Sy0-701 - Lesson 05
Sy0-701 - Lesson 05
ARCHITECTURE DE SECURITE
2
CompTIA Security+ Exam SY0-701
Lesson 5
Maintain Enterprise Campus Network
Architecture
4
Lesson 5
Topic 5A
Enterprise Network Architecture
6
Objectives
7
Architecture and Infrastructure Concepts
8
Switching Infrastructure Considerations
• Topology of nodes and links
• Physical versus logical
• On-premises networks
• Office/campus
• Structured cabling
• Hierarchical design
• Limit size of broadcast domains
• Enforce segmentation
Images © 123rf.com.
9
Architecture and Infrastructure Concepts
10
Architecture and Infrastructure Concepts
11
Architecture and Infrastructure Concepts
12
Architecture and Infrastructure Concepts
13
Architecture and Infrastructure Concepts
• Selection and placement
• Infrastructure (media, appliances, addressing/forwarding for connectivity)
• Applications/services
• Data
• Workflows
• Access
Images © 123rf.com.
15
Routing Infrastructure Considerations
• Layer 3 logical segmentation
• Networks and subnetworks (subnets)
• Difficult to manage
• Updates via media devices
20
Architecture Considerations (1)
• Cost
• Upfront capital cost and loss of value through depreciation
• Ongoing maintenance and support
21
Architecture Considerations (2)
• Availability
• Minimize downtime
• Power
• Costs of high compute resources and reliability of infrastructure
• Patch availability
• Mitigate vulnerabilities
• Inability patch due to third-party management or lack of vendor support
• Risk transference
• Contracting infrastructure to third-parties
22
Review Activity: Enterprise Network Architecture
• Architecture and infrastructure concepts
• Media, applications/services, data supporting workflows
• Network infrastructure
• OSI layer model
• Architecture considerations
• Cost, compute/responsiveness, scalability/ease of deployment, availability, resilience/ease of recovery,
power, patch availability, risk transference
23
Lesson 5
Topic 5B
Network Security Appliances
• Defense in depth
• Zone border (mostly preventive)
• Within zone (mostly detective)
• Endpoint controls (preventive,
detective, and corrective)
25
Device Attributes
• Active versus passive
• Passive controls don’t require hosts to be configured
to use them (and might not be detectable by hosts)
• Active controls require host configuration or
software agents
• Fail-open
• Preserves access on fail to prioritize availability
• Fail-close
• Prevents access on fail to priorities
confidentiality/integrity 26
Firewalls
• Enforce a network access control list (ACL)
• Packet filtering inspects headers only
• Source and destination IP address
• Protocol ID/type (TCP, UDP, ICMP, routing
protocols, and so on)
• Source and destination port numbers (TCP or
UDP application type)
• Drop/deny/reject or accept/permit a packet
(and/or log)
• Inbound, outbound, or both
• Application-specific filtering
28
Proxy Servers
• Forward proxy server
• Proxy opens connections with external
servers on behalf of internal clients
• Application-specific filters
• Non-transparent and transparent
proxies
• User authentication
29
Intrusion Detection Systems
• Sensor captures traffic
• Placement
• Inline versus mirror/tap/monitor
31
Load Balancers
• Distributes requests across farm or pool of
servers (nodes)
• Layer 4 load balancer
• Layer 7 load balancer (content switch)
• Scheduling
• Round robin
• Fewest existing connections / best response
time
• Weighting
• Heartbeat and health checks
Images © 123rf.com.
• Source IP affinity
• Session persistence
32
Web Application Firewalls
• Able to inspect code in HTTP
packets
• Matches suspicious code to
vulnerability database
• Can be implemented as
software
on host or as appliance
• Device attributes
• Active versus passive, inline versus TAP/monitor, fail-open versus fail-closed
Topic 5C
Virtual Private Networks
Images ©
123RF.com.
36
Remote Access Architecture (2)
Images ©
123RF.com.
37
Transport Layer Security Tunneling
• Use TLS to negotiate a secure
connection
• Machines authenticated by PKI
certificates
• Mutual authentication allows VPN
gateway to authenticate client
certificates
• User account authentication via
RADIUS
• Tunnel network traffic over TLS Screenshot used with permission from Rubicon Communications,
LLC.
• Modes
• Transport mode for host-to-host connections
on a private network
• Tunnel mode between gateways across an
unsecure network
Screenshot used with permission from Rubicon Communications,
LLC. 39
Internet Key Exchange
• Establishes Security Association (SA)
between peers
• Phase I provides authentication
• PKI/certificates
• Pre-shared key
• HTML5/clientless
• Access desktops and web applications from Internet via gateway to internal
network
• Browser support for canvas element plus WebSockets
41
Secure Shell
• Remote administration with public key
cryptography security
• Host key identifies server
• Client authentication
• Username/password
• Public key authentication
• Kerberos
• Key management
• SSH commands
• Jump servers
• Single host accepts SSH or RDP
connections from SAWs
• Forwards connections to app servers
• App servers only accept connections from
jump server Images © 123rf.com.
43
Review Activity: Virtual Private Networks
• Remote access architecture
• Tunneling, client-to-site remote access VPN, site-to-site VPN
45
CompTIA Security+ Exam SY0-701
Lesson 5
Summary