08.02.2015 Views

Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...

Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...

Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Security Zones 127<br />

■ A segment dedicated to information storage.<br />

■ A segment specifically for the processing of business information.<br />

Each of these two new segments has special security and operability concerns<br />

above and beyond those of the rest of the organizational network. Considerations<br />

when defining segments are as follows:<br />

■<br />

■<br />

■<br />

■<br />

Creation of multiple segments changes a network structure.<br />

As a site grows and offers new features, new zones may have to be created.<br />

It is best to start with deny-all strategies and permit only the services and<br />

the network transactions required to make the network function.<br />

Access controls regulate the way network communications are initiated.<br />

EXAM WARNING<br />

A deny-all strategy means that there is a firewall rule which blocks all traffic. Additional<br />

rules are created to allow only the minimum level of service required for the network to<br />

function. Any traffic that does not match these rules permitting traffic is then handled by<br />

the default block rule and the traffic is dropped.<br />

Virtual Private Networks<br />

Virtual private networks (VPNs) allow a remote user to behave as if attached to<br />

a local network. The traffic shared among devices on the VPN must be protected<br />

so as to provide confidentiality, integrity, and authentication (see Figure 8.2).<br />

Crunch Time<br />

Point-to-Point Tunneling Protocol (PPTP) is a VPN protocol<br />

that is a relatively simple encapsulation of the Pointto-Point<br />

Protocol (PPP) over an existing Transmission<br />

Control Protocol/Internet Protocol (TCP/IP) connection.<br />

Characteristics of PPTP include the following:<br />

■ Consists of two connections:<br />

■ The control connection is a TCP connection to<br />

port 1723.<br />

■ The IP tunnel connection and user data is implemented<br />

via PPP in conjunction with the Generic<br />

Routing Encapsulation (GRE) protocol.<br />

■ PPTP connections can be established in either<br />

direction.<br />

■ Security requirements of PPTP, such as authentication<br />

and encryption, are left to the PPP portion of<br />

the traffic.<br />

■ PPTP connections can be authenticated through<br />

the PPP layer using Microsoft’s Challenge Handshake<br />

Authentication Protocol (MS-CHAP) or the<br />

Extensible Authentication Protocol–Transport Layer<br />

Security (EAP–TLS) protocol.<br />

■ Encryption can be provided by the Microsoft Pointto-Point<br />

Encryption (MPPE) protocol, which is based<br />

on RC4 with session keys of 40-bit, 56-bit, or<br />

128-bit length.<br />

■ Because of the need for two connections to maintain<br />

a single PPTP tunnel, making sure PPTP traffic<br />

can traverse firewalls can be problematic. Also,<br />

owing to the use of GRE, traffic originating from or<br />

sent to a host that sits behind a device performing<br />

Network Address Translation (NAT).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!