ch 6 Flashcards
Hardware or software device used to join two separate computer networks to enable communication between them
• Bridges
A device that connects network hosts intelligently.
• Switches
Forwards packets across different computer networks.
Operates at a Network Layer (layer3)
• Routers
acts upon data found in Network and transport layer protocols
• Layer 4 Load balancer
Distribute requests based on data found in application layer protocols.
• Layer 7 load balancer
a computer or an application program that intercepts user requests from the internal network and processes that request on behalf of the user.
Forward proxy
A special proxy server that “knows” the application protocols that it supports.
• Application/Multipurpose
Routs requests coming from an external network to correct internal server.
• Reverse Proxy
Does not require any configuration on the user’s computer.
• Transparent Proxy
Can be software or hardware based.
Both types inspect packets and either accept or deny entry.
• Firewalls
– Inspects incoming packet and permits or denies based on conditions set by administrator
• Stateless Packet Filtering
– (lets packets pass through)
Allow
– (prevent the packet from passing into the network and send no response to sender)
Drop
– (prevent the packet from passing into the network but send a message to the sender).
Reject
– Operates on a higher level by identifying applications that send packets through the firewall and make decisions about actions to take.
• Application-Aware Firewalls
– Special type of application aware firewall that looks deeply into packets that carry HTTP traffic. Can block specific sites of HTTP traffic
• Web application Firewall (WAF)
enables authorized users to use an unsecured public network as if it were a secure private network.
• (VPN) Virtual Private Network
a user to LAN connection
• Remote access VPN
Multiple sites can connect to other sites over the internet
• Site to Site
Allow the user to always stay connected.
• Always on VPNs
end of the tunnel between VPN devices, may be software on local computer or a VPN concentrator.
Endpoints
A dedicated hardware device that aggregates hundreds of thousands of VPN connections.
• VPN concentrator
some traffic is routed over the secure VPN, while other traffic directly accesses the internet.
• Split Tunneling
(SMTP)
Simple Mail Transfer Protocol