Chapter 11 - Advanced Networking Devices Flashcards

1
Q

PPTP VPN

A

Point to Point Tunneling Protocol VPN
Creates tunnels between public networks
Now obsolete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Type of VPN connection where a single computer logs into a remote network and becomes a member of that network

A

Host-to-site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

L2TP VPN

A

Layer 2 Tunneling Protocol VPN
Developed by Cisco, uses VPN Concentrators
Has no authentication or encryption, so often paired with IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Connecting two VPN concentrators to connect two separate LANs permanently, enabling two LANs to function as a single network, sharing files and services as if in the same building.

A

Site-to-site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SSL VPN

A

Uses TLS (formerly SSL) to establish a secure connection over a web browser rather than using specific software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SSL Portal VPN

A

User is presented with a web page and gains access to anything linked to that page (email, data, other pages, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DTLS VPN

A

Optimize connections for delay-sensitive applications, such as voice and video over a VPN.
After establishing a traditional TLS tunnel, DTLS VPNs use UDP datagrams rather than TCP segments for communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DMVPN

A

Dynamic Multipoint VPN
Creates direct connections between multiple locations directly rather than using a central VPN location, which would create bottlenecks
Uses IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

GRE

A

Generic Routing Encapsulation
Can pair with IPsec to create a point-to-point connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In-Band Management

A

Uses the same network for management of network devices and regular user data. Simpler to set up but may be impacted if the network experiences issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Out-of-Band Management

A

Involves a separate, dedicated network for management of network devices. Provides a more secure and reliable means of managing devices, especially in critical scenarios.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trunking

A

Process of transferring VLAN traffic between two or more switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trunk Port

A

A port on a switch configured to carry all traffic, regardless of VLAN number, between all switches in a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VLAN Assignment

A

Process in which ports are assigned to a newly created VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Tagged Ports

A

Network ports that carry traffic for multiple VLANs. When a frame leaves a device on a tagged port, it includes a VLAN tag in its header, indicating to which VLAN it belongs.
Typically used in scenarios where a device needs to communicate with multiple VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Untagged Ports

A

Network ports associated with a specific VLAN. Frames leaving or entering through untagged ports do not include VLAN tags

17
Q

VLAN Trunking Protocol (VTP)

A

Cisco proprietary protocol used to automate the updating of multiple VLAN switches. When you make changes to the VLAN configuration of the server switch, all the connected client switches update their configurations within minutes.

18
Q

interVLAN Routing

A

The process of connecting separate VLANs through a single router

19
Q

Relay Agent/DHCP Relay

A

DHCP cannot natively pass IP addresses through a router. When this is configured, the router will pass DHCP messages across the router interfaces. So now we can use a single DHCP server to serve addresses to multiple networks or subnetworks.

20
Q

Cisco implements DHCP relay through a configuration command called ____

A

IP Helper
Command line- ip helper-address

21
Q

Multilayer Switches

A

Operates at both Layer 2 and Layer 3. Multilayer switches have the capability to perform routing functions, making them more versatile in handling complex network environments.
Use MAC addresses to forward frames in the same VLAN
Use IP addresses to route between different VLANs or subnets
Can perform interVLAN Routing without the need for an external router

22
Q

Load Balancing

A

Making a bunch of servers look like a single server, creating a server cluster.
Requests to these servers are distributed evenly so no one server is bogged down while another is idle.

23
Q

DNS Load Balancing

A

Each DNS server for the domain has multiple “A” DNS records, each with the same fully qualified domain name (FQDN). The DNS server then cycles around these records, so the same domain name resolves to different IP addresses.
When a computer comes to the DNS server for resolution, the server cycles through the DNS A records, giving them out in a round robin fashion.

24
Q

Content Switch/Content Filter

A

Network device designed to intelligently distribute network traffic based on content, application-layer information, or server health. It operates at Layer 7, making decisions based on information such as URLs, cookies, or application-specific data.

25
Q

QoS

A

Quality of Service
Policies that prioritize traffic based on certain rules. These rules control how much bandwidth a protocol, PC, user, VLAN, or IP address may use

26
Q

Traffic Shaping

A

Method of QoS where you control the flow of packets into or out of the network according to the type of packet or other rules

27
Q

Port Bonding

A

Joining two or more connections’ ports logically in a switch so that the resulting bandwidth is treated as a single connection, increasing speed
Also called Port Aggregation

28
Q

NIDS vs HIDS

A

Network Based Intrusion Detection System and Host Based Intrusion Detection System
Network Based scans for signatures
Host Based looks for behaviors

29
Q

Port Mirroring

A

Network management feature that involves copying and forwarding network traffic from one network port (or a set of ports) to another designated port. This is done for the purpose of monitoring or analyzing network traffic without disrupting the normal operation of the network.

30
Q

Proxy Server

A

Sits in between clients and external servers, and passes requests back and forth. The client computers never touch the outside servers and thus stay protected from any unwanted activity, as well as keeping the client locations hidden

31
Q

Forward Proxy Server

A

Acts on behalf of clients, getting information from various sources and handing that information to the clients. The sources (servers) don’t know about the clients, only the proxy server

32
Q

Reverse Proxy Server

A

Acts on behalf of the server, handling requests for clients, which don’t know about the server behind the scenes

33
Q

AAA

A

Authentication, Authorization, Accounting