Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...
Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...
Syngress - Eleventh Hour Network+ Exam N10-004 Study Guide (11 ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
50 CHAPTER 3 Network Devices<br />
Proxy servers can:<br />
■<br />
■<br />
■<br />
Cache information going to/from the Internet.<br />
Act as the physical gateway between the Internet and company network.<br />
Be configured with filtering for determining if traffic is to be allowed.<br />
Intrusion Detection System<br />
IDS is designed to inspect and detect the kinds of traffic or network behavior patterns<br />
that match known attack signatures or that suggest potential unrecognized<br />
attacks may be incipient or in progress.<br />
It is used as a specialized tool that knows how to read and interpret the contents<br />
of log files from routers, firewalls, servers, and other network devices. Although<br />
such devices tend to operate at network peripheries, IDS systems can detect and<br />
deal with insider attacks and external attacks.<br />
OTHER DEVICES AND TECHNOLOGIES<br />
Various devices are used to manage a network and provide additional features<br />
that make the network safer and more functional in day-to-day use. <strong>Exam</strong>ples of<br />
other devices and technologies include the following:<br />
■ Gateways A gateway is a bridge connecting two dissimilar systems.<br />
■ Default gateways and subnetworks Default gateways are routers that are<br />
used to forward data packets with a destination IP address not on the local<br />
subnet. The default gateway forwards the data packet to other gateways until<br />
the packet is ultimately delivered to a gateway connected to the intended<br />
destination.<br />
■ Wireless Wireless networks require minimal cabling as data is transmitted<br />
over the air using wireless adapters and wireless routers. Computers using<br />
wireless NICs use a transceiver that sends and receives signals over the air<br />
to a wireless router or hub. The wireless router is an access point providing<br />
a method of communication that the computers with wireless NICs can<br />
connect to.<br />
■ Network attached storage (NAS) NAS devices are devices that are dedicated<br />
to providing storage of data on the network. NAS uses hard disks for storage,<br />
but instead of being installed on a server, the storage device is accessed<br />
through its own network address.<br />
■ Domain name service (DNS) Server DNS is a service that maps IP<br />
addresses to names. A HOSTS file can be used to perform the same function,<br />
but is a local text file that must be kept up-to-date. DNS provides the same<br />
functionality through a centralized database.<br />
■ Dynamic Host Configuration Protocol (DHCP) Server DHCP is a<br />
broadcast-based protocol that is used to automatically assign TCP/IP<br />
addressing information to computers. DHCP requires a DHCP Relay server