3.3 Implement secure network design Flashcards
Load balancing: what is load balancing ?
A way to distribute the load that is incomming across multiple devices. Thereby, making the resource available to more user than having a single server in place.
Load balancing: what is one of the advantage of load balancer ?
Fault tolerance: if a server fail, the others ones can be use.
Load balancing: how load balancer work ?
Load balancing: can load balancer perform encyption ?
Yes, using SSL offload
Load balancing: how to configure a load balancer ?
- Round-robin
- Weighted round-robin
- Dynamic round-robin
- Active/active load balancing
- Active/passive load balancing
Load balancing: what is round robin way to configure load balancer?
The traffic is distributed turn by turn: each server is selected in turn
Ex: user1 get server1, user2 get server2 …
Load balancing: what is weighted round-robin way to configure load balancer?
The traffic is prioritize on one server over another.
Ex: one of the server will receive half of the available load and the other server would make up the rest of that load
Load balancing: what is dynamic round-robin way to configure load balancer?
Monitor the server load and distribute to the server with the lowest use
Load balancing: what is active/active load balancing way to configure load balancer?
All of the server are active simutaneously
Load balancing: what is “affinity” for load balancer?
Certains application may need to communicate through a load balancer will always be distributed to the same server.
This is done by tracked through IP address or sessions IDs
Network segmentation: what is network segmentation ?
Network segmentation is a network security technique that divides a network into smaller, distinct sub-networks that enable network teams to compartmentalize the sub-networks and deliver unique security controls and services to each sub-network.
Network segmentation: why network can be segmented ?
For performance (application with banwidth), security and compliance
Network segmentation: what are the different types of network segmentation ?
- Physical
- Logical
- Virtual
Network segmentation: what is network physical segmentation?
Devices are physically separate. Also refered as “air gap” as the 2 devices are not physically connected and need to be connected if they want to communicate
Network segmentation: what is the disadvantage of network physical segmentation?
Each device needs to be configured, updated and interface managed separately
Network segmentation: what is network logical segmentation?
Devices are logically separated using VLAN
Network segmentation: what is a screened subnet (DMZ)?
It refers to a network architecture where a single firewall is used with three network interfaces. It provides additional protection from outside cyber attacks by adding a perimeter network to isolate or separate the internal network from the public-facing internet.
Network segmentation: what is a extranet?
An extranet is a private network similar to an intranet, but typically open to external parties, such as business partners, suppliers, key customers, etc. The main purpose of an extranet is to allow users to exchange data and applications, and share information.
Network segmentation: what is an intranet?
A private network contained within an enterprise that is used to securely share company information and computing resources among employees
Network segmentation: what is zero trust principle?
Zero Trust is a security framework requiring all users, whether in or outside the organization’s network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.
VPN: what is a VPN?
Establish a protected network connection when using public networks. VPNs encrypt your internet traffic and disguise your online identity.
VPN: what is a VPN concentrator ?
VPN concentrators are used to connect many remote networks and clients to a central corporate network. They are used to protect the communications between remote branches or remote clients – such as workstations, tablets, phones and IoT devices – to corporate networks.
VPN: what is SSL VPN ?
VPN that uses common SSL/TLS protocol to communicate (port 443)
VPN: is a VPN always secure ?
No. VPNs expose entire networks to threats like distributed denial-of-service (DDoS), sniffing and spoofing attacks. Once an attacker or malware has breached a network through a compromised user device connected to it, it can bring down an entire network.