Global Protect Flashcards
HIP Objects & Profiles
Host Information Profile or HIP objects provide the matching criteria for filtering the raw data reported by an agent or app that you want to use to enforce policy. For example, if the raw host data includes information about several antivirus packages on a client, you might be interested in a particular application because your organization requires that package. For this scenario, you create a HIP object to match the specific application you want to enforce.
The best way to determine the HIP objects you need is to determine how you will use the host information to enforce policy. Keep in mind that the HIP objects are merely building blocks that allow you to create the HIP profiles that your security policies can use. Therefore, you may want to keep your objects simple, matching on one thing, such as the presence of a particular type of required software, membership in a specific domain, or the presence of a specific client OS. With this approach, you have the flexibility to create a very granular, HIP-augmented policy.
Jamf
Jamf Pro is comprehensive enterprise management software for the Apple platform, simplifying IT management for Mac, iPad, iPhone and Apple TV.
SAML
Security Assertion Markup Language (SAML) is an open standard that allows identity providers (IdP) to pass authorization credentials to service providers (SP). What that jargon means is that you can use one set of credentials to log into many different websites. It’s much simpler to manage one login per user than it is to manage separate logins to email, customer relationship management (CRM) software, Active Directory, etc.
SAML transactions use Extensible Markup Language (XML) for standardized communications between the identity provider and service providers. SAML is the link between the authentication of a user’s identity and the authorization to use a service.
An example of SAML is when i used google to login to this app (brainscape).
Okta
saml identity provider
Radius
Remote Authentication Dial-In User Service (RADIUS) is a networking protocol, operating on port 1812[1] that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service. RADIUS was developed by Livingston Enterprises, Inc. in 1991 as an access server authentication and accounting protocol and later brought into the Internet Engineering Task Force (IETF) standards.
Because of the broad support and the ubiquitous nature of the RADIUS protocol, it is often used by Internet service providers (ISPs) and enterprises to manage access to the Internet or internal networks, wireless networks, and integrated e-mail services. These networks may incorporate modems, digital subscriber line (DSL), access points, virtual private networks (VPNs), network ports, web servers, etc.
RADIUS is a client/server protocol that runs in the application layer, and can use either TCP or UDP as transport. Network access servers, the gateways that control access to a network, usually contain a RADIUS client component that communicates with the RADIUS server.[4] RADIUS is often the back-end of choice for 802.1X authentication as well.
The RADIUS server is usually a background process running on a UNIX or Microsoft Windows server.
TACACS+
Terminal Access Controller Access-Control System Plus(TACACS+) is a protocol developed by Cisco and released as an open standard beginning in 1993. Although derived from TACACS, TACACS+ is a separate protocol that handlesauthentication, authorization, and accounting (AAA)services. TACACS+ have largely replaced their predecessors.
LDAP
- The Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. Directory services play an important role in developing intranet and Internet applications by allowing the sharing of information about users, systems, networks, services, and applications throughout the network. As examples, directory services may provide any organized set of records, often with a hierarchical structure, such as a corporate email directory. Similarly, a telephone directory is a list of subscribers with an address and a phone number.
- A common use of LDAP is to provide a central place to store usernames and passwords. This allows many different applications and services to connect to the LDAP server to validate users.
Duo
Cisco MFA (Multi Factor Authentication) provider owned by Cisco
Security Posturing
The security status of an enterprise’s networks, information, and systems based on information assurance resources (e.g., people, hardware, software, policies) and capabilities in place to manage the defense of the enterprise and to react as the situation changes.
CFIS
Church Financial Information System
3 components of GlobalProtect
GlobalProtect Portal
GlobalProtect Gateway(s)
GlobalProtect Client Software
GlobalProtect Portal
Central Point of Intelligence
Provides the management functions for the GlobalProtect infrastructure. Every client connecting to the GlobalProtect network receives configuration information from the portal.
- Authenticates users initiating connections to GlobalProtect.
- Ability to create and store custom client configurations.
- Maintains lists of internal and external gateways.
- Manages CA certificates for client validations of gateways.
- Portal can control clients ability to choose which gateway it connects to or to only allow a specific gateway.
GlobalProtect Gateways
Internal or External
Provide security enforcement for traffic from GlobalProtect agents and apps:
-External gateways provide security enforcement and VPN access for remote users.
-Internal gateways apply security policy for access to internal resources.
GlobalProtect Client Software
Windows/UWP Mac/iOS Android/Chromebook Linux App -Runs on end-user systems and enables access to network resources via the deployed GlobalProtect portals and gateways.
Is there communication between one GlobalProtect gateways and another? Or between gateways and portals?
No. Only communication only happens between clients and portals, or clients and gateways.