08.02.2015 Views

Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...

Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...

Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

50 CHAPTER 3 Network Devices<br />

Proxy servers can:<br />

■<br />

■<br />

■<br />

Cache information going to/from the Internet.<br />

Act as the physical gateway between the Internet and company network.<br />

Be configured with filtering for determining if traffic is to be allowed.<br />

Intrusion Detection System<br />

IDS is designed to inspect and detect the kinds of traffic or network behavior patterns<br />

that match known attack signatures or that suggest potential unrecognized<br />

attacks may be incipient or in progress.<br />

It is used as a specialized tool that knows how to read and interpret the contents<br />

of log files from routers, firewalls, servers, and other network devices. Although<br />

such devices tend to operate at network peripheries, IDS systems can detect and<br />

deal with insider attacks and external attacks.<br />

OTHER DEVICES AND TECHNOLOGIES<br />

Various devices are used to manage a network and provide additional features<br />

that make the network safer and more functional in day-to-day use. <strong>Exam</strong>ples of<br />

other devices and technologies include the following:<br />

■ Gateways A gateway is a bridge connecting two dissimilar systems.<br />

■ Default gateways and subnetworks Default gateways are routers that are<br />

used to forward data packets with a destination IP address not on the local<br />

subnet. The default gateway forwards the data packet to other gateways until<br />

the packet is ultimately delivered to a gateway connected to the intended<br />

destination.<br />

■ Wireless Wireless networks require minimal cabling as data is transmitted<br />

over the air using wireless adapters and wireless routers. Computers using<br />

wireless NICs use a transceiver that sends and receives signals over the air<br />

to a wireless router or hub. The wireless router is an access point providing<br />

a method of communication that the computers with wireless NICs can<br />

connect to.<br />

■ Network attached storage (NAS) NAS devices are devices that are dedicated<br />

to providing storage of data on the network. NAS uses hard disks for storage,<br />

but instead of being installed on a server, the storage device is accessed<br />

through its own network address.<br />

■ Domain name service (DNS) Server DNS is a service that maps IP<br />

addresses to names. A HOSTS file can be used to perform the same function,<br />

but is a local text file that must be kept up-to-date. DNS provides the same<br />

functionality through a centralized database.<br />

■ Dynamic Host Configuration Protocol (DHCP) Server DHCP is a<br />

broadcast-based protocol that is used to automatically assign TCP/IP<br />

addressing information to computers. DHCP requires a DHCP Relay server

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!