8 - 2: Secure Networking Design Flashcards
Firewalls
Group systems into network segments
Three network interfaces of border firewalls
Exterior internet,
First border
Between the protected interior network and the outside internet. Only allows traffic screened against security policy
Second border
Connects to org intranet, subdividing systems based on use, including endpoints, guest access, devices, etc.
Third border
Connects to the DMZ
DMZ
Demilitarized zone, where org systems that must connect with the outside internet, such as email, are kept secured. Extra layer in case of their compromise, considering the extra risk they face. Also called a screen sub-layer
Zero trust
A newer approach replacing the DMZ method, where systems do not gain special privileges based on network location
Extranets
Special intranet segments that allow outsiders access for maintenance and support
Honeynets
Decoy networks security teams use to attract attackers to study their behavior and capability
Ad hoc networks
Temporary networks that emerge outside typical security design, typically for use on a certain project or use case
East-West traffic
Network traffic between systems in a data center
North-South traffic
Network traffic between data centers and the internet
Virtual LANs
Logically grouped together systems regardless of where they are located
VLAN steps
1) enable VLAN trunking to allow switches in different locations to carry the same VLANs 2) configure each switchboard to connect to the appropriate VLAN
Where are firewalls placed?
Wherever a boundary is intended
Network data collectors
Network taps, port mirrors
Network data collector placement
Placed on the segment they are intended to collect data from
Aggregation / distribution switches
Connect downstream access switches to each other
Port mirroring
Allows traffic monitoring on a single switchport
Security Information and Event Management
Collects all kinds of data, including network data, and aggregates it. Best practice is to minimize distance between collection and record
Protection tools
Proxy servers and content filters
Protection tool placement
Within the DMZ
Correlation engine
Sensitive device that should be kept on a protected network
VPN concentrators
Aggregate inbound network connections from users, including remote access