Chapter 3:Understanding Devices and Infrastructure Flashcards
TCP/IP Layers
4) Application
3) Transport
2) Internet
1) Network Interface
Antiquated Protocols
Protocols once needed but now serve no purpose
IPv4 address length
32-bits
IPv6 address length
128-bits
Command to show active ports
netstat -a
Windows Socket (Winsock) API
A Microsoft API used to interact with TCP/IP.
Internet Small Computer Systems Interface (iSCSI)
A protocol that enables the creation of storage area networks (SANs) and is used in sending storage-related commands over IP networks.
Fibre Channel
A high-speed networking technology designed to work like iSCSI but for fiber only. Cannot work across large networks.
Security Benefit of VLANs
Allow users with similar data sensitivity levels to be segmented together
Security Benefit of Tunneling
Sensitive data can be encapsulated into other packets and sent directly from one network to its destination
Point-to-Point Tunneling Protocol (PPTP)
- Encapsulates and encrypts PPP packets
- Weakness is that the negotiation between the two points in done in the clear
Layer 2 Forwarding (L2F)
- Tunneling protocol used primarily for dial-up
- No encryption
Layer 2 Tunneling Protocol (L2TP)
- Hybrid of PPTP and L2F
- Not encrypted by default, but can use IPSec for security needs
Secure Shell (SSH)
-Uses encryption to establish a secure connection between two systems
IPSec
A set of protocols that enable encryption, authentication, and integrity over IP.
IPSec Transport vs. Tunneling Mode
Transport encrypts only the payload whereas tunneling also encrypts everything
RAS
Remote Access Services
The Private IP Addresses
- 0.0.0-10.255.255.255
- 16.0.0-172.31.255.255
- 168.0.0-192.168.255.255
Telephony
Telephone technology combined with information technology
Biggest Security Problem with VoIP
If VoIP and data are on the same line then they are both vulnerable to a private branch exchange (PBX) attack
Appliances
Freestanding devices that operate in a largely self-contained manner.