Hub
• “Multi-port repeater” • Traffic going in one port is repeated to every other port • OSI Layer 1 • Everything is half-duplex • Becomes less efficient as network speeds increase • 10 megabit / 100 megabit • Difficult to find today
Bridge
• Imagine a switch with two to four ports
• Makes forwarding decisions in software
• Connects different physical networks
• Can connect different topologies
• Gets around physical network
size limitations / collisions
• OSI Layer 2 device
• Distributes traffic based on MAC address
• Most bridges these days are wireless access points
• Bridges wired Ethernet to wireless
Switch
Router
• Routes traffic between IP subnets • OSI layer 3 device • Routers inside of switches sometimes called “layer 3 switches” • Layer 2 = Switch • Layer 3 = Router • Often connects diverse network types • LAN, WAN, copper, fiber
Firewall
Wireless access point (WAP)
• Not a wireless router • A wireless router is a router and a WAP in a single device • WAP is a bridge • Extends the wired network onto the wireless network • WAP is an OSI layer 2 device
Converting media
Wireless range extender
• Wireless never seems to stretch far enough • We can’t always choose where to install an access point • Extend the reach of a wireless network • A wireless repeater
VoIP endpoint
• Some people still communicate using voice
• We now send this using VoIP
• The device can now be anything
• Traditional phone handset, desktop application,
mobile device app
Multilayer switches
• A switch (Layer 2) and router (Layer 3) in the same
physical device
• Layer 2 router?
• Switching still operates at OSI Layer 2, routing still
operates at OSI Layer 3
• There’s nothing new or special happening here
Wireless networks everywhere
Wireless LAN controllers
Balancing the load
Load balancer
IDS and IPS
• Intrusion Detection System / Intrusion Prevention
System
• Watch network traffic
• Intrusions
• Exploits against operating systems, applications, etc.
• Buffer overflows, cross-site scripting, other
vulnerabilities
• Detection vs. Prevention
• Detection – Alarm or alert
• Prevention – Stop it before it gets into the network
Identification technologies
Proxies
• Sits between the users and the external network
• Receives the user requests and sends the request
on their behalf (the proxy)
• Useful for caching information, access control,
URL filtering, content scanning
• Applications may need to know how to
use the proxy (explicit)
• Some proxies are invisible (transparent)
Application proxies
• Most proxies in use are application proxies
• The proxy understands the way the application works
• A proxy may only know one application, i.e., HTTP
• Many proxies are multipurpose proxies
• HTTP, HTTPS, FTP, etc.
VPN concentrator
Remote access VPN
AAA framework
• Identification - This is who you claim to be
• Usually your username
• Authentication - Prove you are who you say you are
• Password and other authentication factors
• Authorization
• Based on your identification and authentication,
what access do you have?
• Accounting
• Resources used: Login time, data sent and received,
logout time
RADIUS (Remote Authentication Dial-in User Service)
• One of the more common AAA protocols • Supported on a wide variety of platforms and devices • Centralize authentication for users • Routers, switches, firewalls • Server authentication • Remote VPN access • 802.1X network access • RADIUS services available on almost any server operating system
UTM / All-in-one security appliance
• Unified Threat Management (UTM) / Web security gateway • URL filter / Content inspection • Malware inspection • Spam filter • CSU/DSU • Router, Switch • Firewall • IDS/IPS • Bandwidth shaper • VPN endpoint
Next-generation Firewalls (NGFW)
• The OSI Application Layer • Layer 7 firewall • Can be called different names • Application layer gateway • Stateful multilayer inspection • Deep packet inspection • Requires some advanced decodes • Every packet must be analyzed, categorized, and a security decision determined
VoIP technologies
• PBX (Private Branch Exchange) • The “phone switch” • Connects to phone provider network • Analog telephone lines to each desk • VoIP PBX • Integrate VoIP devices with a corporate phone switch • VoIP Gateway • Convert between VoIP protocols and traditional PSTN protocols • Often built-in to the VoIP PBX