Security Appliances Flashcards

1
Q

Network Segmentation Enforcement

A
  • Dividing network into clear areas for placement of security appliances
  • Applied at layers 2 and 3 with use of VLANS and subnets
  • Each segment is a separate broadcast domain
  • All traffic between them must be routed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Zone

A
  • Area of a network where the security configuration is the same for all hosts
  • Traffic between zones should be controlled by firewall
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Perimeter network Zone

A
  • Contains internet-facing hosts (that accepts inbound connections from the internet)
  • Traffic cannot pass through it directly
  • Allows external clients access to data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Proxy server

A
  • Host in perimeter zone configured to communicate to internal network
  • If a host on local network require connection with internet, proxy in perimeter zone takes request and retransmits it if valid
  • External hosts have idea what is behind perimeter
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bastion Hosts

A
  • Hosts in the perimeter zone
  • Typically web, mail, proxy and remote access servers
  • Not fully trusted by internal network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Screened Subnet

A
  • Uses two firewalls placed on either side of the perimeter network zone
  • Edge firewall interacts with public interface
  • Internal (choke) firewall filters communication between hosts in perimeter and LAN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Firewall

A
  • Processes traffic according to rules

- Blocks traffic that does not conform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Packet Filtering Firewal

A
  • Earliest type of firewall
  • Configured with rules in ACL (Access Control List)
  • Defines data packet type and what to do with it.
  • Works at layer 3 and scans headers of IP packets
  • Can make decisions based on source/destination IP, Protocol or source or destination port
  • Stateless, does not preserve information about connection between hosts
  • Vulnerable to attacks spread over packets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Stateful Inspection Firewall

A
  • Addresses problems of security and traffic flow from packet filtering FWs
  • Maintains stateful information about the session established
  • Info on sessions is stored on state table
  • Operates at Level 5
  • Checks each packet to see if it belongs to existing session
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Appliance Firewall

A
  • Stand-alone firewall that performs only firewall functions
  • Monitors all traffic in and out of network segment
  • Can be implemented as layer 2 or virtual wire (transparent)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Router Firewall

A
  • Functionality built into router firmware

- Used by SOHO routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Proxy Server

A
  • Forwards requests and responses on behalf of client
  • Deconstructs and analyzes packets before forwarding them
  • Placed in the perimeter network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Forward Proxy

A
  • Provides for protocol-specific outbound traffic
  • must understand application it is serving
  • Usually contain caching engines as well to negate the need to refetch pages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Transparent vs nontransparent proxy servers

A
  • Nontransparent: the client must be configured with proxy server address and port number
  • Often port 8080
  • Transparent intercepts traffic without having the client to be configured
  • must be configured inline on switch or router
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Reverse proxy

A
  • Provides for protocol specific in bound traffic
  • Often used for messaging or Voip servers which should not be in perimeter network
  • Publishing web server, message or conferencing applications and enabling pop/Imap retrieval
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NAT

A

Network Address Translation

  • Translates private addressing scheme used by LAN and public addressing scheme used by internet-facing device
  • Configured on border device
  • not a security tool
  • Supports multiple connections, but is limited by the number of public IP addresses
17
Q

PAT

A

Port Address Translation

  • AKA Network Address Port Translation
  • Allocates each new connection an ephemeral TCP or UDP port
  • Allows multiple connections on the same external IPs
18
Q

Defense in Depth

A
  • Placing security controls throughout the network

- Examples are NAC, honeypots, separation of duties and intrusion detection

19
Q

NAC

A
  • Authenticates endpoints at the point they connect to network.
  • Uses 802.1x port security, EAP, and AAA model of supplicants
  • Enables devices to be authenticated when they connect to the network
  • Authentication is done by certificates or passwords or health policy, which requires up to date security on the device
20
Q

Honeypot

A
  • System set up to attract attackers
  • Honeynet is entire decoy network.
  • Provides early warning and information on attacks
21
Q

Separation of Duties

A
  • Dividing duties and responsibilities between individuals to prevent conflicts or abuses
22
Q

IDS

A

Intrusion Detection System

  • Performs real-time analysis of traffic and logs
  • Configured with signature patterns
  • Requires sniffer to read frames
  • Does not slow down network or take actions again attackers
23
Q

IPS

A

Intrusion Prevention System

  • Provides active response to threats that match
  • Ends sessions with reset packets
  • Applies temporary filters or blocks
  • Commonly built into firewalls and proxy servers
24
Q

Triple Homed Router

A
  • Perimeter network configuration
  • 3 network interfaces
  • One faces public, one is perimeter subnet and one connects to LAN
  • Routing and filtering rules determine what filtering is allowed between interfaces
  • Can achieve similar configuration to screened subnet