1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 9 Intermediate TCP/IP/ Access Control Lists (ACLs)

Slides:



Advertisements
Similar presentations
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Advertisements

Cisco 2 - Routers Perrine. J Page 14/30/2015 Chapter 10 TCP/IP Protocol Suite The function of the TCP/IP protocol stack is to transfer information from.
CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Intermediate TCP/IP TCP Operation.
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Chapter 7: Transport Layer
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Ensuring the Reliability of Data Delivery © 2004 Cisco Systems, Inc. All rights reserved. Establishing a TCP Connection INTRO v2.0—6-1.
Chapter 7 – Transport Layer Protocols
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Introducing ACLs.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
CCNA 1 v3.1 Module 11 Review.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 10 Intermediate TCP/IP.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Process-to-Process Delivery:
The Saigon CTT Semester 1 CHAPTER 12 – 13 – 14 Le Chi Trung.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 4 Routing Fundamentals and Subnets/ TCP/IP Transport and Application Layers.
Transport Layer Layer #4 (OSI-RM). Transport Layer Main function of OSI Transport layer: Accept data from the Application layer and prepare it for addressing.
1 7-Oct-15 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
1 © 2003 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.0 Module 11 Access Control Lists (ACLs)
TCP/IP Transport and Application (Topic 6)
1 © 2004 Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
Routers and Routing Basics CCNA 2 Chapter 10.
Access Control List (ACL)
11 TRANSPORT LAYER PROTOCOLS Chapter 6 TCP and UDP SPX and NCP.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 10 Intermediate TCP/IP.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Page 1 Access Lists Lecture 7 Hassan Shuja 04/25/2006.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Access Control Lists Accessing the WAN – Chapter 5.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Networking Basics CCNA 1 Chapter 11.
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 10 Intermediate TCP/IP.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Page 12/9/2016 Chapter 10 Intermediate TCP : TCP and UDP segments, Transport Layer Ports CCNA2 Chapter 10.
Wild Stuff ExtendedACLGeneralACLStandardACL Got the Right Number?
CCNA4 Perrine / Brierley Page 12/20/2016 Chapter 05 Access Control Non e0e1 s server.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
1 Version 3.1 Module 10 Intermediate TCP/IP (Layer 4)
1 Pertemuan 23 Overview of Transport Layer Ports.
© 2002, Cisco Systems, Inc. All rights reserved..
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
1 Pertemuan 24 Access Control List Fundamentals. Discussion Topics Introduction ACLs How ACLs work Creating ACLs The function of a wildcard mask Verifying.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Access Control Lists.
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
Accessing the WAN – Chapter 5
Pertemuan 25 TCP/IP Transport Layer
Accessing the WAN – Chapter 5
Accessing the WAN – Chapter 5
CCNA 2 v3.1 Module 10 Intermediate TCP/IP
CCNA 2 v3.1 Module 11 Access Control Lists (ACLs)
Presentation transcript:

1 © 2004, Cisco Systems, Inc. All rights reserved. Chapter 9 Intermediate TCP/IP/ Access Control Lists (ACLs)

222 © 2004, Cisco Systems, Inc. All rights reserved. Objectives

333 © 2004, Cisco Systems, Inc. All rights reserved. TCP Operation The transport layer is responsible for the reliable transport of and regulation of data flow from source to destination.

444 © 2004, Cisco Systems, Inc. All rights reserved. Synchronization or Three-Way Handshake

555 © 2004, Cisco Systems, Inc. All rights reserved. Denial-of-Service Attacks

666 © 2004, Cisco Systems, Inc. All rights reserved. Simple Windowing

777 © 2004, Cisco Systems, Inc. All rights reserved. TCP Sequence and Acknowledgment Numbers

888 © 2004, Cisco Systems, Inc. All rights reserved. Positive ACK Acknowledgement is a common step in the synchronization process which includes sliding windows and data sequencing.

999 © 2004, Cisco Systems, Inc. All rights reserved. Protocol Graph: TCP/IP

10 © 2004, Cisco Systems, Inc. All rights reserved. UDP Segment Format

11 © 2004, Cisco Systems, Inc. All rights reserved. Port Numbers

12 © 2004, Cisco Systems, Inc. All rights reserved. Telnet Port Numbers

13 © 2004, Cisco Systems, Inc. All rights reserved. Reserved TCP and UDP Port Numbers

14 © 2004, Cisco Systems, Inc. All rights reserved. Ports for Clients Whenever a client connects to a service on a server, a source and destination port must be specified. TCP and UDP segments contain fields for source and destination ports.

15 © 2004, Cisco Systems, Inc. All rights reserved. Port Numbering and Well-Known Port Numbers Port numbers are divided into three different categories: well-known ports registered ports dynamic or private ports

16 © 2004, Cisco Systems, Inc. All rights reserved. Port Numbers and Socket

17 © 2004, Cisco Systems, Inc. All rights reserved. Comparison of MAC addresses, IP addresses, and port numbers A good analogy can be made with a normal letter. The name on the envelope would be equivalent to a port number, the street address is the MAC, and the city and state is the IP address.

18 © 2004, Cisco Systems, Inc. All rights reserved. Summary

19 © 2004, Cisco Systems, Inc. All rights reserved. Access Control Lists (ACLs)

20 © 2004, Cisco Systems, Inc. All rights reserved. Objectives

21 © 2004, Cisco Systems, Inc. All rights reserved. What are ACLs? ACLs are lists of conditions used to test network traffic that tries to travel across a router interface. These lists tell the router what types of packets to accept or deny.

22 © 2004, Cisco Systems, Inc. All rights reserved. How ACLs Work

23 © 2004, Cisco Systems, Inc. All rights reserved. Protocols with ACLs Specified by Numbers

24 © 2004, Cisco Systems, Inc. All rights reserved. Creating ACLs

25 © 2004, Cisco Systems, Inc. All rights reserved. The Function of a Wildcard Mask

26 © 2004, Cisco Systems, Inc. All rights reserved. Verifying ACLs There are many show commands that will verify the content and placement of ACLs on the router. show ip interface show access-lists Show running-config

27 © 2004, Cisco Systems, Inc. All rights reserved. Standard ACLs

28 © 2004, Cisco Systems, Inc. All rights reserved. Extended ACLs

29 © 2004, Cisco Systems, Inc. All rights reserved. Named ACLs

30 © 2004, Cisco Systems, Inc. All rights reserved. Placing ACLs Standard ACLs should be placed close to the destination. Extended ACLs should be placed close to the source.

31 © 2004, Cisco Systems, Inc. All rights reserved. Firewalls A firewall is an architectural structure that exists between the user and the outside world to protect the internal network from intruders.

32 © 2004, Cisco Systems, Inc. All rights reserved. Restricting Virtual Terminal Access

33 © 2004, Cisco Systems, Inc. All rights reserved. Summary

34 © 2004, Cisco Systems, Inc. All rights reserved. Question/Answer