3.3 - Secure Network Designs Flashcards
What is Load Balancing?
Efficiently distributing incoming network traffic across a group of backend servers.
What can a load balancer be used for?
1) Configurable load (manage across servers)
2) TCP offload (protocol overhead)
3) SSL offload (encryption/ decryption)
4) Caching
5) Prioritization (QoS)
6) Content switching (application-centric balancing)
List a few ways to configure a load balancer.
1) Round-robin
- Each server is selected in turn
2) Weighted round-robin
- Prioritize the server use
3) Dynamic round-robin
- Monitor the server load and distribute to the
server with the lowest use
What is active/active load balancing?
The workload is distributed across all nodes in order to prevent any single node from getting overloaded.
What is affinity in load balancing?
Each user only talks to one server. This can be tracked through IP addresses or session IDs. Each user is “stuck” to one server.
AKA
Source affinity/ sticky session/ session persistence
What is active/passive load balancing?
Some servers are active while others are on standby. If an active server fails, the passive server takes its place.
What are some forms of network segmentation?
1) Physical segmentation
2) Logical segmentation with VLANs
3) Screened subnet (Logical)
4) Intranet/ Extranet
5)
How would one physically segment a network?
The devices are physically separate, so they cannot communicate with each other.
How would one logically segment a network?
Virtual Local Area Network (VLANs)
How would one segment a network with a screened subnet?
AKA DMZ
Firewalls separate a section of the network that interfaces with the internet, so people coming in can only access the resources within the DMZ.
What is an Extranet?
A private network for business partners. It usually requires additional authentication and only allows access to authorized users.
What is an Intranet?
A private network that this only accessible internally. It has internal servers, and it is only for employees.
NO external access. Only internal or VPN.
What is East-west traffic?
Traffic that flows within a data center. It is traffic between devices in the same data center. It has relatively fast response times.
Internal traffic
What is North-south traffic?
Ingress/ egress to an outside device. External traffic
It has a different security posture than east-west traffic.
What is zero trust?
A holistic approach to network security that covers every device, process, and person.
Nothing is trusted. There is multifactor authentication, encryption, system permissions, additional firewalls, monitoring and analytics, etc.
What is a VPN (Virtual Private Network)?
Encrypted (private) data traversing a public network.
What is a VPN concentrator?
An encryption/decryption access device that is often integrated into a firewall.
What is a SSL VPN (Secure Sockets Layer VPN?
A VPN that uses SSL/TLS protocol (HTTPS port 443).
Can be run on a light VPN client or from a browser. There is no requirement for digital certificates or shared passwords (like IPSec).
What is a HTML5 VPN?
A VPN that uses HTML 5. It creates a VPN tunnel without a separate VPN application. It includes comprehensive API support.
What is the difference between a full tunnel VPN and a split tunnel VPN?
Full tunnel:
All of the data is going across the encrypted tunnel. The user cannot break out of the tunnel to send information to another device directly.
Split tunnel:
Some information goes through the tunnel, but information can be sent to another device outside the tunnel.
What is a site-to-site VPN?
A connection between multiple networks.
This could be a corporate network where multiple offices work in conjunction with each other or a branch office network with a central office and multiple branch locations.
What is L2TP (Layer 2 Tunneling Protocol)?
A protocol often used in site-to-site VPNs that allows sites to connect over a layer 3 network as if they were connected at layer 2. It is commonly implemented with IPsec.
L2TP would be used for the tunnel and IPsec for the encryption (aka L2TP over IPsec or L2TP/IPsec).
What is IPSec (Internet Protocol Security)?
It is security for OSI Layer 3. It provides confidentiality and integrity (anti-replay).
There are two major IPSec protocols:
Authentication Header (AH)
Encapsulation Security Payload (ESP)
What are the two major modes of IPSec? Explain them.
There are two major modes:
Transport mode: IPsec header and IPsec trailers
around the data (IP header is still on the outside)
Tunnel mode: New IP header on the outside with the
old IP header and data surrounded by an IPsec
header and trailer
What are the two major IPSec protocols?
There are two major IPSec protocols:
Authentication Header (AH)
Encapsulation Security Payload (ESP)
How does an authentication header in IPsec work?
A hash of the packet and an authentication header is created.
The hash is used for data integrity. It guarantees the data origin and prevents replay attacks.
AH does not provide encryption.
How does ESP (Encapsulation Security Payload) in IPSec work?
It encrypts and authenticates the tunneled data, adding a header, trailer, and an integrity check value.
It can be combined with AH for integrity and authentication of the outer header.
What are broadcast packets?
Packets that send information to everyone at once within a broadcast domain.