ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Introduction to IPv4 Introduction to Networks.
Addressing the Network IPv4
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 25 Introduction to Computer Networks.
Network Layer IPv6 Slides were original prepared by Dr. Tatsuya Suda.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
思科网络技术学院理事会. 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Ch. 1 – Scaling IP Addresses NAT/PAT and DHCP CCNA 4 version 3.0.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
The Network Layer Chapter 5. The IP Protocol The IPv4 (Internet Protocol) header.
Chapter 5 The Network Layer.
Ch. 1 – Scaling IP Addresses NAT/PAT and DHCP CMPSC-358 (CCNA 4 ) Spring 2007.
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
Subnetting.
Chapter 2 Internet Protocol DoD Model Four layers: – Process/Application layer – Host-to-Host layer – Internet layer – Network Access layer.
Chapter 19 Binding Protocol Addresses (ARP) Chapter 20 IP Datagrams and Datagram Forwarding.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing.
IP-adresses and subnet masks. Figure 19.9 Dotted-decimal notation.
1 26-Aug-15 Addressing the network using IPv4 Lecture # 2 Engr. Orland G. Basas Prepared by: Engr. Orland G. Basas IT Lecturer.
1 26-Aug-15 S Ward Abingdon and Witney College CCNA Exploration Semester 1 Addressing the network IPv4 CCNA Exploration Semester 1 Chapter 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
DHCP: Dynamic Host Configuration Protocol
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
Jan 29, 2008CS573: Network Protocols and Standards1 NAT, DHCP Autonomous System Network Protocols and Standards Winter
G64INC Introduction to Network Communications Ho Sooi Hock Internet Protocol.
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Cisco – Chapter 11 Routers All You Ever Wanted To Know But Were Afraid to Ask.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
Understanding Networking Joe Cicero Northeast Wisconsin Technical College.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 4: Addressing in an Enterprise Network Introducing Routing and Switching in the.
TCOM 515 IP Routing. Syllabus Objectives IP header IP addresses, classes and subnetting Routing tables Routing decisions Directly connected routes Static.
Addressing IP v4 W.Lilakiatsakun. Anatomy of IPv4 (1) Dotted Decimal Address Network Address Host Address.
The seven layers of the OSI Model are: Basics of Networking.
1 Objectives Identify the basic components of a network Describe the features of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6)
ITP 457 Network Security Networking Technologies II UDP, IP, and NAT.
Page 1 Network Addressing CS.457 Network Design And Management.
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Internet Protocols (chapter 18) CSE 3213 Fall 2011.
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
Linux Operations and Administration Chapter Eight Network Communications.
1 12-Jan-16 OSI network layer CCNA Exploration Semester 1 Chapter 5.
NETWORKING (2) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
1 Objectives Identify the basic components of a network Describe the features of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6)
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
Lecture 21: Network Primer 7/9/2003 CSCE 590 Summer 2003.
TCP/IP Protocol Suite and IP Addressing Presented By : Dupien AMS.
1 COMP 431 Internet Services & Protocols The IP Internet Protocol Jasleen Kaur April 21, 2016.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
Network Layer IP Address.
1 K. Salah Module 5.1: Internet Protocol TCP/IP Suite IP Addressing ARP RARP DHCP.
IP - Internet Protocol No. 1  Seattle Pacific University IP: The Internet Protocol Kevin Bolding Electrical Engineering Seattle Pacific University.
CSE 421 Computer Networks. Network Layer 4-2 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside.
Lecture 13 IP V4 & IP V6. Figure Protocols at network layer.
Network Layer/IP Protocols 1. Outline IP Datagram (IPv4) NAT Connection less and connection oriented service 2.
1 28-Sep-16 S Ward Abingdon and Witney College CCNA Exploration Semester 1 OSI network layer CCNA Exploration Semester 1 Chapter 5.
IP: Addressing, ARP, Routing
Binary Lesson 4 Classful IP Addresses
Lecture#5 IPV6 Addressing
Internet Protocol INTERNET PROTOCOL.
Computer Networks Protocols
Presentation transcript:

ITP 457 Network Security Networking Technologies III IP, Subnets & NAT

Internet Protocol( IP) IP handles end-to-end delivery Most commonly used network layer protocol All traffic on the internet uses IP

Internet Protocol ( IP) Upon receiving packet from Transport layer, IP layer generates a header Header includes : source and destination IP addresses Header is added to front of TCP packet to create a resulting IP packet. Purpose of IP is to carry packets end to end across a network.

IP header Source IP address Destination IP address Data

IP addresses Identify each individual machine on the internet 32 bits in length Hackers attempt to determine all IP address in use on a target network – “network mapping” Hackers generate bogus packets appearing to come from a given IP address – “IP address spoofing”

IP Addresses in depth 32 bits, with 8 bit groupings E.x: Each number between the dots can be between 0 and billion combinations Not really Allocated in groups called address blocks  3 sizes, based on the class of the address  Class A, Class B, and Class C

Class A Addresses Giant organizations There are no more available All IP addresses are of the form: 0 – 126.x.x.x x can be between 0 and 255 The first octet is assigned to the owner, with the rest being freely distributable to the nodes Has a 24 bit address space Uses up to half of the total IP addresses available!!! Who owns these??? Internet Service Providers Large internet companies Google, CNN, WB

Class B Addresses Large Campuses or Organizations Example: Colleges, including USC These are running out!!! All Class B Addresses are of the form: x.x.x Where x can take any number between 0 and 255 The first two octets are assigned to the address block owner, with the last two being freely distributable Example: x.x  USC Example: x.x  UCLA 16-bit address space ¼ of all IP addresses belong to Class B Addresses

Class C Addresses Small to mid-sized businesses A fair number left All Class C Addresses have the following format: x.x.x The first three octets are assigned, with the last being freely distributable Only 253 distributable addresses within a Class C Address

Reserved Addresses Private Networks (no public connections) 10.x.x.x x.x x.x 127.x.x.x – local network (loopback) – broadcast – sends to everyone on the network

Netmasks IP address has 2 components Network address Host address Determined by the address and the class of the address Example (Class C): IP Address: Network address: Host address: 16

Packet Fragmentation Various transmission media have different characteristics Some require short packets others require longer packets E.g. satellite – longer packets Local LAN – shorter packets

Packet Fragmentation To optimize packet lengths for various communication links, IP offers network elements (routers and firewalls) the ability to slice up packets into smaller pieces, a process called fragmentation. The end system’s IP layer is responsible for reassembling all fragments Hackers use packet fragmentation to avoid being detected by Intrusion Detection Systems

Lack of Security in IP IP version 4 does not include any security All components of packets are in clear text, nothing is encrypted Anything in the header or data segment can be viewed or modified by the hacker TCP/UDP Hijacking “Man-in-the-middle” attack

ICMP ICMP – Internet Control Message Protocol It is the Network Plumber Its job is to transmit command and control information between networks and systems

ICMP examples “ping” request = ICMP Echo message If the “pinged” system is alive it will respond with ICMP Echo Reply Message Try pinging Will they all work? Some sites have disabled ping. Why? Ping-of-death  a ping too big Ping flooding  type of denial-of-service attack

Routers and packets Routers Transfer packets from network to network They determine the path that a packet should take across the network specifying from hop to hop which network segments the packets should bounce through as they travel across the network Most networks use dynamic routing RIP, EIGRP We will be discussing these technologies later in the course

Network address translation NAT Blocks of addresses are allotted to ISP’s and organizations Classes of IP Addresses What happens when we have more computers than IP Addresses? We have a Class C address – allows 253 computers Our organization has 1000 computers What do we do???

Solution? Reserve a range of IP addresses to build your own IP network 10.x.y.z - un-routable IP addresses y.z y.z How to connect these machines to Internet?

Network Address Translation Use a gateway /router to map invalid addresses to valid IP addresses Translates your local address to a routable address Router receives one IP Address Either dynamically assigns addresses to all the nodes behind the router, or it is assigned statically using non- routable addresses  If dynamic, uses DHCP (Dynamic Host Configuration Protocol) When someone inside the network wants to access a computer outside the local network (the internet), the request is sent to the router, which uses NAT to send the request to the internet

NAT and security? Does NAT improve security? It hides internal IP addresses from hacker NAT must be combined with “firewalls” for optimum security

Firewalls

Network traffic cops Tools that control the flow of traffic going between networks By looking at addresses associated with traffic, firewalls determine whether connections should be transmitted or dropped We will cover the setup and configuration of firewalls in great depth later in class