Section 8: Securing Networks Flashcards
Switch
Operates at Layer 2
▪ Makes traffic switching decisions based on the MAC address of the
sending and receiving devices through transparent bridging
▪ A switch remembers devices and their switchports based on their MAC
CAM Table and MAC Flood
Content Addressable Memory (CAM) Table
▪ Stores information about the MAC addresses available on any given port
of the switch
o MAC Flood
▪ Causes a MAC address overflow to occur in the CAM table by flooding the
switch with random MAC addresses
Persistent MAC Learning (Sticky MAC)
Persistent MAC Learning (Sticky MAC)
▪ Enables an interface to dynamically associate the first MAC address that
it connected to as an authorized address
What can prevent a switching loop
Spanning Tree Protocol
ARP Poisoning/ARP Spoofing
▪ Sends malicious ARP packets to a default gateway on the network to
change the IP and MAC address pairings in its ARP table
Dynamic ARP Inspection (DAI)
▪ Intercepts all ARP requests and responses and compares each one to the MAC-IP bindings in a trusted table a Cisco switch has access to
6to4
▪ Provides the ability for IPv6 packets to be transmitted over a standard
IPv4 network without the need to create explicit tunnels
Teredo
▪ Provides full IPv6 connectivity for hosts even if they do not have a
connection to a native IPv6 network
Generic Routing Encapsulation (GRE) Tunnel
▪ Carries IPv6 packets across an IPv4 network by encapsulating them inside of GRE IPv4 packets
It is a best practice to include a ____ all rule at the end of an ACL
Most specific rules should be placed at the ___ of the list, with more
generic rules towards the ___
deny
top
bottom
Packet-Filtering Firewall
Packet-Filtering Firewall
o Only inspects the header of the packet to determine if
traffic is allowed or denied based on IP addresses and port
numbers
Similar to an ACL on a router, not very secure.
Kernel Proxy or Fifth Generation Firewall
o Has minimal impact to performance that it has on the
network, even while still conducting a full inspection of the
packet at every layer
Unified Threat Management (UTM)
● Provides the ability to conduct numerous
security functions within a single device or
network appliance
Firewall, VPN, Web Security, Email Spam Filtering, etc… all in one device.
Con: Single point of failure.
Web Application Firewall (WAF)
● Utilizes specific rule sets to prevent common attacks against web applications, such as cross-site scripting and SQL
injections
Deep inspection of http and https packets.
Forward Proxy vs Reverse Proxy
Forward/transparent proxy (Outbound traffic)
● is usually positioned at the edge of your corporate network and
regulates the outbound traffic according to specific policies your
organization has created
▪ Reverse proxy (Inbound traffic)
● content caching, traffic scrubbing (ddos), IP masking, and load balancing
If you host a website, and you have your website in America, you could place a reverse proxy in India, so that all clients in India will be able to access your website faster by connecting to the reverse proxy instead of your server directly.