Networking Flashcards
Switches: Bridge traffic in hardware using an application called?
ASIC
NAC 802.1X
This means you need to authenticate with a username and password before accessing a switch interface (port based). Either by using Extensible Auth Protocol or RADIUS.
Looping prevention
802.1D to prevent loops. Spanning Tree Protocol
Flood Guard
Flood the mac address table causing the table to overflow causing a DOS. If you incorporate a flood guard, that will give a maximum number of MAC addresses allowed on a particular interface.
What are proxies useful for?
Cashing information, content scanning, access control and url filtering.
Explicit proxy
You need to configure your OS or browser to use the proxy to be able to communicate to the internet.
Transparent proxy
End users don’t know a proxy is in the middle. No configuration is needed in the OS.
Application proxy
NAT. Some proxies know only HTTP. More advanced know HTTPS, FTP etc.
Forward proxy
A proxy which is in the inside of our network to help users protect themselves from the internet, this is a forward proxy. Used internally.
Reverse proxy
External, want to connect to internal. First need to connect to a proxy.
Open proxy
Set up and configured by a 3rd party. User can go around URL filtering by using an open proxy which allows the user to see an illegal site. (Like at school when playing games were blocked). Open proxy makes the request to the site on your behalf. Downside: Owner of the open proxy could manipulate the url response from the site back to the proxy then add malicious code to send back to the user.