3.3 Flashcards
(50 cards)
What are the functions of Load Balancers
-Configurable load
–Manage across servers
-TCP offload
–Protocol overhead
-SSL offload
–Encryption/Decryption
-Caching
–Fast response
-Prioritization
–QoS
-Content Switching
–Application-centric balancing
What are the functions of Load Balancers?
-Configurable load
–Manage across servers
-TCP offload
–Protocol overhead
-SSL offload
–Encryption/Decryption
-Caching
–Fast response
-Prioritization
–QoS
-Content Switching
–Application-centric balancing
What is the scheduling for Load balancers?
-Round-robin
–Each server is selected in turn
-Weighted round-robin
–Prioritize the server use
-Dynamic round-robin
–Monitor the server load and distribute to the server with the lowest use
-Active/active load balancing
What is affinity (load balancer)?
-Affinity
–A kinship, a likeness
-Many applications require communication to the same instance
–Each user is “stuck” to the same server
–Tracked through IP address or session IDs
–Source affinity / sticky session / session persitence
What is physical segmentation?
-Devices are physically separate
–Air gap between switch A and Switch B
-Must be connected to provide communication
–Direct connect, or another switch or router
-Web servers in one rack
–Database servers on another
-Customer A on one switch, customer B on another
–No opportunity for mixing data
What are logical segmentations with VLANs?
-Virtual Local Area Networks (VLANs)
–Separated logically instead of physically
–Cannot communicate between VLANs without a Layer 3 device / router
What is the Screened Subnet?
-Previously known as the demilitarized zone (DMZ)
–An additional layer of security between the internet and you
–Public access to public resources
What is the Extrnet?
-A private network for partners
–Vendors, suppliers
-Usually requires additional authentication
–Only allow access to authorized users
What is the Extrnet?
-A private network for partners
–Vendors, suppliers
-Usually requires additional authentication
–Only allow access to authorized users
What is the Intranet?
-Private netowrk
–Only available internally
-Company announcements, important documents, other company business
–Employees only
-No external access
–Internal or VPN access only
What is East-West and North-South traffic?
-Traffic flows within a data center
–Important to know where traffic starts and ends
-East-West
–Traffic between devices in the same data center
–Relatively fast response times
-North-south traffic
–Ingress/egress to an outside device
–A different security posture than east-west traffic
What is Zero Trust?
-Many networks are relatively open on the inside
–Once you’re through the firewall, there are few security controls
-Zero trust is a holistic approach to network security
–Covers every device, every process, every person
-Everything must be verified
–Nothing is trusted
–Multifactor authentication, encryption, system permissions, additional firewalls, monitoring and analytics, etc.
What are VPNs?
-Virtual Private Networks
–Encrypted (private) data traversing a public network
-Concentrator
–Encryption/decryption access device
–Often integrated into a firewall
-Many deployment options
–Specialized cryptographic hardware
–Software-based options available
-Used with client software
–Sometimes built into the OS
What is a SSL VPN
-Secure Socket Layer Virtual Private Network
-Uses common SSL/TLS protocol (tcp/443)
–Almost No firewall issues!
-No big VPN clients
–Usually remote access communication
-Authenticate users
–No requirement for digital certificates or shared passwords (like IPsec)
What is a HTML5 VPN?
-Hypertext Markup Language version 5
–The language commonly used in web browsers
-Includes comprehensive API support
–Application Programming Interface
–We cryptography API
-Create a VPN tunnel without a separate VPN application
– Nothing to install
-Use an HTML5 compliant browser
–Communicate directly to the VPN concentrator
What is Site-to-SiteVPN?
-Always-on
-or almost always
-Firewalls often act as VPN concentrators
–Probably already have firewalls in place
What is L2TP?
-Layer 2 Tunneling Protocol
–Connecting sites over a layer 3 network as if they were connected at layer 2
-Commonly implemented with IPsec
–L2TP for the tunnel, IP sec for the encryption
–L2TP over IPsec (L2TP/IPsec)
What is the Authentication Header (AH)?
-Hash of the packet and a shared key
–SHA-2 is common
–Adds the AH to the packet header
-This doesn’t provide encryption
–Provides data integrity (hash)
–Guarantees the data origin (authentication)
–Prevents repla attacks (sequence numbers)
What is ESP?
-Encapsulation Security Payload
-Encrypts and authenticates the tunneled data
–Commonly uses SHA-2 for hash, AES for encryption
–Adds a header, a trailer, and an integrity check value
-Combine with Authentication Header (AH) for integrity and authentication of the outer header
What is Broadcast?
-Sends information to everyone at once
–One frame or packet, received by everyone
–Every device must examine the broadcast
-Limited scope
–The broadcast domain
-Routing updates, ARP requests
–Can add up quickly
-Malicious software or a bad NIC
–Not always normal traffic
-Not used in IPv6
–Focus on multicast
What is broadcast storm control?
-The switch can control broadcasts
–Limit the number of broadcasts per second
-Can often be used to control multicast and unknown unicast traffic
–Tight security posture
-Manage by specific values or by percentage
–Or the change over normal traffic patterns
What is loop protection?
-Connect two switches to each other
–They’ll send traffic back and forth forever
–There’s no “counting” mechanism at the MAC layer
-This is an easy way to bring down a network
–And somewhat easy to resolve
-IEEE standard 802.1D to prevent loops in bridged (switch) networks (1990)
–Created by Radia Perlman
–Used practically everywhere
What is a BPDU gaurd?
-Spanning tree takes time to determine if a switch port should forward frames
–Bypass the listening and learning states
–Cisco calls this PortFast
-BPDU (Bridge Protocol Data Unit)
–The Spanning tree control protocol
-If a BPDU frame is seen on a Portfast configured interface (i.e, a workstation), shut down the interface
–This shouldn’t happen
–Workstations don’t send BPDUs
What is DHCP snooping?
-IP tracking on a layer 2 device (switch)
–The switch is a DHCP firewall
–Trusted: Routers, switches, DHCP servers
–Untrusted: Other computers, unofficial DHCP servers
-Switch watches for DHCP conversations
–Adds a list of untrusted devices to a table
-Filters invalid IP and DHCP information
–Static IP addresses
–Devices acting as DHCP servers
–Other invalid traffic patterns