2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet511/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   507   508   509   510   511   512   513   514   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Virtual Networking
The concept of OS virtualization has given rise to other virtualization topics, such as 
virtualized networks. A virtualized network or 
network virtualization
is the combina-
tion of hardware and software networking components into a single integrated entity. 
The resulting system allows for software control over all network functions: manage-
ment, traffic shaping, address assignment, and so on. A single management console or 
interface can be used to oversee every aspect of the network, a task requiring physical 
presence at each hardware component in the past. Virtualized networks have become 
a popular means of infrastructure deployment and management by corporations 
worldwide. They allow organizations to implement or adapt other interesting network 
solutions, including software-defined networks, virtual SANs, guest operating systems, 
and port isolation.
Software-defined networking (SDN)
is a unique approach to network operation, 
design, and management. The concept is based on the theory that the complexities of a 
traditional network with on-device configuration (i.e., routers and switches) often force 
an organization to stick with a single device vendor, such as Cisco, and limit the flex-
ibility of the network to adapt to changing physical and business conditions. SDN aims 
at separating the infrastructure layer (i.e., hardware and hardware-based settings) from 
the control layer (i.e., network services of data transmission management). Furthermore, 
this also removes the traditional networking concepts of IP addressing, subnets, rout-
ing, and the like from needing to be programmed into or be deciphered by hosted 
applications.
SDN offers a new network design that is directly programmable from a central loca-
tion, is flexible, is vendor neutral, and is open standards based. Using SDN frees an 
organization from having to purchase devices from a single vendor. It instead allows 
organizations to mix and match hardware as needed, such as to select the most cost-
effective or highest throughput–rated devices regardless of vendor. The configuration 
and management of hardware are then controlled through a centralized management 
interface. In addition, the settings applied to the hardware can be changed and adjusted 
dynamically as needed.
Another way of thinking about SDN is that it is effectively network virtualization. It 
allows data transmission paths, communication decision trees, and flow control to be 
virtualized in the SDN control layer rather than being handled on the hardware on a 
per-device basis.
Another interesting development arising out of the concept of virtualized networks is 
that of a virtual SAN (storage area network). A SAN is a network technology that com-
bines multiple individual storage devices into a single consolidated network-accessible 
storage container. A virtual SAN or a software-defined shared storage system is a virtual 
re-creation of a SAN on top of a virtualized network or an SDN.


Network Address Translation 
549
Network Address Translation
The goals of hiding the identity of internal clients, masking the design of your private 
network, and keeping public IP address leasing costs to a minimum are all simple to achieve 
through the use of 
network address translation (NAT)
. NAT is a mechanism for converting 
the internal IP addresses found in packet headers into public IP addresses for transmission 
over the internet.
NAT was developed to allow private networks to use any IP address set without caus-
ing collisions or conflicts with public internet hosts with the same IP addresses. In effect, 
NAT translates the IP addresses of your internal clients to leased addresses outside your 
environment.
NAT offers numerous benefits, including the following:

You can connect an entire network to the internet using only a single (or just a few) 
leased public IP addresses.

You can use the private IP addresses defined in 
RFC 1918
in a private network and still 
be able to communicate with the internet.

NAT hides the IP addressing scheme and network topography from the internet.

NAT restricts connections so that only traffic stemming from connections originating 
from the internal protected network is allowed back into the network from the internet. 
Thus, most intrusion attacks are automatically repelled.
Are You using NAT?
Most networks, whether at an office or at home, employ NAT. There are at least three 
ways to tell whether you are working within a NATed network:
1.
Check your client’s IP address. If it is one of the RFC 1918 addresses and you are still 
able to interact with the internet, then you are on a NATed network.
2.
Check the configuration of your proxy, router, firewall, modem, or gateway device 
to see whether NAT is configured. (This action requires authority and access to the 
networking device.)
3.
If your client’s IP address is not an RFC 1918 address, then compare your address to 
what the internet thinks your address is. You can do this by visiting any of the
IP-checking websites; a popular one is 
http://whatismyipaddress.com
. If your 
client’s IP address and the address that What Is My IP Address claims is your address 
are different, then you are working from a NATed network.


550
Chapter 12 

Secure Communications and Network Attacks
Frequently, security professionals refer to NAT when they really mean 
PAT. By definition, NAT maps one internal IP address to one external IP 
address. However, port address translation (PAT) maps one internal IP 
address to an external IP address and port number combination. Thus, 
PAT can theoretically support 65,536 (2^16) simultaneous communications 
from internal clients over a single external leased IP address. So with 
NAT, you must lease as many public IP addresses as you want to have 
for simultaneous communications, while with PAT you can lease fewer 
IP addresses and obtain a reasonable 1000:1 ratio of internal clients to 
external leased IP addresses. The practical limit seems to be a ratio of 
4,000 internal systems to a single public address.
NAT is part of a number of hardware devices and software products, including fi rewalls, 
routers, gateways, and proxies. It can be used only on IP networks and operates at the 
Network layer (layer 3). 

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   507   508   509   510   511   512   513   514   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish