Day 3
Day 3
Title: V i r t u a l N e t w o r k B a s i c s
It uses virtualized versions of traditional network tools, like switches and network
adapters, allowing for more efficient routing and easier network configuration changes.
1. Virtual Switches
Key Features:
Isolation: Virtual switches can isolate traffic between different VMs, ensuring
that data is not inadvertently shared between them unless explicitly
configured.
1
Network Infrastructure Security
Traffic Management: They can manage traffic flows, apply Quality of Service
(QoS) policies, and monitor network performance.
2. Virtual Routers
Key Features:
Routing Capabilities: Virtual routers can route traffic between different subnets,
manage IP address assignments, and implement routing protocols (like OSPF,
BGP).
Network Address Translation (NAT): They can perform NAT to allow VMs to
access external networks while hiding their internal IP addresses.
Firewall and Security: Virtual routers often include firewall capabilities to control
traffic flow and enhance security.
2
Network Infrastructure Security
Key Features:
Multiple Interfaces: VMs can have multiple virtual NICs, allowing them to
connect to different networks or subnets.
Use Cases
Data Centers: Virtual switches and routers are essential for managing the complex
networking needs of modern data centers, enabling efficient resource utilization and
isolation.
Cloud Services: Cloud providers use virtual networking to offer customers isolated
environments, allowing for secure and scalable applications.
Virtualization:
Types Of Virtualization:
i. Lower expenses:
By enabling multiple VMs – each with its own self-contained operating system
– to share the compute, memory, and storage resources of a single physical
server, organizations can reduce the total number of servers needed to run
their workloads.
In turn, this also lowers costs for power, cooling, and data center space.
That’s much too slow to keep pace with variable demand and changing
business requirements. Now, organizations can spin up and move VMs in
minutes whenever and wherever they’re needed.
4
Network Infrastructure Security
One key benefit of virtualization is the ability to shift most of these tasks to
centrally stored and managed VMs.
With virtualization, IT Ops teams can move VMs easily across the IT
infrastructure to load-balance workloads and resolve bottlenecks.
Features:
Supports various guest operating systems.
Offers features like snapshots, shared folders, and virtual networking.
Allows the creation of internal networks, host-only networks, and NAT
networks.
2. VMware
Description: A suite of virtualization products, including VMware Workstation
and VMware Fusion that enables users to run multiple operating systems on a
single machine.
Features:
Advanced networking options, including NAT, bridged, and host-only
networking.
Support for virtual switches and VLANs.
Integration with VMware vSphere for enterprise-level virtualization.
5
Network Infrastructure Security
3. Hyper-V
Description: A virtualization platform built into Windows Server and Windows 10/11
Pro and Enterprise editions.
Features:
Supports virtual switches for network configuration.
Offers features like virtual network adapters and network isolation.
Integration with Windows networking features.
4. OpenStack
Description: An open-source cloud computing platform for creating and managing
large groups of virtual machines.
Features:
Provides networking services through Neutron.
Supports advanced networking features like load balancing, VPN, and
firewalls.
Suitable for building private and public clouds.
3. Protocols:
802.1X: A network access control protocol that provides an authentication
mechanism for devices wishing to connect to a LAN or WLAN. It uses EAP
(Extensible Authentication Protocol) for communication between the client,
the authenticator (e.g., a switch or access point), and the authentication
server.
6
Network Infrastructure Security
Figure1.1 NAC
7
Network Infrastructure Security
Internal Zone: This zone contains the organization's internal resources, such
as databases, file servers, and internal applications. Access to this zone is
typically restricted to authorized users and devices.
External Zone: This zone represents the untrusted network, usually the
internet. It is where external users and systems reside, and it is critical to
implement strict controls to prevent unauthorized access to internal
resources.
Key Concepts:
1. Demilitarized Zone (DMZ) and Its Purpose:
The DMZ serves as a buffer zone between the internal network and the
external network.
It typically hosts services that need to be accessible from the internet, such as
web servers, email servers, and DNS servers.
This approach allows for more precise control over traffic flows and security
policies, reducing the attack surface and limiting the potential impact of a
breach.
Cloud providers often offer tools and services that facilitate segmentation,
allowing organizations to implement security measures that align with their
specific needs.
9
Network Infrastructure Security
Access Controls:
Strict access controls were enforced, allowing only authorized personnel to
access critical systems. This limited the potential for unauthorized access and
reduced the attack surface.
Benefits Realized:
Reduced Risk of Lateral Movement:
By segmenting the network, the university effectively limited the ability of
attackers to move laterally within the network. In the event of a breach in one
segment, the attackers would face barriers preventing them from accessing
other critical systems.
Improved Compliance:
The implementation of segmentation helped the university meet regulatory
compliance requirements by ensuring that sensitive data was adequately
protected and access was controlled.
10
Network Infrastructure Security
Types of Firewalls
1. Packet-Filtering Firewalls:
Function: These firewalls inspect packets at the network layer. They allow or
block traffic based on predefined rules such as IP addresses, port numbers,
and protocols.
11
Network Infrastructure Security
2. Stateful Firewalls:
Function: These firewalls maintain the state of active connections and make
decisions based on the context of the traffic (i.e., whether a packet is part of
an established connection).
Pros: More secure than packet-filtering firewalls; can track the state of
connections.
Cons: More complex and resource-intensive than packet-filtering firewalls.
12
Network Infrastructure Security
Application-Layer Filtering
Function: This involves inspecting the data within the packets at the
application layer (Layer 7 of the OSI model).
It allows firewalls to make decisions based on the content of the traffic, such
as blocking specific applications or protocols (e.g., blocking peer-to-peer file
sharing).
Logging: Firewalls can log traffic data, including allowed and denied connections,
which is crucial for auditing and troubleshooting.
Alerts: Configuring alerts for specific events (e.g., repeated denied access attempts)
can help in proactive threat detection.
14
Network Infrastructure Security
15