Chapter 8 - Advanced network devices Flashcards
Multi Layer Switch
Operates at both layer 2 (Data Link) and layer 3 (Network)
Performs basic functions of both a switch and router
Uses an Application Specific Integrated Circuit (APIS) to accomplish Routing
Examine packets to determine if it needs to send to another device on a different network using the IP Address.
If two network, it can use a segments of using the same IP Address.
!segment addresses must not overlap!
!giver option to configure two networks into one!
!assess packet forwarding on IP and MAC address!
Multi Layer Switch Benefits
Easy to use
as it’s auto configurable and no need to learn new IP switching technology
Convergence
by responding to route failures and routing technology changes
!understands routing protocols!
Resilience
Supports Hot Standby Router Protocol (HSRP) which eliminates a single point of failure, allowing device to to send to a stand by device without disrupting services.
Access List Support
Can filter traffic base on access list and prevents traffic crossing between subnets
Transparency
No new routing protocols implemented and supports DHCP
Standards Based
Internet Engineering Task Force (IETF) protocols like
Open Shortest Path First (OSPF)
Routing Information Protocol (RIP)
Simplified network design by retaining existing structure
Management
Analysis of Accounting and Traffic to generate reports
Wireless Controlers
Is centralised management device that manages and can configure all access points
What can some WLAN Controllers enable?
VPN connectivity
Intrusion detection
Firewall settings
It’s simple to connect to a wireless controller to give access to all WAP in the network
What a Wireless Controller Offers?
1/ Centralised Authentication
You don’t need to creat individual MAC Address Tables for each access point
Authentication performed by RADIUS, Active Directory and LDAP integration
2/ Interference Mitigation
Access Points operate in non overlapping channels
No loss of packets due to interference in a dense wireless network
3/ Load Balancing
Users shift to adjacent AP if load becomes unbalanced
It occurred when an AL has a higher number of users while a neighbour WAP has fewer
4/ Radio Balancing
Enables clients to connect only to 802.11n AP
5/ Fail Over
Automatic Shift to a neighbour WAP during failure
Load Balancers
A physical network appliance use to distribute traffic across multiple servers.
It also won’t forward requests to a sever which has failed.
!all servers have to perform the same task!
!at least have 1 consistency service. Servers can perform other tasks!
Load Balancer traffic routing
Based on
Availability
Resource utilisation
Number of connections to the server
Over all server performance
If server 1 is more robust than server two. You’d use server 1 to Handel more requests.
Load Balancer Benefits
Minimise probability of servers becoming overwhelmed by traffic
Optimise bandwidth to each computer or terminal
Minimise network downtime
Perform traffic prioritisation
Provide end to end application monitoring
Provide user authentication
Protect against malicious attacks like DoS
!Load balancers can be configured to reject non logo to mate requests! (Attacks)
IDS
Intrusion Detection System
Detects suspicious activity on a host or network
Analyses traffic patterns and tried to identify normal traffic
Other if the normal traffic considered an intrusion
Can mitigate detected activity using logs
!IDS doesn’t stop an attack! It only detects suspicious activity!
IPS
Detects and prevents attacks
Network firewall
Allows or Denys traffic based on packet header for
IP Address
Protocol type
Port Number
IDS Types
1/Host Based
Web sever or database server
2/Network Based
Must see all network traffic to identify suspect activity
3/Logs
Log suspicious activity to alert of the threat but doesn’t stop it.
IPS Types
1/Host Based
Runs on individual host on the network
2/Network Based
Must be able to see all network traffic to identify and prevent attacks
3/activity log
IPS activity logs alert of an occurrence and prevents the threat
Proxy Servers
Places in a DMZ
Implemented to eliminate direct connectivity between
1/ Internal clients from internet and
2/ external clients from internal recourses
- Protects host identity as outgoing traffic appears to come from the proxy*
- Uses public IP Address to collect requested internet data for clients*
Reverse Proxy
Listens for connection requests for a given network service like TCP vid port 80 for a website
Connection is then forwarded to internal host