Advanced Networking Devices Flashcards
PPTP
A protocol that works with PPP to provide a secure data link between computers using encryption.
L2TP
A VPN protocol developed by Cisco that can run on almost any connection imaginable. L2TP has no authentication or encrtption but uses IPsec for all its security needs.
in-band management
Allows configuration over the network.
out-of-band management
One port is dedicated as a management port. configuration can only be done via that port.
You’ll find out-of-band management options –management URL, modem connection, console port – on switches and on routers. CompTIA uses the term console router to describe a router with out-of-band management capabilities.
Trunking
is the process of transfering VLAN traffic between two or more switches. To do this you will need to configure a trunk port on each switch that will then carry all traffic, regardless of VLAN number, between all switches in a LAN
IEEE 802.1Q is the trunk standard
VLAN Tagging
multi-layer switch port addressing:
A switch opterating at layer 3 requires each port to have an IP address, because the routing table uses the IP addess to determine where to send packets. Cisco uses the terms switchport and router port to differentiate betweec the two types of ports.
Load Balancing
Means making a bunch of servers look like a single server, creating a server cluster.
DNS load balancing
Content Switch
QoS and Traffic Shaping
Port Bonding (link aggregation/NIC bonding/NIC teaming/port affrefation)
IDS
Intrusion Detection System – is an application (often running on a dedicated box) that inspects a copy of packets, looking for active intrusions. An IDS functions inside the network. Sits outside the flow of traffic.
An IDS in promiscuouus mode inspects a copy of every pcket on a network.
NIDS
Network Bases IDS – consists of multiple sensors placed around the network, often on one or both sides of the router.
NIDS scans using signature files, thus it is a signature-based IDS
HIDS
Host-based IDS – is software running on individual systems that monitors for events such as system file modification or registry changes.
A host-based IDS watches for suspicious behavior on systems, thus it is behavior-based IDS
IPS
Intrusion Preventions System – sit directly in the flow of traffic. Can directly stop an attack while it si gappening.
The network bandwidth and latency take a hit.
Proxy Server
sits between clients and external servers, essentially pocketing the repuests from the clients for server resources and making those requests itself. The client computers never touch the outside servers and thus stay protected from any unwanted activity.
Forward Proxy Server
Acts on behalf of clients, getting information from various sources and handing that informaition to the clients.
Reverse Proxy Server
Acts on behalf or its servers