by default can capture only traffic on that segment.

Multiple broadcast domains If you want to control how far your broadcast messages go on the network, you can use routers to break the network into multiple broadcast domains. The benefit of breaking the network into multiple broadcast domains with routers is that you can then use access control lists on the routers to control what traffic can enter or leave each of the networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Segregation/Segmentation/Isolation - Logical (VLAN)

A

If you wanted to create communication boundaries by dividing your network into different broadcast domains without using multiple routers, you could do so by using virtual LANs (VLANs) on a network switch. Once a system is connected to a port on a switch that is part of a particular VLAN, the system cannot communicate with systems in other VLANs unless a router is used to route the data from one VLAN to another VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Segregation/Segmentation/Isolation - Virtualization

A

Virtualization products nowadays allow you to segment traffic using virtual networks. With virtual networking, you can place virtual machines on different network segments and control which VMs can talk to one another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Segregation/Segmentation/Isolation - Air gaps

A

Air gap in the context of network segmentation is a conceptual term meaning a network has no connection point between two networks. For example, in highly secure environments, there may be a secret network and a nonsecret network. Due to the sensitivity of the secret network, there is to be no physical connection linking the two networks, thus creating an air gap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Tunneling/VPN

A

VPNs technology enables you to encrypt communication between two parties across an untrusted network such as the Internet

Another scenario where VPN can be used is with wireless networks. Because wireless security protocols are known to have flaws, you can treat the wireless network as an untrusted network and have a wireless client create a VPN connection to the server before allowing the wireless client to access the corporate network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tunneling/VPN - Site-to-site

A

If you need to secure all communication across the Internet between two networks, then you can configure a site-to-site VPN. With a site-to-site VPN, the secure tunnel is created by a central device at each office location. All clients on each network send data through the central encrypted tunnel, which gives the benefit of not needing to configure VPN software on each client system.

17
Q

Tunneling/VPN - Remote Access

A

When implementing your VPN solution, you can configure it for remote access, where the clients create an encrypted tunnel with the VPN server.

18
Q

Security Device/Technology Placement

A

When designing the network, it is important to place the different security devices at the right location on the network.

19
Q

Security Device/Technology Placement - Sensors

A

Sensors should be placed on each network segment so that they can capture network traffic for that network segment and send it to a collector or analysis engine.

20
Q

Security Device/Technology Placement - Collectors

A

You can place a single collector on any network segment and have each of the sensors send captured traffic to that collector.

21
Q

Security Device/Technology Placement - Correlation Engines

A

The correlation engine should be running on a system that has access to the data on the collector, and should be placed on a secure network segment.

22
Q

Security Device/Technology Placement - Filters

A

Filters are components that filter different types of traffic and should be placed on the edge of the network. For example, you can use URL filters on your proxy server to block specific sites from users. The proxy server is placed between the Internet connection and your users so that it can review each web site being visited and filter out web sites that have been disallowed.

23
Q

Security Device/Technology Placement - Proxies

A

A proxy is a device that is placed on the edge of the network between your Internet connection and the users. All requests for Internet resources are passed through the proxy so that it can filter out any unauthorized content.

24
Q

Security Device/Technology Placement - Firewalls

A

Firewalls should be placed at the edge of the network to protect the network from unauthorized traffic coming in from the Internet. You can also place a firewall between different network segments to control traffic between segments.

25
Q

Security Device/Technology Placement - VPN Concentrators

A

The VPN concentrator is placed at the edge of the network as well, but behind the firewall so that the firewall can block malicious traffic that may be headed toward the VPN concentrator. The firewall will need to open ports to allow VPN traffic to reach the VPN concentrator.

26
Q

Security Device/Technology Placement - SSL Accelerators

A

SSL accelerators can be placed inside any system or server that performs a large number of cryptographic functions

27
Q

Security Device/Technology Placement - Load Balancers

A

Load balancers are typically placed in the DMZ and are typically used to load balance requests to web applications. You can also place load balancers inside the network for network services that may require multiple servers to split the load.

28
Q

Security Device/Technology Placement - DDoS Mitigator

A

The DDoS mitigator is placed between the Internet and your public Internet resources, such as web sites and e-mail servers, so that it can protect those resources from DDoS attacks.

29
Q

Security Device/Technology Placement - Aggregation Switches

A

In most organizations, each floor has a switch in a wiring closet for that floor that the users on that floor connect to. The switch for each floor is then connected to an aggregation switch within the data center. That aggregation switch acts as a connectivity point for all switches, but also may be a layer-3 switch and be able to
route the traffic out to the Internet. If it is not a layer-3 switch, then it would connect to a router, which would then be connected to the Internet.

The aggregation switch is placed in a central server room for the office and typically is connected to the switch on each floor.

30
Q

Security Device/Technology Placement - Taps and Port Mirror

A

Network switches can be configured to send a copy of all network traffic to a port that you can run your monitoring software or IDS on. This is critical as switches filter traffic, preventing anyone but the destination from seeing that traffic. You can also install a network tap device, which would contain multiple ports, plus a monitor port, which receives a copy of all traffic.

You can place a network tap device on each network segment so that it sends a copy of all data to your monitoring system. The monitoring system is connected to the port mirror and runs software to monitor network traffic.

31
Q

SDN

A

Software-defined networking is a feature that can be configured within your virtualization environment that allows you to create virtual networks and segment network traffic.