3.3 Implement Secure Network Designs Flashcards
Previously known as the DMZ, and allows public access to resources without access to internal network.
Screened subnet
A private network for partners like vendors and suppliers
Extranet
Holistic approach to network security that involves ensuring all devices, processes, and people are verified/nothing is trusted.
Zero trust
VPN that uses TLS protocols and doesn’t require a VPN client. Usually ran from a browser.
SSL VPN
VPN that provides on-demand access. Software connects to a VPN concentrator via a tunnel.
Remote access VPN
VPN type: traffic is encrypted through local concentrator and decrypted on the concentrator on the other side of the tunnel. Generally from firewall/concentrator to firewall/concentrator.
Site-to-site VPN
VPN type: Remote user connects to a VPN concentrator and all traffic must pass through the concentrator before being sent out to 3rd party sites.
Full tunnel
What is it called when a load balancer provides a preference connection to a specific server based off of a session ID?
Affinity
What major support is provided by HTML5 that allows use of SSL VPNs without installing a client?
API support
VPN type: Administrator can determine which traffic is allowed through the tunnel and what traffic can be transmitted over the public internet.
Split tunnel
Protocol used to connect sites over IP as if they were connected over layer 2. Commonly implemented with IPSec
Layer 2 tunneling protocol (L2TP)
What two main security features does IPSec provide?
encryption
packet signing (anti-replay)
What are the two main IPSec protocols?
Authentication Header (AH)
Encapsulation Security Payload (ESP)
What portion of a packet remains in the clear when sending IP packets via transport mode?
IP Header
True or false: When sending IP packets via tunnel mode, the IP Header is not encrypted.
False
An authentication header does not provide encryption, but rather what aspect of the data? (By using a hash and shared key)
Integrity
True or false: ESP provides authentication as well as encryption of IP packets?
True