3.3 secure network designs Flashcards
screened subnet
aka DMZ
a network architecture that uses a single firewall with three network interfaces.
Interface 1 is the public interface connected to the internet
Interface 2 connects to the demilitarized zone (DMZ)
Interface 3 connects to the intranet
extranet
private network that allows organizations to share information and applications with third parties. Third parties may include: Suppliers, Partners, Customers, Other businesses.
concentrator
encryption and decryption in a device
usually in the firewall
L2TP
Layer 2 tunneling protocol
a computer networking protocol that creates a connection between a device and a VPN server.
BPDU guard
SPANNING TREE PROTECTION
bridge protocol data unit guard
a security feature that protects the Spanning Tree domain from external influence
NAT gateway
network address translation
It’s a process that maps multiple private IP addresses to a single public IP address. This is done by changing the header of IP packets while they’re in transit through a router.
NAT can help improve security, privacy, and network performance. It can also reduce the number of IP addresses an organization needs.
FIM
file integrity monitoring
tests and checks operating system (OS), database, and application software files to determine whether have been tampered with or corrupted.
network based firewall
filter traffic by port number or app
encrypt traffic
layer 3 device
NAT functionality
stateless firewall
Stateless firewalls protect networks based on static information like the source and destination.
doesn’t understand traffic flows, rule based, relies on ACL
clunky, outdated technology
stateful firewall
network-based firewall that monitors the state of active network connections. It also analyzes incoming traffic for potential risks.
most are stateful, secure, and intelligent
UTM
universal threat management
all-in-one security appliance
A UTM appliance will usually include functions such as: antivirus, anti-spyware, anti-spam, network firewalling, intrusion detection and prevention, content filtering and leak prevention. Some units also provide services such as remote routing, network address translation (NAT), and virtual private network (VPN) support. The allure of the solution is based on simplicity, so organizations that may have had individual vendors or appliances for each separate security task can now have them all under one vendor umbrella, supported by one IT team or segment, and run through one console
WAF
web application firewall
applies to PCI DSS
proxies
a server application that acts as an intermediary between a client and a server. Proxies can be software or hardware.
- access control
- url filtering
- content scanning
jump server
A jump server creates a barrier between networks, which provides an extra layer of security against outsiders who may want to access sensitive company data.
Increase security: Create a barrier between networks and separate the user workstation from network assets
Reduce exposure: Minimize direct connections to internal resources, reducing the risk of security threats
HSM
hardware security module
safeguards and manages secrets (most importantly digital keys), performs encryption and decryption functions for digital signatures, strong authentication and other cryptographic functions
can be an appliance for multiple endpoints