1/4
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Site-to-Site VPN
Connects entire networks to each other, allowing branches or remote offices to communicate securely over the internet as if they were within the same local network. This setup is commonly used to connect geographically dispersed offices of an organization, enabling secure and private communications using encrypted tunnels over public networks.
Client-to-Site VPN
Also known as Remote Access VPN, allows individual clients (such as employees working remotely) to connect to the corporate network securely over the internet. It provides users with secure access to network resources and applications as if they were physically on the network, typically using VPN client software.
Clientless VPN - Allows users to securely access network resources through a web browser without the need for installing dedicated VPN client software. This configuration is useful for providing access to specific applications or services and is often utilized for secure, remote access to web applications and internal networks.
Split Tunnel vs. Full Tunnel VPN - In a split tunnel configuration, only network traffic for the corporate site passes through the VPN tunnel, while other traffic accesses the internet directly. This can reduce the load on the VPN gateway but may expose the traffic to security risks. With a full tunnel configuration, all of the client's internet traffic is routed through the VPN to the corporate network. This increases security as all traffic is encrypted but can lead to higher bandwidth usage and slower performance.
Connection Methods
Various methods are utilized to interact with network devices and systems, each serving specific purposes from configuration and management to troubleshooting. Common methods include SSH, GUI, API, and console connections, each offering different levels of control, security, and ease of use.
SSH - SSH is a cryptographic network protocol for secure remote login and other secure network services over an unsecured network. It provides a secure channel over an insecure network, replacing older protocols like Telnet that do not encrypt communications, and is widely used for managing servers and network devices remotely.
GUI - GUI provides a visual interface to interact with a computer or network device, making it accessible for users who prefer point-and-click interactions over command-line interfaces. They are commonly used in network management software, providing dashboards, configuration menus, and monitoring tools that simplify complex processes.
API - API allows for programmable interaction with network devices and systems, enabling automation, integration with other systems, and custom functionality. They are crucial for modern network management, allowing administrators to create custom scripts and applications that interact directly with network hardware and software.
Console Connection - Provides direct, physical access to network devices through a console port, typically using a cable and a terminal emulator. This method is essential for initial device setup, recovery, and troubleshooting when remote access is not possible, or the device is not yet configured for network connectivity.
Jump Box/Host
A secure computer that all administrators first connect to before launching any administrative task or accessing more sensitive parts of the network. It acts as a stepping stone from one security zone to another, providing a controlled means of access between different trust levels within or across network environments, often used to manage devices within a demilitarized zone (DMZ).
In-Band Management vs Out-of-Band Management
In-Band Management - Involves administering network devices through the same network connections and paths used for normal data traffic. This method allows network administrators to remotely manage devices using standard network tools and protocols, such as SSH or HTTP, which is convenient but depends on the network's operational status, making it vulnerable during network outages.
Out-of-Band Management - Uses a separate, dedicated channel for device administration, independent of the primary network infrastructure. This approach ensures access to network devices for monitoring, maintenance, and recovery even when the main network is down, providing a reliable alternative for critical management tasks that enhances security and uptime.