Lecture 0x01
Lecture 0x01
Infrastructure
Introduction to Network basics, Common Network
Infrastructure and Transport protocols.
Syllabus
NSE 4 – FGT 7 Exam details
Exam Name: Fortinet Network Security Expert 4 – FortiOS 6.4/7
• Exam Number: NSE 4 – FGT 6.4/7
• Exam Price: (Students will have access to the Fortinet lab environment as well as the
training material at no extra charge. Towards the end of the semester, vouchers will be
provided in order to take Fortinet’s NSE4 certification exam for free.)
• Duration: 105 minutes (actual)
• Number of Questions: 60-70
• Passing Score: 60%, maybe higher
NSE 4 exam syllabus
You will be tested on 5 syllabus as shown below:
Deployment and System configuration
Firewall and authentication
Content inspection
Routing and L2 switching
VPN
After taking the exam, you will only get pass or fail for each syllabus and the overall pass or
fail.
Breakdown
● Networking basics
○ OSI model
○ TCP/IP
○ Ports
○ IPV4/IPV6
● Common Network Infrastructure
○ Routers, Switches
○ Firewalls, IDS
● Transport Protocols
○ UDP, ICMP, maybe some others
○ Multicast, Unicast
● Network Security
● Traditional Firewalls vs NGFW
● Traditional WAN Architecture vs. SD-WAN
Networking Basics:
OSI model
● 7 Layers
● Layered like an onion - layer 1 is the
innermost layer
● If you don’t like onions. You can think of
those layers as envelopes inserted inside
other (bigger) envelopes
● The OSI model did not end up being
adopted as the standard and lost to the
TCP/IP model
Networking Basics:
TCP/IP model
● Combines many of the OSI model layers
that are commonly combined anyways
● Used in physical implementations of
networking infrastructure
[1]: https://spectrum.ieee.org/osi-the-internet-that-wasnt#toggle-gdpr
Link Layer
● 2 layers in OSI, 1 in TCP/IP
● Operates only within the local
network
● Covers the communication between
physical devices in the same
network (have multiple devices
behind a router)
● Uses physical/MAC addresses
Network Layer
● 1 layer in OSI, 1 in TCP/IP
● Covers the communication between
devices using the IP addressing
system
● Used to route packets between your
home network and the rest of the
internet
Transport Layer
● 1 layer in OSI, 1 in TCP/IP
● The transport layer protocol
determines how two devices
communicate with each other
● Establishes communication
channels
2a03:2880:f01c:0601:face:b00c:0000:0001
2a03:2880:f01c:601:face:b00c::1
IPV6 Address Types
● By tracking identifiers such as destination address and source port, a router can identify which internal
address any incoming packets are intended for, and modify the destination address of the packet as it
enters the LAN.
● This is the functionality of basic one-to-many NAT used by routers, but there are much more complex
forms of NAT employed by networking infrastructure.
Switches
● Switches are responsible for
routing packets to the correct
device when multiple are
connected
● They operate on the link layer
(L2), so they know the MAC
address of the device on each
physical port
● To route packets, switches look
at the destination MAC address
of a frame and sends it out to
the appropriate physical port of
the switch
Transport Layer
Protocols
TCP / UDP
TCP / UDP In Wireshark
ICMP
● Used for network diagnostics - determining which hosts have connectivity,
how packets are getting routed, etc...
Unicast Multicast
Unicast is the method of routing that we have Multicast is the method of sending one message
used up until this point, it communicates to multiple recipient devices at the same time.
between one source device and one destination By using a special address on the:
device.
● link layer (FF:FF:FF:FF:FF)
● IP layer (255.255.255.255)
● Rules include data such as source and destination interface, ip address range,
source and destination port etc.
● But what if I want to allow most traffic, and deny something specific?
Firewalls Cont’d
● Firewall policy priority allows you to define in what order the policy checks
apply.
Firewalls Cont’d: Packet- filtering firewalls (Legacy)
● Performs allow, deny based on each packet header info.
● Easy to maintain/manage
● Decrypts and encrypts traffic and acts as the source destination for a network connection rather
than a pass through.
● May also inspect data portion for Malware or other malicious payloads
● Provides a single system with full visibility into higher level protocols for ease of reporting and
granular access control of applications.
Intrusion Detection / Prevention System
What is an IDS/IPS?
● The IDS/IPS term is aged, as modern systems typically serve both purposes
and do much more
● They are used to observe the content of network traffic at a much more
granular level than firewalls
● They typically have three actions that can be performed on their rules: allow,
alert, and block
● IDS / IPS rules focus more on the content of network traffic rather than the
source or destination
Example: Snort
● Snort is a modern, open source IDS / IPS that can be installed on anything
(There’s even a docker image!)
● While firewalls focus on network segregation and policy matching with
minimal packet inspection, snort allows you to dig deep into a packet when
defining a rule.
The Modern Context of Network Security
What is an Network Security?
● Threat landscape is expanding: There are many different cyber threats, each becoming
more sophisticated daily: malware, Ransomware attacks, Zero-day vulnerabilities …
● Today’s networks are highly complex environments whose borders are constantly
changing multifaceted and multidevice environments with no identifiable perimeter:
• Mobile workforce
• Partners accessing your network services
• Public and private clouds
• Internet of things (IoT)
• Bring your own device (BYOD)