Security: Network Administration Principles - Paiet/Tech-Journal-for-Everything GitHub Wiki
-
Rule-based management
- The use of operational rules or restrictions to govern the security of an organization's infrastructure. A security policy used to determine how employees can access the Internet and other network resources is an example of rule-based management.
-
Firewall rules
- Used to control traffic flowing through a firewall device.
- Inbound rules: Define the action to be performed by the firewall on the data that enters the system from another system.
- Outbound rules: Define the action to be performed by the firewall on the data that flows out of the system.
- Used to control traffic flowing through a firewall device.
-
VLAN management
- Can be complex. Most organizations will keep track of VLAN configuration using diagrams and documentation.
-
Secure router configuration
- Ensuring that all routers on the network are properly secured to protect your network from attacks and can also prevent routing loops.
-
Access control lists
- Networking ACLs
- On routers and switches, rules that are applied to port numbers or IP addresses to control both inbound and outbound traffic
- Filesystem ACLs
- A table that contains entries that specify individual user or group rights to specific system objects such as programs, processes or files.
- Networking ACLs
-
Port security
- Disable unnecessary services.
- Close ports that are by default open or have limited functionality.
- Regularly applying the appropriate patches.
- Hiding responses from ports that indicate their status and allow access to pre-configured connections only.
-
802.1x
- IEEE standard used to provide a port-based authentication mechanism for wireless communications. It uses the Extensible Authentication Protocol (EAP) to provide user authentication against a directory service.
-
Flood guards
- Used to protect resources from flooding attacks, such as Distributed Denial of Service (DDoS) attacks.
- Detectors are placed throughout the network and will react and apply the appropriate mitigation techniques when an attack occurs.
-
Loop protection
- Occurs when one or more pathways exist between the endpoints in a network and packets get forwarded over and over again.
- Loop protection is done by applying proper router configuration and manufacturer recommended configurations.
-
Implicit deny
- Principle of denying all traffic unless it is specifically allowed.
-
Network separation
- Splitting your network into two or more logically separated networks in order to separate critical network functions from non-critical network functions.
- It can also prevent intruders from getting to other systems, and helps enforce access control efforts.
-
Log analysis
- Logs must be regularly monitored and analyzed to detect any unauthorized intrusion attempts, and to assess any data leaks and insider threats.
-
Unified threat management
- A system that centralized various security techniques like firewall, anti-malware, network intrusion prevention, URL filtering, content inspection, malware inspection, etc., into a single appliance.
- They usually include a single manangement interface.
- A downsides to UTM is can become a single point of failure that could affect an entire network.
-
WPA
- Provides improved data encryption through the Temporal Key Integrity Protocol (TKIP), which is a security protocol created by the IEEE 802.11i task group to replace WEP.
- It is combined with the existing WEP encryption to provide a 128-bit encryption key that fixes the key length issues of WEP
-
WPA2
- In addition to TKIP, WPA2 adds Advanced Encryption Standard (AES) encryption for even greater security and to replace TKIP. It provides 128-bit encryption
-
WEP
- Provides 64-bit, 128-bit, and 256-bit encryption using the Rivest Cipher 4 (RC4) algorithm.
- WEP is considered a security hazard and had been depreciated due to vulnerabilities to initialization vector (IV) attacks
-
EAP
- A framework that allows clients and servers to authenticate with each other using one of a variety of plug-ins.
- It can be used with a wide range of current authentication methods, and is extensible for use with future authentication methods.
-
PEAP
- Open standard implementation of EAP, developed by a coalition made up of Cisco System, Microsoft, and RSA Security
-
LEAP
- Cisco System's proprietary implementation of EAP. Uses MS-CHAP, which is not considered secure
-
MAC filtering
- The technique of allowing or denying devices with certain MAC addresses to connect to a network. A whitelist is used to specify which MAC addresses are granted access.
- A blacklist is used to specify which MAC addresses are explicitly blocked.
-
Disable SSID broadcast
-
TKIP
-
CCMP
- Counter Mode Cipher Block Chaining Message Authentication Code Protocol or Counter Mode CBC-MAC Protocol
-
Antenna placement
- The radio frequency range of each access point should not extend beyond the physical boundaries of the organization's facilities
-
Power level controls
- Used to reduce your wireless LAN transmitter power. Also helps to minimize power consumption within the wireless network
-
Captive portals
- A technique that requires a client attempting to connect to the Internet to authenticate through a web page.
- Commonly used by free and / or public Wi-Fi hotspots in order to get the user to agree to an acceptable use policy before they begin using the service
-
Antenna types
- Omni-directional
- Rubber duck
- Small omni-directional antenna, usually sealed in a rubber jacket. They are ideal for mobility and are often used in walkie-talkies or other two-way radios
- Ceiling dome
- Omni-directional antenna is installed in ceilings and is commonly used to cover rooms in a building with a wireless signal
- Rubber duck
- Directional
- Yagi
- A directional antenna used primarily in radio, but also used in long distance wireless networking to extend the range of hotspots
- Parabolic
- A very precise directional antenna often used in satellite dishes. Because it is so precise it is somewhat more difficult to establish a connection
- Backfire
- "Cantenna"
- Yagi
- Omni-directional
-
Site surveys
- the collection of information on a location, including access routes, potential obstacles and best positioning of materials for the purpose of constructing a wireless network that provides quality coverage and bandwidth while at the same time being conscious of security protocols and requirements
-
VPN (over open wireless)
- Used to provide authentication techniques and encrypt your data in transit over the network even when using an insecure wireless hotspots