Computer Networks & FirewallsUniversity IT Security Office - Tom Davis, CISSP University IT Security Officer Office of the Vice.

Slides:



Advertisements
Similar presentations
Configuring Internet Access for a Network. Overview Options for Connecting a Network to the Internet Configuring Internet Access by Using a Router Configuring.
Advertisements

CST Computer Networks NAT CST 415 4/10/2017 CST Computer Networks.
1 Ports and IPv6. 2 Ports Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), used for communication Generally speaking, a computer.
CCNA – Network Fundamentals
Chapter 7: Transport Layer
CCNA 1 v3.1 Module 11 Review.
CLIENT / SERVER ARCHITECTURE AYRİS UYGUR & NİLÜFER ÇANGA.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Application Layer PART VI.
Hardware Firewall Feature © N. Ganesan, Ph.D.. Chapter Objectives Show the configuration of a hardware firewall such as Dlink DI 604 Illustrate the sharing.
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
Chapter 8 PIX Firewall. Adaptive Security Algorithm (ASA)  Used by Cisco PIX Firewall  Keeps track of connections originating from the protected inside.
Day15 IP Space/Setup. IP Suite of protocols –TCP –UDP –ICMP –GRE… Gives us many benefits –Routing of packets over internet –Fragmentation/Reassembly of.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
IP Ports and Protocols used by H.323 Devices Liane Tarouco.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
TCP/IP. The Internet Protocol Suite is the set of communications protocols used for the Internet and other similar networks. It is commonly also known.
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
TCP/IP: Basics1 User Datagram Protocol (UDP) Another protocol at transport layer is UDP. It is Connectionless protocol i.e. no need to establish & terminate.
Greg Van Dyne December 4, Agenda Introduction Technical Overview Protocols Demonstration Future Trends References.
Examining TCP/IP.
Windows Programming Using C# Internet Programming.
I. Basic Network Concepts. I.1 Networks Network Node Address Packet Protocol.
Crossing firewalls Liane Tarouco Leandro Bertholdo RNP POP/RS.
Private Network Interconnection Chapter 20. Introduction Privacy in an internet is a major concern –Contents of datagrams that travel across the Internet.
TCP/IP Suite Transmission Control Protocol/ Internet Protocol Presentation by Chandra Porchia.
TCP/IP Transport and Application (Topic 6)
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
1. I NTRODUCTION TO N ETWORKS Network programming is surprisingly easy in Java ◦ Most of the classes relevant to network programming are in the java.net.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Exploring Office 2003 – Grauer and Barber HTML And Basic Web page.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
What is TCP/IP? TCP/IP is the communication protocol for communication between computers on the Internet. TCP/IP stands for Transmission Control Protocol.
Marwan Al-Namari Week 5. Responsible for delivering packets between endpoints over multiple links Physical Link Network Transport Application.
Networking Terminology: ISP (Internet service provider) – dialup, dsl, cable LAN (local area network) IP (internet protocol) address, eg
Networking Fundamentals Network Protocols. Protocol Rule for how networks communicate Each OSI layer handled by one or more protocols Protocol Suites.
Linux Networking #1 Dr. Michael L. Collard 1.
Presented by Rebecca Meinhold But How Does the Internet Work?
TCP/IP (Transmission Control Protocol / Internet Protocol)
Socket Programming Introduction. Socket Definition A network socket is one endpoint in a two-way communication flow between two programs running over.
Cisco Discovery Semester 1 Chapter 6 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Computer Communication: An example What happens when I click on
Data Security in Local Network Using Distributed Firewall Presented By- Rahul N.Bais Guide Prof. Vinod Nayyar H.O.D Prof.Anup Gade.
Network protocles (TCP), (UDP), (DHCP), (DNS) DR:abd alrauoof alshtawi
1 Network Address Translation. 2 Network Address Translation (NAT) Extension of original addressing scheme Motivated by exhaustion of IP address space.
Assumption You’re not a “networking guy” and you don’t want to be Networking infrastructure is configured properly – Packets go where they’re told to go.
Chapter 16 - TCP: Software For Reliable Communication Introduction A Packet Switching System Can Be Overrun (merging highways) TCP Helps IP Guarantee Delivery.
DIYTP Network Basics  How do computers communicate?  Network Interface Card (NIC)  Media Access Control Address (MAC)  Unique to each NIC 
TCP/IP Protocol Suite ©Richard L. Goldman September 25, 2002.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
1 K. Salah Application Layer Module K. Salah Network layer duties.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Networking Mehdi Einali Advanced Programming in Java 1.
Network Programming. These days almost all devices.
© 2001, Cisco Systems, Inc. CSPFA 2.0—5-1 Chapter 5 Cisco PIX Firewall Translations.
COMPUTER NETWORKS CS610 Lecture-39 Hammad Khalid Khan.
Network Wiring and Reference
Introducing To Networking
Hiding Network Computers Gateways
Digital Pacman: Firewall Edition
I. Basic Network Concepts
CSC Advanced Unix Programming, Fall 2015
COMPUTER NETWORKS CS610 Lecture-35 Hammad Khalid Khan.
Request for Comments(RFC) 3489
Network Addressing.
Computer Networks Protocols
Chapter 15 - IP: Software To Create A Virtual Network
Presentation transcript:

Computer Networks & FirewallsUniversity IT Security Office - Tom Davis, CISSP University IT Security Officer Office of the Vice President for Information Technology Computer Networks & Firewalls

University IT Security Office - Agenda Networks Firewalls Software Configuration Questions

Computer Networks & FirewallsUniversity IT Security Office - A Word of Warning! Computer geeks love TLA’s And, I’m a computer geek! So, ask questions at anytime…

Computer Networks & FirewallsUniversity IT Security Office - Agenda Networks Firewalls Software Configuration Questions

Computer Networks & FirewallsUniversity IT Security Office - Network Internet Computer AComputer B

Computer Networks & FirewallsUniversity IT Security Office - Networking Terms IP addresses and DNS names –static vs. dynamic IP addresses Port numbers TCP vs. UDP

Computer Networks & FirewallsUniversity IT Security Office - IP Addresses and DNS Names (Static IP Address) Internet peppsi.geology.indiana.edu nlcs.k12.in.us IP = Internet Protocol DNS = Domain Name System

Computer Networks & FirewallsUniversity IT Security Office - IP Addresses and DNS Names (Dynamic IP Address) Internet peppsi.geology.indiana.edu dynamic-69-3.k12.in.us

Computer Networks & FirewallsUniversity IT Security Office - IP Addresses and DNS Names (Dynamic IP Address) Internet peppsi.geology.indiana.edu dynamic-69-3.k12.in.us dynamic-69-7.k12.in.us

Computer Networks & FirewallsUniversity IT Security Office - Port Numbers (nlcs.k12.in.us) Port 80 Port 1568 web scream

Computer Networks & FirewallsUniversity IT Security Office - TCP vs. UDP TCP (Transmission Control Protocol) –delivery is guaranteed (registered letter) –both endpoints are connected UDP (User Datagram Protocol) –delivery is not guaranteed (postcard) –both endpoints are not connected

Computer Networks & FirewallsUniversity IT Security Office - Agenda Networks Firewalls Software Configuration Questions

Computer Networks & FirewallsUniversity IT Security Office - Firewalls Purpose –block network connections, primarily based on: IP address Port number Protocol (TCP or UDP) Masquerading Firewalls –Network Address Translation (NAT)

Computer Networks & FirewallsUniversity IT Security Office - Firewalled Network Internet Firewall Protected Network peppsi.geology.indiana.edu nlcs.k12.in.us

Computer Networks & FirewallsUniversity IT Security Office - Masquerading Firewall Internet firewall.k12.in.us Protected Network peppsi.geology.indiana.edu hidden.k12.in.us

Computer Networks & FirewallsUniversity IT Security Office - Agenda Networks Firewalls Software Configuration Questions

Computer Networks & FirewallsUniversity IT Security Office - Software Configuration IP Address and DNS Name –peppsi.geology.indiana.edu – Ports –1568 (recommended) Protocols: –Your machine sends data to IU via UDP –IU requests data from your machine via TCP

Computer Networks & FirewallsUniversity IT Security Office - Software Issues Dynamic IP addressing IP address blocking Port blocking Protocol blocking (TCP and UDP) Address masquerading

Computer Networks & FirewallsUniversity IT Security Office - Questions?