Time
10 hours 32 minutes
Difficulty
Beginner
CEU/CPE
11

Video Transcription

00:00
Welcome to Cyber is Video. Siri's in the Company of Security Plus five, Owen Certification and Exam.
00:06
I'm Your Instructor, Round Warner.
00:09
This video is on section 2.1, talking about the installation in configuration of network components, both hardware and software base to support organisational security.
00:20
This is part of Domaine two on technologies and tools.
00:24
Please see the domain Introduction video and the video on Networking Basics.
00:29
This section has a lot to cover.
00:31
We'll be talking about the different types of network components like louder routers and switches, proxies, load balancers,
00:38
firewalls, intrusion detection, prevention systems, VPN concentrators, security incident in event management systems, male and media gateways and hardware security modules.
00:51
It's a lot to cover, so this series will be split into three parts.
00:55
Before we can dive into the world of network security, you need to understand basic components and functions on the network.
01:03
In Part one, I'll cover common network devices like routers, switches, bridges, proxies, load balancers and wireless access points.
01:12
We'll start by talking about network routers.
01:15
The primary instrument used for connectivity between two or more networks is the router.
01:22
Routers work by providing a path between networks,
01:26
a router has two connections that are used to join the networks. Each connection has its own address, sometimes more, and appears as a valid address in its respective network.
01:37
Most writers could be configured to operate as a packet filtering, firewall and use access control lists. Many of the new writers also provide advanced firewall functions.
01:48
Routers operate at Layer three, the network layer, and they store information about network destinations within routing tables.
01:57
A border router works on the outside of a corporation's network provides that connectivity between the internal land and the external land
02:07
router security is provided through access control lists, zones and using anti spoofing technology.
02:15
Access control lists Filter packet by the source address destination address protocol were port,
02:23
for example. You could block a certain set of I P addresses using your router.
02:29
You can also establish zones within your router. Segmenting networks based on functionality or security.
02:38
Routers can also be connected internally to other routers. Official. Effectively creating zones that operate autonomously.
02:46
Anti spoofing is creating a set of access list that deny access to private I P addresses on local host ranges from the Internet, for example, you can't spoof an internal I P address coming from the outside of the network.
03:01
These are all security features she should be looking for in your routers. Switches are the most common choice for connecting death stops to a network.
03:10
A switch connects devices with a computer network. Contrast that with router that connect networks together.
03:20
A network switches a small hardware device that centralizes communications among multiple connected devices with within one local area network. Does this by using packet switching to receive process and forward data from the source device to that destination. Device switches can work at either layer to
03:39
the data link layer
03:40
word layer three network layer
03:44
packet forwarding decisions are made on the switch based on media access control addresses
03:51
to review the basic functions of a switch. Our filter and forwarding frames. Learning Mac addresses and preventing loops.
04:00
Let's talk about some switch security
04:02
switches can be used to provide layers of security within a network. For example, virtual lands or villains villains are designed that properly segments the network's virtually rather than using physical switches, you can do it within multiple switches by a view Lands.
04:19
Port security is a layer to traffic control. Feature on switches. It enables individuals switch ports to be configured to allow on Lee a specified number of source Mac addresses to come in through that port.
04:32
It's primary use is to keep two or three users from sharing a single access port.
04:39
Port security can be configured to take one of three actions and going to a default shutdown mode, protect mode or restrict mode.
04:48
Port security is deterrent, but not a reliable security feature.
04:53
Mac addresses can be spoofed, and multiple hosts can still easily be hidden behind. A small router switch is also protect against looping.
05:03
When did a unit units can travel from the first land segment, toe a second land segment through multiple paths? It's considered a loop, and this could happen on switches or bridges.
05:16
The solution is using spanning tree protocol. STP, which is a link management protocol that provides path redundancy while preventing undesirable loops in the network. Be familiar with looping and have spanning tree protocol protects against that on switches.
05:33
A flood guard is an advanced firewall guard feature that used to control network activity associated with DOS and de Das attacks. Flood guard controls how the authentication and counting an authorization or triple A service handles bad log in attempts. They're tying up network connections
05:54
it allows. The firewall resource is toe automatically be reclaimed if the authentication subsystem runs out of resource is thereby defeating Das. Indeed, US attacks, for example, to remember the three way handshake the Sin sen Ack ack. I keep sending a sin. That's a flood.
06:13
Flood guards protect against that.
06:15
The last network device you might find on your network is a bridge that connects two different physical networks using layer to
06:25
bridges have basically been replaced by switches. Loops can also occur on bridges like they happen on switches.
06:33
A common challenge we found in the earlier days of the Internet was running out of pipe version for network addresses.
06:42
This was solved partially by Nat Network address Translation.
06:46
It also provides a layer of security by hiding internal I P addresses from external networks.
06:55
That is a method of remapping one i p address base say, coming in from the Internet into another by modifying network address information in the I P header of packets while they're in transit across traffic routing devices. So, as you see on your screen is the example from the Internet to internal.
07:15
The address is translated from the Internet address to an internal address space.
07:20
I suggest you try this yourself by using liken if CONFIG Commander I p convict on your local workstation for one i p address and you'll see it's different than your Internet address. That's a result of network address. Translation.
07:35
Another type of network device that provides a layer of security at the network is known as a proxy. It's that boundary device between internal and external networks.
07:46
It routes packets on behalf of something internally. A proxy is any device that acts on behalf of others. It could be done for security, logging or cashing,
07:59
for example, rather than continually going out to Google or cyber very dot i t. Using up Network Resource is that site can be cashed by a proxy when someone internally goes out to that website that might actually be going into the proxy pulling down that cash.
08:18
A proxy server could be used to block known malicious websites based on the URL or particular category.
08:26
Ah, forward proxy retrieves data on behalf of the client. The example I just used is a forward proxy where it's pulling information from well known websites to be used by internal resource is therefore reducing network loads.
08:41
A reverse proxy protects access to a server on the internal network is coming
08:48
from the outside looking inside. It could be proxy along the lines of a Web application firewall,
08:54
a transparent proxy also known as an intercepting in line or forced proxy. It's a cashing server that redirects client request without modifying them solely to reduce bandwidth usage.
09:07
Familiarize yourself with these different forms and functions of network proxies.
09:15
A load balancer is another type of network device, and it's implemented as either software or hardware. It's usually associated with another device, a routers, which network address, translation, appliance and so on.
09:28
It's most common implementation. A load balancer splits the traffic intended for a website in tow. Individual requests there, then rotated to redundant servers as they become available
09:41
of a server that should be available is busy or down. It could be taken out of the rotation
09:48
you see on your screen different benefits of a load balancer, reducing the response time. Maximizing throughput
09:54
allows for better allocation of resource is
09:58
scheduling and balancing network traffic is a key issue with load balancing. Its job is to determine how to split up the work and distributed across multiple redundant servers.
10:11
There's multiple methods for distributing the load.
10:13
First is round robin. We're just takes turns in a circular pattern. First server, one server to Server three and so on.
10:22
With affinity or sticky sessions, requests are sent to a specific application, so you're always stuck going to that one particular application server with affinity, scheduling
10:35
least connections is taking the server that's least busy and distributing you load to it.
10:43
Lastly, is just random where the load balancer will just pick at random. Which server wants to send the traffic, too,
10:50
With active active load balancing, the servers work together, so if one will fail over dramatically automatically to the other
11:01
active passive, all traffic is into an active server. That active server goes down, then will be automatically redistributed to that passive server
11:11
with virtual eyepiece. V. I. P. S. At least one physical server is a sign,
11:18
but more than one virtual I P address can also be assigned.
11:22
Be aware of these different functions of load balancing.
11:28
Access points are another common network device normally associated with WiFi wireless access points were W a piece there layer to or data link layer of the O. S. I model.
11:41
They can operate as a bridge connecting a shared wired network toe wireless devices or as a router, passing data transmission for one access point
11:52
to another. Routers connect networks.
11:56
Wireless Access Point consists of a transmitter and a receiver or transceiver. It's the device used to create at wireless land or W land.
12:07
A centralized access controller or a C is capable of providing management configuration, encryption and policy settings for all wireless land access points within a corporate network.
12:22
The level of control and management options in a C or access controller needs to provide depends on the type of access points the organization implements.
12:31
Three main types of wireless access points exist. Fat, fit and thin
12:37
fat. Wireless access points are also sometimes called intelligent access points because they're all inclusive. They contain everything needed to manage wireless clients such as A C L's quality of service functions, v land support and band steering
12:54
fat. A piece can be used a standalone access points and do not need an access controller.
13:00
However, this capability makes them costly because they're built on powerful hardware and require complex software.
13:09
A fit access point is a scaled down version of a fat AP and uses an access controller for control and management functions.
13:18
A thin access point. There's nothing more than a radio and antenna controlled by a wireless switch. Thin access points are sometimes called intelligent antennas. A thin access point has minimal functionality, so a controller is required thin A peas are simple and do not require complex hardware
13:37
or software
13:39
can be a lot more cost effective.
13:41
Access points can either be controller based or stand alone. They require that access controller like fit or thin a PPIs than their controller based
13:52
fat. A piece can be stand alone.
13:56
There are different methods for managing wireless access points and providing for their security
14:01
the first R S s I. D. S or service set identifiers.
14:07
These are basically the name of the wireless access point. They can be common within a corporation If those wireless access points have a sink, RAL have a centralized access controller.
14:18
An SS I d can be set to either broadcast so everyone can see it or cloaked meaning hidden so they're not seat. Even hidden SS ideas could be determined. Another WiFi security feature is Mac Fill Trick. You cannot
14:35
allow only specific devices onto your WiFi network based on their Mac address.
14:41
Review the concept of the Mac address on Nick's. If you're not familiar with it,
14:46
it's the specific layer to address for devices, and you can use that to limit who can access a particular WiFi network. This is something you could even do at home.
14:58
Signal strength is another management and security feature of WiFi access points. You want to make sure you limit the signal strength. You don't want signal to be leaking outside of your borders outside of your office, outside of your apartment or home, you can limit the signal strength.
15:18
You can also determine the band or band with to be used using one of the specific channels.
15:24
Lastly, you can use different types of antennas either omni directional, meaning they go everywhere or directional, meaning you're focused where the signal goes.
15:35
Normal WiFi access points are omni directional and think of them like a severe, which means they go up, down and sideways. You can use all these different features to better secure your wireless access point and your network
15:52
on your screen, you see the differing WiFi standards from IEEE 802.11 how they have different capabilities and signal strength as well as bands.
16:03
Review this as you're studying for your security, plus example, and look at your own wireless connectivity to see what IEEE standard you use in this video. I explained some common network components, such as routers, switches, bridges, proxies, load balancers and wireless access points.
16:22
Let's practice on a few sample quiz questions.
16:26
Question one.
16:27
This condition exists. When did the unit's contract vel from a first land segment? Second Land segment through more than one path and assault by S. T. P.
16:40
The answer is D looping
16:42
STP spanning tree protocol on bridges and on switches to prevent looping.
16:51
This concludes part one of section 2.1, talking about the installation and configuration of network components, hardware and software based to support organisational security

Up Next

CompTIA Security+

CompTIA Security Plus certification is a great place to start learning IT or cybersecurity. Take advantage of Cybrary's free Security+ training.

Instructed By

Instructor Profile Image
Ron Woerner
CEO, President, Chief Consultant at RWX Security Solutions LLC
Instructor