Network+ basics Flashcards
Hub
Traffic going in one port is repeated to every other port.
Osi layer 1
Everything is half duplex.
10mb/100mb
Switch
ASIC
OSI layer 2 device
Fowards traffic based on data link address
may provide power over ehternet
many ports
Router
OSI layer 3 device
often connects wan,lan,fiber
Firewall
Filters traffic by port number
OSI layer 4, come can filter through layer 7
Can encrypt traffic into/out of the network
Can proxy traffic
WAP
Wireless access point
Not a router, is a single device.
OSI layer 2 device
Intrusions
Exploits against operating systems,applications
Buffer overflows,cross-site scripting.
Signature-based
Look for a perfect match
Anomaly-based
Build a baseline of what;s normal
Behavior-based
Observe and report
Heuristics
Use artificial intelligence to identify
Content filtering
Control traffic based on data within the content
Coporate control of outbound and inbound data
Control of inappropriate content
URL Filtering
Allow or restrict based on uniform resource locator
Managed by catefory
Can have limited control
Often invisble to encryption
Site-to-Site VPNs
Encrypt traffic between sites
Host-to-Site VPNs
Also called “remote access VPN”
Requires software on the user device
Host-to-Host VPNs
User to user encryption
Software-based
PPP
(Point-to-Point Protocol)
Authentication,compression,error detection
no encryption
Layer 2 Protocol
PPTP
Controls the tunnel
GRE is the tunnel
Sends multi-protocol traffic through the GRE tunnel
Authentication and encryption
MS-Chapv2
EAP-TLS
Encrypts the data with MPPE
SSL VPN
Uses tcp/443
usually client-to-site communication
Authenticate users
Can br run from a browser or vpn client
IPSec
Security for OSI layer 3
Authentication and encryption for every packet
Ecvryption and packet signing
Ah and ESP