3.3 Flashcards
Load balancing
Devices that move loads across multiple resources in an attempt not to overload one resource or device to start bottlenecking or throttling. Best for stateless systems.
Active/Active Load Balancing
All load balancers are active. If one of the active balancers fail then session interruption will surely occur since there is no backup balancer to take over.
Active/Passive Load Balancer
Needed in high availability solutions. One balancer will take all of the load and will work while there is a passive one that observes and will step in if the primary one fails.
Scheduling
There is a scheduling procedure for load balancers to decide which machine gets a request.
Two commonly used algorithms: affinity-based scheduling and round-robin scheduling.
Round Robin Scheduling (Load Balancing)
Round-robin involves sending new requests to the next server in the rotation. All requests are sent in equal amounts, regardless of the server load.
Weighted round-robin will take the server load or other criteria into considerations when assigning the next server.
Virtual IP
Load balancers use virtual IPs that allow for multiple systems to be reflected back as a single IP address.
Persistence (Load Balancing)
It is the condition where the system connects to the same target in a load-balanced system. Persistence is achieved through affinity-based load-balancing.
Affinity-based scheduling
Designed to keep a host connected to the same server across a session. Applications can benefit from this method.
Network Segmentation
It is a configuration for devices that allow access to certain portions of a network. This is good for, let’s say, a screened subnet or a DMZ where the internet and the intranet have access to this server but can’t be crossed directly. Usually meaning that the internet can’t cross a DMZ to get into the intranet.
Virtual Local Area Network (VLAN)
A VLAN allows for computers on different physical networks to act and communicate as if they were on the same network. This allows network flexibility, scalability, and performance and allows for Admins to perform network reconfigurations without having to physically relocate or re-cable systems.
Screened Subnet (Previously Known as Demilitarized Zone)
It is a screened subnet that is the buffer zone between the untrusted internet and the internal network of an organization. There are firewalls on each side that is used to stop anomalous traffic from the internet into the internal network and vice versa.
East-West Traffic
Data flow between devices within a portion of the enterprise.
Extranet
It is a semi-private network that uses common network services to share info and provide resources to business partners. It’s like the ability to share information between multiple organizations.
Intranet
It is a network that has the same functionality as the internet, but lies completely inside of the trusted area of a network and is under the security control of the system and network admins. Content on intranets are not available to the internet.
Zero Trust
Security model based on the belief that you shouldn’t trust any request without verifying authentication and authorization.
Virtual Private Network (VPN)
VPNs work to tunnel data between two connections. Any data from a VPN that is intercepted by an attacker cannot be read.
Always-on VPN
These are VPNs that don’t require additional user involvement and will automatically activate once an internet connection is sensed.
Split Tunnel vs. Full Tunnel
Split tunnel VPN is where some traffic is sent over VPN and other traffic is not. This can prevent bottlenecking.
Full- tunnel VPN is where all traffic is sent over VPN.
Remote Access vs. Site-to-Site
Site-to-Site communication links two network connection across an intermediary network layer. Site-to-internet-to-site. To secure traffic, a VPN or tunnel is needed.
Remote access via a VPN is bad because it’s like you’re letting a person connect directly to your machine and have free reign.
SSL/TLS
This protocol uses a public key encryption to exchange a symmetric key for use in confidentiality and integrity protection as well as authentication.
HTML5
Current version of HTML protocol. You don’t need as many plug-ins in order to make full use of HTML5. One of the enhancements is better compatibility of a VPN implementing a secure HTML5-based remote access solution.
Layer 2 Tunneling Protocol (L2TP)
L2TP is a tunneling protocol used to support VPNs. it is an extension of PPTP and L2TP can be used across all kinds of networks. L2TP in routers can concentrate VPN traffic over higher-bandwidth lines, create a hierarchy network to effectively manage across an enterprise. L2TP can also use IPSec and encryption tools.
Network Access Control (NAC)
NAC is used to manage the endpoints on a case-by-case basis as they connect to the network.