Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
63 views37 pages

Sy0-701 - Lesson 05

Lesson 5 of the CompTIA Security+ Exam SY0-701 covers maintaining enterprise campus network architecture, focusing on security implications, effective controls, and secure communications for remote access. It discusses network infrastructure considerations, security zones, attack surfaces, and various network security appliances like firewalls, intrusion detection systems, and VPNs. The lesson emphasizes the importance of architecture considerations such as cost, availability, resilience, and the implementation of layered security controls.

Uploaded by

bison.hornet8534
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views37 pages

Sy0-701 - Lesson 05

Lesson 5 of the CompTIA Security+ Exam SY0-701 covers maintaining enterprise campus network architecture, focusing on security implications, effective controls, and secure communications for remote access. It discusses network infrastructure considerations, security zones, attack surfaces, and various network security appliances like firewalls, intrusion detection systems, and VPNs. The lesson emphasizes the importance of architecture considerations such as cost, availability, resilience, and the implementation of layered security controls.

Uploaded by

bison.hornet8534
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

CompTIA Security+ Exam SY0-701

Lesson 5
Maintain Enterprise Campus Network
Architecture

Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org


1
Objectives
• Compare and contrast security implications of different on-premises
network architecture models
• Apply security principles to secure on-premises network
architecture
• Select effective controls to secure on-premises network architecture
• Ensure secure communications for remote access and tunneling

2
Lesson 5

Topic 5A
Enterprise Network Architecture

Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org


3
Architecture and Infrastructure Concepts
• Selection and placement
• Infrastructure (media, appliances, addressing/forwarding for connectivity)
• Applications/services
• Data

• Workflows
• Access
• Email mailbox server
• Mail transfer server

4
Network Infrastructure

Images © 123rf.com.

5
Switching Infrastructure Considerations
• Topology of nodes and links
• Physical versus logical

• On-premises networks
• Office/campus
• Structured cabling

• Hierarchical design
• Limit size of broadcast domains
• Enforce segmentation
Images © 123rf.com.
6
Routing Infrastructure Considerations
• Layer 3 logical segmentation
• Networks and subnetworks (subnets)

• Internet Protocol (IP)


• IPv4 and IPv6

• Network prefix/subnet mask

• Virtual LAN (VLAN)


• Map layer 2 switch port topology to
layer 3 IP subnet topology

• Makes logical topology independent of


port location on physical switches
7
Security Zones
• Segment containing hosts with
same access control/security
requirements
• Public versus private
• Database and file servers
• Compartmentalize different types
of data assets
• Client devices
• Public-facing app servers
• Network infrastructure servers
8
Attack Surface
• Points at which threat actor can gain access
• Layer 1/2 versus layer 3 versus layer 4/7

• Defense in depth and layered security controls


• What problems arise from weaknesses in the network design/architecture?
• Single points of failure

• Complex dependencies

• Availability over confidentiality and integrity

• Lack of documentation and change control

• Overdependence on perimeter security

9
Port Security
• Physical port security and administratively
disabled ports

• MAC filtering and limiting

• 802.1X, EAP, and RADIUS


• Supplicant (user’s computer)

• Authenticator/RADIUS client (switch)

• Authentication/RADIUS server

• IEEE 802.1X allows switches to implement EAP over


LAN (EAPoL)

• Extensible Authentication Protocol (EAP) provides


framework for authentication methods/factors

• Remote Authentication Dial-in User Service


(RADIUS) allows use of a directory of user accounts
and credentials

10
Physical Isolation
• Single host or group of hosts not connected to any other network
• Air gapped

• Difficult to manage
• Updates via media devices

11
Architecture Considerations (1)
• Cost
• Upfront capital cost and loss of value through depreciation

• Ongoing maintenance and support

• Compute and responsiveness


• Reduce workload processing time

• Scalability and ease of deployment


• Minimize costs associated with increasing (or decreasing) workloads

12
Architecture Considerations (2)
• Availability
• Minimize downtime

• Resilience and ease of recovery


• Reduce time taken to recover from failures

• Power
• Costs of high compute resources and reliability of infrastructure

• Patch availability
• Mitigate vulnerabilities

• Inability patch due to third-party management or lack of vendor support

• Risk transference
• Contracting infrastructure to third-parties

13
Review Activity: Enterprise Network Architecture
• Architecture and infrastructure concepts
• Media, applications/services, data supporting workflows

• Network infrastructure
• OSI layer model

• Switching and routing infrastructure considerations


• Security zones and attack surface
• Port security and physical isolation
• MAC filtering, 802.1X/EAP/RADIUS

• Architecture considerations
• Cost, compute/responsiveness, scalability/ease of deployment, availability, resilience/ease of recovery, power,
patch availability, risk transference

14
Lesson 5

Topic 5B
Network Security Appliances

Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org


15
Device Placement
• Selection of effective controls
• Enforce segmentation, apply
access controls, monitor traffic

• Defense in depth
• Zone border (mostly preventive)
• Within zone (mostly detective)

• Endpoint controls (preventive,


detective, and corrective)

16
Device Attributes
• Active versus passive

• Passive controls don’t require hosts to be configured to use


them (and might not be detectable by hosts)

• Active controls require host configuration or software agents

• Inline versus tap/monitor

• Inline is installed as part of cable path (“bump-in-the-wire”)

• Switched port analyzer (SPAN) or mirror port

• Test access point (TAP)

• Fail-open

• Preserves access on fail to prioritize availability

• Fail-close

• Prevents access on fail to priorities confidentiality/integrity

17
Firewalls
• Enforce a network access control list (ACL)
• Packet filtering inspects headers only
• Source and destination IP address

• Protocol ID/type (TCP, UDP, ICMP, routing


protocols, and so on)

• Source and destination port numbers (TCP or


UDP application type)

• Drop/deny/reject or accept/permit a packet


(and/or log)

• Inbound, outbound, or both

• Placement and attributes


• Routed, bridged, or inline placement

• Firewall appliance versus router firewall


18
Layer 4 and Layer 7 Firewalls
• Stateful inspection validates connections
• State table stores connection
information

• Transport layer (layer 4)


• TCP handshake

• New versus established and related connections

• Application layer (layer 7)


• Validate protocol and match threat signatures

• Application layer gateway, stateful multilayer


inspection, or deep packet inspection

• Application-specific filtering
Screenshot used with permission from Rubicon Communications, LLC

19
Proxy Servers
• Forward proxy server
• Proxy opens connections with external
servers on behalf of internal clients

• Application-specific filters

• Non-transparent and transparent


proxies

• User authentication

• Reverse proxy server


• Proxy opens connections with internal
servers on behalf of external clients

20
Intrusion Detection Systems
• Sensor captures traffic
• Placement
• Inline versus mirror/tap/monitor

• Intrusion Detection System (IDS)


• Detection engine performs real-time
analysis of indicators
• Passive logging/alerting

• Intrusion Prevention System (IPS)


• Active response (block, reset, redirect)
• Inline response versus integration with Screenshot Security Onion securityonion.net

other security tools

21
Next-generation Firewalls and Unified Threat Management
• Next-generation firewall
• Application-aware filtering, user account-based filtering, IPS, cloud
inspection, …

• Unified threat management (UTM)


• Combining security controls into single agent and management platforms
• Firewall, anti-malware, network intrusion prevention, spam filtering, content
filtering, data loss prevention, VPN, cloud access gateway, …

22
Load Balancers
• Distributes requests across farm or pool of servers
(nodes)
• Layer 4 load balancer

• Layer 7 load balancer (content switch)

• Scheduling
• Round robin

• Fewest existing connections / best response time

• Weighting

• Heartbeat and health checks

• Source IP affinity Images © 123rf.com.

• Session persistence

23
Web Application Firewalls
• Able to inspect code in HTTP
packets
• Matches suspicious code to
vulnerability database
• Can be implemented as
software
on host or as appliance

Screenshot used with permission from Microsoft.


24
Review Activity: Network Security Appliances
• Device placement
• Defense in depth plus use of preventive, detective, and corrective controls

• Device attributes
• Active versus passive, inline versus TAP/monitor, fail-open versus fail-closed

• Firewalls (layer 4/7)


• Proxy servers
• Intrusion detection systems
• Next-generation firewalls and unified threat management
• Load balancers
• Web application firewalls

25
Lesson 5

Topic 5C
Virtual Private Networks

Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org


26
Remote Access Architecture (1)

Images © 123RF.com.

27
Remote Access Architecture (2)

Images © 123RF.com.

28
Transport Layer Security Tunneling
• Use TLS to negotiate a secure
connection
• Machines authenticated by PKI
certificates
• Mutual authentication allows
VPN gateway to authenticate
client certificates
• User account authentication via
RADIUS
• Tunnel network traffic over TLS
• Can use TCP or UDP Screenshot used with permission from Rubicon Communications, LLC.

29
Internet Protocol Security Tunneling
• Provides confidentiality and/or integrity
• Authentication Header (AH)

• Signs packet but does not encrypt payload

• Provides authentication/integrity only

• Encapsulation Security Payload (ESP)

• Provides confidentiality and/or


authentication/integrity

• Modes
• Transport mode for host-to-host connections on
a private network

• Tunnel mode between gateways across an


unsecure network

Screenshot used with permission from Rubicon Communications, LLC.


30
Internet Key Exchange
• Establishes Security Association (SA)
between peers
• Phase I provides authentication
• PKI/certificates
• Pre-shared key

• Phase II establishes cipher suites


and key sizes and use of AH or ESP
• IKE v1 supports host-to-host and site-
to-site tunneling
• IKE v2 adds better support for client-
to-site remote access VPN
Screenshot used with permission from Rubicon Communications, LLC. 31
Remote Desktop
• GUI-based remote terminal software
• Remote Desktop Protocol (RDP)
• Connect to physical machines
• RDP gateway to virtual desktops and apps

• HTML5/clientless
• Access desktops and web applications from Internet via gateway to internal
network
• Browser support for canvas element plus WebSockets
32
Secure Shell
• Remote administration with public key
cryptography security
• Host key identifies server
• Client authentication
• Username/password
• Public key authentication
• Kerberos

• Key management
• SSH commands
• ssh versus scp (Secure Copy)
Screenshot used with permission from PuTTY.
33
Out-of-band Management and Jump Servers
• Secure admin workstations (SAWs)
• Out-of-band (OOB) management
• Serial/modem/console port

• Virtual terminal

• Separate cabling or VLAN isolation

• Jump servers
• Single host accepts SSH or RDP connections
from SAWs

• Forwards connections to app servers

• App servers only accept connections from jump


server

Images © 123rf.com.
34
Review Activity: Virtual Private Networks
• Remote access architecture
• Tunneling, client-to-site remote access VPN, site-to-site VPN

• Transport Layer Security (TLS) tunneling


• Internet Protocol Security (IPSec) tunneling
• Internet Key Exchange
• Remote Desktop
• Secure Shell
• Out-of-band management and jump servers
35
Lab Activity
• Assisted Lab: Setting up Remote Access
• Assisted Lab: Using IPSec Tunneling

36
CompTIA Security+ Exam SY0-701

Lesson 5
Summary

Copyright © 2023 CompTIA, Inc. All Rights Reserved. | CompTIA.org


37

You might also like