Basic Network Devices Flashcards
BPDU guard prevents what from happening? How
It prevents a rogue switch from becoming the root bridge. It does this by preventing Bridge Protocol Data Units being received from a switch that isn’t already known to the switch
BPDU guard is typically applied to which ports?
Access ports that don’t connect to known switches.
Besides BPDU guard, what other feature helps to protect the STP topology and where would you apply it?
Root Guard.
On all ports on the ROOT BRIDGE only (you don’t want any of the ports on the root bridge being told to point out to another root bridge, there should only be one)
How does Root Guard work?
If the root bridge receives a BPDU with a superior priority number it disables the port connecting to that switch.
Router ACL’s filter packets based on what 3 criteria?
IP address
Protocol
Port Number
ACL’s are applied on routers/firewalls or hosts using software, but what do you apply an ACL to?
The Ingress or Egress of an interface
How would you apply anti-spoofing on a router?
you would deny incoming traffic from the private address ranges for each of the address classes
type the command to deny class B private addresses inbound on a router interface
deny ip 172.16.0.0 0.15.255.255
What’s the difference between a stateful and a stateless firewall?
a stateful firewall will keep track of the status of TCP sessions and block traffic that isn’t part of an established session. A stateless firewall only uses ACL criteria to permit/deny traffic
Would you replace a firewall with a WAF?
No. WAFs are an added layer of protection in addition to the regular firewall
An ACL applied to protocols instead of interfaces is known as what?
Distribution List
Stateful firewalls work by using the TCP 3-way handshake but can also keep track of connections using UDP. TRUE or FALSE?
TRUE
ACLs can categorize and queue packets for applications that require QoS, TRUE or False?
True
How does a nontransparanet proxy improve security?
because it can filter requests to web pages using URL filters, restricting access to content that may contain malware. Transparent proxies don’t do any filtering.
How can a reverse proxy increase security?
It removes the need for direct connections to a web server, thereby adding a layer of protection. It also means the web server can be placed in the private network and not the DMZ