Network forensics. P.Pale: Computer forensics

Size: px
Start display at page:

Download "Network forensics. P.Pale: Computer forensics 2015 12 01 1"

Transcription

1 Network forensics is a sub branch of digital forensics whose aim is to: capture, record, and analyze network events in order to discover the source of security attacks or other problem incidents or activities of legitimate users 2 IP and MAC addresses passwords files messages: mail, chat, web, who was doing what and when what is hidden behind firewalls what attacks have been or still are going on an organization s communication policies 3 P.Pale: Computer forensics 1

2 ... relating to Network Evidence Acquisition Networks contain so many possible sources of evidence e.g. wireless access points, web proxies, central log servers... sometimes pinpointing the correct location of the evidence is tricky Content Network devices often have very limited storage capacity Storage The data which network devices contain may be so volatile as to not survive a reset of the device Seizure Very disruptive! In some cases, an entire network segment may be brought down indefinitely until equipment is returned and operations restored Admissibility Network forensics is a newer approach to digital investigations There are sometimes conflicting or even nonexisting legal precedents for admission of various types of network based digital evidence 4 Evidence acquisition Protocol analysis Packet analysis Flow analysis Network Logs Network devices Network intrusion detection/prevention systems Common network attacks Web browser forensics 5 Evidence acquisition Protocol analysis Packet analysis Flow analysis Network Logs Network devices Network intrusion detection/prevention systems Common network attacks Web browser forensics 6 P.Pale: Computer forensics 2

3 Is it possible to obtain network traffic without sending or modifying any data frames on the network? While it is never possible to have absolutely zero impact on the environment, the process of capturing (or sniffing) traffic can often be conducted with very little impact Sniffing can be done in these ways: A Physical interception B Traffic acquisition software C Active acquisition 7 A Passively acquire network traffic by intercepting it as it is transmitted across cables, through the air, (will be discussed in wireless forensics) or through network equipment or through network equipment such as hubs and switches 8 Most common materials for cables are Copper two most widely used types: coaxial and Twisted Pair (TP) Fiber Fiber optic cables consist of thin strands of glass (or sometimes plastic) which are bundled together in order to transmit signals across a distance Each of these can be sniffed, although the equipment and side effects vary depending on the physical media 9 P.Pale: Computer forensics 3

4 A Layer 1 device is inserted inline between two physically connected network devices The network tap will pass along the packets and also physically replicate copies to a separate port(s) Commonlyhave four ports: two connected inline to facilitate normal traffic, and two sniffing ports, which mirror that traffic (one for each direction) NOTE: causes a brief disruption, while cable being disconnected in order to connect the network tap inline Every additional break in a cable is a potential point of failure! Inline insertion of network taps necessarily increase the risk of network disruption 10 devices that pierce the shielding of copper wires in order to provide access to the signal within Unlike inline network taps, the cable does not need to be disconnected or severed in order for a vampire tap to be installed NOTE: inserting a vampire tap, even if done correctly, can bring down the link on a TP cable since the characteristics of the required balanced communication will be affected negatively 11 Inline network taps work similarly both for fiber optic cables and copper cables To place a network tap inline on a fiber optic cable, network technicians splice the optic cable and connect it to each port of a tap This causes a network disruption NOTE: Inline optical taps may cause noticeable signal degradation! Vampire taps Not as easy as with coper cables because of photon characteristics 12 P.Pale: Computer forensics 4

5 All wires conducting voltages emit various electromagnetic signals outside of the intended channel Such electromagnetic radiation is more pronounced in unshielded wires, such as UTP, due to the lack of shielding As a consequence, it is theoretically possible to introduce what is called an induction coil alongside such wiring in order to translate the laterally emitted signals into their original digital form Induction coils are devices that essentially transform the magnetism of weak signals to induce a much stronger signal in an external system Such a device could potentially capture the throughput of a cable without being detected by users, administrators, or owners of the wires However such devices are not commercially available in a way that the public can acquire in order to surreptitiously tap Cat5e and Cat6 cables 13 Layer 1 device that physically connects all stations on a local subnet to one circuit Important characteristics relevant to forensics: does not store enough state to track what is connected to it, or how maintains no knowledge of what htdevices are connected tdto what htports received frames are retransmitted on all other ports Thus: traffic on the segment can be seen by everyone else, not just the investigators Confusion Many devices that are currently labeled as hubs by the manufacturer are, in fact, switches 14 Most prevalent Layer 2 device Unlike hubs, switches use software to keep track of which stations are connected to which ports,, in its CAM table. When a switch receives a packet, it forwards it only to the destination station s port Switches operate at Layer 2 (the data link layer), and sometimes Layer 3 CAM table Switches populate the CAM table by listening to arriving traffic When a switch receives a frame from a device, it looks at the source MAC address and remembers the port associated with that MAC address Later, when the switch receives a packet destined for that device, it looks up the MAC address and corresponding port in the CAM table And passes the packet only to that port Switches with sufficient software capabilities can be configured to replicate traffic from one or more ports to some other port for aggregation and analysis Switches have varying port mirroring capabilities, depending on their make and model Port mirroring is inherently limited by the physical capacity of the switch itself 15 P.Pale: Computer forensics 5

6 B Once physical access to network traffic is gained, one needs software tools to record it The most common software libraries used for recording, parsing, and analyzing captured packet data: libpcap WinPcap Most popular tools: Tcpdump Wireshark 16 Libpcap is a UNIX C library that provides an API for capturing and filtering data link layer frames from arbitrary network interfaces Different UNIX systems have different architectures for processing link layer layer frames Consequently, programmers writing a utility on UNIX to inspect or manipulate link layer frames originally had to write operating system specific routines for accessing them The purpose of libpcap was to provide a layer of abstraction so that programmers could design portable packet capture and analysis tools WinPcap is a library based on libpcap designed for Windows In 1999 by the Computer Networks Group (NetGroup) in the Politecnico di Torino In order to inspect traffic we need a program like WireShark or tcpdump which uses libpcap or winpcap 17 An extremely powerful filtering language included in Libpcap the volume of data that flows across networks has become so huge that it is very important for investigators to be able to filter it during both capture and analysis enables to filter traffic based on value comparisons in fields for Layer 2, 3, and 4 protocols includes built in in references called primitives for many commonly used protocol fields filters can also consist of elaborate conditional chains, nesting logical ANDs and ORs 18 P.Pale: Computer forensics 6

7 easiest way to construct a BPF filter is to use BPF primitives to refer to specific protocols, protocol elements, or qualities of a packet capture three different kinds of qualifiers Type Dir Proto For example: host and not host and (port 138 or port 139 or port 445) will show us only the traffic in which a computer with the IP address communicates with any other system except over ports 138, 139, or A tool for capturing, filtering, and analyzing network traffic was originally designed as a UNIX tool In 1999 it was ported to Windows as WinDump Tcpdump captures traffic bit by bitbit as it traverses any physical media Suitable for conducting link layer traffic capture copper, fiber, or even air Since tcpdump is based on libpcap, it captures at Layer 2 (the data link layer) Fidelity (not dropping packets) One reason that tcpdump is such a powerful tool is that it is capable of capturing traffic with high fidelity, to the degree that the resulting packet capture can constitute evidence admissible in court However, the quality of the packet capture can be impacted by hardware limitations and configuration constraints 20 # tcpdump -nni eth0 'not (tcp and port 80) tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link -type EN10MB (Ethernet), capture size bytes 12:49: IP > : NTPv4, Broadcast,length 48 12:49: IP > : SYSLOG local2.notice, length: :49: IP > : SYSLOG local2.notice, length: :49: IP > : udp 12:49: IP > : udp 12:49: IP > : SYSLOG local2.notice, length: :49: IP > : SYSLOG local2.notice, length: :49: IP > : udp 21 P.Pale: Computer forensics 7

8 Wireshark A libpcap based graphical, open source tool designed for capturing, filtering, and analyzing traffic due to GUI mostly used for manual/human inspection Tshark command line network protocol analysis tool that is part of the Wireshark distribution like Wireshark, it is libpcap based, and can read and save files in the same standard formats as Wireshark mostly used to prepare captured data for automatic processing and analysis can prepare CSV files Dumpcap Part of wireshark Used to capture network packets 22 C Active evidence acquisition network traffic is acquired directly on the target computer for example using tcpdump, wireshark, and is stored in a file which is then: analysed on the target computer or transferred to investigator s computer this process modifies df the environment!!!! Investigators should be highly aware of various ways in which live acquisition modifies the devices and environment under investigation and work to minimize the impact Common Interfaces Console, Secure Shell (SSH), Secure Copy (SCP), SSH File Transfer Protocol (SFTP), Telnet, Simple Network Management Protocol (SNMP), Trivial File Transfer Protocol (TFTP) etc 23 Evidence acquisition Protocol analysis Packet analysis Flow analysis Network Logs Network devices Network intrusion detection/prevention systems Common network attacks Web browser forensics 24 P.Pale: Computer forensics 8

9 refers to the art and science of understanding how a particular communications protocol works, what is it used for, how to identify it, and how to dissect it. This may not be as straightforward as one might expect In an ideal world, all protocols would be neatly cataloged, publicized, and implemented according to specification in reality, however, none of this is true Many protocols are deliberately kept secret by their inventors, either to protect intellectual property, keep out competition, or for the purposes of security and covert communications Other protocols are simply not documented well enough because no one has taken the time to do so IETF Request for Comments (RFC) RFCs have emerged as a way to develop, communicate, and define international standards for internetworking They are developed and distributed by the Internet Engineering Task Force (IETF) which is a loosely self organized group of people who contribute to the engineering and evolution of Internet technologies... the principal body engaged in the development of new Internet standard specifications. Other Standards Bodies IEEE SA Institute of Electrical and Electronics Engineers Standards Association ISO International Organization for Standardization Vendors 27 P.Pale: Computer forensics 9

10 How do you identify which protocols are in use in a packet capture? Search for common binary/hexadecimal/ascii values that are typically associated with a specific protocol Leverage information in the encapsulating protocol Leverage the TCP/UDP port number many of which are associated with standard default services Analyze the function of the source or destination server specified by IP address or hostname Test for the presence of recognizable protocol structures 28 Example: IPv4 Most protocols contain sequences of bits that are commonly, if not always, present in packets associated with that protocol, in predictable places beginning of an IPv4 is often marked with the hexadecimal sequence 0x4500 Example: 29 Many TCP/UDP ports are associated with usual, default services A simple and common way to identify protocols is by examining the TCP or UDP port number in use 65,535 possible port numbers for each of TCP and UDP IANA publishes a list of known services: numbers Identifying protocols by port number is not always reliable servers can easily be configured to use nonstandard ports for specific services Port Service 21 FTP 22 SSH 23 telnet 25 SMTP 53 DNS 80 HTTP 110 POP3 123 NTP 143 IMAP 30 P.Pale: Computer forensics 10

11 Higher layer protocols Can be extremely useful when analyzing modern applications which rely heavily on them Examples Hypertext Transfer Protocol (HTTP) Simple Mail Transfer Protocol (SMTP) Domain Name System (DNS) Dynamic Host Configuration Protocol (DHCP) Of course, there are many, many others 31 Layer 7 protocol that facilitates automatic configuration of network details assigning an IP address to a MAC address also gateway, DNS servers, etc Forensic value DHCP server logs and packet captures contain: pairs: IP and MAC address which can provide clues to the hardware manufacturer client hostname, routing information etc who used and IP address at specific time 10,12/09/15,00:00:21,Assign, ,Nikola-PC.WIN.LSS.HR, 0013D30C227E 12,12/09/15,00:03:21,Release, ,Nikola-PC.WIN.LSS.HR, 0013D30C227E 25,12/09/15,00:07:00,2 leases expired and 4 leases deleted,,,,,0,6,,, 30,12/09/15,00:09:00,DNS Update Request, ,Anya-PC.WIN.LSS.HR,,,0,6,,, P.Pale: Computer forensics 11

12 Used to access resources on the web Web applications Web APIs (especially interesting for mobile devices) Content (audio/video, images,.) Simple set of request messages GET, POST, HEAD, OPTIONS, DELETE, TRACE Simple set of response messages 1xx Informational Request received, continuing process 2xx Success The action was successfully received, understood and accepted 3xx Redirection Further action must be taken in order to complete the request 4xx Client Error The request contains bad syntax or cannot be fulfilled 5xx Server Error The server failed to fulfill an apparently valid request 34 provides a hierarchical distributed database for resolving the names that people prefer to use with the 32 bit IPv4 numerical addresses or 128 bit for IPv6 example: maja.zesoi.fer.hr > DNS is a query response response protocol Client typically asks a question within a single UDP packet Server responds with a single UDP packet It is possible to route normal DNS traffic over TCP server s response to a query is too large to fit within a single UDP packet DNS zone transfers transfer everything a DNS server knows about a domain a security risk!!! P.Pale: Computer forensics 12

13 Evidence acquisition Protocol analysis Packet analysis Flow analysis Network Logs Network devices Network intrusion detection/prevention systems Common network attacks Web browser forensics 37 The art and science of inspecting the protocols within a set of packets in order to Identify packets of interest and understand their structure and relationship in order to gather evidence and facilitate further analysis To identify packets of interest use filtering techniques to isolate packets based on protocol fields or their contents search for strings or patterns in packet contents to identify targets for further inspection even if the protocol in use is not yet known 38 Wireshark/tshark Include a display filter language allows the end user to isolate packets of interest based on protocol fields example: capture only packets from a specific computer to a specific computer $ tshark -r capturefile.pcap -R "ip.src == && ip.dst == " Hex editors 39 P.Pale: Computer forensics 13

14 Evidence acquisition Protocol analysis Packet analysis Flow analysis Network Logs Network devices Network intrusion detection/prevention systems Common network attacks Web browser forensics 40 practice of examining related groups of packets in order to identify patterns, analyze higher layer protocols, or extract data Flow is defined as: a sequence of packets sent from a particular source to a particular unicast, anycast, or multicast destination that the source desires to label as a flow. A flow could consist of all packets in a specific transport connection or a media stream. However, a flow is not necessarily 1:1 mapped to a transport connection P.Pale: Computer forensics 14

15 Tshark Can list all conversations and/or flows within a packet capture, or only specific flows based on their characteristics 43 Useful to identify the specific flows of interest so that we can get ready to extract the higher layer protocol data Example: $ pcapcat -r evidence01.pcap [1] TCP : : > : :80 [2] TCP :1271 -> :443 [3] TCP :1272 -> :5190 [4] TCP :1273 -> :80 Enter the index number of the conversation to dump or press enter to quit: 44 Files Can be crucial to any investigation Are often transported over a network Data Such as HTML/JavaScript and other resources on the WWW can be useful Wireshark Has the ability to extract all files and data that were transferred during a capture Network miner Point and click tool for extracting files & data, viewing network packets (similar to Wireshark): 45 P.Pale: Computer forensics 15

16 Evidence acquisition Protocol analysis Packet analysis Flow analysis Network Logs Network devices Network intrusion detection/prevention systems Common network attacks Web browser forensics 46 Why are they important? Event logs are simply selected records that provide information about the state of the system and/or environment at a given time Event logs may include information about system access (such as server logins and logouts), startup and shutdown times, errors and problems, or just routine data such as the data center temperature Where do they come from? Application servers, routers, firewalls, network devices, cameras, HVAC all kinds of other devices generate event logs Different types of devices generate different types of event logs Where are they stored? on the device that generates them on a computer in the network on a (remote?) computer dedicated to collecting logs 47 Sep 20 21:53:09 bigserver postfix/sendmail [10815]: fatal: usage: sendmail [options] Sep 20 22:27:48 bigserver postfix/sendmail [10961]: fatal: Recipient addresses must be specified on the command line or via the t option Sep 20 22:27:48 bigserver postfix/sendmail [10963]: fatal: Recipient addresses must be specified on the command line or via the t option Sep 20 22:28:29 bigserver postfix/sendmail [10979]: fatal: Recipient addresses must be specified on the command line or via the t option Sep 22 13:04:31 bigserver postfix/sendmail [24424]: fatal: usage: sendmail [options] Sep 22 15:32:07 bigserver postfix/postmap [25785]: fatal: open database /etc/postfix/generic.db: Permission denied Sep 22 15:55:40 bigserver postfix/postmap [26209]: fatal: open database /etc/postfix/virtual.db: Permission denied Sep 22 17:01:33 bigserver postfix [27072]: error: to submit mail, use the Postfix sendmail command Sep 22 17:01:33 bigserver postfix [27072]: fatal: the postfix command is reserved for the superuser 48 P.Pale: Computer forensics 16

17 Evidence acquisition Protocol analysis Packet analysis Flow analysis Network Logs Network devices Network intrusion detection/prevention systems Common network attacks Web browser forensics 49 Hub analogue only electrically restores the signal in order to span longer distances create star topology Switch digital collects whole packet and looks at addresses based on destination address forwards it on just one port there is no need to decide where to forward the packet outgoing port is taken from CAM table puts source address in CAM table all interfaces (ports) are of the same type and protocol typically works on Layer 2 although Layer 3 switches exist, too Router has potentially different interfaces and different protocols has to make the decision where to forward the packet depending on final destination address and properties of paths behind the port speed, error rate, usage, price, can perform network address translation an incoming packet sent to port X can be sent to completely different address internally likewise, outgoing packet will be appearing to com from router s port Y Firewall essentially a router but refuses to forward some packets both in and out depending on packet s source and destination addresses source and destination ports The line between switches, routers, and firewalls has become very blurred It only exists as a theoretical line, which is no longer strictly implemented at all if it ever really was What does that mean for the forensic investigator? The evidence you may expect to find on one device may actually exist on another A device called a switch may actually contain logs that you would expect to find on a firewall 51 P.Pale: Computer forensics 17

18 Network infrastructure devices contain configurations that reflect the state of the network and activities and the policies of the enterprise that s deployed them descriptive information about the investigated environment and (perhaps) evidence relating to a particular event of interest for example: blocked ports, subnets, port mirroring access lists, NAT, routing tables 52 Dynamic Random Access Memory (DRAM) very volatile and does not retain data (for long) when power is turned off operational data can be found here very difficult to capture Content Addressable Memory(CAM) a special kind of very fast memory used to store information that must be accessed extremely quickly most famously used on switches for storing tables that map MAC addresses to ports Nonvolatile Random Access Memory (NVRAM) retains data when the power is turned off, but can also be easily modified most common type found in network equipment is flash memory it is typically used to store configurations > instructions to device how to work also for logs Hard drive Most switches, routers, and firewalls do not include a hard drive However, general purpose servers can be configured to act as routers or firewalls Read Only Memory (ROM) ROM is a type of random access memory that is designed to permanently store data without modification it is typically used for storing device s programs HIGH Memory volatility LOW 53 Content Addressable Memory (CAM) Table Can be very valuable, since it contains the MAC addresses of the network cards communicating on the local subnet Very volatile and can change quickly, depending on network activity Example: 54 P.Pale: Computer forensics 18

19 when a computer needs to send an IP packet it has to be encapsulated in Layer 2 packet typically Ethernet (IEEE 802.3) which means MAC address is needed corresponding to IP address thesepairs are stored in ARPtable however, if table does not contain required pair ARP request is sent as a broadcast message on Layer 2 containing the IP address the computer using this IP address will respond thus, its MAC address will be associated with its IP address and remembered in ARP table 55 Routers are typically involved in investigations because: Traffic of interest may traverse the router, resulting in associated flow data and related records A router is one of the most basic logging devices on any network and also one of the most fundamental The network topology is the key to understanding evidence and incidents, and is described at Layer 3 by the aggregate of routing tables NOTE: The router itself may be compromised 56 Types of evidence that can be gathered from routers, categorized by expected volatility Volatile Routing tables, Stored packets before they are forwarded, Packet counts and statistics, ARP table, DHCP lease assignments, Access control lists, I/O memory, Running configuration, Processor memory, Flow data and related statistics Persistent Operating system image, Boot loader, Startup configuration files, Access logs, DHCP logs Off System Routers tend to include very little, if any, writable persistent storage on board Most enterprise class devices can be configured to automatically export data to external systems for storage through syslog, FTP, TFTP, SNMP, and other 57 P.Pale: Computer forensics 19

20 are essentially routers Capable of inspecting and filtering traffic to a much higher degree then routers Early firewalls were most often built and configured by local system administrators using general operating system tools and commercial or open source firewall software packages However, general purpose hardware introduced significant latency, and as a result inspection capabilities were limited Furthermore, system administrators were not always well versed in operating system hardening procedures 58 Firewall logs tend to include extensive information about connection attempts, whether or not these were successful, and if so, how much data was transferred from source to destination Firewall logs may also include extensive details regarding protocols and applications in use, or even packet contents Firewall configuration can reveal whether hth services or data dt were exposed to the world, or to systems of interest It can also inform an investigator as to the type of evidence that logs may or may not include An investigator may need to modify firewall configuration in order to collect more evidence, or to gain access to systems of interest during the course of an investigation NOTE: The firewall itself may be compromised 59 Packet Filters route packets and can allow or deny traffic based on source and destination addresses (at Layer 3) and Layer 4 protocol header information such as TCP ports and flags Session Layer firewall a device between the source and destination that intercepts connections in order to make stateful decisions whether the firewall will establish or continue a connection on behalf of the endpoints Application firewall take this concept even further by inspecting traffic all the way up to Layer 7 The protocols inspected and reconstructed vary depending on the manufacturer, model, and purpose of the device 60 P.Pale: Computer forensics 20

21 Evidence acquisition Protocol analysis Packet analysis Flow analysis Network Logs Network devices Network intrusion detection/prevention systems Common network attacks Web browser forensics 61 specialized sniffers with the added capability of evaluating captured traffic to determine whether it is malicious or legitimate After rebranding Most IDS systems have become IPS systems Intrusion Prevention Systems Over the years, IDS/IPS product space has developed two separate niches: NIDS/NIPS monitor network traffic and alert on suspicious network events HIDS/HIPS monitor system events and alert on suspicious system activities 62 Are often a very good starting point in an investigation They detect potentially adverse events via network monitoring Chances are they have logged the incident that is investigated Unfortunately They can t always reconstruct a sequence of events and explain them to us at least not easily Useful because: Logs contain details regarding illicit connections (or even attempts) that are not recorded anywhere else Can be configured to alert and log traffic that firewalls deem perfectly acceptable An investigator could potentially modify a NIDS/NIPS configuration to begin detecting events it wasn t previously configured to record NIDS/NIPS are well positioned as inspection points for network traffic 63 P.Pale: Computer forensics 21

22 Rules Descriptions of how to compare a packet or stream containing known malicious traffic Alerts Lists of suspicious packets/streams Packet captures Certain NIDS/NIPS can be configured to capture suspicious packets and save them for later analysis not always configured to do this by default Other features: Higher Layer Protocol Awareness for example: Signature Based Analysis explain Behavioral analysis explain 64 Types of Evidence Configuration Alert data Packet header and/or flow record information Packet payloads Activities correlated across multiple sensors NIDS/NIPS are specifically designed to sift through large amounts of network traffic and pick out specific events of interest particularly those that relate to security Useful as a starting point! 65 Commercial Check Point IPS 1 Cisco IPS Corero Network Security Enterasys IPS HPTippingPoint IPS IBM Security NIPS Sourcefire 3D System Open source Snort Bro Network Security Monitor 66 P.Pale: Computer forensics 22

Evidence Acquisition. Network Forensics. Jae Woong Joo

Evidence Acquisition. Network Forensics. Jae Woong Joo 1 Evidence Acquisition Network Forensics Jae Woong Joo 2 Table of Contents 3.1 Physical Interception 3.2 Traffic Acquisition Software 3.3 Active Acquisition 3.4 Conclusion 3 3.1 Physical Interception It

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network

More information

COMPUTER NETWORK TECHNOLOGY (300)

COMPUTER NETWORK TECHNOLOGY (300) Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant

More information

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time Essential Curriculum Computer Networking 1 PC Systems Fundamentals 35 hours teaching time Part 1----------------------------------------------------------------------------------------- 2.3 hours Develop

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Network Traffic Analysis

Network Traffic Analysis 2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing

More information

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours

Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Firewalls. Chapter 3

Firewalls. Chapter 3 Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border

More information

Introduction to Network Security Lab 1 - Wireshark

Introduction to Network Security Lab 1 - Wireshark Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication

More information

Packet Sniffing with Wireshark and Tcpdump

Packet Sniffing with Wireshark and Tcpdump Packet Sniffing with Wireshark and Tcpdump Capturing, or sniffing, network traffic is invaluable for network administrators troubleshooting network problems, security engineers investigating network security

More information

Network Security: Workshop

Network Security: Workshop Network Security: Workshop Protocol Analyzer Network analysis is the process of capturing network traffic and inspecting it closely to determine what is happening on the network decodes,, or dissects,,

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including

More information

Connecting with Computer Science, 2e. Chapter 5 The Internet

Connecting with Computer Science, 2e. Chapter 5 The Internet Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar

More information

FIREWALLS & CBAC. [email protected]

FIREWALLS & CBAC. philip.heimer@hh.se FIREWALLS & CBAC [email protected] Implementing a Firewall Personal software firewall a software that is installed on a single PC to protect only that PC All-in-one firewall can be a single device that

More information

Chapter 4 Connecting to the Internet through an ISP

Chapter 4 Connecting to the Internet through an ISP Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No

More information

Broadband Phone Gateway BPG510 Technical Users Guide

Broadband Phone Gateway BPG510 Technical Users Guide Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department

More information

Multi-Homing Security Gateway

Multi-Homing Security Gateway Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000

More information

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015) s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware

More information

Chapter 2 TCP/IP Networking Basics

Chapter 2 TCP/IP Networking Basics Chapter 2 TCP/IP Networking Basics A network in your home or small business uses the same type of TCP/IP networking that is used for the Internet. This manual provides an overview of IP (Internet Protocol)

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

Testing Network Security Using OPNET

Testing Network Security Using OPNET Testing Network Security Using OPNET Agustin Zaballos, Guiomar Corral, Isard Serra, Jaume Abella Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Spain Paseo Bonanova, 8, 08022 Barcelona Tlf:

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Network Security. Network Packet Analysis

Network Security. Network Packet Analysis Network Security Network Packet Analysis Module 3 Keith A. Watson, CISSP, CISA IA Research Engineer, CERIAS [email protected] 1 Network Packet Analysis Definition: Examining network packets to determine

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

Classification of Firewalls and Proxies

Classification of Firewalls and Proxies Classification of Firewalls and Proxies By Dhiraj Bhagchandka Advisor: Mohamed G. Gouda ([email protected]) Department of Computer Sciences The University of Texas at Austin Computer Science Research

More information

PROFESSIONAL SECURITY SYSTEMS

PROFESSIONAL SECURITY SYSTEMS PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security

More information

Firewalls, IDS and IPS

Firewalls, IDS and IPS Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not

More information

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview

More information

Practical Network Forensics

Practical Network Forensics BCS-ISSG Practical Network Forensics Day BCS, London Practical Network Forensics Alan Woodroffe [email protected] www.securesystemssupport.co.uk Copyright Secure Systems Support Limited.

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Firewall Design Principles

Firewalls. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49. Firewall Design Principles Firewalls Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Firewall Design Principles Firewall Characteristics Types of Firewalls Firewall Configurations

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

COMPUTER NETWORK TECHNOLOGY (40)

COMPUTER NETWORK TECHNOLOGY (40) PAGE 1 OF 9 CONTESTANT ID# Time Rank COMPUTER NETWORK TECHNOLOGY (40) Regional 2012 TOTAL POINTS (450) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must

More information

EKT 332/4 COMPUTER NETWORK

EKT 332/4 COMPUTER NETWORK UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

Network Agent Quick Start

Network Agent Quick Start Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer) Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI

More information

Appendix B Network, Routing, Firewall, and Basics

Appendix B Network, Routing, Firewall, and Basics Appendix B Network, Routing, Firewall, and Basics This chapter provides an overview of IP networks, routing, and networking. Related Publications As you read this document, you may be directed to various

More information

Network Forensics: Log Analysis

Network Forensics: Log Analysis Network Forensics: Analysis Richard Baskerville Agenda P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Two Important Terms PPromiscuous Mode

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings . Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It

More information

- Basic Router Security -

- Basic Router Security - 1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password

More information

VisuSniff: A Tool For The Visualization Of Network Traffic

VisuSniff: A Tool For The Visualization Of Network Traffic VisuSniff: A Tool For The Visualization Of Network Traffic Rainer Oechsle University of Applied Sciences, Trier Postbox 1826 D-54208 Trier +49/651/8103-508 [email protected] Oliver Gronz University

More information

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan

More information

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall Figure 5-1: Border s Chapter 5 Revised March 2004 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Border 1. (Not Trusted) Attacker 1 1. Corporate Network (Trusted) 2 Figure

More information

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1 Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with

More information

Protecting and controlling Virtual LANs by Linux router-firewall

Protecting and controlling Virtual LANs by Linux router-firewall Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia

More information

Networked AV Systems Pretest

Networked AV Systems Pretest Networked AV Systems Pretest Instructions Choose the best answer for each question. Score your pretest using the key on the last page. If you miss three or more out of questions 1 11, consider taking Essentials

More information

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01 CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA Test Code: 8148 Version: 01 Specific competencies and skills tested in this assessment: Personal and Environmental Safety Wear personal protective

More information

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.

More information

Bro at 10 Gps: Current Testing and Plans

Bro at 10 Gps: Current Testing and Plans U.S. Department of Energy Bro at 10 Gps: Current Testing and Plans Office of Science Brian L. Tierney Lawrence Berkeley National Laboratory Bro s Use at LBL Operational 24 7 since 1996 Monitors traffic

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT Network Security s Access lists Ingress filtering s Egress filtering NAT 2 Drivers of Performance RequirementsTraffic Volume and Complexity of Static IP Packet Filter Corporate Network The Complexity of

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

From Network Security To Content Filtering

From Network Security To Content Filtering Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals

More information

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis Agenda Richard Baskerville P Principles of P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Principles Kim, et al (2004) A fuzzy expert system for

More information

Introduction to Analyzer and the ARP protocol

Introduction to Analyzer and the ARP protocol Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining

More information

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01 JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

Detecting Threats in Network Security by Analyzing Network Packets using Wireshark

Detecting Threats in Network Security by Analyzing Network Packets using Wireshark 1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,

More information

New Products and New Features May, 2015

New Products and New Features May, 2015 NetAcquire Server 8 New Products and New Features May, 2015 1. Includes all NetAcquire 7.6 and earlier enhancements 2. Runs on a new real-time operating system: NetAcquire Deterministic Linux (NDL) a.

More information

Chapter 12 Supporting Network Address Translation (NAT)

Chapter 12 Supporting Network Address Translation (NAT) [Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information

More information

LifeSize Video Communications Systems Administrator Guide

LifeSize Video Communications Systems Administrator Guide LifeSize Video Communications Systems Administrator Guide November 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made

More information

Network Security TCP/IP Refresher

Network Security TCP/IP Refresher Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)

More information

F-SECURE MESSAGING SECURITY GATEWAY

F-SECURE MESSAGING SECURITY GATEWAY F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE

More information

Classic IOS Firewall using CBACs. 2012 Cisco and/or its affiliates. All rights reserved. 1

Classic IOS Firewall using CBACs. 2012 Cisco and/or its affiliates. All rights reserved. 1 Classic IOS Firewall using CBACs 2012 Cisco and/or its affiliates. All rights reserved. 1 Although CBAC serves as a good foundation for understanding the revolutionary path toward modern zone based firewalls,

More information

Network Terminology Review

Network Terminology Review Network Terminology Review For those of you who have experience with IP networks, this document may serve as a reminder of the current lexicon of terms used in our industry. If you re new to it or specialized

More information

Domain 5.0: Network Tools

Domain 5.0: Network Tools ExamForce.com CompTIA Network+ N10-004 Study Guide 1 Domain 5.0: Network Tools Chapter 5 5.1 Given a scenario, select the appropriate command line interface tool and interpret the output to verify functionality

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a traditional NAT? Un article de Le wiki des TPs RSM. Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with

More information

Introduction to Passive Network Traffic Monitoring

Introduction to Passive Network Traffic Monitoring Introduction to Passive Network Traffic Monitoring CS459 ~ Internet Measurements Spring 2015 Despoina Antonakaki [email protected] Active Monitoring Inject test packets into the network or send packets

More information

Networking Devices. Lesson 6

Networking Devices. Lesson 6 Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). 1 / 17 Network: several computers who can communicate. Bus topology: bus Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb). Hardware has globally unique MAC addresses (IDs).

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

DEPLOYMENT GUIDE. This document gives a brief overview of deployment preparation, installation and configuration of a Vectra X-series platform.

DEPLOYMENT GUIDE. This document gives a brief overview of deployment preparation, installation and configuration of a Vectra X-series platform. This document gives a brief overview of deployment preparation, installation and configuration of a Vectra X-series platform. Traffic Requirements The Vectra X-series platform detects threats and attacks

More information

Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1

Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1 Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 1 1 Objectives Identify a router as a computer with an OS and hardware designed for the routing process. Demonstrate

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

Proxy Server, Network Address Translator, Firewall. Proxy Server

Proxy Server, Network Address Translator, Firewall. Proxy Server Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as

More information

IP Addressing A Simplified Tutorial

IP Addressing A Simplified Tutorial Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PACKET SNIFFING MS. SONALI A. KARALE 1, MS. PUNAM P. HARKUT 2 HVPM COET Amravati.

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503

More information

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton

More information

Introduction to Computer Networks

Introduction to Computer Networks Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,

More information

CompTIA Network+ (Exam N10-005)

CompTIA Network+ (Exam N10-005) CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion

More information