3.3 Secure Network Design

Load Balancing

Distributing the load coming to the servers. This is invisible to the users. If one of the server fails, all requests to the failed server is redirected to the available server, users doesn't understands this redirection.

Here you can see the capabilities of a load balancer:

  • Round-robin = each server will have same amont of load from the users - each server is selected in turn

  • Affinity = uses a client’s IP address to keep track of them throughout their session in order to continue sending them to the same server even with subsequent requests

  • Weighted round-robin = prioritize the server load

  • Dynamic round-robin = monitor the server load and distribute to the server with the lowest load

Active/Passive load balancing = some servers are active, and some of are standby. If one of the active server goes down, the standby server becomes active and respond to requests


Network Segmentation

Separating the network into physical, logical, or virtual segments like different segment for database which users can not directly talk with those servers usually used for security purposes

VLAN - separate logically instead of physically DMZ - this is for incoming Internet traffic, where we put our Internet facing application in the infrastructure

DMZ (screened subnet) - this is for incoming Internet traffic, where we put our Internet facing application in the infrastructure sensitive servers won't be placed here

Extranet - we build separate network, other than the private, for vendors/suppliers, it is like a private network for partnerts Intranet - this is the private network, only accessible from internally

Zero trust - you trust nothing in your network, with zero trust you consider all devices or systems being untrusted, eveything must be verified with MFA, encryption, system permissions, additional firewalls


Virtual Private Networks

Concentrator = encrypts/decrypts outgoing and incoming data and uses security protocols to create safe tunnels - secure remote access over the public internet or untrusted networks, via secure tunnel Full tunnel = eveything sends to the concentrator from the end-user, cncentrator decides where the data goes within the network

Split tunnel = some information goes through the tunnel and some of them are not, this is for communicating with servers that are not in the private network

Port Security

  • control and protect specific data types

    • limit overall traffic

    • watch for unusual or unwanted traffic Broadcast = send from one device to multiple Broadcast storm control - switch can control and limit the number of broadcasts per second STP (spanning tree protocol) - common way for loop control


Secure Networking

DNSSEC - ability to confirm the DNS response, origin authentication and data integrity - DNS records are signed with trusted third party

DNS sinkhole address = if a user visits a known malicious server, the DNS server redirects the users to a sinkhole address which is trusted and safe

QoS (quality of service) = prioritize traffic performance, VoIP has priority over web-browsing - prioritize by maximum bandwidth, traffic rate, VLAN - describes the process of controlling traffic flows

FIM (file integrity monitoring) = monitor important OS and application files and identify whether they are changed - Windows - SFC (system file checker) - Linux - tripwire


Firewalls

Network-based firewalls - filter traffic by ports number or application stateless firewall - doesn't keep track of traffic flows, each packet is individually examined stateful firewall - the firwall keeps the state of the session

UTM (unified threat management) - url filter/content inspection/malware inspection/spam filter/VPN endpoint

NGFW - application layer gateway, adds the most latency - every packet needs to be analyzed and categorized before security decisions are determined

WAF (web application firewall) = applies rules to HTTP/HTTPS communications, allow or deny based on expected input, unexpected input can be bypassed

Access Control Lists (ACLs) = allow or disallow traffic based on tuples - list of rules which decide whether to allow or disallow traffic - source/destination IP, port number, time of the day, application


Network Access Controls

Posture assessment - BYOD - malware infections/missing anti-malware software on personal devices - before connecting to the network, a health check needs to be performed and asked these questions below - is it a trusted device? - is it running anti-virus software? - are the corporate aplications installed?


Proxies

sits between the user and external network receives the user requests and sends the request on user's behalf useful for caching information, access control, URL filtering, content scanning most proxies are application proxies

Forward proxy = protect and control users access to internet (internal proxy) - located inside the internal network, checks the requests being made to the Internet

Reverse proxy = hosts from Internet are hitting the proxy to gain access internal services in the internal network - proxy will examine the requests from external users


Intrusion Prevention

detection - alarm or alert prevention - stop it before it gets into the network

passive monitoring - examine a copy of the traffic, no way to block traffic out-of-band response - when malicious traffic is identified, IPS sends TCP RST frames inline monitoring - IDS/IPS physicaly sits in between, can analyze all trafic

identification technologies signature-based = look for malware matches anomaly-based = build a baseline of what is normal behavior-based = observe and report the behavior heuristics = use AI to identify


Other Network Appliances

Jump server = provides an access mechanism to secure/protected network - SSH/tunnel/VPN connection to connect to jump server - compromise to the jump server is a significant breach

HSM (hardware security module) = manager large number of keys and certificates - used in large environment, clusters - high-end cryptographic devices, key backup, secured storage

Last updated

Was this helpful?