network devices cont, secure network design,

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/31

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

32 Terms

1
New cards

false positive errors

  • IDS/IPS trigger an alert when an attack did not actually take place

2
New cards

signature detection systems

  • contains databases with rules describing malicious activity

  • alert administrators to traffic matching signatures

  • fails to detect brand new attacks

  • reduce false positive rates

3
New cards

anomaly detection systems (aka behavior based or heuristic detection)

  • build models of normal activity

  • alert admins to activity not matching the model

  • increased false positive rate

4
New cards

IPS deployment modes

  • in band- device sits in path of network communciations and can block suspicious traffic

  • out of band- device connects to a SPAN port on a switch. Can react after suspicious traffic enters the network

5
New cards

Protocol Analyzer uses

  • troubleshoot network issues

  • investigate security incidents

  • eavesdrop on confidential communications

  • most common is wireshark

6
New cards

tcpreplay

allows editing and replaying of traffic

7
New cards

content delivery networks (CDNs)

provide scalability and security

  • can filter DDoS attacks

  • provides web application firewall (WAF) functionality

8
New cards

quality of service (QoS)

allows admins to prioritize network traffic based upon protocol or IP addresses

9
New cards

WAN optimization techniques

  • deduplication

  • compression

  • caching

  • latency optimization

10
New cards

public IP addresses

assigned by a central authority and are routable over the Internet

-assigned by ICANN

11
New cards

private IP addresses

available for anyone’s use but not routable over the internet

12
New cards

Private IP Ranges

  • 10.0.0.1-10.255.255.255

  • 172.16.0.1-172.31.255.255

  • 192.168.0.1-192.168.255.255

13
New cards

NAT and Security

  • hides internal addresses from internet systems

  • limits direct access to systems

  • makes it difficult to identify the true origin of traffic

14
New cards

port address translation (PAT)

  • allows multiple systems to share same public address

  • assigns unique ports to each communciation

15
New cards

subnet mask

identifies the dividing line between network and host addresses

16
New cards

subnetting

breaks a large network address space up into manageable pieces that administrators may assign to smaller subnetworks

17
New cards

extranet

intranet segments extended to business partners

18
New cards

honeynet

decoy networks designed to attract attackers

19
New cards

ad hoc network

temporary entworks that may bypass security controls

20
New cards

east west traffic

network traffic between systems loacted in the data center

21
New cards

north south traffic

network traffic between systems in the data center and systems on the internet

22
New cards

logical segmentation

uses switches to enforce seperation between devices

23
New cards

physical segmentation

uses physically separate network devices and wiring to separate devices

24
New cards

microsegmentation

creates extremely small network segments serving very small groups of devices or individual devices

25
New cards

VLAN

seperate systems on a network into logical groups based upon function, regardless of physical location

-must enable vlan trunking to allow switches in different lcoations on the network to carry the same vlans

  • must assign switchports to VLANs

26
New cards

proxy servers and content filters typically belong in the…

DMZ

27
New cards

network traffic collectors

  • intrusion detection and prevention sensors

  • network taps

  • port mirrors

28
New cards

aggregation/ distribution switches

connect downstream access swithces to each other

29
New cards

SIEM

  • gather info using collectors

  • analyze info with a centralized aggregation and correlation engine

  • place collectors near the systems generating records

30
New cards

VPN concentrators

  • aggregate remote user connections

  • often reside in their own VLAN, where access controls may restrict remote user activity

31
New cards

SSL accelerator

designed to boost the performance of services that you provide to the outside world at scale.

  • handles the difficult cryptographic work of setting up TLS connections

  • normally reside in DMZ

32
New cards

DDoS mitigation tools

  • belongs as close to the internet as possible, ideally would be services purchased from ISP