Chapter 4 - Advance Networking Flashcards
What are switches?
Connects devices within a network.
Operates in the Data Link layer (layer 2)
What are routers?
Connects multiple networks together.
Operates in the Network Layer (layer 3)
Are VLANs an example of physical or logical network segmentation?
Logical
What are the other functions of a proxy server?
Caching - popular sites can be cached for quicker site retrieval.
Filtering - proxy based white/black listing domains and urls as a security service.
What are the two different types of Firewalls?
Network-Based Firewalls
- placed in line of network traffic that filters all traffic going in and out of a network
Host-Based Firewalls
- software based firework application that filters traffic in/out of a network node or machine.
What are Packet Filtering firewalls?
Firewalls that filter data packet based on headers such as IP address, ports, protocols etc.
Filtering based on a Access Control List (ACL)
What is an Access Control List?
A list that determines whether traffic is permitted or rejected.
Rules are analyzed from top to bottom to see if any rules match the traffic.
At the bottom of ACL should contain - Deny ‘ANY ANY ANY’
What are Stateful Inspection Firewalls?
Stateful Inspection firewalls analyze packets for the entirety of the session.
Packet filtering firewalls only analyze each packet as an individual object.
What are Application Proxy Firewalls?
Application Proxy Firewalls are firewalls with added capabilities of analyzing protocol specific commands.
The firewall understands data and commands for many protocols such as HTTP, SMTP etc.
Admins can configure these firewalls based on some commands and actions regarding a specific protocol.
What are Unified Threat Management Devices? (UTM)
UTM’s are a single device that houses multiple firewall and security capabilities such as:
- Packet Filtering
- Malware Blocking through AV
- URL management
etc.
What are the purpose of tunneling protocols?
Tunneling protocols encapsulate and encrypt this encapsulated data prior to data transmission.
What are the two constituents of IPSec?
Authentication Headers (AH) for authentication and integrity (protocol 51)
Encapsulation Security Protocol (ESP) for data encryption prior to transmission. (protocol 50)
L2TP/IPSec are used in conjunction together as an effective tunneling protocol.
What are the problems of using L2TP as a tunneling protocol?
Using a NAT service with L2TP corrupts the encrypted data.
NAT-T was created to allow L2TP/IPSec data to pass through NAT.
What are the two different IPSec modes?
Tunnel Mode:
- The entire packet is encapsulated, encrypted and transported over the Internet.
Transport Mode:
- Only the payload data is encrypted.
- This improves network performance and used for internal traffic.
How does the Challenge Handshake Authentication Protocol (CHAP) work?
- Server sends a “number used only once” nonce to the client.
- Client received the nonce, combines it with a shared secret between client and server.
- Nonce + shared secret is then hashed.
- Hash is sent to server for validation as it also knows the shared secret
- If hashes match, client is authenticated.