Dynamic Host Configuration Protocol (DHCP)
Domain Name System (DNS)
resolves host names and domain labels to IP addresses
DNS spoofing
HOSTS
before DNS was developed (in the 1980s), name resolution took place using a text file named HOSTS. Each name:IP address mapping was recorded in this file and system administrators had to download the latest copy and install it on each Internet client or server manually. Even though all name resolution now functions through DNS, the HOSTS file is still present and most operating systems check the file before using DNS. Its contents are loaded into a cache of known name:IP mappings and the client only contacts a DNS server if the name is not cached
DNS server cache poisoning (or pollution)
DNS footprinting
DNS Security Extensions (DNSSEC)
cybersquatting
Simple Network Management Protocol (SNMP)
• The agent is a process (software or firmware) running on a switch, router, server, or other SNMP-compatible network device.
• The SNMP monitor (a software program) provides a location from which network activity can be overseen
Network Time Protocol (NTP)
remote access
tunneling
technology used when the source and destination computers are on the same logical network but connected via different physical networks
VPN concentrator
clients connect to a VPN gateway (a VPN-enabled router, or sometimes called a VPN concentrator) on the local network. This is the “telecommuter” model, allowing home-workers and employees working in the field to connect to the corporate network. The VPN clients will connect over the Internet
site-to-site VPN
connects two or more local networks, each of which runs a VPN gateway (or router/VPN concentrator). Where remote access VPN connections are typically initiated by the client, a site-to-site VPN is configured to operate automatically. The gateways exchange security information using whichever protocol the VPN is based on. This establishes a trust relationship between the gateways and sets up a secure connection through which to tunnel data. Hosts at each site do not need to be configured with any information about the VPN. The routing infrastructure at each site determines whether to deliver traffic locally or send it over the VPN tunnel.
Point-to-Point Tunneling Protocol (PPTP)
legacy protocols such as the Point-to-Point Tunneling Protocol (PPTP) have been deprecated because they do not offer adequate security
TLS VPN (still more commonly referred to as an SSL VPN)
OpenVPN
open source example of a TLS VPN
Internet Protocol Security (IPSec)
• Tunnel mode—the whole IP packet (header and payload) is encrypted and a new IP header added. This mode is used for communications across an unsecure network (creating a VPN). This is also referred to as a router implementation
Authentication Header (AH) protocol
encapsulation security payload (ESP)
Internet Key Exchange (IKE) protocol
Layer 2 Tunneling Protocol (L2TP) VPN
for remote access VPNs, a combination of IPSec with the Layer 2 Tunneling Protocol (L2TP) VPN protocol is most often used. With L2TP/IPSec, the client and server machines can authenticate using digital certificates or a pre-shared key. The user can then authenticate to the remote access server using whatever method is supported (MS-CHAP or EAP, for instance). L2TP uses UDP port 1701 for data and connection control
IKEv2
Network Access Server (NAS) or Remote Access Server (RAS)
all the major NOS are bundled with software supporting VPNs. A server configured in this role is usually called a Network Access Server (NAS) or Remote Access Server (RAS). Where the functionality is part of a router or dedicated security appliance, it may be called a VPN concentrator. In either case, the server would be placed on the network edge, protected by a firewall configuration in a Demilitarized Zone (DMZ)