Network Security Devices Part 1

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

35 hours 10 minutes
Video Transcription
greetings and welcome to sigh Berries comp tia certified a van Security practitioners certification. Preparation course
We're gonna continue on in this discussion on marginal seven, which is tied our network security architecture.
Here are the learning objectives which encompasses this particular presentation. At this point time, we're gonna pull the attention for discussion off network security devices explain how they can be used.
This is actually section two of this particular presentation. And in fact, we have on Lee one objective in its title network security devices and explain how they can be used.
One first and one point out is that we have a pre assessment question during this particular presentation. And the question is as follows. Which function does an Internet content filters not perform? Isn't a your l filtering be male? Well, inspection, See content inspection or lastly, D
intrusion detection.
If you said like that, D, you're absolutely correct.
So as we begin this presentation, which is titled Security Through Network Devices, when you put together what we call a proactive security approach, you have that here to what we call layered security
and what that means The defense adept uses what we call multiple types of security devices to protect the network is also referred to as defence in depth.
A network with layout security would make it much more difficult for the would be her attacker. He must have all the tools, the knowledge and skills to break through the various layers that you actually put together. Their network security can be achieved by using what we call network devices or Harper Design for security.
We have some standard network, but we call standing network devices security has found in network hardware and provide what we call basic level of security.
Never, devices can be classified based on their function. When we go back and look at what we call the S. R. Morrow often referred to the open system interconnection models standards were released back in 1978 opposite. They were advised back in 99 3 and they're still in use Even today.
It'll screw how network prepares data for delivery and how Data is. Hannah, once it's actually received,
continue on with the network what we call the standing. There were devices there. Once I'm out of brakes, network steps into what we call seven layers each of their has different network and tasks each of their cooperates with the adjacent layer standing network device. Kay also be classified by the West I layer, as which day function.
Some devices include we have switches. We have routers. We have low balances
as well as proxies.
The first item on our agenda. We're gonna take a look at switches when you think about the switches compared to what we call a legacy. Advice is what example will be a hub off switch is much more different than what would be legacy Advice on hope
A switch is a network is a network switches a device that connects together network device together, and it operates at layer or two of the SA. Tomorrow, in fact, it operates that will be called a doubt of Letelier.
The switch can determine which devices connected to each port it can afford. The frames sent to that specific device. Other words either the unit cats or frames, and it sent through all the devices. Other words we call broadcast is a term it uses what we call a Mac address to identify
that address or device. In other words, because each device,
even when you look at switches. No two switches have the exact same address. Other words we're referencing the Mac address.
Continue on with switches here attacking attached to the switch. See only frames that are directed to that device and not others.
Earlier network that was every Mitchell used up to connect devices to a network. Hubs repeated all of frames to all attached network devices. In this case, Attackers could use a protocol analyzing capture all the package. The photo and eyes could also be cold and analyzed. The packets content
network of ministers obviously should be able to mount a network traffic because that helps to identify and troubleshoot what we call potential network problems.
Traffic monitoring methods. We have port mirroring basic What that does. It allows US administrator to configure the switch the competent traffic that occurs on some or all reports designed to designated what got what we call designated Monitoring pours on the switch.
We have a term called network tap, which is ah was the test. You can also test your access point. It's separate devices installed between the two network devices. In this case,
then we have the rodders. What rodders do they four packs across different computer networks.
They operated layer three. Or in fact, it was Roger's off that referred to as a layer three device. Because it operates in the Layer three off the SA. Tomorrow, it can. It can be set to filter our specific types of network traffic.
Then we have low balances. What a seance. Or do they have to balance describe it, work across your network. It allocates with caresses. Calls multiple devices as well
now forced the advantages of low balance and technology
Essentially what it does it reduce the probably of overloading a single server and optimize the band with your network computers, and it reduces potential network downtime. Ah, low balance is achieved through software hardware.
Low bias are grouped into two categories. We have layer for what we call low balances and central what they do. They act upon data found in your network and transport layer of protocols. They're seven low balances. What did they do it? They describe it Requests based on data found in the application layer protocols.
Now for the security advantage of low balances central where they can do, they can detect and stop attacks directed at a server or your application. It can also detect and prevent the now or dolls,
attacks and protocol attacks. Some cannot attack us information about the network. It can always allow you to hide your HDP hypertext transport protocol error pages. It also remove the service identification hitter from the A C T P type response.
We have a proximity, and there are several types of proxy in use. You have a proxy server, and then you also have what we call an application of where a proxy in this case, a proxy server is a computer or application program that intercept user requests from the internal network and process that request on behalf of the user.
While not a hand, the application where proxy is a special process server
that knows the advocates of protocols that it supports.
Obviously we have some advantages off proxy server that can increase the speed it reduces the cost, improve management and scramble security. When you have a reverse proxy, it does not serve clients and routes Incoming requests to the correct server
that it's not another thing that bear in mind. You have specifically designed security hardware devices because what they do to provide greater protection in the standard networking devices. We also have a network firewalls. Now, when you think about Stop firewall, it can either be software base or it can be, in fact, hardware based.
Both type wouldn't do essentially what they do. They expect the packages
and either accept or deny injury. Your hard work by walls are using located outside the network security perimeter.
Their methods in terms of firewall package fielding, you have statements. Practice field three and then you have state full package filter Would statements package filtering. It inspects the incoming package, and permits organized based on the condition set by the administrator
was stable. Packets filter. It keeps a record of the state of the connection. It makes decision based on the connection as well as the condition.
Now for the flower action on a package, it can either allow what you get a lot of packing the past two. You can either drop other words, prevented packets from passing to the network and center. No response to the center. It can also reject, in other words, when it rejected, prevents the package for moving into the network, but sends a message to the sender.
We also have a rule based type firewalls, essentially with the rule based. They use a set of individual instruction to control actions. Call firewall rules.
Each rule is a separate instruction process and sequence telling the foul what actions to take
Not during this presentation we took. It took a look expensive, differently at switches. We learned that a switches that network two switches on the advice that connects network devices together. It operates also is a layer considered layer to device. It could determine which devices connected to each port it can for the frame sent to specific device.
Other words unit gas or frame set toe all devices. Other words
broadcast it all. We also learned that they used a Mac address because reality is this No. Two switches and no device to network devices.
We'll have the same Mac address.
We also discussed the Orson tomorrow and learned that it breaks the networking steps into seven layers each. There have different network and tasks. Lastly, each lyric cooperates with the adjacent layer,
and the upcoming presentation will be continuing our discussion off network security devices. It's playing how they could be used in the next video
Up Next