8 - 4: Network Security Techniques Flashcards
Two major objectives
Perimeter security and limit physical access to authorized users and devices
Perimeter security
Keeping unwanted users out of the network entirely
Access Control Lists
ACLs, the records of users allowed past a firewall
Network Access Control
Intercepts network traffic coming from unknown devices and verifies authorization before beginning communication
Rules
The simplest form of restriction, expressed as technical terms or business logic
NAC Authentication protocol
802.1x
Three systems in NAC protocol
1) Device attempting to connect to NAC network, must be running a supplicant 2) a switch that the device connects to, if a wired network 3) back-end authentication server
Supplicant
Performs all NAC duties on behalf of user and system
Authenticator
On wireless systems, the device/switch which receives credentials from the end user
Back-end authentication server
In NAC, performs authentication for all authenticators on the network
Additional NAC capabilities
Role-based access and posture checking
Role-based access
Once the authenticator knows user identity, it decides where they are placed
Posture checkers
Verify that systems connecting to the network meet certain criteria, such as current antivirus software
Inbound NAC
NAC device is directly involved with making and enforcing access control
Outbound NAC
NAC device makes enforcement decisions, everything else makes the networking decisions
Firewall errors
Shadowed rule, promiscuous rules, orphaned rules
Shadowed rule
A rule base contains a rule that will never be executed because it is placed in the rule base. Occurs when rules are executed from general to specific
Promiscuous rules
Violate the rule of least privilege
Orphaned rules
When a system or service is decommissioned but the rules are not removed from the firewall
Standard Access Control List entries
access-list [number] [permit/deny] [source] [mask]
Extended Access Control Lists
Block addresses based on source and destination addresses, protocols, and ports
Why firewalls over routers?
1) purpose specific and efficient 2) advanced rule capability 3) integrate with and have advanced security function