SSCP Book Chapter06 (Network-and-Communications) Notes
SSCP Book Chapter06 (Network-and-Communications) Notes
2. TCP Flags:
3. TCP Handshake:
3.1 SYN: packet is sent to the destination system to request the opening of a connection.
3.2 SYN/ACK: The destination system receives the SYN flag and sends a SYN and ACK flag
acknowledging it has received the SYN flag and opening a connection to the original system.
3.3 ACK: The original system sends an ACK flag to the destination system verifying that it has
received the destination systems SYN flag.
6. Network Address Translation (NAT): Your router or firewall takes care of translating your
private IP address (home or office) to public IP addresses when you communicate over the
internet. This takes place using NAT.
7. IPv6:
7.1 Because IPv4 only consists of 32 bit addresses we are running out of IPv4 addresses.
7.2 IPv6 consists of 128 bit addresses which allows for a lot more use of IPv6 addresses
rather than using IPv4.
7.3 IPv6 addresses consist of 8 groups of four hexadecimal numbers, for example:
2345:0425:2CA1:0000:0000:0567:5673:23b5.
8.1 Static IPs: Static IPs are manually assigned to systems by an administrator. Servers are
typically configured with static IP addresses.
8.2 Dynamic Host Configuration Protocol (DHCP): Allows the automatic assignment of IP
addresses from an administrator- configured pool. End-user devices are typically configured
with DHCP IP addresses.
9. Domain Name System (DNS) Server: Translates between domain names and IP
addresses. Functions over UDP port 53.
10. Domain Name System Security Extensions (DNSSEC): Adds digital signatures to DNS.
16.1 Client to server: Each computer on the network has a specific role, its either a client or
a server.
16.2 Peer to peer: Every device acts both as a client and a server.
17.1 Wireless Access Points (WAP): Connect to switches and create Wi-Fi networks.
18. SWITCHES WORK AT LAYER 2 OF OSI MODEL WHERE THEY ONLY WORK WITH
MAC ADDRESSES!!!
But some switches can operate at layer 3 of the OSI model where they now take on the
function of routers.
19. Routers: Connect networks to each other making intelligent packet routing decisions.
21. Firewalls connect three networks together: The internet, internal network and the
DMZ.
23.1 Stateless Firewall: Evaluates each connection independently. These are how old
firewalls used to work and it was very inefficient.
25. Implicit Deny: If the firewall receives traffic not explicitly allowed by the firewall rule, then
that traffic must be blocked.
26. Next Generation Firewalls (NGFW): Incorporate contextual information into their
decision making.
27.1 Anonymity.
27.2 Performance boosting.
27.3 Content filtering.
35. Advance Scheduling: Algorithms use servers based upon performance and available
capacity.
36. Session Persistence: Routes an individual user’s requests to the same server.
37. Load Balancers are a point of failure, this is how we can approach thos SPOF with
high availability:
37.1 Active-Active: Activate 2 load balancers that will both route traffic to different web
servers but if one load balancer fails the other one take all the work load this doesn;t impact
user experience but it does reduce capacity.
37.2 Active-Passive: One load balancer handles all the network traffic and if that one fails
the other load balancer takes its place.
38.1 Firewalls.
38.2 Routers.
38.3 Servers.
38.4 VPN concentrators.
39. Most VPNs used a protocol called IPsec (Internet Protocol Security):
42. Remote Access VPN admins must choose 2 different tunneling approaches:
42.1 Full-Tunnel VPN: All network traffic leaving the connected device is routed through the
VPN tunnel regardless of its final destination.
42.2 Split-Tunnel VPN: Only traffic destined for the corporate network is sent through the
VPN tunnel. Other traffic is routed directly over the internet.
43. EXAM TIP: USERS ARE FILLED WITH A FALSE SENSE OF SECURITY BECAUSE
THEY CAN’T TELL THE DIFFERENCE BETWEEN FULL-TUNNEL VPNS AND SPLIT-
TUNNEL VPNS.
44. Always On VPN: Configured to automatically connect to VPN whenever they are
powered on.
46.1 In-Band(Inline) Deployments: Device sits in the path of the network communication
and it can block suspicious traffic from entering the network.
46.2 Out-Of-Band (Passive) Deployments: Device connects to a SPAN port on a switch and
can only react after suspicious traffic enters the network.
47. Protocol Analyzers: Allows deep inspection of traffic. Wireshark is a protocol analyzer.
49. Wireshark and tcpdump are both built on the libcap (packet capture library) library.
52. CDNs provide a shared web infrastructure that satisfies demand for your content through
a network of dozens or hundreds of locations around the world, each of these locations
caches your web content. Point of Presence retrieve content from your web server and cache
it for nearby users.
54. Quality of Service (QOS) Technology: Allows administrators to provide network traffic
based upon protocol or IP addresses.
57.1 Network Border Firewall: This has 3 network interfaces because they connect 3
different security zones together:
57.1.1 Internet Zone: The interface between the protected networks and the outside world
5.7.1.2 Intranet Zone: The internal network where most systems reside, organization may
use additional fireworks to segment the networks inside the intranet (endpoint,wireless,guest
and data center networks).
5.7.1.3 DMZ Zone: Place systems that must accept connections from outside world.
59. East-West Traffic: Network traffic between systems located in the data center.
60. North-South Traffic: Network traffic between systems in the data center and systems on
the internet.
61. VLANs: VLANs separate systems on a network into logical groups based upon function,
regardless of physical location.
62.1 Enable VLAN trunking: Allow switches from different locations on the network to carry
the same VLANs.
62.2 Assign the switch ports to the appropriate VLANs.
63. Network Traffic Collectors Include:
64. Aggregation Switch: Pulls together network traffic from the access switches deeper in
the network that are connected to user devices.
65. SPAN Ports: Provide a copy of all traffic that crosses the switch.
66. Port Mirroring: Allows the monitoring of traffic on a single switch port.
68. Proxy servers and content filters typically belong in the DMZ..
71. Data plane: Responsible for carrying out the instructions of the control plane.
72. Software Defined Networks (SDN): Separate the control plane and data plane from
each other.
74. Encapsulation: Allows one protocol to carry traffic that uses another protocol.
77. Li-Fi technology replaces the radio waves of Wi-Fi with light.
80.1 Supplicant: Device that wishes to connect to the NAC protected network, runs a special
piece of software called a supplicant.
80.2 Authenticator (Switch, wireless controller): Receives credentials from the end-user.
80.3 Authentication Server (Backend): Centralized server that performs authentication for
all of the authenticators on the network.
81. NAC Roles:
82. RADIUS (Remote Access Dial In User Service): Allow many diverse applications to rely
on the same authentication source.
85. TACACS+:
86.1 Shadowed Rules: A rule base contains a rule that will never be executed because of its
placement in the rule base.
86.2 Promiscuous Rules: Allow more access than necessary (too much access).
86.3 Orphaned Rules: Allow access to decommissioned systems and services.
87.1 SYN Flood: Fills connection state tables on firewalls with half open connection entries.
87.2 MAC Flood: Fills switch’s MAC addresses table with many entries, causing it to flood
traffic on all ports. PORT SECURITY PROTECTS.
88. Spanning Tree Protocol: Prevents broadcast storms by implementing loop prevention.
jump boxes jump servers and jump hosts are all the same thing
92.1 Wired Equivalent Privacy (WEP): The original wireless encryption standard. No longer
considered secure.
92.2 Wi-Fi Protected Access (WPA): Replaced WEP in 2003. Used the temporal key
integrity protocol (TKIP) to rapidly rotate encryption keys. No longer secure.
92.3 Wi-Fi Protected Access V2 (WPA2): Released in 2004 as upgrade to WPA. Encrypts
packets using AES encryption. Uses the CCMP protocol. Widely used and considered secure.
92.4 Wi-Fi Protected Access v3 (WPA3): Required on new wi-fi devices from 2020.
Supports CCMP. Uses Simultaneous Authentication of Equals (SAE) for key exchange.