CONFIGURING TCP/IP ADDRESSING AND SECURITY



Similar documents
IP Addressing A Simplified Tutorial

APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.

Lab#2: IP Addressing and Subnetting

Question Question Question EdTech 552: Lab 3 Answer Sheet

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

Network System Design Lesson Objectives

Guide to TCP/IP, Third Edition. Chapter 2: IP Addressing and Related Topics

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

IP Addressing. -Internetworking (with TCP/IP) -Classful addressing -Subnetting and Supernetting -Classless addressing

Lab IP Addressing Overview

Internet Addresses (You should read Chapter 4 in Forouzan)

Classful IP Addressing (cont.)

- IPv4 Addressing and Subnetting -

Number of bits needed to address hosts 8

IP Addressing. IP Addresses. Introductory material.

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

CE363 Data Communications & Networking. Chapter 6 Network Layer: Logical Addressing

8.2 The Internet Protocol

Computer Network Foundation. Chun-Jen (James) Chung. Arizona State University

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

IP Addressing Introductory material.

How To Make A Network Address Prefix Smaller

EXPLORER. TFT Filter CONFIGURATION

Internetworking and IP Address

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Advanced IP Addressing

TCP/IP Basis. OSI Model

Scaling the Network: Subnetting and Other Protocols. Networking CS 3470, Section 1

Subnetting/Supernetting and Classless Addressing

Subnetting Study Guide

Lecture Computer Networks

Tutorial (03) IP addresses & Sub netting

IP Networking Part 3- IP Address Management A webinar to help you prepare for the CBNE Certification


JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

CCNA Tutorial Series SUBNETTING

TCP/IP works on 3 types of services (cont.): TCP/IP protocols are divided into three categories:

Network and Host Addresses , Cisco Systems, Inc. All rights reserved. INTRO v1.0a 6-4

IP Subnetting and Addressing

Chapter 5. IPv4 Addresses. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Security and Access Control Lists (ACLs)

Topics. Subnetting. The Basics of Subnetting Subnet Mask Computing subnets and hosts Subnet Routing Creating a Subnet Example of Subnetting 1/37

Frequently Asked Questions: Xplornet Internet Security Suite

OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010

TCP/IP Cheat Sheet. A Free Study Guide by Boson Software, LLC

Networking Technology Online Course Outline

Lab a Basic Subnetting

Computer Networks By Bahaa Q. Al-Mussawi Subnetting Basics Reduced network traffic Optimized network performance Simplified management

Networking Basics for Automation Engineers

Table of Contents 1 IP Addressing Configuration 1-1

PART IV. Network Layer

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

2. IP Networks, IP Hosts and IP Ports

Internet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming IP routing

IP address format: Dotted decimal notation:

Subnet + CIDR. Internet Networking recitation #1. 11: , Internet Networking,

SNMP/HTTP Access Control User Manual

Networking Test 4 Study Guide

TCP/IP Addressing and Subnetting. an excerpt from: A Technical Introduction to TCP/IP Internals. Presentation Copyright 1995 TGV Software, Inc.

Module 2: Assigning IP Addresses in a Multiple Subnet Network

Chapter 19 Network Layer: Logical Addressing 19.1

The Subnet Training Guide

1. How many unique network IDs are there in class A addresses? # of unique hosts?

DO NOT REPLICATE. Analyze IP. Given a Windows Server 2003 computer, you will use Network Monitor to view and analyze all the fields of IP.

Expert Reference Series of White Papers. Binary and IP Address Basics of Subnetting

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

How to Create Subnets To create subnetworks, you take bits from the host portion of the IP address and reserve them to define the subnet address.

Norton Personal Firewall for Macintosh

We Are HERE! Subne\ng

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Internet Protocol Address

WHITE PAPER. Understanding IP Addressing: Everything You Ever Wanted To Know

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE

How to install and use CrossTec Remote Control or SchoolVue in a Virtual and or Terminal Service environment

Variable length subnetting

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.

CCNA R&S: Introduction to Networks. Chapter 9: Subnetting IP Networks

No need to operate a DHCP server. If a server s IP address changes, clients will lose the ability to access it!

Symantec Hosted Mail Security Getting Started Guide

Intro to Firewalls. Summary

Chapter 4. IP Addresses: Classful Addressing

IP Filter/Firewall Setup

Chapter 4 Customizing Your Network Settings

Chapter 12 Supporting Network Address Translation (NAT)

IP Addressing. and Subnetting. Workbook Version 1.5. Student Name:

Table of Contents. Cisco IP Addressing and Subnetting for New Users

1 Introduction. Agenda Item: Work Item:

Network layer: Overview. Network layer functions IP Routing and forwarding

COMPUTER NETWORK TECHNOLOGY (40)

ICS 351: Today's plan

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Transcription:

1 Chapter 11 CONFIGURING TCP/IP ADDRESSING AND SECURITY Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 2 OVERVIEW Understand IP addressing Manage IP subnetting and subnet masks Understand IP security terminology Manage Internet security features of Windows XP Configure and troubleshoot Windows Firewall Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 3 UNDERSTANDING BINARY NUMBERS Base 2 number system. Bit (1 = On; 0 = Off), Byte, Nibble, Octet. Kilo = 1024; Mega, Giga, Terra. 1

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 4 CONVERTING DECIMAL ADDRESSES TO BINARY Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 5 CONVERTING BINARY ADDRESSES TO DECIMAL Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 6 USING CALCULATOR TO CONVERT NUMBERS 2

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 7 DEFAULT SUBNET MASKS CLASSFUL ADDRESSING First two bits determine IP address class. Network bits are 1 s from left to right. Host bits are 0 s from right to left. Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 8 IP ADDRESSES Class A Class B Class C 1 st bit (binary) 0 10 110 1 st byte (decimal) 0-127 128-191 192-223 Network ID bits 8 16 24 Default subnetmask 255.0.0.0 255.255.0.0 255.255.255.0 Possible Networks 126 16,384 2,097,152 Possible Hosts 16,777,214 65,534 254 IP@ Special Class, Loopback and RFC1918 Reserved Addresses Class D Class E Loopback Private Class A Private Class B Private Class C APIPA 224 239 Multicast group 240 255 Experimental 127.0.0.0 127.255.255.255 10.0.0.0 10.255.255.255 172.16.0.0 172.31.255.255 192.168.0.0 192.168.255.255 169.254.0.0 (Automatic Private IP Address) Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 9 PROBLEMS WITH CLASSFUL ADDRESSES Wasted addresses Class A Which organization have 1.7 public systems? Shortage of address blocks Class A has only 126 blocks Class B has only 16,384 blocks Excessive routing table entries Class C has 2,097,152 blocks Organizations need multiple Class C blocks - causing routing table proliferation 3

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 10 SUBNETTING A LARGE NETWORK Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 11 RESERVED HOST ADDRESS Useable number of hosts is 2 n 2 Host address bits of all zeroes is the network ID Example: 192.168.1.0 Network ID or address of the network Network ID of host address 192.168.1.25 Host address bits of all ones is the network broadcast address Example: 192.168.1.255 is the broadcast address for 192.168.1.0 Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 12 CLASSLESS INTERDOMAIN ROUTING (CIDR) CIDR notation: IP address/network bits 4

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 13 SUPERNETS Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 14 SECURING IP COMMUNICATIONS OVERVIEW Internet threats Protective technologies Configuring and managing Windows Firewall Monitoring Internet communications security Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 15 INTERNET THREATS Viruses (the oldest threat) Worms (the most persistent threat) Trojan horses Spyware Zombies - Bots Direct hacking 5

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 16 VIRUSES Take advantage of gullible users Infect document, graphics, and executable files Often include mass-mailing components Can carry destructive payloads Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 17 WORMS Self-replicating Network-aware Use bugs in programs or systems to spread Can carry viruses or other payloads Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 18 TROJAN HORSES Usually e-mailed or downloaded Appear to be a useful program or game Carry payload or back door application 6

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 19 SPYWARE Has attributes of Trojan horses or worms Spies on its victim Might transmit marketing data or transmit personal data to the spyware author Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 20 ZOMBIES - BOTS Payload of worm or Trojan horse Remotely controlled to attack network targets Participate in large-scale assaults on public Web sites Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 21 DIRECT HACKING Relatively low incidence Hardest form of attack to defeat 7

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 22 PROTECTIVE TECHNOLOGIES Security Center Windows Firewall Internet Connection Sharing (ICS) Third-party utilities Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 23 SECURITY CENTER Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 24 FIREWALL TERMINOLOGY Packet filtering Protocols (ICMP, TCP, UDP) Ports - Service Stateful packet filtering Exceptions (packet filter rules) Allowed/Permitted traffic Rejected/Blocked/Denied traffic Logging 8

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 25 ENABLING WINDOWS FIREWALL Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 26 FIREWALL EXCEPTIONS Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 27 ADVANCED WINDOWS FIREWALL SETTINGS 9

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 28 MONITORING INTERNET SECURITY Windows Firewall monitoring Service logs Event logs Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 29 WINDOWS FIREWALL ALERTS Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 30 WINDOWS FIREWALL LOGS 10

Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 31 SERVER LOGS Chapter 11: CONFIGURING TCP/IP ADDRESSING AND SECURITY 32 SUMMARY IP addresses are 32-bit binary addresses. The network portion of IP addresses determines location. CIDR allows creation of custom netblocks. CIDR permits use of variable-length subnet masks. Windows Firewall blocks unauthorized packets. Windows Firewall exceptions allow specified traffic to pass through the firewall. Alerts and logs warn of attempted attacks. 11