Securing Networks Flashcards
What is a UTM?
Unified threat management.
An all in 1 device employ for network security. Provides a wide range of services like:
IPS/IDS
Firewall
Content Filtering
NAT
What is a firewall?
A device that filters traffic as it moves from an area of your network to another area of you network or to an area outside your network.
What is a stateless firewall?
Does NOT keep track of session information. Source destination and port#.
What is a stateful Firewall?
Does keep track of session information. Maintain aware of active connections. It sequences everything also. It can make a more inform decision.
What is an application based firewall?
Tracks sessions information. They track on Layer 7 and user behavior.
Ex. Guardicore
What is a screened subnet (DMZ) topology?
Is the buffer zone between the internet and private network. Your publicly accessible services are places here. You can control the traffic to protect your connection.
What is a Bastion Host / Jump Box ?
A device we setup in the DMZ zone to enhance remote access security.
You have to harden your jump box to prevent any compromise activity.
You make an SSH connection to the jumpbox then to the internal.
What is an IDS/NIDS system?
Intrusion detection system is a device that can alert you of any anomalies on your network for you to react. Traffic already reached the destination.
Its job is to alert but not react
What is an IPS/NIPS system?
Intrusion prevention system. It will alert you of any issues and prevent/react. It has to be inline on the traffic.
Signature based / stateful protocol analysis /
What is a proxy server?
An device that sits between a client that is requesting a resource and a server that is providing a resource.
Features:
It can mask the client from the server
Reverse Proxy - is from client to server
Maintain session persistence with the back end.
Load balancers
What is a VLAN?
Logical segmentation on the same physical switch.
What is IPSec?
A framework that provides the means of creating a secure trusted IP tunnel over untrusted networks
Confidentiality with encryption
Integrity with hashing
Authentication with RSA
Anti-replay with sequencing
What is Spanning-tree protocol used for?
Prevent layer 2 loop from crashing our L2 network
What is BPDU guard?
Prevent rogue devices from modifying our STP topology by sending bogus BPDU into our network
What are storm control used?
Rate limit the number of broadcast, multicast or unicast packets to prevent a storm