Threat Defense Technologies Flashcards
AAA
Authentication, Authorization, Accounting
Authentication
Who is the user?
Authorization
Which resources the user is allowed to access and which operations the user is allowed to perform?
Accounting
What did they do?
AAA Uses
Device access/administration. Network Access.
Cisco Traffic Telemetry Methods
Network admin needs to monitor the kind of traffic, unusual network traffic, and device failures
Dates & time between devices should be accurate and sync(NTP-Network Time Protocol)
Notification about network device status or SNMP traps
Notification about unusualy network activity using logging
Exporting the network traffic flows using Net-flow
What is a Firewall?
A system or a group of systems that manages access between two or more networks
Wall=what traffic is allowed to pass between
Fire=Allowed traffic will be inspected based on security policies
Firewall configured between trusted and untrusted zones
Main scope to control traffic coming from untrusted zones(internet)
Reasons to have a Firewall
And essential element for network security
- Internal network and hosts are unlikely to be properly secured
- Internet is a dangerous place
- To prevent an attacker from launching DOS attacks
- To prevent unauthorized modification/access of internal data
Modern Firewall Design
Firewalls define traffic policies between security zones(Network Segments)
- Inside(Most trusted. LAN Users and endpoints)
- Outside(Untrusted Networks. Internet)
- DMZ(Maintain public servers/services. Accessible from the LAN and Internet)
IPS(Intrusion Prevention Systems)
Hardware/software used to detect and prevent intrusion or malicious traffic
- Identify, classify, then stop/block in real time
- Performs deep packet inspection.
- Examines network traffic flows to detect/prevent vulnerability exploits.
- Ensure that protocols are running per standards
- Identify intrusion, log information about intrusion
- Attempt to stop/block intrusion. report intrusion.
VPN(Virtual Private Network)
Using an intermediary group of logically connected devices to simulate p2p/p2m connections without needing to directly connection point-to-point
-Used primarily to reduce costs from using leased lines
X.25, frame relay, ATM, MPLS, L2TPv3, GRE,DMVPN,IPSEC
Next Generation Firewall Features
- Identity based access controls. Rules based on user/pass or security tags
- URL Filtering. Which users can access what websites
- Application and visibility control. What applications are you using while browsing(facebook, chat, audio, video)
- Next gen IPS(NGIPS)
- Advanced Malware Protection. Scan content to defend known and unknown malwares