Network Security Basics Cheat Sheet

Network security fundamentals — firewalls, IDS/IPS, zero trust architecture, NAC, DDoS mitigation, and security zones explained.

Last Updated: July 15, 2025

Firewall Types

TypeOSI LayerWhat It Filters
Packet Filter3-4IP addresses, ports, protocols (iptables, ACLs)
Stateful3-4Tracks connection state — only allows established sessions
Application (WAF)7HTTP payloads, SQL injection, XSS patterns
Next-Gen (NGFW)3-7DPI, application awareness, threat intelligence

IDS vs IPS

FeatureIDSIPS
PlacementOut of band (monitor)Inline (blocks traffic)
ActionAlerts only (passive)Blocks/drops (active)
LatencyZero impactAdds microsecond latency
False Positive RiskLow (no disruption)High (legit traffic blocked)
ExamplesSnort (passive), ZeekSnort (inline), Suricata IPS

Zero Trust Principles

PrincipleDescription
Never Trust, Always VerifyNo implicit trust based on network location — authenticate every request
Least PrivilegeGrant minimum access needed — JIT (just-in-time) access where possible
MicrosegmentationSegment workloads — east-west traffic also inspected
Assume BreachDesign as if perimeter is already compromised — encrypt, monitor, segment

Common Attack Mitigations

AttackLayerMitigation
DDoS (volumetric)3-4Anycast scrubbing, rate limiting, BGP blackhole
DDoS (application)7WAF, CAPTCHA, rate limiting per endpoint
Port Scanning3-4IDS detection, port knocking, default-deny firewall
MITM (ARP spoofing)2Dynamic ARP inspection, static ARP entries
DNS Poisoning7DNSSEC, DNS over HTTPS/TLS
Pro Tip: Security is about layers — no single control is sufficient. Combine firewalls, IDS/IPS, segmentation, and zero-trust principles for defense in depth.
Part of the Empire Builder Network