Secure a Network Infrastructure Flashcards
Windows Firewall Software Defined Firewall IPSec DNSSEC SMB Message Analyzer
In which version of the Windows was the Windows (Defender) Firewall with Advanced Security MMC introduced?
Windows Vista / Server 2008 R1
What is the difference between the Windows Firewall M MC and the Windows Firewall control panel applet?
The MMC extension is far more configurable and intended for administrative use.
The Control Panel Applet allows for easier management of the more basic features. It is geared towards consumer use.
When configured through Windows Firewall, what functionality does IPSec offer?
IPSec enables the requiring of authentication from any device attempting to communicate with your device.
IPSec also can require that specific network traffic be encrypted.
What is the purpose of an isolation policy?
Domain isolation policies prevent devices joined to the domain from receiving unsolicited network traffic from devices that are not domain joined.
What is a boundary zone?
Boundary zones are for devices that must be able to receive requests from devices that are not isolated devices.
What is an encryption zone?
Encryption zones are for devices that store sensitive data and must be protected during network transmission.
What is a Connection Security Rule?
A rule in Windows Defender Firewall that contains a set of conditions and an action to be applied to network packets that match the condition. Can be configured to allow, block, or even require the packet to be protected by IPSec. Formerly referred to as an IPSec rule.
What is Certificate-based Isolation?
Certificate-based Isolation allows for adding devices that do not support Kerberos v5 into an isolated domain. Every device in the isolated domain that is unable to use Kerb v5 are given a device certificate that can allow them to authenticate with one another.
What are reasons to have a Host-Based Firewall?
Host-based firewalls secure devices by dropping all network traffic that does not match the administrator-designated rule set for permitted network traffic.
What are the benefits of using a Basic Firewall Policy Design doctrine?
- Network traffic that is a reply to a request from the local device is permitted.
- Network traffic that is unsolicited and matches a rule for allowed traffic is permitted
- Outbound traffic not specifically blocked is permitted
What mechanism of Windows Firewall can be used to restrict access to only trusted devices?
Connection Security Rules
In general, how do you secure a network from untrusted devices?
Authenticate traffic. This way only authenticated traffic is permitted to core resources.
In general, how do you obtain isolation using Windows Firewall?
Use Connection Security Rules to restrict traffic to be authenticated either with certificates or with Kerberos v5 in the AD domain
What are the benefits of domain isolation using Windows Firewall?
- Devices in the isolated domain accept unsolicited inbound traffic only when it can be authenticated as coming from another device in the domain. Exemption rules can be configured to allow inbound traffic from computers unable to utilize IPSec.
- Devices in the isolated domain can still send outbound traffic to untrusted devices and receive responses to the outbound requests.
How would you equip devices in a boundary zone to communicate with both protected internal devices and unprotected external devices?
Boundary zones would be configured to use connection security rules that request and do not require authentication.
What are the benefits of using Windows Defender Firewall?
Reducing the risk of network security threats.
Safeguard sensitive data and intellectual property
Extend value of existing investments
Does Windows Firewall encrypt traffic by default?
No. Windows Firewall makes no attempt to encrypt traffic by default. However, this can be enabled.
What does requiring authentication for connections not protect against?
Eavesdropping on the network traffic shared between two hosts if the traffic is unencrypted.
What are the benefits of encrypting traffic with Windows Firewall?
- Devices in the encryption zone require authentication to communicate with other devices
- Devices in the encryption zone require all inbound and outbound traffic to be encrypted
- Devices in the encryption zone are good candidates for isolation.
What are Network Access Groups (NAGs)?
Groups authorized to access a device that has its access restricted using Windows Defender Firewall.
How do you create a virtual “secure zone” within a domain isolation zone?
Configure Windows Firewall to restrict access to members of certain groups using Network Access groups.
What are the features of restricting access to servers to specific users and groups?
- Isolated services accept unsolicited inbound traffic only from devices that are members of the NAG
- Isolated servers can be implemented as part of an isolated domain and treated as another zone
- Server isolation can be configured independently of an isolated domain
- Server isolation zone can be simultaneously configured as an encryption zone
Why is AD Group Policy recommended as the configuration point of all Connection Security Rules?
AD Group Policy supports centralized management of all connection security rules. These rules can be applied, via GPO, to target servers or server groups (OUs).
You have configured server isolation using connection security rules. You need to configure those servers to be part of your encryption zone. What else would need to be configured?
Configure the devices with rules that force encryption along with restricting access to NAG members.
You have configured server isolation using connection security rules. You also need to configure those servers to be part of an isolated domain. What else would need to be configured?
Configure only devices that must communicate with the server with connection security rules to implement authentication and check NAG membership.
What is the benefit of using IPSec over just using Windows Firewall?
- Windows Firewall can restrict access on a given port to alist of defined source IPs
- IPSec allows the use of computer groups and dynamic IPs allow for more flexible security.
- In effect, IPSec allows for building identity-based Firewall Rules.
Can you utilize IPSec and the Windows Firewall in tandem?
Yes. In fact, IPSec requires the use of the Windows Firewall.
NOTE: Some 3rd party solutions are not compatible with the Windows Firewall and may disable the use of IPSec.
Are there any port requirements to using IPSec with Windows Firewall?
UDP 500 (IKE) is used during the key exchange
Where must Connection Security RUles be configured to ensure that two computers can create an IPSec connection?
Since both systems must agree on the parameters of the connection, connection security rules are required for both the source and the destination.
What is a Security Association?
Security Associations are created once two systems have agreed upon IPSec parameters, authenticated each other, exchanged key material, and agreed upon encryption and hashing algorithms.
Where do you configure a connection security rule?
- Windows Firewall MMC
- Group Policy via Computer Configuration \ Windows Settings \ Security Settings \ Windows Firewall with Advanced Security
What is the impact of a misconfigured Connection Security Rule?
A misconfigured CSR could very easily prevent a device from connecting on the network or being accessed. Undoing the damage may require console access to correct.
How do you create a Connection Security Rule?
- Launch the Windows Firewall with Advanced Security MMC or use Group Policy and load the Windows Firewall with Advanced Security section
- Right-Click “Connection Security Rule” \ Choose “New Rule”
What different types of settings can be configured in a Connection Security Rule?
- Isolation Rules that restrict connections based on authentication criteria, such as domain membership or health status.
- Authentication Exemptions that do not authenticate connections from specified computers
- Server-to-Server authenticates connections between specified computers
- Tunnel will authenticate connections between two computers
- Custom rules
In a connection security rule, how do you determine which systems are inbound or outbound systems?
Endpoints are where you specify the sides of the connection (Endpoint 1 and Endpoint 2)
Protocol and ports allows for selecting which ports on which side are being used. Since most apps use randomized source ports “All ports” usually specifies the sender.
What different authentication requirements can be configured for Connection Security Rules?
- Request authentication for inbound and outbound connections
- Require authentication for inbound connections and request authentication for outbound connections
- Require authentication for inbound and outbound connections
- Do not authenticate.
What different authentication methods can be chosen from via Connection Security Rules?
- Default (uses methods specified in IPSec Settings)
- Computer and User (Kerberos v5)
- Computer (Kerberos v5)
- Advanced (allows for customizing)
You have configured a connection security rule, what else needs done for a system to require authenticated connection?
Configure a firewall rule for the given protocol or application and specify that the connection must be secure “Allow the connection if it is secure”
You’ve configured connection security rules and restricted access to your systems. The networking team has reached out and informed you that they are unable to perform network packet inspection. What can you do to ensure that they can still perform this task?
On the firewall rule where “Allow the connection if it is secure” is configured, click customize and configure “Allow the connection to use null encapsulation”.
Where do you see if Security Associations have been established to a system?
Launch Firewall MMC \ Expand Monitoring \ Expand Security Associations \ expand “Main Mode”
Which Windows Firewall designs would provide the ability to protect devices from unwanted network traffic?
- Basic Firewall design
- Domain Isolation Policy Design
- Server Isolation Policy Design
- Certificate-based Isolation policy design
Which Windows Firewall designs would restrict access to only trusted devices?
- Domain Isolation Policy Design
- Server Isolation Policy Design
- Certificate-based Isolation Policy Design
Which Windows Firewall design would allow access only to specified users or devices?
- Server Isolation Policy Design
- Certificate-based Isolation Policy Design
In which version of Windows was the ability for most roles and features to auto-add their firewall configurations to the Windows Firewall added?
Server 2000
What is the function of Software Defined Networking?
- SDN provides a method to centrally configure and manage physical and virtual network devices such as routers, switches, and gateways
- Allows for deeper integration between virtual networks and physical networks.
What version of Windows is required for Hyper-V hosts to utilize SDN infrastructure?
Server 2016 Datacenter
What are some things that SDN Can do?
- Dynamically create, secure, and connect the network to meet the needs of applications.
- Speed up the deployment of workloads in a non-disruptive manner
- Contain security vulnerabilities from spreading across the network
- Define and control policies that govern both physical and virtual networks.
- Implement network policies consistently at scale.
- SDN can help reduce overall network infrastructure costs
What is “Datacenter Firewall”?
Datacenter Firewall is a new service in Server 2016. It is a network-layer, stateful, multitenant firewall that allows for tenant administrators to configure firewall policies to protect their virtual networks from unwanted traffic originating from the internet and adjacent intranet networks
What are the advantages of Datacenter Firewall?
- Scalable, manageable, and diagnosable software-based firewall that can be offered to tenants.
- Freedom to move tenant virtual switches to different compute hosts without breaking tenant firewall policies
- Offers protection to tenant VMs independent of the guest OS
- Allows tenants to define firewall rules to help protect internet-facing workloads
- Allows tenants to define firewall rules to help protect traffic on the same L2 subnet
- Allows tenants to define firewall rules to help isolate traffic between on-prem and virtual networks at the service provider.
What is a Network Controller?
Network controllers provide a centralized, programmable point of automation to manage, configure, monitor, and troubleshoot both physical and virtual network infrastructure. The configuration of the network infrastructure can be automated with a network controller.
What different APIs are supported by a Network Controller?
Southbound API - Allows Network Controller to communicate with the network.
Northbound API - Allows you to communicate with the network controller
What specific types of infrastructure can be managed with a network controller?
- Hyper-V VMs and Virtual Switches
- Physical Network Switches
- Physical Network Routers
- Firewall Software
- VPN Gateways (including RAS Multitenant gateways)
- Load Balancers
What is Hyper-V Network Virtualization?
Hyper-V Network Virtualization helps abstract applications and workloads from the physical network by using virtual networks. Virtual networks provide necessary multi-tenant isolation by running on a shared physical network fabric
What is a Hyper-V virtual switch?
Hyper-V virtual switch is a software-based layer-2 Ethernet switch available in Hyper-V manager after Hyper-V has been installed.
Hyper-V switches are programmatically managed and include extensible capabilities to connect VMs to both virtual and physical networks.