1 Some TCP/IP Basics....NFSDNSTELNETSMTPFTP UDPTCP IP and ICMP Ethernet, serial line,..etc. Application Layer Transport Layer Network Layer Low-level &

Slides:



Advertisements
Similar presentations
Routing Routing in an internetwork is the process of directing the transmission of data across two connected networks. Bridges seem to do this function.
Advertisements

DMZ (De-Militarized Zone)
1 Ports and IPv6. 2 Ports Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), used for communication Generally speaking, a computer.
IP Masquerading Homes and Businesses: When you only have one IP but you have LOTS of machines.
Review of Important Networking Concepts
Firewalls and Intrusion Detection Systems
Skills: Concepts: layered protocols, transport layer functions, TCP and UDP protocols, isochronous applications This work is licensed under a Creative.
Chapter 7 Firewalls. Firewall Definition  A network device that enforces network access control based upon a defined security policy.
Networking Theory (part 2). Internet Architecture The Internet is a worldwide collection of smaller networks that share a common suite of communication.
Circuit & Application Level Gateways CS-431 Dick Steflik.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
1 Introduction to TCP/IP. 2 Agenda What Is TCP/IP? IP Addressing.
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
Information Networking Security and Assurance Lab National Chung Cheng University Anti-hacker Tool Kit: CH13 Port Redirection Jared 04/03/31.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Building a Simple Network
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
Module 1: Reviewing the Suite of TCP/IP Protocols.
1 Figure 5-4: Drivers of Performance Requirements: Traffic Volume and Complexity of Filtering Performance Requirements Traffic Volume (Packets per Second)
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Chapter 23 TCP/IP Overview Network Layer Transport Layer Application Layer WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998.
Chapter 6: Packet Filtering
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 4 Routing Fundamentals and Subnets/ TCP/IP Transport and Application Layers.
Chabot College ELEC Ports (Layer 4).
Examining TCP/IP.
Chapter 9 & 10 TCP/IP. TCP/IP Model Application Transport Internet Internet Access.
I. Basic Network Concepts. I.1 Networks Network Node Address Packet Protocol.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Network – internet – part2  Address at diff. layers  Headers at diff. layers  Equipment at diff. layers.
 network appliances to filter network traffic  filter on header (largely based on layers 3-5) Internet Intranet.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 TCP/IP, Addressing and Services S. Hussain Ali M.S. (Computer Engineering) Department of Computer Engineering King Fahd University of Petroleum and Minerals.
Basic IP Protocol Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Homework 02 NAT 、 DHCP 、 Firewall 、 Proxy. Computer Center, CS, NCTU 2 Basic Knowledge  DHCP Dynamically assigning IPs to clients  NAT Translating addresses.
ACCESS CONTROL LIST.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
Slide #1 CIT 380: Securing Computer Systems TCP/IP.
Introduction to TCP/IP. Agenda What Is TCP/IP? IP Addressing.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
2.1 Chapter 2 Network Models – cont. Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
IP packet filtering Breno de Medeiros. Florida State University Fall 2005 Packet filtering Packet filtering is a network security mechanism that works.
End-host IP: MAC: 11:11:11:11:11 gateway IP: MAC: 22:22:22:22:22 Google server IP: interne t interface DNS server IP:
Communication Networks NETW 501 Tutorial 2
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
Cisco Routers Routers collectively provide the main feature of the network layer—the capability to forward packets end-to-end through a network. routers.
Cisco I Introduction to Networks Semester 1 Chapter 3 JEOPADY.
Chapter4 Packet and Protocol.
Distributed Systems.
Network Architecture Introductory material
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Review of Important Networking Concepts
I. Basic Network Concepts
Firewalls Purpose of a Firewall Characteristic of a firewall
Chapter 25 Digital Evidence at the Network and Transport Layers
Firewalls Jiang Long Spring 2002.
Firewalls.
Network Models CCNA Instructor Training Course October 12-17, 2009
ACCESS CONTROL LIST Slides Prepared By Adeel Ahmed,
46 to 1500 bytes TYPE CODE CHECKSUM IDENTIFIER SEQUENCE NUMBER OPTIONAL DATA ICMP Echo message.
INFORMATION FLOW ACROSS THE INTERNET
Network Address Translation (NAT)
16EC Computer networks unit II Mr.M.Jagadesh
Networking Theory (part 2)
Presentation transcript:

1 Some TCP/IP Basics....NFSDNSTELNETSMTPFTP UDPTCP IP and ICMP Ethernet, serial line,..etc. Application Layer Transport Layer Network Layer Low-level & Physical Layer

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24 Ports Each connection initiating from or arriving at the application layer is given a logical number, the so-called port number A TCP or UDP connection is defined by: Source IP address, Destination IP address, Sources port number, and Destination port number.

25 Firewalls and Their Components To the Internet Host 1Host 2 Packet Filter- ing Router Allowed traffic Blocked Traffic

26 Firewalls and Their Components Web request Host 1Host 2 Application Gateway With Web proxy

27 A Firewall Example Internet Host 1Host 2 Application Gateway running Web and FTP proxies Packet Filter

28 firewall Actual Traffic?

29 Assignment 0: