Advanced Networking Devices Flashcards
PPTP VPNs
Point to Point Tunneling protocol
RRAS
Routing and Remote Access Service that Microsoft builds into Windows Server that uses PPTP
L2TP VPN
Layer 2 Tunneling Protocol; took all the good feature of PPTP and L2F and added support to run on almost any type of connection.
VPN Concentrator
Used by L2TP vpn that uses a VPN capable router instead of a server program
Difference Between L2TP and PPTP
L2TP requires no auth or encryption; and uses IPsec for all security needs.
SSL VPNs
Offers advantages over Data link or network Based VPNs because they don’t require any special client software. Clients connect to vpn over standard web browser with the traffic secured using TLS.
Two types of SSL VPNs
- SSL portal VPNs
2. SSL Tunnel VPNs
SSL Portal VPN
Client accesses VPN and is presented with a secure web page where they can access anything linked to that page.
SSL Tunnel VPN
Client web browser runs some kind of active control such as Java and gains more access to the VPN connected network.
DTLS VPNs
Datagram TLS VPNs optimize connections for delay sensitive application such as voice and video over a vpn. Uses UDP rather than TCP segments for communications.
DMVPN
Dynamic Multipoint VPN enables direct VPN connections between multipole locations directly. No need to travel through the main VPN point.
GRE
Generic Routing Encapsulation paired with IPsec for encryption.
VLAN
Virtual Local Area Network; allows you to segment a physical network into multiple discreet networks without having to add additional hardware.
Trunking
The process of transferring VLAN traffic between two or more switches
Trunk port
A port on a switch configured to carry all traffic, regardless of VLAN number bweteen all switches in a LAN.
Tagging
Access ports that are configured to do the work of tagging traffic with the appropriate VLAN when frames enter the switch
VTP
VLAN trunking protocol; allows automation of multiple VLAN switches
3 types of switch in VTP
- Server
- Client
- Transparent
When you change vlan config on server switch, all connected client switches update their configs within minutes.
VTP Pruning
a Tool for minimizing broadcast traffic.
InterVLAN routing
The process of making a router work between two VLANS
Relay Agent/DHCP Relay
Enabled within a router to pass DHCP messages across the router interfaces.
Load Balancing
Means making a bunch of servers look like a single server, creating a server cluster.
DNS Load Balancing
Each DNS server gets its own public IP address but has multiple A DNS records each with an FQDN. The DNS server then cycles around those records so the same domain name resolved to different IP addresses.
Conent Switch
Can read incoming HTTP and HTTPS requests and can perform such actions as handling SSL certs and cookies or removing workload from the web servers.
QoS and traffic Shaping
Quality of Service policies to prioritize traffic based on certain rules. Controlls how much bandwidth a protocol, pc, VLAN or IP can use.
Port Bonding (link aggregation, NIC Bonding, NIC teaming, port aggregation)
Connecting two or more ports together and are treated as a single connection allowing the throughput to be multiplied by the number of linked connectors.
PAgP
Port Aggregation Protocol; Ciscos version of Port bonding
LACP
Link Aggregation Control Protocol
LACP IEEE designation
IEEE 802.1AX-2014.
Network Protection has 4 areas, what are they?
- Intrusion protection/intrusion prevention
- Port Mirroring
- Proxy Serving
- AAA
Intrusion Detection/intrustion prevention
detect that something has intruded into a network and then do something about it.
IDS
Intrusion Detection System; is an application that inspects packets, looking for active intrusions. Inspects traffic inside a network and can discover internal threats.
Network Based IDS
consists of multiple sensors placed around a network often on one or both sides of the gateway router. These sensors report to a central application that reads a signature file to detect anything out of the ordinary.
Host Based IDS
software running on individual systems that monitors for events such as system file modification or registry changes.
IPS
Intrusion Prevention System; sits directly in the flow of network traffic. Can stop an attack while its happening. Network and bandwidth take a hit, and if it goes down the network might go down.
HIPS
Host based intrusion prevention system is located on the host.
NIPS
Network Intrusion prevention system.
Port Mirroring
Managed Switches capability to copy data from any or all physical ports on a switch to a single physical port. Used where admin needs to inspect packets coming to or from certain computers.
Proxy Serving
Sits between clients and external servers, pocketing the requests from the clients for server resources and making those requests itself.