Chapter 12: Advanced Networking Devices Flashcards
Dedicated Server
A computer that only acts as a server, never a client.
Peer-to-Peer network
Any system can act as a server, a client, or both, depending on how you configure them.
Peer-to-Peer Applications (P2P)
Act as both client and server (uTorrent and shit)
Virtual Private Network (VPN)
- A network configuration that enables a remote user to access a private network via the Internet.
- Use tunneling
Point-to-Point Tunneling Protocol (PPTP)
- An advanced version of PPP that handles VPNs.
- Used on Windows.
Routing and Remote Access Service (RRAS)
A special remote access server program on which a PPTP endpoint is placed in Microsoft networks.
Web browser performance on a VPN
Hella fucking slower
Host-to-Site
Type of VPN connection where a host logs into a remote network as if it were any other local resource of that network.
Layer 2 Tunneling Protocol (L2TP)
A VPN protocol that uses IPsec
VPN Concentrator
The new endpoint of the local LAN in L2TP
Host-to-Host
Type of VPN connection in which a single host establishes a link with a remote, single host.
Site-to-Site
A type of VPN connection using two Cisco VPN concentrators to connect two separate LANs permanently.
SSL VPN
A type of VPN in which clients connect to the VPN server through a web browser, with the traffic secured by SSL
Portal SSL VPN
A client accesses the VPN and is presented with a secure web page. (Like myucsc and shit)
Tunnel SSL VPN
The client web browser runs some kind of active control, such as Java or Flash, and gains much greater access to the network.
Managed Switch
Switches that have extra programming and logic to handle switching, security, and many other functions
Console Port
Connection jack in a switch used to connect a computer that will manage the switch.
Out-of-Band Management
Method to connect to and administer a network device. An example is connecting a computer to the console port of a switch.
VLAN
Enables a single switch to support multiple logical broadcast domains
Trunking
The process of transferring VLAN traffic between switches
Trunk Port
A port on a switch configured to carry all traffic between switches in a LAN
Native VLAN
The specified VLAN designation that will be assigned to all untagged frames entering a trunk port in a switch
IEEE 802.1Q
Trunk standard that enables you to connect switches from different manufacturers
VLAN Trunking Protocol (VTP)
Cisco proprietary protocol to automate the updating of multiple VLAN switches.
3 states of VTP
1) server
2) client
3) transparent: tells it not to update
DHCP Relay
A router process that allows DHCP communications to cross from one network to another.
IP Helper
Command used in Cisco switches and routers to enable, disable, and manage internetwork forwarding of certain protocols.
Multilayer Switch
Switch that works on multiple layers of the OSI model.
Load Balancing
The process of taking several servers and making them look like a single server, for purposes of spreading shit out.
Round Robin DNS
Assigning multiple IPs to the same FQDN to share the load of DNS requests
Quality of Service (QoS)
Policies that prioritize traffic/bandwidth based on certain rules.
Traffic Shaping
Controlling the flow of packets into or out of the network according to the type of packet or other rules.
Shapers
Network devices that can implement traffic shaping
Port Bonding
The logical joining of multiple redundant ports and links between two network devices. Basically to improve performance.
Link Aggregation Control Protocol (LACP)
IEEE specification of certain features and options to automate the negotiation, management, load balancing, and failure modes of aggregated ports.
Intrusion Detection System (IDS)
An application that inspects packets looking for intrusions. Finds the intrusions after they have already hit.
Network-Based IDS (NIDS)
- Multiple sensors placed around the network that report to a central app that reads a signature file to detect weird stuff.
- Signature-based IDS
Host-Based IDS (HIDS)
- Software running on individual systems that monitors for out of the ordinary events.
- Behavior-based IDS
Intrusion Prevention System (IPS)
Sits directly in the flow of network traffic to stop intrusions.
Port Mirroring
Copying data from any or all physical ports on a switch to a single physical port.
Proxy Server
A device that fetches Internet resources for a client without exposing that client directly to the Internet.