3.3 Given a scenario, implement secure network designs. Flashcards
gathers information to determine if the data being passed is malicious or not.
sensors
aggregation switch
An aggregation switch can connect multiple subnets to reduce the number of active ports. When aggregating subnets, the subnets are connected to the switch versus the router.
active/passive configuration
Sends all requests to one node while the other node is on standby. The secondary node takes over services when the primary node loses connectivity or goes offline.
virtual IP address
A virtual IP address is a shared (usually public) IP address between the two instances in a cluster. Requests go to one IP address and are routed, usually via a scheduling algorithm.
Persistence settings
Persistence settings allow an application-layer load balancer to keep clients connected to a session. This is achieved with a cookie at the client.
scheduling algorithm
The scheduling algorithm is the code and metrics that determine which node is selected for processing each incoming request. The simplest scheduling is round robin; this just means picking the next node.
extranet
An extranet is a zone created to allow authorized users access to company assets separate from the intranet.
DMZ
A demilitarized zone (DMZ) is an area of a network that is designed specifically for public users to access. The DMZ is a buffer network between the public untrusted Internet and the private trusted LAN.
Intranet
An intranet is an internal company zone established to allow employees the ability to share content and communicate more effectively.
Collector
A collector combines multiple sensors to collect internet traffic for processing by an Intrusion Detection Systems (IDS) and other systems. Depending on where the collector is placed determines the type of traffic analyzed.
Port mirror
A port mirror is used to monitor network traffic. It forwards a copy of each packet from one switch port to another.
NAT
Network Addressing Protocol (NAT) translates public IP addresses to private and vice versa. By using the NAT protocol on the firewall, a company can hide assets from the public internet.
Agentless Health assessment
An agentless health or posture assessment supports a wide range of devices, such as smartphones and tablets, but less detailed information about the client is available.
GLBP
Gateway Load Balancing Protocol (GLBP) is Cisco’s proprietary service to providing a load-balanced service with a VIP. The infrastructure is Cisco-based, so this service will most likely be implemented.
CARP
Common Address Redundancy Protocol (CARP) is another commonly used network protocol that works in the same way as GLBP.