Please enable JavaScript.
Coggle requires JavaScript to display documents.
NS to enhance network security, Specialized Security Appliances, compare…
NS to enhance network security
access layer
Port security, dynamic ARP inspection and DHCP snooping
distribution layer
Access lists for a Layer 3 firewall
– Layer 4 stateful firewall
core layer
Proxy Firewall
Web proxy firewall
Email proxy firewall
SSL security appliance
IDS
wireless network
WPA2 encryption and authentication
Firewalls
benefits
Blocks malicious data from servers and clients.
Reduces security management complexity.
Sanitizes protocol flow.
limitations
can have serious consequences for the network.
performance can slow down.
cannot be passed over firewalls securely.
properties
All traffic flows through the firewall.
resistant to network attacks.
enforce the access control policy
type
Transparent firewall -
Hybrid firewall
Host-based (server and personal) firewall
Application gateway firewalls (Proxy firewall)
Stateful firewalls
Packet filtering (Stateless) firewalls -
Packet Filtering Firewalls
use a
simple policy table look-up
denies traffic
IDS and IPS
advantage IDS
no impact network
no impact if sensor fail
advantage IPS
can use stream
stop trigger packet
disadvantage IDS
more vulnerable to netsec
cant stop trigger packet
disadvantage IPS
overloading the network
affect network traffic
type of IPS
HIPS
ombine antivirus software,
network based IPS
critical component of intrusion prevention.
Specialized Security Appliances
ACL
Filter traffic based on traffic type.
Provide traffic flow control.
SNMP
Manager that runs SNMP management
software.
the nodes being
monitored
NETFLOW
provides statistics on packets flowing through
a Cisco router or multilayer switch.
syslog server
common method of accessing system messages.
Allows networking devices to send their system messages across the network to
syslog servers.
port mirroring
allows a switch to make duplicate copies of traffic passing
through a switch
send data out a port with a network monitor
attached.
NTP
synchronize their time settings with an NTP server
can be set up to synchronize to a private master clock
AAA Servers
Authorization
Accounting and auditing
Authentication
protocols
RADIUS
TACACS+
VPN
encrypted to keep the data
confidential while it is transported across the public network
private network that is created over a public network
compare three categories of network component
logical and physical
physical
physical connections and identifies how end
devices and infrastructure devices are interconnected.
logical
network transfers frames from one node
to the next.
differences between WAN and LAN
WAN
hub and spoke
a central site
interconnects branch sites using point-to-point links.
mesh
provides high availability,
point to point
a permanent link between two endpoints.
LAN
extended star
Ethernet switches
interconnect other star topologies
bus
All end systems are chained to each other
star
connected to a central intermediate device.
ring
connected to their respective neighbors,