Chapter 19 Terms and Topics Flashcards
What is the purpose of an ACL?
To manage which traffic can access the network.
An authentication mechanism that provides protection for secure network access.
IEEE 802.1x
Where not all traffic is routed via the VPN. Allows multiple connection paths, some via a protected route.
Split Tunnel VPN
Routes all traffic over the VPN, providing protection to all networking traffic.
Full Tunnel VPN
Security tool that helps protect web applications by filtering and monitoring HTTP traffic between a web application and the internet.
WAF [Web Application Firewall]
Network infrastructure that separates public and private functions into two distinct areas.
Screen Subnet
What types of servers are placed within a screened subnet?
Web servers, remote access servers, and external email servers to name a few.
What is the purpose of a BPDU?
To detect loops in network topologies. It contains information regarding ports, switches, port priority and addresses.
What functions does IPSec perform?
Encrypt application layer data. Provide security for routers sending routing data across the public internet. Provides authentication without encryption and protect network data.
TCP Port 20 for active transfers and Port 990 for implicit connections is used by
FTPS
Set of technologies that work on a network to control traffic and ensure the performance of critical applications with limited network capacity.
QoS
Network data that flows within an enterprise network.
east-west traffic
Data flowing between the enterprise network or data center and the outside of the network.
north-south traffic
Operates forward requests to servers based on a variety of parameters.
Forward Proxy
Sits behind the firewall in a private network and forwards clients requests to the appropriate backend server.
Reverse Proxy
Hardware device that allows network traffic to flow between two end-points in a network without interruption.
TAP [Test Access point]
A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
Firewall
An information security system that provides a single point of protection against threats.
UTM [Unified Threat Management]
Network security device that combines traditional firewall capabilities with other network device filtering functions.
NGFW
A method of mapping an IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device. It works by selecting gateways that sit between two local networks: the internal network and outside network. It reduces the need for IPv4 public addresses and hides private network address ranges.
NAT [Network Address Translation]
An extension of NAT that permits multiple devise on a LAN to be mapped to a single public IP address to conserve IP addresses.
PAT [Port Address Translation]