8 Network Services, Virtualization, and Cloud Computing Flashcards
What is a screened subnet ?
formerly called a demilitarized zone [DMZ], is a network separated from the internal network by a firewall but also protected from the Internet by a firewall.
What are DNS servers ?
Domain Name System (DNS) servers resolve hostnames to IP addresses.
If a company wants to host its own website, it also needs to maintain two public DNS servers with information on how to get to the website. (Two servers are required for redundancy.) An advantage of using ISPs or web hosting companies to host the website is that they are then also responsible for managing the DNS servers.
Each DNS server has a database, called a zone file, which maintains records of hostname to IP address mappings.
If a DNS server doesn’t have an address in its zone file or its cache, it is configured to ask another, higher-level DNS server called the root server.
Within the zone file, some key record types are:
A (IPv4 host)
AAAA (IPv6 host)
MX (mail exchanger)
TXT (text)
DNS servers for intranet use only can be located on the internal network (inside the network firewalls). If the DNS server is being used for Internet name resolution, it’s most effective to place it in the screened subnet. DNS uses UDP or TCP port 53.
What is DHCP ?
Dynamic Host Configuration Protocol (DHCP) servers
DHCP servers are configured to provide IP configuration information automatically to clients, such as an IP address, subnet mask, default gateway, and the address of a DNS server.
DHCP servers are configured with a scope, which contains the information that the server can provide to clients. DHCP servers need at least one scope, but they can also have more than one.
Scopes contain an IP address pool, lease duration, address reservations, and scope options such as the default gateway and DNS server address.
If a client is on a different subnet than the DHCP server, the client’s network segment needs to have a DHCP relay agent, which will pass along the DHCP request.
If a Windows-based DHCP client is unable to reach a DHCP server, it will configure itself with an Automatic Private IP Address (APIPA) address. Those addresses have the format 169.254.x.x.
DHCP servers should be located on the internal network. If the network has clients that are connecting via remote access, then a device with DHCP capabilities (such as the Remote Access Service [RAS]) can be placed in the screened subnet. DHCP uses UDP ports 67 and 68.
What are Fileshare or File Servers ?
A fileshare or file server provides a central repository for users to store, manage, and access files on the network. There are a few distinct advantages to using file servers:
Ease of access to files for collaboration
Centralized security management
Centralized backups
Fileshares come in a variety of shapes and sizes. Some are as basic as Windows-, macOS-, or Linux-based servers with a large amount of internal hard disk storage space. Networks can also use network-attached storage (NAS) devices, which are stand-alone units that contain hard drives, come with their own file management software, and connect directly to the network. If a company has extravagant data storage needs, it can implement a storage area network (SAN). A SAN is basically a network segment, or collection of servers, that exists solely to store and manage data. Since the point of a fileshare is to store data, it’s pretty important to ensure that it has ample disk space. Some dedicated file servers also have banks of multiple optical drives for extra storage (letting users access files from optical media) or for performing backups. Processing power and network bandwidth can also be important to manage file requests and deliver them in a timely manner. As far as location goes, fileshares will almost always be on the internal network. You might have situations where a fileshare is also an FTP server, in which case the server should be on the screened subnet. In those cases, however, you should ensure that the server does not contain highly sensitive information or other data that you don’t want to lose.
What are Print Servers ?
Print servers are much like file servers, except, of course, they make printers available to users. In fact, file servers and print servers are combined so often that you will see a lot of publications or tools refer to file and print servers as if they were their own category.
On its own, a print server makes printers available to clients over the network and accepts print requests from those clients. A print server can be a physical server like a Windows-or Linux-based server, a small stand-alone device attached to a printer (or several printers), or even a server built into the printer itself. Print servers handle the following important functions:
Making printers available on the network
Accepting print requests
Managing print requests (in the print queue)
In some cases, processing and storing print jobs
What are Mail Servers ?
Email servers are responsible for sending, receiving, and managing email. To be a mail server, the computer must be running a specialized email server package. Some popular ones are Microsoft Exchange, Sendmail, Postfix, and Exim, although there are dozens of others on the market.
Clients access the mail server by using an email client installed on their systems. The most common corporate email client is Microsoft Outlook, but Apple Mail, HCL Notes (formerly IBM Notes and Lotus Notes), Gmail, and Thunderbird are also used. Mobile and Internet email clients (which are more popular than their corporate cousins) include the iPhone, iPad, and Android email clients; Gmail; Outlook, Apple Mail, and Yahoo! Mail.
In addition to sending and receiving email, mail servers often have antispam software
built into them as well as the ability to encrypt and decrypt messages. Email servers are most often located in the screened subnet.
Email Protocols:
Protocol Port Purpose
SMTP 25 Sending email and transferring email between mail servers.
POP3 110 Receiving email.
IMAP4 143 Receiving email. It’s newer and has more features than POP3.
What is Syslog ?
Syslog works as a client-server model, where the clients generate messages based on the
triggering of certain conditions, such as a login event or an error with a device, and send them to a centralized logging server, also known as the syslog server. Syslog uses UDP port 514 by default. Consequently, the term syslog can be applied to a standard or system for event monitoring, the protocol, or the actual server that collects the logged messages. Syslog got its start in the UNIX world and is used extensively with Linux-based networking systems and devices. Microsoft operating systems don’t natively support syslog—Windows comes with its own event logger called Event Viewer but
it’s easy to find packages that let Windows
servers participate in a syslog environment.
Syslog messages:
Messages have the following three components:
A Facility Code
The facility code is a number between 0 and 23 that identifies the type of device sending the message. For example, facility code 0 is for operating system kernel messages; code 2 is used by email servers; code 4 is for security messages; and code 6 is used by printers.
A Severity Level
The severity level lets the administrator know how urgent the issue is. The lower the level, the more urgent the message is. Facility codes and error levels can be helpful when sorting events on a syslog server, and they can also be used to send the administrator an alert if something catastrophic happens. Facility codes and severity levels are required message components.
A Text Description
The final portion of the message is the text description of the message itself. The description may be in easy-to-read
language, or it could be nonsensical
ranting. It really depends on the device developer and what they program it to be. There is no standardized format for the description, so it can come in any number of formats. Most messages do come with an IP address or device name included, but the lack of standardization can make understanding messages a challenge.
Syslog severity levels:
0 Emergency A panic condition when the system is unusable
1 Alert Immediate action needed
2 Critical Major errors in the system
3 Error “Normal” error conditions
4 Warning Warning conditions, usually not as urgent as errors
5 Notice Normal operation but a condition has been met
6 Information Provides general information
7 Debug Information used to help debug programs
What is a Syslog server ?
The syslog server’s job is to collect and store messages. Most syslog servers are made up of three components:
the listener, a database, and management and filtering software.
Syslog servers listen on UDP port 514 by default. Remember that UDP is a connectionless protocol, so the delivery of packets is not guaranteed. The default implementation of syslog is also not secure. However, you can secure it by running syslog over Transport Layer Security (TLS) and TCP port 6514. Regardless of whether you secure it or not, always place the syslog server behind your firewall and on the internal network. Even on small networks, devices can generate huge numbers of syslog messages. Therefore, most syslog implementations store messages in a database for easier retrieval and analysis.
Finally, most syslog servers will have management software that you can use to view messages. The software should also have the ability to send the administrator a console message or text (or email) if a critical error is logged. Dozens of syslog packages are available. Some popular packages are Kiwi Syslog by SolarWinds, Splunk, syslog-ng,
and Syslog Watcher.
What is a Web Server ?
Whenever you visit a web page, you are making a connection from your device (the client) to a web server. To be more specific, a connection is requested by your Internet software (generally, a web browser) using the Hypertext Transfer Protocol Secure (HTTPS) of the TCP/IP protocol suite. Your client needs to know the IP address of the web server, and it will make the request on port 443. The web server itself is configured with web hosting software, which listens for inbound requests on port 443. Two of the most common web server platforms are the open source Apache and Microsoft’s Internet Information Services (IIS), although there are a few dozen different packages available for use. Web servers provide content on request, which can include text, images, and videos, and they can also do things like run scripts to open additional functions, such as processing credit card transactions and querying databases. Individuals or independent companies can manage web servers, but more often than not an Internet service provider or web hosting company that manages hundreds or thousands
of websites manages them. If a company wants to host its own web server, the best place for it is in the screened subnet. The firewall can be configured to allow inbound port 443 requests to the screened subnet but not to allow inbound requests on those ports to make it to the internal corporate network.
What is triple A in information security ?
A framework for access control known involving authentication, authorization, and accounting (AAA).
Occasionally auditing is added to the mix, making it quad A.
Servers that handle all aspects of AAA:
Domain Controller: a centralized authentication server.
Remote Access Service (RAS)
Remote Authentication Dial-In User Service (RADIUS)
Terminal Access Controller Access-Control
System Plus (TACACS+)
Kerberos
Authentication
User authentication happens when the system being logged into validates that the user has proper credentials. Oftentimes, this is as simple as entering a username and password
There are two categories of authentication:
Single-Factor Authentication
A single-factor system requires only one piece of information beyond the username to allow access. Most often, this is a password. Single-factor authentication is
quite common, but it’s not the most secure method out there.
Multifactor Authentication
To increase security, your computer or network might require multifactor authentication, which as the name implies requires multiple pieces of information for you to log in. Generally speaking, in addition to a username, multifactor authentication requires you to provide two or more pieces of information out of these four categories: something you know, something you have, something you are, or somewhere you are.
Authorization
Users are allowed to perform only specific tasks on specific objects based on what they are authorized to do. Most computers grant access based on a system of permissions, which are groups of privileges. One of the key foundations of an authorization system is the principle of least privilege. This states that users should be granted only the least amount of access required to perform
their jobs, and no more. This principle applies to computers, files, databases, and all other available resources.