0% found this document useful (0 votes)
2 views

Module 4 - Network Infrastructure

This module covers network infrastructure, focusing on how various network devices facilitate communication and enhance security. It explains the roles of end devices, intermediary devices, routers, switches, and firewalls, along with their operations and types. Additionally, it addresses wireless communications, security devices, and network topologies, providing a comprehensive overview of network design and security measures.

Uploaded by

Charles Uy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Module 4 - Network Infrastructure

This module covers network infrastructure, focusing on how various network devices facilitate communication and enhance security. It explains the roles of end devices, intermediary devices, routers, switches, and firewalls, along with their operations and types. Additionally, it addresses wireless communications, security devices, and network topologies, providing a comprehensive overview of network design and security measures.

Uploaded by

Charles Uy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 47

INFORMATION

ASSURANCE &
SECURITY 2
MODULE 4

NETWORK INFRASTRUCTURE
OBJECTIVES
Upon completion of this module, the student would be able to:
➢Explain how network devices enable wired and wireless network
communication.
➢Explain how network devices enable network communication.
➢Explain how wireless devices enable network communication.
➢Explain how devices and services are used to enhance network security.
➢Explain how specialized devices are used to enhance network security.
➢Explain how network services enhance network security.
➢Explain how networks and network topologies are represented.
➢Explain how network designs are represented by interconnected symbols.

.
NETWORK COMMUNICATION
DEVICES
Network Devices
End Devices
Intermediary Devices
▪ End Devices:
• Computers, laptops, servers, printers,
smart devices, and mobile devices.
• Individual end devices are connected to the
network by intermediary devices.
▪ Intermediary Devices:
• Connect the individual end devices to the
network and also connect multiple
individual networks to form an
internetwork.
• Provide connectivity and ensure that data
flows across the network.
Network Devices
Routers
▪ Function of a Router:
• Provides path determination and packet
forwarding.
• Responsible for encapsulating and de-
encapsulating packets.
• Uses a routing table to determine the
best path to use to send packets to a
specified network.
▪ Routing Table:
• Contains directly connected routes and
remote routes.
• Router searches its routing table for a
network address that matches the
destination IP address of a packet.
• Uses the gateway of last resort if learned
or configured; otherwise, the packet is
discarded.
Network Devices
Routers (Cont.)
▪ The router performs the following
three major steps:
1. It de-encapsulates the Layer 2 frame header
and trailer to expose the Layer 3 packet.
2. It examines the destination IP address of the
IP packet to find the best path in the routing
table.
3. If the router finds a path to the destination,
it encapsulates the Layer 3 packet into a new
Layer 2 frame and forwards that frame out the
exit interface.
▪ Devices have Layer 3 IPv4 addresses,
while Ethernet interfaces have Layer 2
data link addresses. The MAC
addresses are shortened to simplify
the illustration.
Network Devices
Router Operation
▪ A primary function of a router is to determine the best path to use to send packets to each
subnet. To determine the best path, the router searches its routing table for a network
address that matches the destination IP address of the packet. The routing table search
results in one of three path determinations:
• Directly connected network
• Remote network
• No route determined
Network Devices
Routing Information
▪ The routing table of a router stores the following
information:
• Directly connected routes
• Remote routes
▪ The destination network entries in the routing table
can be added in several ways:
• Local Route interfaces – These are added when
an interface is configured and active.
• Directly connected interfaces – These are added
to the routing table when an interface is
configured and active.
• Static routes – These are added when a route is
manually configured and the exit interface is
active.
• Dynamic routing protocol – This is added when
routing protocols that dynamically learn about
the network, such as EIGRP or OSPF, are
implemented and networks are identified.
Network Devices
Hubs, Bridges, LAN Switches
▪ An Ethernet hub acts as a multiport repeater that receives
an incoming electrical signal (data) on a port. It then
immediately forwards a regenerated signal out all other
ports. Hubs use physical layer processing to forward data.

▪ Bridges have two interfaces and are connected between


hubs to divide the network into multiple collision domains.
Each collision domain can have only one sender at a time.

▪ LAN switches are essentially multiport bridges that connect


devices into a star topology. Like bridges, switches
segment a LAN into separate collision domains, one for
each switch port. A switch makes forwarding decisions
based on Ethernet MAC addresses.
Network Devices
Switching Operation
Network Devices
VLANs
▪ Segments networks based on multiple
factors (function, project team, or
application) regardless of physical
location.
▪ Creates logical broadcast domains that
can span multiple physical LAN
segments.
▪ Improves network performance by
separating large broadcast domains into
smaller ones.
▪ Prevents users on different VLANs from
snooping on each other’s traffic.
Network Devices
STP
▪ Spanning Tree Protocol (STP)
• Ensures a single logical pathway between all destinations on a network by blocking
redundant paths.
• Prevents loops using strategically placed "blocking-state" ports.
• Uses bridge protocol data unit (BPDU) frames to prevent loops.
Network Devices
Multilayer Switching
▪ Multilayer switches support routed ports and Switched Virtual Interfaces
(SVIs) to forward frames based on Layer 3 information.
• Routed Ports – physical port acts like an interface on a router, not associated with any
VLANs.
• SVI – virtual interface can be configured for any VLAN within a multilayer switch.
Wireless Communications
Protocols and Features
▪ Wireless LANs (WLANs):
• Use Radio Frequencies (RF) instead of cables at the physical layer and MAC sublayer of
the data link layer.
• Connect clients to a network through a wireless access point (AP) or wireless router,
instead of an Ethernet switch.
Wireless Communications
Wireless Network Operations
▪ Wireless client association process with AP includes discovering a new wireless AP,
authenticating with that AP, then associating with that AP.
▪ Common configurable wireless parameters include:
• Network mode
• SSID
• Channel settings
• Security mode
• Encryption
• Password
▪ Wireless devices must discover and connect to an AP or wireless router. This
process can be passive or active.
▪ The 802.11 standard was originally developed with two authentication mechanisms:
open authentication provides wireless connectivity to any wireless device, and the
shared key authentication technique is based on a key that is pre-shared
between the client and the AP.
Wireless Communications
The Client to AP Association Process
▪ A wireless client goes through a three-stage process to associate with an AP.
▪ Discovery: A wireless client locates the AP to associate.
▪ Authentication:
• The wireless client sends an authentication frame to the AP.
• The AP responds with a challenge text.
• The client encrypts the message using its shared key and
returns the encrypted text back to the AP.
• The AP then decrypts the encrypted text using its shared key.
• If the decrypted text matches the challenge text, the AP
authenticates the client.
▪ Association:
• The wireless client forwards an Association Request frame
that includes its MAC address.
• The AP responds with an Associate Response that includes
the AP MAC address.
• The AP maps a logical port to the wireless client.
Wireless Communications
Wireless Devices – AP, LWAP, WLC
▪ Access Point (AP):
• Small network – usually a wireless router that integrates the functions of a router.
• Large network – can be many APs.
▪ Wireless LAN Controller (WLC):
• Controls and manages the functions of the APs on a network.
• Simplifies configuration and monitoring of numerous APs.
▪ Lightweight AP (LWAP):
• Centralized management by WLC.
• No longer acts autonomously.
NETWORK SECURITY
INFRASTRUCTURE AND
NETWORK REPRESENTATIONS
Security Devices
Firewalls
▪ Some common firewall properties:
• Firewalls are resistant to network attacks.
• All traffic flows through the firewall.
• Firewalls enforce the access control policy.
▪ Several benefits of using a firewall in a network:
• Prevents the exposure of sensitive hosts, resources,
and applications to untrusted users.
• Sanitizes protocol flow.
• Blocks malicious data from servers and clients.
• Reduces security management complexity.
▪ Firewalls also present some limitations:
• A misconfigured firewall can have serious consequences for the network.
• The data from many applications cannot be passed over firewalls securely.
• Users search for ways around the firewall to receive blocked material.
• Network performance can slow down.
• Unauthorized traffic can be tunneled as legitimate traffic through the firewall.
Security Devices
Firewall Type Descriptions
▪ Packet filtering (Stateless) firewalls - usually part of a router firewall, which
permits or denies traffic based on Layer 3 and Layer 4 information.
▪ Stateful firewalls:
• Allows or blocks traffic based on state, port, and protocol.
• Monitors all activity from the opening of a connection until it is closed.
▪ Application gateway firewalls (Proxy firewall) - filters information at Layers 3, 4,
5, and 7 of the OSI reference model.
▪ Host-based (server and personal) firewall - A PC or server with firewall software
running on it.
▪ Transparent firewall - filters IP traffic between a pair of bridged interfaces.
▪ Hybrid firewall - a combination of the various firewall types.
Security Devices
Packet Filtering Firewalls
▪ Usually part of a router firewall,
which permits or denies traffic
based on Layer 3 and Layer 4
information.
▪ Are stateless firewalls that use a
simple policy table look-up that
filters traffic based on specific
criteria.
Security Devices
Stateful Firewalls
▪ The most versatile and common firewall
technology in use.
▪ Provides stateful packet filtering by using
connection information maintained in a state
table.
▪ Classified at the network layer but also
analyzes traffic at OSI Layer 4 and Layer 5.
Security Devices
Next-Generation Firewalls
▪ Provide standard firewall capabilities
like stateful inspection.
▪ Contain integrated intrusion prevention.
▪ Use application awareness and control
to see and block risky apps.
▪ Upgrade paths to include future
information feeds.
▪ Implement techniques to address
evolving security threats.
Security Devices
Intrusion Prevention and Detection Devices
Security Devices
Advantages and Disadvantages of IDS and IPS
Security Devices
Types of IPS
▪ Host-based IPS (HIPS):
• Software installed on a single host to monitor and analyze suspicious activity.
• Monitor and protect operating system and critical system processes that are specific to that host.
• Combine antivirus software, antimalware software, and firewall.

▪ Network-based IPS:
• Implemented using a dedicated or non-dedicated IPS device.
• Are a critical component of intrusion prevention.
• Sensors detect malicious and unauthorized activity in real time and can take action when required.
Security Devices
Specialized Security Appliances
▪ Cisco Advanced Malware Protection (AMP):
• Is enterprise-class advanced malware analysis and protection solution.
• Provides comprehensive malware protection for organizations before, during, and after an attack.
▪ Cisco Web Security Appliance (WSA) with Cloud Web Security (CWS):
• WSA protects the network by automatically blocking risky sites and testing unknown sites before allowing users to access them.
• WSA provides malware protection, application visibility and control, acceptable use policy controls, insightful reporting and
secure mobility.
• CWS enforces secure communication to and from the Internet.
• CWS provides remote workers the same level of security as onsite employees.
▪ Cisco Email Security Appliance (ESA):
• Defends mission-critical email systems.
• Detects and correlates threats using a worldwide database monitoring system.
Security Services
Traffic Control with ACLs
▪ Access Control Lists (ACLs) - Is a series of commands that control whether a
device forwards or drops packets based on information found in the packet
header:
• Limit network traffic to increase network
performance.
• Provide traffic flow control.
• Provide a basic level of security for
network access.
• Filter traffic based on traffic type.
• Screen hosts to permit or deny access
to network services.
Security Services
ACLs: Important Features
▪ The two types of Cisco IPv4 ACLs are standard and extended.
▪ Standard ACLs can be used to permit or deny traffic only from source IPv4
addresses. Extended ACLs filter IPv4 packets based on several attributes that
include:
• Protocol type
• Source IPv4 address
• Destination IPv4 address
• Source TCP or UDP ports
• Destination TCP or UDP ports
• Optional protocol type information for finer control
▪ Standard and extended ACLs can be created using either a number or a name to
identify the ACL and its list of statements.
▪ An ACL message can be generated and logged when traffic meets the permit or deny
criteria defined in the ACL.
Security Services
SNMP
▪ SNMP allows administrators to manage end devices such as servers,
workstations, routers, switches, and security appliances.
▪ The SNMP system consists of three elements:
• Manager that runs SNMP management software.
• Agents which are the nodes being monitored and
managed.
• Management Information Base (MIB) –
this is a database on the agent that stores data
and operational statistics about the device.
Security Services
NetFlow
▪ A Cisco IOS technology that provides statistics on packets flowing through a
Cisco router or multilayer switch.
▪ Provides data to enable network and security monitoring, network planning,
traffic analysis, and IP accounting for billing purposes.
Security Services
Port Mirroring
▪ A feature that allows a switch to make duplicate copies of traffic passing
through a switch, and then send data out a port with a network monitor
attached.
▪ The original traffic is forwarded in the usual manner.
Security Services
Syslog Servers
▪ The most common method of accessing system messages.
▪ Allows networking devices to send their system messages across the network
to syslog servers.
▪ The syslog logging service provides three primary functions:
• Gather logging information for monitoring and troubleshooting.
• Select the type of logging information that is captured.
• Specify the destination of captured syslog messages.
Security Services
NTP
▪ Allows routers on the network to synchronize their time settings with an NTP server
and use strata levels.
▪ NTP can be set up to synchronize to a private master clock or it can synchronize to
a publicly available NTP server on the Internet.
▪ NTP servers are arranged in levels known as strata:
• Stratum 0 - high-precision timekeeping devices assumed
to be accurate and with little or no delay.
• Stratum 1 - connected to the authoritative time sources.
They act as the primary network time standard.
• Stratum 2 and Lower - connected to stratum 1 devices
through network connections. Stratum 2 devices
synchronize their time using the NTP packets from
stratum 1 servers. They could also act as servers for
stratum 3 devices.
Security Services
AAA Servers
▪ AAA Services is a set of three independent security functions: Authentication,
Authorization, and Accounting/auditing.
• Authentication - Users and administrators must prove that they are who they say they are.
• Username and password combinations, challenge and response questions, token cards, and other
methods.
• AAA authentication provides a centralized way to control access to the network.
• Authorization - After authentication, determine which resources the user can access and which
operations the user is allowed to perform.
• Accounting and auditing - Accounting records what the user does, what is accessed, the
amount of time the resource is accessed, and any changes that were made. Accounting keeps
track of how network resources are used.

▪ AAA Authentication protocols


Security Services
VPN
• This is a private network that is created over a public network.
• A VPN is private in that the traffic is encrypted to keep the data
confidential while it is transported across the public network.
• IPsec services allow for authentication, integrity, access control, and confidentiality.
Virtual Private Network IPsec VPN
Network Topologies
Overview of Network Components
▪ Network infrastructure contains three categories of network components:
Devices
• Devices
• Media
• Services
Services

Media
Network Topologies
Physical and Logical Topologies
▪ Physical Topology refers
to the physical
connections and identifies
how end devices and
infrastructure devices are
interconnected.
Network Topologies
Physical and Logical Topologies (Cont.)
▪ Logical Topology
refers to the way a
network transfers
frames from one
node to the next.
Network Topologies
WAN Topologies
▪ Point-to-Point - Consists of a permanent link between two endpoints.
▪ Hub and Spoke - A WAN version of the star topology in which a central site
interconnects branch sites using point-to-point links.
▪ Mesh - This topology provides high availability, but requires that every end
system be interconnected to every other system.
Network Topologies
LAN Topologies
▪ Star - End devices are connected to a central
intermediate device.
▪ Extended Star - In an extended star topology,
additional Ethernet switches interconnect other
star topologies. A
▪ Bus - All end systems are chained to each other
and terminated in some form on each end.
▪ Ring - End systems are connected to their
respective neighbors, forming a ring. Unlike the
bus topology, the ring does not need to be
terminated.
Network Topologies
The Three-Layer Network Design Model
Three-Layer Hierarchical Model
• Access layer:
• Provides endpoints and users direct access to the network.
• User traffic is initiated at this layer.
• Distribution layer
• Aggregates access layers.
• Provides connectivity to services.
• Core layer
• Provides connectivity between distribution layers.

▪ Collapsed Core
• Core and distribution layers are collapsed into
one layer.
• Reduces cost and complexity.
Network Topologies
Common Security Architectures
▪ Firewall design is primarily about device interfaces permitting or denying traffic based on the
source, the destination, and the type of traffic. Some designs are as simple as designating an
outside network and inside network. A firewall with two interfaces is configured as follows:
• Traffic originating from the private network is permitted and inspected as it travels toward the public network.
Inspected traffic returning from the public network and associated with traffic that originated from the private
network is permitted.
• Traffic originating from the public network and traveling to the private network is generally blocked.
Network Topologies
Common Security Architectures (Cont.)
▪ A demilitarized zone (DMZ) is a firewall design where there is typically one inside interface
connected to the private network, one outside interface connected to the public network,
and one DMZ interface:
• Traffic originating from the private network is
inspected as it travels toward the public or DMZ
network. This traffic is permitted with little
or no restriction. Return traffic is usually permitted.
• Traffic originating from the DMZ network and
traveling to the private network is usually blocked.
• Traffic originating from the DMZ network and
traveling to the public network is selectively
permitted based on service requirements.
• Traffic originating from the public network and
traveling toward the DMZ is selectively permitted
and inspected. Return traffic is dynamically permitted.
• Traffic originating from the public network and
traveling to the private network is blocked.
Network Topologies
Common Security Architectures (Cont.)
▪ Zone-based policy firewalls
(ZPFs) use the concept of
zones to
provide additional flexibility.
▪ A zone is a group of one or
more
interfaces that have similar
functions or features.
• Diane Barrett/ Martin M. Weiss (2018).CompTIA Security+ SY0-501 Exam Cram (5th Edition)

• Emmett Dulaney and Chuck Easttom. CompTIA Security+ Study Guide: Exam SY0-501 7th Edition

• David L. Prowse (2018) Pearson. CompTIA Security+ SY0-501 Cert Guide (4th Edition)

• Cisco Networking Academy (Author).(June 25, 2018)CCNA Cybersecurity Operations Companion


Guide 1st Edition

• Omar Santos/ Joseph Muniz /Stefano De Crescenzo(June 17, 2017)CCNA Cyber Ops (SECFND #210-
250 and SECOPS #210-255)Official Cert Guide Library 1st Edition

You might also like