8 - 2: Secure Networking Design Flashcards
Firewalls
Group systems into network segments
Three network interfaces of border firewalls
Exterior internet,
First border
Between the protected interior network and the outside internet. Only allows traffic screened against security policy
Second border
Connects to org intranet, subdividing systems based on use, including endpoints, guest access, devices, etc.
Third border
Connects to the DMZ
DMZ
Demilitarized zone, where org systems that must connect with the outside internet, such as email, are kept secured. Extra layer in case of their compromise, considering the extra risk they face. Also called a screen sub-layer
Zero trust
A newer approach replacing the DMZ method, where systems do not gain special privileges based on network location
Extranets
Special intranet segments that allow outsiders access for maintenance and support
Honeynets
Decoy networks security teams use to attract attackers to study their behavior and capability
Ad hoc networks
Temporary networks that emerge outside typical security design, typically for use on a certain project or use case
East-West traffic
Network traffic between systems in a data center
North-South traffic
Network traffic between data centers and the internet
Virtual LANs
Logically grouped together systems regardless of where they are located
VLAN steps
1) enable VLAN trunking to allow switches in different locations to carry the same VLANs 2) configure each switchboard to connect to the appropriate VLAN
Where are firewalls placed?
Wherever a boundary is intended