Lesson 9 Implement Secure Network Designs Flashcards
(40 cards)
Switches
Forward frames between nodes in a cabled network
- works at the Datalink layer (2) of the OSI Model
- makes forwarding decisions based on the HW MAC address of attached nodes
- can establish network segments to the cabling or logical segments to establish virtual LANS (VLANS)
- Data it moves is frames
WAP
Wireless Access Point
- Provides a bridge btwn a cabled network and wireless clients or stations
- works at the OSI model Datalink layer (2)
- works with frame data
Routers
Forward packets around an internet based on IP addresses
- works on OSI Model Network layer (3)
- can apply logical IP subnet addresses to segments within a network
- works on Frame data
Firewalls
Apply Access Control List (ACL) to filter traffic passing in or out of a network segment
- works a the OSI Model Network layer (3)
Load Balancers
Network appliance which distributes traffic btwn network segments or servers to optimize performance
- works at the OSI Model Transport layer (4) or higher
DNS
Domain Name System
- A system which resolves IP addresses to FQDNs
- Works at OSI Model Application layer (7)
- abuse of name resolution is a common attack vector
OSI Model - Layer 1
Layer 1: Physical PDU: bits HW: Hubs, net tap, repeaters Addressing: none Protocols: UTP, STP, COAX, Fiber, TDM, FDM Control: node
OSI Model Layer 2
Layer: Datalink - Connects nodes inside a LAN together - Nodes to Nodes
PDU: Frame
HW: Switch, Bridge, WAP
Addressing: MAC address (Physical Address), VLAN id
Protocols: Ethernet, PPP, LLC
Control: MAC Filtering
Address Resolution Protocol (ARP) between Physical and Datalink layers
OSI Model Layer 3
Layer: Network - Connects LANs together - LAN to LAN
PDU: Packet
HW: Router, Layer 3 Switches
Addressing: IP Addresses (Logical Addresses)
Protocols: IP, ICMP, IPSec, IGMP
Control: Packet Filtering Firewall
OSI Model Layer 4
Layer: Transport - End to end connections PDU: Segment HW: Load Balancer, Firewall Addressing: Logical Port Numbers Protocols: TCP, UDP, optionally SSL/TLS Control: Packet Filtering Firewall
OSI Model Layer 5
Layer: Session - Interhost Communication
- Synchronize upper layers with lower layers
- allows session establishment btwn processes
PDU:
HW:
Addressing:
Protocols:
OSI Model Layer 6
Layer: Presentation - Syntax layer
- Formats the data as needed
PDU: Data HW: Addressing: Protocols: Control: NGFW or App layer Firewall
OSI Model Layer 7
Layer: Application - End Used Layer PDU: Data HW: Addressing: Protocols: HTTP(TCP 80), HTTPS(TCP 443), SMTP(TCP 25), FTP (20, 21) Control: NGFW or App Layer Firewall
ARP
Address Resolution Protocol
- Maps a MAC address to and IP address
- Sits btwn Datalink (2) and Network (3) layers
Firewall
- sits between Network Layer (4) and Datalink Layer (3)
DNS
Domain Name System
- Sits btwn Transport Layer (4) and the upper layers (5-7)
IP Addresses come from ?
Locally:
DHCP - Dynamic Host Configuration Protocol
- Service to assign network IP addresses to client upon connection
Public:
- Internet Service Provider (ISP), assigned when get the service
Private IP ranges
- 0.0.x
- 16-31.x.x
- 168.x.x
IPv4 vs IPv6
IPv4
- 32 bit
- 172.16.1.101/16 - the /16 indicates the first half of the address 172.16.0.0 is the network id, while the remainder identifies the host on the network.
- the /16 can also be written as subnet 255.255.0.0
IPv6
- 128 bit
- uses hex numbers
- 2001:db8::abc:0:dev0: 1234
Network Segmentation
Network Segment
- All hosts attached to the segment can use local layer 2 to communicate freely with one another
- said to be in the same broadcast domain
Segregation
- Host is one segment are restricted in the way they communicate with hosts in the other segment
- could be restricted by ports they can access or communicate across
- two switches can be connect via a layer 3 router and enforce network policies via Access Control List (ACL)
- more likely though to be enforced via virtual LAN (VLAN)
VLAN
Virtual Local Area Network
- segmentation enforcement
- Any port on a any switch can be assigned to any VLAN in the same topology
DMZ
Demilitarized Zones
- a perimeter or edge network made up of internet facing hosts
- basic principle is traffic can not pass directly through the DMZ
- acts as proxy to the outer facing (in the internet) servers and the internal hosts of the network
- hosts in the DMZ are bastion hosts and run minimal services to reduce the attack surface
Screened Subnet
- part of a DMZ to further restrict access into and out of the DMZ
- two firewalls sit on either side of the DMZ
- edge firewall is called the Screening Router/Firewall
- internal firewall is called the choke router/firewall
- provides better access control and easier monitoring
PNAC
Port-based Network Access Control
- part of the 802.1X standard
- means the switch utilizes an AAA Svr to authenticate the attached device before activating the port
Network Access Control
- extends the scope of Authentication
- allows for policies or profiles describing minimum security Configuration a device must meet to be granted access to the network
- this is called a health policies