Lesson 8: Implementing a Secure Network Architecture Flashcards

1
Q

network architecture weaknesses

A
  • single points of failure—a “pinch point” relying on a single hardware server or appliance or network channel
  • complex dependencies—services that require many different systems to be available. Ideally, the failure of individual systems or services should not affect the overall performance of other network services
  • lack of documentation and change control—network segments, appliances, and services might be added without proper change control procedures, leading to a lack of visibility into how the network is constituted
  • overdependence on perimeter security—if the network architecture is “flat” (that is, if any host can contact any other host), penetrating the network edge gives the attacker freedom of movement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cisco’s SAFE architecture

A
  • good starting point for understanding the complex topic of network architecture design
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SAFE’s Places In the Network (PIN)

A

represents types of network locations, including campus networks, branch offices, data centers, and the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

email workflow

A
  • access–the client device must access the network, obtaining a physical channel and logical address (must be authenticated and authorized)
  • email mailbox server–ensure that mailbox is only accessed by authorized clients and that it is fully available and fault tolerant
  • mail transfer server–must connect with untrusted Internet hosts, so communications between untrusted network and trusted LAN must be carefully controlled
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

segment

A
  • one where all the hosts attached to the segment can communicate freely with one another
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

segregation

A

hosts in one segment are restricted in the way they communicate with hosts in other segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ethernet network

A

network segments can be established physically by connecting all hosts in one segment to one switch and all the hosts in one segment to one switch and all the hosts in another segment to another switch

  • the two switches can be connected by a router and router can enforce network policies or Access Control Lists (ACL) to restrict communications between two segments
  • because enterprise networks typically feature hundreds of switching appliances and network ports (not to mention wireless access and remote access), segmentation is more likely to be enforced using virtual LANs (VLANs)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

isolated segment

A

one that has no connectivity with other segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

air gapped

A

host or network segment that has no sort of physical connectivity with other hosts or networks is referred to as air gapped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

virtualization

A
  • segregation and isolation of hosts or applications can also be accomplished using virtualization
  • when a host is running as a guest OS on a hypervisor, connectivity with or isolation from other networks can be completely controlled via the hypervisor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

topology

A
  • description of how a computer network is physically or logically organized
  • essential to map the network topology when designing a computer network an to update the map when any changes or additions are made to it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

zone

A
  • main building of a security topology
  • area of network where the security configuration is the same for all hosts within it
  • should be segregated from one another by physical and/or logical segmentation, using VLANs, subnets, and possibly virtualization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

firewall

A
  • software or hardware that filters traffic passing into and out of a network segment
  • bases its decisions on a set of rules called an access control list (ACL)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

private network (intranet)

A

network of trusted hosts owned and controlled by organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

extranet

A

network of semi-trusted hosts, typically representing business partners, suppliers, or customers (hosts must authenticate to join extranet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

internet/guest

A

zone permitting anonymous access (or perhaps a mix of anonymous and authenticated access) by untrusted hosts over the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Internet-facing

A

an Internet-facing host accepts inbound connections from and makes connections to hosts on the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Demilitarized Zones (DMZs)

A
  • Internet-facing host are placed in one or more Demilitarized Zones (DMZs)
  • DMZ referred to as a perimeter network
  • traffic cannot pass through it
  • enables external clients to access data on private systems, such as web servers, without compromising the security of the internal network as a whole
  • if communication is required between hosts on either side of a DMZ, a host within DMZ acts a proxy
  • to configure a DMZ, two different security configurations must be enabled: one on the external interface
  • DMZ and intranet are on different subnets, so communications between them need to be routed
  • DMZ can also be established using a single router/firewall appliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

bastion hosts

A
  • hosts in a DMZ are not fully trusted by the internal network, because of the possibility that they could be compromised from the Internet
  • bastion host would not be configured with any services that run on the local network, such as user authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

differences between services designed to be accessible to a public Internet versus those for an extranet

A
  • dedicated DMZ for employee web browsing and proxy services
  • DMZ for email, VoIP, and conferencing servers
  • isolate remote access/Virtual Private Network (VPN) traffic
  • isolate traffic for authorized cloud applications
  • multi-tier DMZ to isolate front-end, middleware, and backend servers
  • multi-tier DMZ to isolate front-end, middleware, and backend servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

subnet

A
  • subdivision of larger network, isolated from the rest of the network by means of routers (or layer 3 switches)
  • useful for security, as traffic passing between each subnet can be subjected to filtering and access control at the router
  • important use of subnets is to implement a DMZ
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

three-legged firewall (or triple-homed)

A
  • one with three network ports, each directing traffic to a separate subnet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

screened host

A
  • Internet access can still be implemented using a dual-homed proxy/gateway server acting as a screened host
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

zone types

A
  • guest–zone that allows untrusted or semi-trusted hosts on local network
  • wireless–traffic from WiFi networks might be less trusted than from the cabled network
  • honeynet–network containing honeypot hots, designed to attract and study malicious activity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Cisco’s campus network hierarchy

A
  • access–allowing end-user devices, such as computers, printers, and smartphones to connect to the network
  • distribution–provides fault-tolerant interconnections between different access blocks and either the core or other distribution blocks
  • core–provides a highly available network backbone, such as clients and server computers should not be attached directly to the core
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

layer 2 Ethernet switches

A

basic Ethernet switch might also be referred to as a LAN switch, data switch, or workgroup switch

  • there are unmanaged and managed types
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

stackable

A

on a corporate network, switches are most likely to be managed and stackable, meaning they can be connected together and operate as a group

28
Q

modular

A

on a larger enterprise network, the switches are likely to be modular (as opposed to fixed), meaning they can be configured with different numbers and types of ports to support network links other than basic copper wire Ethernet

29
Q

switching and routing

A
  • this function can be implemented by several devices:
  • router–provides connectivity between subnetworks based on their IP address
  • Layer 3 switch–router appliances are capable of many different types of routing, especially over wide area networks (WAN), and tend not to have many interface ports
  • aggregation switch–functionally similar to layer 3 switches, but the term is often used for high-performing switches deployed to aggregate links in a larger enterprise or services provider’s routing infrastructure
30
Q

hubs

A
  • early Ethernet networks used hubs as a means of connecting network segments
  • multiport repeater
31
Q

collision domain

A

all ports are said to be in the same collision domain

32
Q

bridge

A
  • could be used to divide a network overloaded with hosts and suffering from excessive collisions into separate segments at the physical layer
  • bridge appliances have all been replaced by switches, but the function of a bridge continues to have an impact on network security because a user may accidentally (or maliciously) create a bridge from one network to another
33
Q

ad hoc network

A

created when wireless stations are configured to connect to one another in a peer-to-peer topology

  • computer could allow wireless clients to connect to it in either an ad hoc network or by being configured as a soft access point
34
Q

Spanning Tree Protocol (STP)

A
  • Layer 2 loops are prevented by the STP, defined in the IEEE 802.1D MAC Bridges standard
  • Spanning tree is a means for the bridges to organize themselves into a hierarchy and prevent loops from forming
35
Q

MAC spoofing

A
  • changes the Media Access Control (MAC) address configured on an adapter interface or asserts the use of an arbitrary MAC address
36
Q

ARP poisoning

A
  • attack works by broadcasting unsolicited ARP reply packets

- antiquated protocol with no security

37
Q

MAC flooding

A
  • variation of an ARP poisoning attack
  • can be directed against a switch
  • if a swtich’s cache table is overloaded by flooding it with frames containing different (usually random) source MAC addresses, it will typically start to operate as a hub (failopen mode)
38
Q

rogue devices

A
  • can potential create loops by incorrect placement of patch cables, access to the physical switch ports and switch hardware should be restricted to authorized staff, using a secure server room and/or lockable hardware cabinets
39
Q

port security

A

protection from an attacker who could unplug a device from an enabled port and connect their own laptop

40
Q

MAC filtering

A

configuring MAC filtering on a switch means defining which MAC addresses are allowed to connect to a particular port

41
Q

ARP inspection

A

additional a security feature, such as ARP inspection, prevents a host attached to an untrusted port from flooding the segment with gratuitous ARP replies by maintaining a trusted database of IP:ARP mappings and ensuring that ARP packets are validly constructed and use valid IP addresses

42
Q

DHCP snooping

A
  • inspects DHCP traffic arriving on access ports to ensure that a host is not trying to spoof its MAC address
  • can also be used to prevent rogue (or spurious) DHCP servers from operating on the network
43
Q

endpoint security

A

set of security procedures and technologies designed to restrict network access at a device level

44
Q

port-based network access control (PNAC)

A
  • PNAC means that the switch (or router) performs some sort of authentication of the attached device before activating the port
  • under the 802.1X, the device requesting access is the supplicant | switch, referred to as the authenticator, enables the Extensible Authentication Protocol over LAN (EAPoL) protocol only and waits for the device to supply authentication data
45
Q

authenticating server

A

typically RADIUS server, which checks the credentials and grants or denies access

46
Q

health policy

A
  • as well as authentication, most network access control (NAC) products allow administrators to devise policies or profiles describing a minimum security configuration that devices must meet to be granted network access
47
Q

admission control

A

point at which client devices are granted or denied access based on their compliance with the health policy

48
Q

preadmission control

A

device must meet policy to gain access

49
Q

postadmission control

A

subsequently polls the device to check that it remains compliant

50
Q

NAC policy enforcer

A

with preadmission control, supplicant client devices connect to the network via a NAC policy enforcer, such as a switch, router, or wireless access point

51
Q

NAC policy server

A

performs machine and user authentication with a RADIUS AAA server

52
Q

posture assessment

A
  • process by which host health checks are performed against a client device to verify compliance with the health policy
  • some NAC solutions can perform agentless posture assessment
53
Q

persistent v non-persistent

A

an agent can be persistent, in which case it is installed as a software application on the client, or non-persistent (dissolvable)

54
Q

remediation

A

refers to what happens if a device does not meet the security profile

55
Q

guest network

A

this would be a VLAN or a firewalled subnet (DMZ) granting limited access to network resources

56
Q

quarantine network

A

restricted network, captive portal (allows only HTTP traffic and redirects the HTTP traffic to a remediation server)

57
Q

rogue system detection

A

refers to process of identifying (and removing) hosts on the network that are not supposed to be there

58
Q

routers

A

can server both to join physically remote networks and subdivide a single network into multiple subnets

59
Q

border (or edge routers)

A

routers that join different types of networks

60
Q

routing protocols

A

Dynamic routers exchange information about routes using routing protocols, such as Open Shortest Path First (OSPF), Routing Information Protocol (RIP), and Border Gateway Protocol (BGP)

61
Q

IP spoofing

A

attacker changes the source and/or destination address recorded in the IP packet

62
Q

Network Address Translation (NAT)

A

devised as a way of freeing up scarce IP addresses for hosts needing Internet access

63
Q

Network Address Port Translation (NAPT) or NAT overloading

A

provides a means for multiple private IP addresses to be mapped onto a single public address

64
Q

source NAT

A

the types of NAT described so far involve source addresses (and ports in the case of NAPT) from a private range being rewritten with public addresses

65
Q

destination NAT (DNAT) or port forwarding

A

Port forwarding means that the router takes requests from the Internet for a particular application (say, HTTP/port 80) and sends them to a designated host and port on the LAN

66
Q

software defined networking (SDN)

A

application (or suite of applications) can be used to define policy decisions on the control plane. These decisions are then implemented on the data plane by a network controller application, which interfaces with the network devices using application programming interfaces (APIs)

67
Q

routing attacks

A
  • fingerprinting–port scanning using a tool such as Nmap can reveal the presence of a router and which dynamic routing and management protocols it is running
  • software exploits
  • spoofed routing information (route injection)
  • denial of service (DoS)
  • ARP poisoning
  • source routing