Network+ Extra 6 Flashcards
(10 cards)
Uses a packet’s original IP header, as opposed to adding an additional tunnel header. This approach works well in networks where increasing a packet’s size might cause an issue. Also, _________ ____ is often used for client-to-site VPNs, where a PC running VPN client software connects back to a VPN termination device at a headquarters location.
Transport Mode
Unlike transport mode, ______ mode encapsulates an entire packet. As a result, the encapsulated packet has a new header (an IPSec header). This new header has source and destination IP address information that reflects the two VPN termination devices at different sites. Therefore, ______ mode is often used in an IPSec site-to-site VPN.
Tunnel Mode
is a VPN protocol that lacks security features, such as encryption. However, ____ can still be used for a secure VPN connection if it is combined with another protocol that does provide encryption.
Layer 2 Tunneling Protocol (L2TP)
is a VPN protocol designed (by Cisco Systems) with the intent of providing a tunneling protocol for PPP. Like L2TP, ___ lacks native security features.
Layer 2 Forwarding (L2F)
is an older VPN protocol (which supported the dial-up networking feature in older versions of Microsoft Windows). Like L2TP and L2F, ____ lacks native security features. However, Microsoft’s versions of ____ bundled with various versions of Microsoft Windows were enhanced to offer security features.
Point-to-Point Tunneling Protocol (PPTP)
whereas an IDS device receives a copy of traffic to be analyzed, an IPS device resides inline with the traffic
IDS/IPS
A signature could be a string of bytes, in a certain context, that triggers detection.
signature-based detection
based on network policies and if something happens out of policy it is reported.
policy-based detection :
Anomaly-based detection : detecting things outside of normal conditions
________ anomaly detection : This approach watches network-traffic patterns over a period of time and dynamically builds a baseline. Then, if traffic patterns significantly vary from the baseline, an alarm can be triggered.
anomaly-based detection (Statistical Anomaly based detection)
___________ anomaly detection : This approach allows an administrator to define what traffic patterns are supposed to look like, so anything outside the baseline will be reported and or blocked.
Nonstatistical anomaly detection