finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,...



Similar documents
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Introduction to Network Security Lab 1 - Wireshark

CTS2134 Introduction to Networking. Module Network Security

Exam Questions SY0-401

Firewalls (IPTABLES)

Firewalls. Network Security. Firewalls Defined. Firewalls

Firewalls. Chapter 3

Linux Network Security

TELE 301 Network Management. Lecture 16: Remote Terminal Services

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Lab Organizing CCENT Objectives by OSI Layer

COMPUTER NETWORK TECHNOLOGY (300)

EXPLORER. TFT Filter CONFIGURATION

CS197U: A Hands on Introduction to Unix

How To Understand The Internet Of S (Netware)

Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Introduction to Computer Security

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

Network Programming TDC 561

Introduction to Computer Security

Introduction To Computer Networking

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

ProCurve Networking. Hardening ProCurve Switches. Technical White Paper

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

Executive Summary and Purpose

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Technical Support Information Belkin internal use only

Cisco Secure PIX Firewall with Two Routers Configuration Example

Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

- Basic Router Security -

Computer Networks - Xarxes de Computadors

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Networking Basics and Network Security

Specialized Programme on Internetworking Design and LAN WAN Administration

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Connecting with Computer Science, 2e. Chapter 5 The Internet

Security Technology: Firewalls and VPNs

UPPER LAYER SWITCHING

Data Communication Networks and Converged Networks

The OSI and TCP/IP Models. Lesson 2

ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration

Connecting to the School of Computing Servers and Transferring Files

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Multi-Homing Dual WAN Firewall Router

Test Code: 8148 / Version 1

Protocols. Packets. What's in an IP packet

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Transport and Network Layer

Network Configuration Settings

Overview of Computer Networks

Firewall Design Principles Firewall Characteristics Types of Firewalls

Networking Technology Online Course Outline

Packet Sniffing with Wireshark and Tcpdump

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

COMPUTER NETWORK TECHNOLOGY (40)

CCT vs. CCENT Skill Set Comparison

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

Prestige 310. Cable/xDSL Modem Sharing Router. User's Guide Supplement

IP Addressing A Simplified Tutorial

Protecting and controlling Virtual LANs by Linux router-firewall

Computer Networks/DV2 Lab

Internet Protocol: IP packet headers. vendredi 18 octobre 13

LESSON Networking Fundamentals. Understand TCP/IP

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Copyright 2006 Comcast Communications, Inc. All Rights Reserved.

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski

CounterACT 7.0 Single CounterACT Appliance

Connecting to and Setting Up a Network

Protocols and Architecture. Protocol Architecture.

Introduction to computer networks and Cloud Computing

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

How To Understand And Understand The Security Of A Key Infrastructure

Socket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast.

Unix System Administration

BASIC ANALYSIS OF TCP/IP NETWORKS

LifeSize Video Communications Systems Administrator Guide

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Measurement of the Usage of Several Secure Internet Protocols from Internet Traces

Objectives of Lecture. Network Architecture. Protocols. Contents

Chapter 7. Firewalls

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

524 Computer Networks

Basic Network Configuration

TCP/IP Network Essentials. Linux System Administration and IP Services

The IP Transmission Process. V1.4: Geoff Bennett

Chapter 5. Data Communication And Internet Technology

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Networking Test 4 Study Guide

Fundamentals of UNIX Lab Networking Commands (Estimated time: 45 min.)

Deployment Guide AX Series for Palo Alto Networks SSL Intercept and Firewall Load Balancing

Guideline for setting up a functional VPN

Ethernet. Ethernet. Network Devices

Transcription:

Read Chapter 9 Linux network utilities finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,... 1 Important to know common network terminology how networks are built how to talk to other people on the network how to use other computeras on the network 2

Local Area Networks Simplest LAN 3 Local Area Networks Ethernet (Standardized as IEEE 802.3) You have seen the RJ45 connectors 4

Bridges Bridge passes Ethernet message between different segments of the network as if both segments were a single Ethernet cable. Used when one has to go beyond the allowed length of a single section fo wire 5 Routers Route traffic to where it is needed. Or, does not route messages where they are not needed. Example of 4 networks: now argue router vs bridge 6

Gateway High-capacity routers 7 Internetworking Packet Switching and Circuit Switching Circuit Switching establish, maintain and terminate dedicated circuit e.g., traditional telephone networks Packet Switching network nodes send messages that are split up into small packets packets get routed from source to destination 8

Internetworking Packet Switching Issues How big are the packets How do packets get routed, all along the same route or not What if packets get lost, arrive out of order What if packet sizes change Who s packet is it? 9 Internetworking Most of the Internet revolves around: Transmission Control Protocols (TCP/UDP) Internet Protocol (IP) 10

LAN Protocols in Context CS420/520 Axel Krings Sequence 17 Internetworking Internet Protocol IPv4 Header 12

Internetworking IP Address Formats 13 Internetworking So what network are we? 129.101.153.117 14

IP Addresses - Class B Start with binary 10 Range 128.x.x.x to 191.x.x.x Second Octet also included in network address 2 14 = 16,384 class B addresses All allocated CS420/520 Axel Krings Page Sequence 19 Internetworking IPv6 extended addressing 128-bit addresses but that is not all, e.g., security,... 16

Naming What associations exist? hostname, IP address, MAC address address resolution protocol (arp) -bash-3.2$ /sbin/arp -a bender.cs.uidaho.edu (129.101.153.101) at 00:0E:0C:69:7B:E7 [ether] on eth0 bunyan.cs.uidaho.edu (129.101.153.110) at 00:D0:B7:B6:C1:5C [ether] on eth0 varanid.cs.uidaho.edu (129.101.153.119) at 00:03:BA:5C:48:0E [ether] on eth0 granite.cs.uidaho.edu (129.101.153.125) at 00:03:BA:5C:48:17 [ether] on eth0 -bash-3.2$ 17 Routing Dynamic routing Static routing 18

Security User Authentication e.g., login with username and password e.g., remote procedure call RPC: execute a command, say date on another computer commet:~ krings$ rsh eternium.cs.uidaho.edu date works if one establishes machine equivalence this is defined in.hosts file can also be done in /etc/hosts.equiv 19 Security Data Encryption Example use telnet to connect to other computer and all communication is in clear-text --- outch! use secure shell, e.g., based on Open Secure Socket Layer OpenSSL 20

Ports and Common Services Services like ftp, mail or http use TCP or UDP /etc/services shows the ports and their services take a look Linux interprocess communication allows you to communicate with other programs at a known IP address and port. See Chapter 12 Systems Programming 21 Network Users users, list the users on the local host who, like users except that it gives you more information w, like who except that it gives you even more information hostname, displays your local host's name finger, gives information about specific users 22

Communication with Network Users write, allows you to send individual lines to a user, one at a time talk, allows you to have an interactive split-screen two-way conversation wall, allows you to send a message to everyone on the local host mail, allows you to send mail messages 23 Distributing Data rcp (remote copy) and scp (secure copy) allow you to copy files between your local Linux host and another remote Linux or UNIX host. ftp (file transfer protocol or program) and sftp (secure ftp) allow you to copy files between your local Linux host and any other host (possibly non-linux) that supports FTP (the File Transfer Protocol). ftp is thus more powerful than rcp. uucp (unix-to-unix copy) is similar to rcp, and allows you to copy files between any two Linux or UNIX hosts. 24

Distributing Data sftp sftp eternium.cs.uidaho.edu Connecting to eternium.cs.uidaho.edu... **************************************************************** * WARNING: To protect the system from unauthorized use and to * * ensure that the system is functioning properly, activities * * on this system are monitored recorded and subject to audit. * * Use of this system is expressed consent to such monitoring * * and recording. Any unauthorized access or use of this system * * is prohibited and subject to criminal and civil penalties. * **************************************************************** krings@eternium.cs.uidaho.edu's password: sftp>? [check out the commands displayed with the? option] 25 Distributed Processing rlogin and slogin, which allow you to log in to a remote Linux or UNIX host rsh and ssh, which allow you to execute a command on a remote Linux or UNIX host telnet, which allows you to execute commands on any remote host that has a telnet server 26

rlogin how does it work? rlogin asks for password -l option is used to specify username other than current one if remote hosts has local host in /etc/rhosts file then no passwd needed what are the advantages or disadvantages of this? what is the difference to telnet? similar but less customizable, connects only to unix hosts wisdom: telnet and rlogin should be avoided. Use ssh and slogin 27 rlogin how does it work? rlogin asks for password -l option is used to specify username other than current one if remote hosts has local host in /etc/rhosts file then no passwd what are the advantages or disadvantages of this? what is the difference to telnet? similar but less customizable, connects only to unix hosts Word of wisdom: telnet and rlogin should be avoided! Use ssh and slogin! 28