Ch8 - 8.03 - Network Design and Administration Principles Flashcards

1
Q

Physical Segmentation - Multiple Collision Domains

A

If your goal is to have multiple collision domains, then you can segment the traffic by using a bridge, switch, or
router. Each interface on each of these devices creates a collision domain, which is a group of systems that can have their data collide with one another. Each of these collision domains is also known as a network segment, with the security benefit being that a hacker monitoring traffic while on a network segment by default can capture
only traffic on that segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Physical Segmentation - Multiple Broadcast Domains

A

If you want to control how far your broadcast messages go on the network, you can use routers to break the network into multiple broadcast domains. The benefit of breaking the network into multiple broadcast domains with routers is that you can then use access control lists on the routers to control what traffic can enter or leave each of the networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Virtual LANs

A

If you wanted to create communication boundaries by dividing your network into different broadcast domains without using multiple routers, you could do so by using virtual LANs (VLANs) on a network switch. You learned in Chapter 1 that once a system is connected to a port on a switch that is part of a particular VLAN, the system cannot communicate with systems in other VLANs unless a router is used to route the data from one VLAN to another VLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Air Gaps

A

Air gap in the context of network segmentation is a conceptual term meaning a network has no connection point between two networks. For example, in highly secure environments, there may be a secret network and a nonsecret network. Due to the sensitivity of the secret network, there is to be no physical connection linking the two networks, thus creating an air gap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network Address Translation (NAT) Overloading

A

All clients inside the network access the Internet using one public address assigned to the public interface of the NAT device. The NAT device not only translates the private IP address to a public IP address, but it translates the port address information as well. This is known as port address translation (PAT) and is used so that the NAT device can track each different client request over the one public address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Static NAT

A

Static NAT is when a single public IP address on the NAT device is mapped to a single private address inside the network. This is typically used to handle inbound requests to a server in the DMZ that the company is publishing to the Internet, such as a web site or FTP site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network Access Control (NAC)

A

Network access control (NAC) is a very hot technology today and allows you to control who gains access to a wired or wireless network based on the state of the connecting system. With network access control, you can specify conditions that a system must meet to gain access to the network. If those conditions are not met, you can then redirect the user to a restricted network from which they can remedy (set right) their system.

For example, you may require that for a system to connect to the network, it must have antivirus software installed, with the antivirus definitions up to date. You may also require that the system have a personal firewall enabled. If any of these conditions are not met, the NAC system then places the client on a restricted network where they can typically apply patches, or in this case, perform an update of the virus definitions.

When connected to the restricted network, the client has no access to network resources because communication to the private company network from the restricted network is controlled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NAC Concepts/Scenarios

A
  1. Connecting to wireless/wired
  2. Patch status
  3. Connecting to a switch
  4. Agent vs. agentless
  5. Permanent vs. Dissolvable
  6. Host health check
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Loss Prevention (DLP)

A

Organizations today are looking for ways to implement data loss prevention (DLP) solutions, which are designed to prevent data leaking outside the organization. DLP involves a number of security controls to ensure that data is not leaked outside the organization either intentionally or accidentally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mail Gateway

A

The mail gateway is the device or server that is placed in your DMZ that sends and receives e-mail for your organization. When people on the Internet send e-mail to employees within your organization, the mail is directed to the mail gateway within the DMZ. At this point, the mail gateway should do a virus scan and spam filter check on the message to ensure the message is a valid message clean of any viruses. Once the message passes the virus check and the spam filter, the mail gateway then forwards the message to your internal mail server. Keep in mind there is typically a firewall between the DMZ and the internal network, so you will need to configure a rule on this firewall to allow mail traffic from the mail gateway to the internal mail server
only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IPSec

A

IP Security, typically called IPSec, is a protocol that provides different security features depending on how it is configured. IPSec can provide three different security services:

  1. Authentication
  2. Integrity
  3. Confidentiality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IPSec - Protocols

A
  1. ESP
    The Encapsulating Security Payload protocol can provide all three services of authentication, integrity, and confidentiality.
  2. AH
    The Authentication Header protocol only provides authentication and integrity services. It cannot be used to encrypt the IP packet.
  3. IKE
    The Internet Key Exchange protocol is used to set up a security association (SA) between two parties. The SA is a unidirectional secure channel, so if the two parties want to send data to each other, typically two SAs are established—one for each direction. The IKE protocol is
    also the key management protocol for IPSec that allows the parties to exchange encryption keys.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IPSec - Transport vs. Tunnel Mode

A

IPSec can be configured to run in either transport mode or tunnel mode.

Transport mode is used for host-to-host encryption, meaning that if two systems want to encrypt communication between them, they run in transport
mode.

If you wish to encrypt communication from all systems on one network with all systems on another network, then you can configure IPSec for tunnel mode. The benefit of tunnel mode is each client system, or host, does not need to have IPSec configured; you simply configure IPSec on the gateways to each of the networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VPN - Full Tunnel

A

Full tunnel is the traditional implementation in which a user launches VPN software from a remote network, such as their home network, to create an encrypted tunnel between their system and the corporate network VPN server. One of the problems users experience with full tunnel is that they cannot access any resources on the LAN they are connected to (in this case, the home network); for example, if they want to print to their home printer, they cannot because technically once the VPN connection is made, the user is on the corporate network and can access only those resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

VPN - Split Tunnel

A

Split tunnel is a VPN feature that allows the user to access the corporate network through the secure VPN tunnel after the VPN software has been launched, but retain the capability to access LAN resources. The split tunnel feature can specify which destination systems are to have their traffic delivered through the tunnel and which traffic stays on the LAN. This is known as split-include tunnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SSL Decryptors

A

SSL and TLS decryptors are devices on enterprise networks used to decrypt a message so that DLP policies can review the contents. They are also used so malware detection features can scan the message after it is decrypted, or to allow cloud monitoring services to scan the message.

17
Q

Media Gateway

A

A media gateway device is a component that is used to translate data streams from one form of communication to another. For example, the media gateway can translate data on your network to a format used by 3G radio networks.

18
Q

DDoS Mitigator

A

A DDoS Mitigator would be placed between the Internet and your public Internet resources such as web servers and email servers. The DDoS mitigator is a device that monitors network traffic coming from the Internet to your public servers and identifies traffic that may be designed to overburden your servers. The mitigator checks characteristics of the packet including the source IP address and the HTTP header to determine if the traffic is coming from a bot. If so, the mitigator blocks that traffic so that it does not reach your public server.

19
Q

Aggregation Switches

A

In most organizations, each floor has a switch in a wiring closet for that floor that the users on that floor connect to.

The switch for each floor is then connected to an aggregation switch within the data center. That aggregation switch acts as a connectivity point for all switches, but also may be a layer-3 switch and be able to route the traffic out to the Internet. If it is not a layer-3 switch, then it would connect to a router, which would then be connected to the Internet.