Course Notes Flashcards
(421 cards)
Switch
An OSI layer 2 device • Hardware bridging ASICs (very fast!) • Forwards traffic based on MAC address • The core of an enterprise network • High bandwidth - Many simultaneous packets
Router
An OSI layer 3 device • Routes traffic between IP subnets • Routers inside of switches are sometimes called “layer 3 switches” • Layer 2 = Switch, Layer 3 = Router • Often connects diverse network types - LAN, WAN, copper, fiber
Firewall
OSI layer 4 (TCP/UDP), some firewalls filter
through OSI layer 7
• Filters traffic by port number
• Can encrypt traffic into/out of the network
and between sites
• Can proxy traffic - A common security technique
• Most firewalls can be layer 3 devices (routers)
Load balancer
Distributes the load over many physical servers
• Very common in large environments
• Load balanced evenly across servers or
based on specific content types
Proxy
Sits between the users and the external network
• Receives the user requests and sends
the request on their behalf (the proxy)
• Applications may need to know how to
use the proxy (explicit)
• Some proxies are invisible (transparent)
All-in-one security appliance
Unified Threat Management (UTM) /
Web security gateway
• URL filter / Content inspection, malware
inspection, spam filter, CSU/DSU, router, switch,
firewall, IDS/IPS, bandwidth shaper, VPN endpoint
VPN concentrator
The connection point for remote users • Traffic is encrypted across the Internet and decrypted on the internal private network
Intrusion detection/prevention system
Protects against OS and application exploits • Detection • Alerts but does not stop the attack • Prevention • Blocks the attack
Protocol analyzer
- Captures network packets
- Decodes each part of the communication
- Sees all of the network conversation
Spam Filters
Stop unsolicited email at the gateway
• Whitelist
• Only receive email from trusted senders
• SMTP standards checking
• Block anything that doesn’t follow RFC standards
• rDNS - Reverse DNS
• Block email where the sender’s domain
doesn’t match the IP address
• Tarpitting
• Intentionally slow down the server conversation
• Recipient filtering
• Block all email not addressed to a valid
recipient email address
Web Application Firewall
• Applies rules to HTTP conversations • Allow or deny based on expected input • Protects against exploits like SQL injections and buffer overflows • Focus of Payment Card Industry Data Security Standard (PCI DSS)
Application-aware Security Devices
• Network-based Firewalls
• Control traffic flows based on the application
• Microsoft SQL Server, Twitter, YouTube
• Intrusion Prevention Systems
• Identify the application
• Apply application-specific vulnerability signatures
to the traffic
• Host-based firewalls
• Work with the OS to determine the application
Configuring firewall rules
• Allow or disallow traffic based on security tuples
• Source IP, Destination IP, port number,
time of day, application, etc.
• Evaluated top-to-bottom
• There’s an implicit deny at the bottom
VLANs
Logically separate your switch ports into subnets
• VLANs cannot communicate to each
other without a router
• Group users together by function
Secure router configuration
- Always change the default login / password
- Protect configuration file transfers
- TFTP - in the clear
- SCP - encrypted
- HTTPS - encrypted
Access Control Lists (ACLs)
• Permissions associated with an object
• Used in file systems, network devices,
operating systems, and more
Switch port security
- IEEE 802.1X
- Port-based Network Access Control (PNAC)
- Makes extensive use of EAP and RADIUS
- Extensible Authentication Protocol
- Remote Authentication Dial In User Service
- Disable your unused ports
- Enable duplicate MAC address checking / spoofing
Flood Guards
Commonly seen on intrusion prevention systems • DoS / DDoS • Denial of Service • SYN floods • Overload a server • Ping floods / ping scans • Overwhelm the network • Identify what’s out there • Port floods / port scans • Identify open ports on a device
Spanning Tree Protocol (STP)
- IEEE standard 802.1D
- Prevents loops in bridged (switched) networks
- Built into the switch configuration options
Network Separation
Separate switches, separate routers, no overlap
• Used in sensitive environments
• Logical separation
• Virtualization of the network infrastructure
Log Analysis
- Good for post-event analysis
- Can provide useful real-time analysis
- Automation and consolidation is the key
• Remote Access
An important requirement
• We are increasingly mobile
• Take advantage of encryption technologies
• Keep everything private
• Consider adding additional authentication
technologies (One-time passwords)
• Constantly audit your access logs
Telephony
One of the newest digital technologies
• And one of the most difficult to secure
• Firewalls generally don’t like VoIP technologies
• You’ll need protocol-specific application gateways
• Don’t forget your legacy telephony!
• Long distance still costs money
Network Access Control
A complex technology • But powerful when well engineered • Very useful in large open environments • Universities and large enterprises • Requires a large security infrastructure • Authentication is critical • Redundancy is required