GCGA Ch. 3 Exploring Network Technologies and Tools Flashcards
OSI Model
OSI Model ->
Please Do Not Throw Sausage Pizza Away
Physical Data Link Network Transport Session Presentation Application
TLS & SSL
Transport Layer Security - updated, more secure version of Secure Sockets Layer (SSL); both of these technologies use certificates to establish an encrypted session between client/server.
FTP & SFTP
File Transfer Protocol - used to send files over networks; SSH encrypts Secure Copy (SCP) and Secure FTP (SFTP). TLS encrypts FTPS.
SMTP & SMTPS
Simple Mail Transfer Protocol/Secure - uses TCP port 25 (original) and 587 (encrypted over TLS)
POP3
Post Office Protocol - uses TCP port 110 (original) and TCP port 995 (encrypted)
IMAP4
Internet Messaging Access Protocol - uses TCP port 143 (original) and TCP port 993 (encrypted)
HTTP & HTTPS
Hypertext Transfer Protocol/HTTP Secure - HTTP uses TCP port 80, HTTPS uses TCP port 443, encrypting browser-based traffic.
LDAP & LDAPS
Lightweight Directory Access Protocol/LDAP Secure - LDAP runs over TCP port 389; LDAPS runs over TCP port 636
RDP
Remote Desktop Protocol - connects graphically to remote systems over TCP 3389
NTP
Network Time Protocol - provides time synchronization services
DNS
Domain Name System - provides domain name resolution; includes A records for IPv4 addresses and AAAA records for IPv6. MX -> mail servers, MX w/ lowest preference is primary mail server; DNS uses TCP 53 -> zone transfers & UDP 53 -> client queries
DNSSEC
Domain Name Security Extensions - provides validation for DNS responses by adding a Resource Record Signature (RRSIG)
RRSIG
Resource Record Signature - provides data integrity & authentication; helps prevent DNS poisoning attacks
Switch
connects computer on local network; map MAC addresses to physical ports
Port security
limits access to switch ports; includes limiting # of MAC addresses per port and disabling unused ports
Router
connect networks to each other; direct traffic based on destination IP address; routers (and firewalls) use rules w/in access control lists (ACLs) to allow or block traffic
Route command
used to view/manipulate routing table
Implicit deny
indicates that unless explicitly allowed, it is denied; last rule in an ACL
Host-based firewalls
filter traffic in/out of individual hosts
Network-based firewalls
filter traffic in/out of network, such as between Internet/internal network
Stateless firewall
controls traffic between networks using rules within ACL; ACL can block traffic based on ports, IP addresses, subnets, and some protocols. Stateful firewalls, additionally, filter traffic based on state of a packet w/in session
WAF
web application firewall - protects a web server against web application attacks; typically placed in screened subnet, will alert administrators of suspicious events; works @ application layer (7)
NGFW
next generation firewall - perform deep packet inspection, analyzing traffic @ application layer (7)
Stateful inspection firewall
In computing, a stateful firewall is a network-based firewall that individually tracks sessions of network connections traversing it; also known as layer 4 firewalls