Chapter 12: Advanced Networking Devices Flashcards Preview

Network+ > Chapter 12: Advanced Networking Devices > Flashcards

Flashcards in Chapter 12: Advanced Networking Devices Deck (41):
1

Dedicated Server

A computer that only acts as a server, never a client.

2

Peer-to-Peer network

Any system can act as a server, a client, or both, depending on how you configure them.

3

Peer-to-Peer Applications (P2P)

Act as both client and server (uTorrent and shit)

4

Virtual Private Network (VPN)

-A network configuration that enables a remote user to access a private network via the Internet.
-Use tunneling

5

Point-to-Point Tunneling Protocol (PPTP)

-An advanced version of PPP that handles VPNs.
-Used on Windows.

6

Routing and Remote Access Service (RRAS)

A special remote access server program on which a PPTP endpoint is placed in Microsoft networks.

7

Web browser performance on a VPN

Hella fucking slower

8

Host-to-Site

Type of VPN connection where a host logs into a remote network as if it were any other local resource of that network.

9

Layer 2 Tunneling Protocol (L2TP)

A VPN protocol that uses IPsec

10

VPN Concentrator

The new endpoint of the local LAN in L2TP

11

Host-to-Host

Type of VPN connection in which a single host establishes a link with a remote, single host.

12

Site-to-Site

A type of VPN connection using two Cisco VPN concentrators to connect two separate LANs permanently.

13

SSL VPN

A type of VPN in which clients connect to the VPN server through a web browser, with the traffic secured by SSL

14

Portal SSL VPN

A client accesses the VPN and is presented with a secure web page. (Like myucsc and shit)

15

Tunnel SSL VPN

The client web browser runs some kind of active control, such as Java or Flash, and gains much greater access to the network.

16

Managed Switch

Switches that have extra programming and logic to handle switching, security, and many other functions

17

Console Port

Connection jack in a switch used to connect a computer that will manage the switch.

18

Out-of-Band Management

Method to connect to and administer a network device. An example is connecting a computer to the console port of a switch.

19

VLAN

Enables a single switch to support multiple logical broadcast domains

20

Trunking

The process of transferring VLAN traffic between switches

21

Trunk Port

A port on a switch configured to carry all traffic between switches in a LAN

22

Native VLAN

The specified VLAN designation that will be assigned to all untagged frames entering a trunk port in a switch

23

IEEE 802.1Q

Trunk standard that enables you to connect switches from different manufacturers

24

VLAN Trunking Protocol (VTP)

Cisco proprietary protocol to automate the updating of multiple VLAN switches.

25

3 states of VTP

1) server
2) client
3) transparent: tells it not to update

26

DHCP Relay

A router process that allows DHCP communications to cross from one network to another.

27

IP Helper

Command used in Cisco switches and routers to enable, disable, and manage internetwork forwarding of certain protocols.

28

Multilayer Switch

Switch that works on multiple layers of the OSI model.

29

Load Balancing

The process of taking several servers and making them look like a single server, for purposes of spreading shit out.

30

Round Robin DNS

Assigning multiple IPs to the same FQDN to share the load of DNS requests

31

Quality of Service (QoS)

Policies that prioritize traffic/bandwidth based on certain rules.

32

Traffic Shaping

Controlling the flow of packets into or out of the network according to the type of packet or other rules.

33

Shapers

Network devices that can implement traffic shaping

34

Port Bonding

The logical joining of multiple redundant ports and links between two network devices. Basically to improve performance.

35

Link Aggregation Control Protocol (LACP)

IEEE specification of certain features and options to automate the negotiation, management, load balancing, and failure modes of aggregated ports.

36

Intrusion Detection System (IDS)

An application that inspects packets looking for intrusions. Finds the intrusions after they have already hit.

37

Network-Based IDS (NIDS)

-Multiple sensors placed around the network that report to a central app that reads a signature file to detect weird stuff.
-Signature-based IDS

38

Host-Based IDS (HIDS)

-Software running on individual systems that monitors for out of the ordinary events.
-Behavior-based IDS

39

Intrusion Prevention System (IPS)

Sits directly in the flow of network traffic to stop intrusions.

40

Port Mirroring

Copying data from any or all physical ports on a switch to a single physical port.

41

Proxy Server

A device that fetches Internet resources for a client without exposing that client directly to the Internet.