Introduction to Network Security. Topics



Similar documents
ΕΠΛ 674: Εργαστήριο 5 Firewalls

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Version 0.1 June Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)

Networking Test 4 Study Guide

OSI Seven Layers Model Explained with Examples

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso

Cisco Configuring Commonly Used IP ACLs

What communication protocols are used to discover Tesira servers on a network?

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

Protocols. Packets. What's in an IP packet

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

Transport and Network Layer

UPPER LAYER SWITCHING

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

How to put the DVR online

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

An Introduction to VoIP Protocols

Mini-Challenge 3. Data Descriptions for Week 1

Lecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Firewalls P+S Linux Router & Firewall 2013

Intro to Firewalls. Summary

Data Communication Networks and Converged Networks

CCT vs. CCENT Skill Set Comparison

LECTURE 4 NETWORK INFRASTRUCTURE

Follow these steps to prepare the module and evaluation board for testing.

Network Basics GRAPHISOFT. for connecting to a BIM Server (version 1.0)

LESSON Networking Fundamentals. Understand TCP/IP

Configuring IP to Serial with Auto Answer and Serial to IP

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Interconnecting Cisco Network Devices 1 Course, Class Outline

ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Overview - Using ADAMS With a Firewall

BASIC ANALYSIS OF TCP/IP NETWORKS

VOIP Guide Using ZyXEL Switch

Lecture 28: Internet Protocols

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Network Layers. CSC358 - Introduction to Computer Networks

This Lecture. The Internet and Sockets. The Start If everyone just sends a small packet of data, they can all use the line at the same.

Review: Lecture 1 - Internet History

10CS64: COMPUTER NETWORKS - II

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Cisco Data Centre: Introducing Cisco Data Center Networking

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Flow Analysis Versus Packet Analysis. What Should You Choose?

How to Make the Client IP Address Available to the Back-end Server

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

CPS221 Lecture: Layered Network Architecture

Firewall Design Principles

Lecture 23: Firewalls

Lecture 17 - Network Security

Chapter 11. User Datagram Protocol (UDP)

Configuring Network Address Translation (NAT)

Multi-Homing Dual WAN Firewall Router

Firewall VPN Router. Quick Installation Guide M73-APO09-380

NETGEAR ProSAFE WC9500 High Capacity Wireless Controller

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Network Packet Analysis and Scapy Introduction

ETSF10 Part 3 Lect 2

Internet Control Protocols Reading: Chapter 3

Use Domain Name System and IP Version 6

Protocol Data Units and Encapsulation

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

Securing EtherNet/IP Using DPI Firewall Technology

Industrial Communication Whitepaper. Principles of EtherNet/IP Communication

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers

This presentation discusses the new support for the session initiation protocol in WebSphere Application Server V6.1.

Protocol Security Where?

IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

Solution of Exercise Sheet 5

Ethernet. Ethernet. Network Devices

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Application Protocols for TCP/IP Administration

Overview. Protocols. VPN and Firewalls

21.4 Network Address Translation (NAT) NAT concept

Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes

Voice over IP. Presentation Outline. Objectives

A DHCP Primer. Dario Laverde, 2002 Dario Laverde

Technical Support Information

Network Address Translation (NAT)

Lab VI Capturing and monitoring the network traffic

Web Browsing Examples. How Web Browsing and HTTP Works

Lab Organizing CCENT Objectives by OSI Layer

Traffic monitoring with sflow and ProCurve Manager Plus

EXPLORER. TFT Filter CONFIGURATION

Application. Transport. Network. Data Link. Physical. Network Layers. Goal

Chapter 9. IP Secure

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

How To Design A Layered Network In A Computer Network

How To Understand The Internet Of S (Netware)

Unit 23. RTP, VoIP. Shyam Parekh

Transcription:

Introduction to Network Security Chapter 2 Network Protocols 1 Topics Protocol Specifications Protocol Addresses Protocol Headers 2

Protocol Specifications Open vs. Closed Specification methods English descriptions Flow & timing diagrams Open to interpretation Implementation flaws 3 Network Standards Specifies Services provided Services expected Functions provided Protocol and packet formats Timing and sequence of the packets 4

Standards Organizations American National Standards Institute (ANSI): ANSI is a private organization whose membership is made up of professional societies, government groups and other associations. They develop standards that help groups complete in the global market. Institute of Electrical and Electronics Engineers (IEEE): IEEE is an international professional society that creates international standards in many different areas. International Standards Organization (ISO): A group whose membership is standards committees from across the world. ANSI represents the United States on ISO. International Telecommunications Union-Telecommunications Standards Sector (ITU-T): A group created by the United Nations that creates standards primarily for the phone system. Internet Engineering Task Force (IEFT): This group develops standards for the Internet and consists of members from various organizations and is open to any person that has an interest. 5 Sender Addressing Recipient Street Address Street Address LA DC Street Corner CHI Postal System Network 6

Addressing 7 Application 1 Addresses Application 2 Application user address: identifies items within the application Application port number: Identifies the instance of application UDP TCP IP Other Transport Protocol type: Identifies the transport layer used GlobalNetwork Layer Address: Identifies the device TCP/IP Network Protocol type: Identifies which protocol is carried in the packet Hardware Address: Identifies which device on the physical network 8

Address Assignment - How Static Configuration Built in Dynamic Protocol discovery User provided 9 Address Assignment Who Central Authority Ad-hoc Locally based 10

Hardware address assignment Hardware Vendor assigned Address used as a filter Address can be changed 11 IP address assignment Global address allocation Address assignment Protocol based (DHCP) Static Locally controlled Addresses can be changed 12

Application address assignment Port Number (much less control) Well know ports Protocol based discovery Configuration based User input based 13 Hostname assignment Often political and/or commercially driven Assignment via central authority Protocol to find the IP address given a name (DNS) 14

Protocol Headers Fixed packet type Easy to parse Limited functionality Freeform type Harder to parse Easy to extend 15 Fixed packet header Fixed Options Payload Trailer Fixed: Addresses (Layer addresses and payload type) Payload data Control data Header data Options: Extended fixed data Optional control data Optional Payload control Payload: Content is not a concern of the header Trailer: Optional field often used for error control 16

Freeform header <Start Header> <Data type = application 7> <Data length = 400> <Data encoding = ASCII> </End Header> <Start Data> (the data) </End Data> 17