Zoom
Trash
Manuel Dantas
Cyber Intelligent Security - Be a CCFAi-Certified Professional Ethical Hacker. Insecure.Org - Nmap Free Security Scanner, Tools & Hacking resources. BackTrack Linux - Penetration Testing Distribution. Penetration Testing Software | Metasploit. Wireshark · Go deep. Home Network Security. This section provides a basic introduction to the technologies that underlie the Internet.
It was written with the novice end-user in mind and is not intended to be a comprehensive survey of all Internet-based technologies. Subsections provide a short overview of each topic. This section is a basic primer on the relevant technologies. For those who desire a deeper understanding of the concepts covered here, we include links to additional information. What does broadband mean? "Broadband" is the general term used to refer to high-speed network connections.
Network Security Resources. Network Security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform their permitted critical functions within a secure environment.
Paid SANS Network Security Resources SEC503: Intrusion Detection In-Depth This is the most advanced program in network intrusion detection where you will learn practical hands-on intrusion detection methods and traffic analysis from top practitioners/authors in the field. All of the course material is either new or just updated to reflect the latest attack patterns. This series is jam-packed with network traces and analysis tips. SEC401: Security Essentials Bootcamp Style SEC502: Perimeter Protection In-Depth AUD507: Auditing Networks, Perimeters, and Systems Free SANS Network Security Resources Additional Resources.
Network security. Network security[1] consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals.
Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. Network security concepts[edit] Security management[edit] Medium businesses[edit] Protocol directory | HDLC, UDP, FTP, HTTP, GSM, SIP, GPRS. Internet protocol suite.
The Internet protocol suite is the computer networking model and set of communications protocols used on the Internet and similar computer networks. It is commonly known as TCP/IP, because its most important protocols, the Transmission Control Protocol (TCP) and the Internet Protocol (IP), were the first networking protocols defined in this standard. Often also called the Internet model, it was originally also known as the DoD model, because the development of the networking model was funded by DARPA, an agency of the United States Department of Defense. TCP/IP provides end-to-end connectivity specifying how data should be packetized, addressed, transmitted, routed and received at the destination. The TCP/IP model and related protocol models are maintained by the Internet Engineering Task Force (IETF). History[edit] Early research[edit] Diagram of the first internetworked connection Specification[edit] Adoption[edit] Key architectural principles[edit] Abstraction layers[edit] Link layer[edit]
Protocols.com: | WAN, LAN, ATM |Ftp, Http, ICMP, UDP | Telecommunications. TCP / IP Protocols: ICMP UDP FTP HTTP Reference Page. The Defense Advance Research Projects Agency (DARPA) originally developed Transmission Control Protocol/Internet Protocol (TCP/IP) to interconnect various defense department computer networks. The Internet, an international Wide Area Network, uses TCP/IP to connect government and educational institutions across the world. TCP/IP is also in widespread use on commercial and private networks. The TCP/IP suite includes the following protocols The TCP/IP suite is illustrated here in relation to the OSI model: Click the protocols on the map to see more details. RFC 1180 - TCP/IP tutorial. [Docs] [txt|pdf] [Errata] INFORMATIONAL Errata Exist Network Working Group T. Socolofsky Request for Comments: 1180 C. Kale Spider Systems Limited January 1991 Status of this Memo This RFC is a tutorial on the TCP/IP protocol suite, focusing particularly on the steps in forwarding an IP datagram from source host to destination host through a router.
It does not specify an Internet standard. 1. This tutorial contains only one view of the salient points of TCP/IP, and therefore it is the "bare bones" of TCP/IP technology. RFC 1180 A TCP/IP Tutorial January 1991 The next section is an overview of TCP/IP, followed by detailed descriptions of individual components. 2. The generic term "TCP/IP" usually means anything and everything related to the specific protocols of TCP and IP. 2.1 Basic Structure RFC 1180 A TCP/IP Tutorial January 1991 data. 2.2 Terminology The name of a unit of data that flows through an internet is dependent upon where it exists in the protocol stack. 2.3 Flow of Data 3. RFC 2460 - Internet Protocol, Version 6 (IPv6) Specification. [Docs] [txt|pdf] [draft-ietf-ipngwg...] [Diff1] [Diff2] [Errata] Updated by: 5095, 5722, 5871, 6437, 6564, 6935, DRAFT STANDARD 6946, 7045, 7112 Errata Exist Network Working Group S.
Deering Request for Comments: 2460 Cisco Obsoletes: 1883 R. Hinden Category: Standards Track Nokia December 1998 Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol.
Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (1998). RFC 2460 IPv6 Specification December 1998 Appendix A. 1. IP version 6 (IPv6) is a new version of the Internet Protocol, designed as the successor to IP version 4 (IPv4) [RFC-791]. 2. 3. RFC 2460 IPv6 Specification December 1998 4. 4.1 Extension Header Order 4.2 Options. RFC 791 - Internet Protocol. [Docs] [txt|pdf] [Errata] Updated by: 1349, 2474, 6864 INTERNET STANDARD Errata Exist RFC: 791 INTERNET PROTOCOL DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION September 1981 prepared for Defense Advanced Research Projects Agency Information Processing Techniques Office 1400 Wilson Boulevard Arlington, Virginia 22209 by Information Sciences Institute University of Southern California 4676 Admiralty Way Marina del Rey, California 90291 September 1981 Internet Protocol TABLE OF CONTENTS PREFACE ........................................................ iii 1.
INTRODUCTION ..................................................... 1 1.1 Motivation .................................................... 1 1.2 Scope ......................................................... 1 1.3 Interfaces .................................................... 1 1.4 Operation ..................................................... 2 2. September 1981 Internet Protocol [Page ii] 1.1. Motivation 1.2. 1.3. 1.4. 2.1. 2.2. 2.3. Firewall (computing) An illustration of where a firewall would be located in a network.
In computing, a firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted.[1] Firewall technology emerged in the late 1980s when the Internet was a fairly new technology in terms of its global use and connectivity. The predecessors to firewalls for network security were the routers used in the late 1980s:[3] The first paper published on firewall technology was in 1988, when engineers from Digital Equipment Corporation (DEC) developed filter systems known as packet filter firewalls.
Packet filters act by inspecting the "packets" which are transferred between computers on the Internet. IOS Security Configuration Guide, Release 12.2 - Configuring Cisco IOS Firewall Intrusion Detection System [Cisco IOS Software Releases 12.2 Mainline. LAN switching. This article addresses packet switching in computer networks. LAN switching is a form of packet switching used in local area networks.
Switching technologies are crucial to network design, as they allow traffic to be sent only where it is needed in most cases, using fast, hardware-based methods. Layer 2 switching[edit] Layer 2 switching uses the media access control address (MAC address) from the host's network interface cards (NICs) to decide where to forward frames. Layer 2 switching is hardware based,[1] which means switches use application-specific integrated circuit (ASICs) to build and maintain filter tables (also known as MAC address tables or CAM tables). One way to think of a layer 2 switch is as a multiport bridge.
Layer 2 switching provides the following Hardware-based bridging (MAC)Wire speedHigh speedLow latency Server farms — Servers are no longer distributed to physical locations because virtual LANs can be created to create broadcast domains in a switched internetwork. Packet switching. Packet switching is a digital networking communications method that groups all transmitted data – regardless of content, type, or structure – into suitably sized blocks, called packets. Overview[edit] An animation demonstrating data packet switching across a network (Click on the image to load the animation) Packet switching features delivery of variable bitrate data streams (sequences of packets) over a computer network which allocates transmission resources as needed using statistical multiplexing or dynamic bandwidth allocation techniques.
When traversing network adapters, switches, routers, and other network nodes, packets are buffered and queued, resulting in variable delay and throughput depending on the network's capacity and the traffic load on the network. History[edit] First proposed for military uses in the early 1960s and implemented on small networks in 1968, packet switching became one of the fundamental networking technologies behind the Internet and most local area networks. Routing. Routing is the process of selecting best paths in a network. In the past, the term routing was also used to mean forwarding network traffic among networks. However this latter function is much better described as simply forwarding. Routing is performed for many kinds of networks, including the telephone network (circuit switching), electronic data networks (such as the Internet), and transportation networks. This article is concerned primarily with routing in electronic data networks using packet switching technology.
In case of overlapping/equal routes, the following elements are considered in order to decide which routes get installed into the routing table (sorted by priority): Delivery semantics[edit] Routing schemes differ in their delivery semantics: Unicast is the dominant form of message delivery on the Internet. Topology distribution[edit] In static routing (or non-dynamic routing), small networks may use manually configured routing tables. Distance vector algorithms[edit] Border Gateway Protocol. BGP may be used for routing within an AS. In this application it is referred to as Interior Border Gateway Protocol, Internal BGP, or iBGP. In contrast, the Internet application of the protocol may be referred to as Exterior Border Gateway Protocol, External BGP, or EBGP. Current version[edit] The current version of BGP is version 4 (BGP4) codified in RFC 4271 since 2006. Early versions of the protocol are widely considered obsolete and are rarely supported.[2] RFC 4271, which went through more than 20 drafts, is based on the earlier RFC 1771 version 4.
The RFC 4271 version corrected a number of errors, clarified ambiguities and brought the RFC much closer to industry practices. Uses[edit] Most Internet service providers must use BGP to establish routing between one another (especially if they are multihomed). Very large private IP networks use BGP internally. Operation[edit] Extensions negotiation[edit] Finite-state machines[edit] BGP router connectivity and learning routes[edit] [edit] RFC 4271 - A Border Gateway Protocol 4 (BGP-4) [Docs] [txt|pdf] [draft-ietf-idr-bgp4] [Diff1] [Diff2] [Errata] Updated by: 6286, 6608, 6793 DRAFT STANDARD Errata Exist Network Working Group Y. Rekhter, Ed. Request for Comments: 4271 T. Li, Ed. Obsoletes: 1771 S. Hares, Ed.
Category: Standards Track January 2006 Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. RFC 4271 BGP-4 January 2006 Table of Contents 1. RFC 4271 BGP-4 January 2006 8.2.1.5. RFC 4271 BGP-4 January 2006 1. The Border Gateway Protocol (BGP) is an inter-Autonomous System routing protocol. 1.1. This section provides definitions for terms that have a specific meaning to the BGP protocol and that are used throughout the text. Dijkstra's algorithm. Graph search algorithm The algorithm exists in many variants. Dijkstra's original algorithm found the shortest path between two given nodes,[6] but a more common variant fixes a single node as the "source" node and finds shortest paths from the source to all other nodes in the graph, producing a shortest-path tree. For a given source node in the graph, the algorithm finds the shortest path between that node and every other.[7]: 196–206 It can also be used for finding the shortest paths from a single node to a single destination node by stopping the algorithm once the shortest path to the destination node has been determined.
For example, if the nodes of the graph represent cities and costs of edge paths represent driving distances between pairs of cities connected by a direct road (for simplicity, ignore red lights, stop signs, toll roads and other obstructions), then Dijkstra's algorithm can be used to find the shortest route between one city and all other cities. (where . History[edit] Open Shortest Path First. RFC 2740 - OSPF for IPv6.
RFC 2328 - OSPF Version 2. OSPF Design Guide. Cisco Systems, Inc. Code analysis and security audit (tools)