3.3 Secure Network Design Flashcards
Load balancing
Spreads network loads across a set of resources.
Used for websites, high bandwidth files, IRC (Internet Relay Chat)
Active/Active
Two servers working together to distribute the load.
Active/Passive
One server active and the second server or more is just observing ready to take over if the primary server fails.
Scheduling
A algorithm decides which machine receives the load.
Types of scheduling:
Affinity-based & Round-Robin
Affinity-Based Scheduling
Keeps the host connected to the same server for the entire session.
Directs all load balancing back to the same server.
Round-Robin Scheduling
Sends request to a new server each time, dose not matter how big the request is.
Virtual IP
Server creates virtual IPs to give to the end users so the request data from that server.
Persistence
Uses Affinity Scheduling, connects to the same target(server) in a load balancing system.
Network Segmentation
Separates servers or network devices off the Internet.
VLAN
Virtual Local Area Network
A LAN set of devices that are connected to a switch.
A VLAN is the same thing but is ran by software.
A trunk is used to send packets to other VLAN for communication.
Screened Subnet
Buffer zone between Untrusted network (Internet) and Trusted Network. Accomplished by placing Hardening devices between the two.
East-West Traffic
Data that flows through a enterprise
North-South Traffic
Data that flows outside the the enterprise.
Extranet
It is semi private network that allows users to request information from the Internet but masks the IP address by using a VPN.
Intranet
Private Network that only allows downloaded data to be shared across its network.
It can get information from the internet by using a proxy server and a cache server to slow down request for that same thing.
Proxy sever also stop inappropriate content from being shared.
Zero Trust
Security Model that doesn’t allow you to trust anyone without validating ID
VPN
Virtual Private Network
Protocols that allow packets to be sent across a unsecured network.
VPNs work because only the endpoints can decrypt the message.
Protocols: SSH, IPSec, L2TP, SSL/TLS
Always On
When a VPN senses a internet connection its auto-mantically turns on
Split tunnel vs. full tunnel
Splitting Traffic from a VPN. Increases speed but some packets are insecure.
Full gives full protection over the network
Site-to-Site
Encrypting traffic when connecting to a intermediary (public Internet)