3.3 Implement secure network design Flashcards
Load balancing: what is load balancing ?
A way to distribute the load that is incomming across multiple devices. Thereby, making the resource available to more user than having a single server in place.
Load balancing: what is one of the advantage of load balancer ?
Fault tolerance: if a server fail, the others ones can be use.
Load balancing: how load balancer work ?
Load balancing: can load balancer perform encyption ?
Yes, using SSL offload
Load balancing: how to configure a load balancer ?
- Round-robin
- Weighted round-robin
- Dynamic round-robin
- Active/active load balancing
- Active/passive load balancing
Load balancing: what is round robin way to configure load balancer?
The traffic is distributed turn by turn: each server is selected in turn
Ex: user1 get server1, user2 get server2 …
Load balancing: what is weighted round-robin way to configure load balancer?
The traffic is prioritize on one server over another.
Ex: one of the server will receive half of the available load and the other server would make up the rest of that load
Load balancing: what is dynamic round-robin way to configure load balancer?
Monitor the server load and distribute to the server with the lowest use
Load balancing: what is active/active load balancing way to configure load balancer?
All of the server are active simutaneously
Load balancing: what is “affinity” for load balancer?
Certains application may need to communicate through a load balancer will always be distributed to the same server.
This is done by tracked through IP address or sessions IDs
Network segmentation: what is network segmentation ?
Network segmentation is a network security technique that divides a network into smaller, distinct sub-networks that enable network teams to compartmentalize the sub-networks and deliver unique security controls and services to each sub-network.
Network segmentation: why network can be segmented ?
For performance (application with banwidth), security and compliance
Network segmentation: what are the different types of network segmentation ?
- Physical
- Logical
- Virtual
Network segmentation: what is network physical segmentation?
Devices are physically separate. Also refered as “air gap” as the 2 devices are not physically connected and need to be connected if they want to communicate
Network segmentation: what is the disadvantage of network physical segmentation?
Each device needs to be configured, updated and interface managed separately
Network segmentation: what is network logical segmentation?
Devices are logically separated using VLAN
Network segmentation: what is a screened subnet (DMZ)?
It refers to a network architecture where a single firewall is used with three network interfaces. It provides additional protection from outside cyber attacks by adding a perimeter network to isolate or separate the internal network from the public-facing internet.
Network segmentation: what is a extranet?
An extranet is a private network similar to an intranet, but typically open to external parties, such as business partners, suppliers, key customers, etc. The main purpose of an extranet is to allow users to exchange data and applications, and share information.
Network segmentation: what is an intranet?
A private network contained within an enterprise that is used to securely share company information and computing resources among employees
Network segmentation: what is zero trust principle?
Zero Trust is a security framework requiring all users, whether in or outside the organization’s network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.
VPN: what is a VPN?
Establish a protected network connection when using public networks. VPNs encrypt your internet traffic and disguise your online identity.
VPN: what is a VPN concentrator ?
VPN concentrators are used to connect many remote networks and clients to a central corporate network. They are used to protect the communications between remote branches or remote clients – such as workstations, tablets, phones and IoT devices – to corporate networks.
VPN: what is SSL VPN ?
VPN that uses common SSL/TLS protocol to communicate (port 443)
VPN: is a VPN always secure ?
No. VPNs expose entire networks to threats like distributed denial-of-service (DDoS), sniffing and spoofing attacks. Once an attacker or malware has breached a network through a compromised user device connected to it, it can bring down an entire network.
VPN: what is IPsec ?
An IPsec VPN is a VPN that uses the IPsec protocol suite to establish and maintain the privacy of communication between devices, apps or networks over the public internet. IPsec VPN uses a technique called “tunneling” to encrypt the data that is being sent between the device and the VPN server.
Port security: what are the different types of ports that exist ?
There are two classes of ports – physical and virtual. Physical switch interfaces is an example of a physical port while a TCP/IP port is an example of a virtual port. Virtual ports outnumber physical ports.
The logical (or virtual) port is the software port the link is made to from the other side of the internet.
Port security: what is the goal of physical port security ?
Control and protect the network by limiting overall traffic, watch for unusual or uwanted traffic
Port security: what are the different ways to bring physical port security ?
- Broadcasts
- Loop prevention
- Port fast
- DHCP snooping
Port security: what is broadcasts ?
Sends information to everyone at once so that every device examine the broadcast. However this is limited to the broadcast domain (ex: vlan)
Port security: what is loop ?
A loop occurs when 2 switches are connected to each other and send traffic bacl & forth forever. Leading to network down
Port security: what is 802.1D standard ?
A loop protection standard to prevent loops in switched network using a spanning tree protocol (STP)