Lesson 9 Implementing Secure Network Designs Flashcards
What is a Network Segment
A portion of a network where all attached hosts can communicate freely with one another.
What is zone
an area of the network where the security configuration is the same for all hosts within it.
Describe the intranet zone
a network of trusted hosts owned and controlled by the organization. Within the intranet, there may be sub-zones for different host groups, such as servers, employee workstations, VoIP handsets, and management workstations
What is an Extranet zone
a network of semi-trusted hosts, typically representing business partners, suppliers, or customers. Hosts must authenticate to join the extranet
What is a bastion host
A server typically found in a DMZ that is configured to provide a single service to reduce the possibility of compromise.
Described the screened subnet topology
uses two firewalls placed on either side of the DMZ. The edge firewall restricts traffic on the external/public interface and allows permitted traffic to the hosts in the DMZ. The edge firewall can be referred to as the screening firewall or router. The internal firewall filters communications between hosts in the DMZ and hosts on the LAN. This firewall is often described as the choke firewall.
Describe the Triple-Homed Firewall
using one router/firewall appliance with three network interfaces, referred to as triple-homed. One interface is the public one, another is the DMZ, and the third connects to the LAN. Routing and filtering rules determine what forwarding is allowed between these interfaces
What is East-West traffic
Design paradigm accounting for the fact that data center traffic between servers is greater than that passing in and out (north-south).
What is Zero Trust
Security design paradigm where any request (host-to-host or container-to-container) must be authenticated before being allowed
How can Zero Trust be implemented in a network
Continuous authentication and conditional access to mitigate privilege escalation and account compromise by threat actors
What is another way Zero Trust can be implemented in a network
applying micro segmentation by setting policies to a single node as though it was a zone of its own
What is ARP poisoning?
A network-based attack where an attacker with access to the target local network segment redirects an IP address to the MAC address of a computer that is not the intended recipient. This can be used to perform a variety of attacks, including DoS, spoofing, and Man-in-the-Middle.
What is a Broadcast storm?
Traffic that is recirculated and amplified by loops in a switching topology, causing network slowdowns and crashing switches.
What is a storm control setting on a switch
a backup mechanism to rate-limit broadcast traffic above a certain threshold
What is a BPDU guard?
a switch port security feature that can disable a port if it receives a BPDU from a connected device
What is MAC filtering?
Applying an access control list to a switch or access point so that only clients with approved MAC addresses can connect to it
What is Dynamic ARP inspection?
prevents a host attached to an untrusted port from flooding the segment with gratuitous ARP replies
What is Endpoint Security?
a set of security procedures and technologies designed to restrict network access at a device level
What is Port-Based network Access control (PNAC)
A switch (or router) that performs some sort of authentication of the attached device before activating the port.
How does PNAC - Port-based network access control work?
A switch uses an AAA server to authenticate the attached device before activating the port
What is Network Access Control (NAC)
A general term for the collected protocols, policies, and hardware that authenticate and authorize access to a network at the device level.