Module 16: Configure Network and Device Security Flashcards
describe a
Demilitarized Zone (DMZ)
this is a part of your network whee you will place devices such as web servers that must be accessible from the internet.
it is a method for seperating your protected LAN from devices that must be exposed to the internet
this is a wireless network access method where only an SSID is needed to join the network
a further portal may be used after to accept conditions such as fair use
this is typically seen in public wifi networks such as cafes or hotels
what is
open authentication
name 6 steps that can
help secure a wireless network
- change default SSID and passwords - these can often be easily looked up on the internet making your network extemely vulnerable
- disable SSID broadcast - this helps to make your network invisible to anyone/ however it is not a silver bullet since packets transmitted can still be found
- configure encryption using WPA2 with AES - this will encrypt all traffic passing between your device and the access point
- configure MAC address filtering - again this is not a silver bullet since mac addresses can be easily spoofed but deciding who can access the network based on their IP address may offer some light protection
- port forwarding - configure any ports that should be forwarded to a specific device such as a web server using port 80
- DMZ - Configure the IPv4 address for the server in the DMZ.
this action on a firewall would occur when:
- it is a respnse to a message that originated inside the network
- it is a message bound for a port that you have preconfigured
in which two cases would a
firewall typically not block incoming traffic
in which two cases would a
firewall typically not block incoming traffic
this action on a firewall would occur when:
- it is a respnse to a message that originated inside the network
- it is a message bound for a port that you have preconfigured
example
FTP client will start a conversation on port 21 but then the server replies on port 20 this in a usual case is a problem since the conversation did not initiate on port 20 and so will be blocked
with port triggering. port 21 is the trigger port and when traffic goes outbound on port 21 then port 20 is opened for inbound traffic. this is also usefulll for gaming that may use a port for the game connection and a seperate port for voice communication
using FTP give an example of
port trggering
what is
open authentication
this is a wireless network access method where only an SSID is needed to join the network
a further portal may be used after to accept conditions such as fair use
this is typically seen in public wifi networks such as cafes or hotels
on a home router what are the 2 steps to
configure a DMZ
to configure this:
- on your router you will enable the DMZ setting and then enter the private IP address of any devices within your DMZ
- you will setup port forwarding. this is what will actually route the traffic to your device in the DMZ depending on what port you enable. if no ports are enabled your DMZ device is essentially still protected
describe
trigger ports
(usually configured on a router) is a port or a range of ports that outbound traffic will use. when the trigger port is used it will then allow the use of a seperate configured port for inbound traffic even if traffic on that port did not originate from inside the network. when the trigger port is no longer in use it also closes the other port which was allowing inbound traffic
using FTP give an example of
port trggering
example
FTP client will start a conversation on port 21 but then the server replies on port 20 this in a usual case is a problem since the conversation did not initiate on port 20 and so will be blocked
with port triggering. port 21 is the trigger port and when traffic goes outbound on port 21 then port 20 is opened for inbound traffic. this is also usefulll for gaming that may use a port for the game connection and a seperate port for voice communication
these are terms used to describe a threat actor trying to find vulnerable wifi networks by driving or walking around an area. sometimes chalk marks may be left outside a property to denote the state of the wireless network
describe
war driving / war walking
describe
war driving / war walking
these are terms used to describe a threat actor trying to find vulnerable wifi networks by driving or walking around an area. sometimes chalk marks may be left outside a property to denote the state of the wireless network
to configure this:
- on your router you will enable the DMZ setting and then enter the private IP address of any devices within your DMZ
- you will setup port forwarding. this is what will actually route the traffic to your device in the DMZ depending on what port you enable. if no ports are enabled your DMZ device is essentially still protected
on a home router what are the 2 steps to
configure a DMZ
this is a part of your network whee you will place devices such as web servers that must be accessible from the internet.
it is a method for seperating your protected LAN from devices that must be exposed to the internet
describe a
Demilitarized Zone (DMZ)
(usually configured on a router) is a port or a range of ports that outbound traffic will use. when the trigger port is used it will then allow the use of a seperate configured port for inbound traffic even if traffic on that port did not originate from inside the network. when the trigger port is no longer in use it also closes the other port which was allowing inbound traffic
describe
trigger ports