Network + Part 7

  1. SNMP
    Simple Network Management Protocol. A database of MIB management information base and OIDs Object Identifiers. Poll devices over udp/161.
  2. SNMP v1
    Structured tables. No encryption.
  3. SNMP v2
    Data type enhancements, bulk transfers, but no encryption.
  4. SNMPv3
    Message integrity, authentication, and encryption.
  5. OID
    Object identifier.
  6. SNMP traps
    Device monitors itself and sends alerts over udp/162. User needs to set a threshold for alerts.
  7. Audit logs
    What did the device / application do. When did they do it.
  8. Syslog
    Standard for message logging.
  9. SIEM
    Security Information and Event Manager. Gets data from the syslogs.
  10. Runts
    Frames that are less than 64 bytes. May be the result of a collision.
  11. Giants
    Frames that are more than 1518 bytes.
  12. CRC Error
    Cyclic redundancy error. Failed frame check sequence. May indicate a bad cable or interface.
  13. Encapsulation error
    Inconsistent configurations between switches such as ISL or 802.1Q
  14. Netflow
    Gather traffic statistics from all traffic flows. Shared communication between devices.
  15. COOP
    Continuity of operations planning. When things do not go according to plan. Examples include writing down manual transactions.
  16. System Life Cycle
    Managing asset disposal. In some organizations data can’t be legally destroyed.
  17. AUP
    Acceptable use policy. Detailed documentation on acceptable use of company assets. May be documented in the rules of behavior.
  18. BYOD
    Bring your own device. The company manages certain features and applications on the device. MDM recommended.
  19. Remote access policies
    For employees working offsite.
  20. DLP
    Data loss prevention. A solution that looks for sensitive data and blocks it before it leaves the network. Firewalls can also help prevent loss.
  21. Floor Plans
    Overlay the wired and wireless layout. Helps to understand network topology.
  22. Physical Network map.
    Network Topology
  23. Distribution frame
    Passive cable termination. Punch down blocks and patch panels.
  24. IDF
    Intermediate Distribution frame. Sits in between end users and the main distribution frame.
  25. Logical Network Map
    Network Topology is based on how devices are connected rather than physical locations.
  26. Site Survey
    Determine existing wireless landscape. Identify existing access points. Work around existing frequencies.
  27. Fault tolerance
    Maintain uptime in case of failure. Example 2 servers synchronizing or 1 server with RAID and multiple power supplies.
  28. High Availability
    Example, 1 system that is already running and takes over for the main in case of fault.
  29. LBFO
    Load balancing fail over. Aggregate bandwidth, redundant parts.
  30. NIC Teaming
    When network interface cards talk to each other to help with load balancing.
  31. Port Aggregation
    Having multiple ports on a switch act as one.
  32. Multipathing
    When a single server has more than one NIC (Network Interface Card) and connects them to their own switch.
  33. UPS
    Uninterruptible Power Supply. Short term backup power for blackouts, brownouts, and surges.
  34. PDU
    Power distribution units. Provide multiple power outlets, sometimes built into a rack. Can provide monitoring functions.
  35. HVAC
    Heating, ventilation, and air conditioning.
  36. Fire suppression materials
    No water. Use inert gases and chemical agents. Nitrogen, Argon, Helium, Carbon Dioxide.
  37. Site Resiliency
    Recovery site is prepped in case the primary goes down. Data is synchronized.
  38. Cold Site
    Empty building with power. You bring the hardware and personnel.
  39. Hot Site
    A replica of your primary data center.
  40. Warm Site
    Somewhere in between hot and cold sites.
  41. Cloud Site
    An established cloud provider.
  42. Active – Passive
    Two devices installed and configured. Only one is active at a time. The passive one is always in sync.
  43. Active – Active
    2 devices and both are active at the same time.
  44. FHRP
    First Hop Redundancy Protocol. A second default gateway is provided if the first one fails.
  45. VRRP
    Virtual Router Redundancy Protocol. Devices use a virtual IP for the default gateway. If a router disappears another one takes its place.
  46. RTO
    Recovery Time Objective. Time to get running again.
  47. RPO
    Recovery Point Objective. How much data loss is acceptable.
  48. MTTR
    Mean time to repair. Time required to fix the issue.
  49. MTBF
    Mean time between failures.
  50. CIA Triad
    Combination of principles for security objectives. Confidentiality, Integrity, and Availability.
  51. Confidentiality
    Confidentiality prevents disclosure of information to unauthorized individuals or systems. Uses encryption, access controls, steganography to conceal information within another piece of information such as a message within an image.
  52. Integrity
    Integrity messages can’t be modified without detection. Availability systems must be up and running. Hashing is a fingerprint. Digital signatures use a mathematical scheme to verify the integrity of data. Certificates combine with digital signatures to verify an individual. Non-repudiation provides proof of integrity.
  53. Availability
    Information is accessible to authorized users. Redundant services. Fault tolerance. Patching closes security holes.
Author
dsagent
ID
363250
Card Set
Network + Part 7
Description
SNMP Logs and Monitoring Change management Security Policies Network Documentation High Availability Infrastructure Support Recovery Sites Network Redundancy Availability Concepts CIA Triad
Updated