Operational Security. Speaking Frankly The Internet is not a very safe place. A sense of false security... Firewalls*
|
|
- Sandra Bryant
- 6 years ago
- Views:
Transcription
1 Operatinal Security Firewalls and Intrusin Detectin CS242 Cmputer Netwrks Speaking Frankly The Internet is nt a very safe place Frm ur netwrk administratr s pint f view, the wrld divides int tw camps: Us - gd; able t access lcal resurces and Them - suspicius; access must be carefully scrutinized and perhaps restricted. Department f Cmputer Science Wellesley Cllege Firewalls 25-2 Firewalls* A sense f false security... In thery, nly authrized traffic, as defined by lcal security plicy, is allwed t pass. Administered Netwrk trusted gd guys Public Internet untrusted bad guys Of curse the firewall itself is a device cnnected t the netwrk. It had better be carefully designed and installed r else we are nly fling urselves. firewall *A firewall islates an rganizatins internal netwrk frm larger Internet, allwing sme packets t pass, blcking thers. Firewalls 25-3 Firewalls
2 Firewalls cme in three flavrs Traditinal (stateless) packet filters Traditinal packet filters exam each datagram in islatin at the pint f entry/exit. The internal netwrk is cnnected t Internet via ruter firewall which filters packet-by-packet. Stateful filters track TCP cnnectins, and use this knwledge t make filtering decisins. Applicatin s are applicatin-specific servers thrugh which all applicatin data must pass. Filtering decisins typically based n: IP surce r inatin ; Prtcl type in IP datagram field; TCP r UDP surce and inatin prt; TCP s (SYN, ACK, etc.); ICMP message type. Firewalls 25-5 Firewalls 25-6 Plicy decisins Plicy N utside Web access. N incming TCP cnnectins, except thse fr institutin s public Web server nly. Prevent Web-radis frm eating up the available bandwidth. Prevent yur netwrk frm being used fr a smurf DS attack. Prevent yur netwrk frm being traceruted Firewall Setting Drp all utging packets t any IP, prt 80 Drp all incming TCP SYN packets t any IP except , prt 80 Drp all incming UDP packets - except DNS and ruter bradcasts. Drp all ICMP packets ging t a bradcast (e.g ). Drp all utging ICMP TTL expired traffic We culd get tricky And base ur plicy n a cmbinatin f es and prt numbers. Fr example, ur ruter culd filter all Telnet datagrams (prt 23) except thse ging t and cming frm a list f specific IP. This allws Telnet cnnectins t and frm hsts n the allwed list. Hwever,... Firewalls 25-7 Firewalls
3 Filtering TCP handshakes Access cntrl list fr ruter interface* Filtering can be based n whether r nt the TCP ACK is set. This lets internal clients cnnect t external servers, but prevents external clients frm cnnecting t internal servers. actin surce allw allw utside f allw allw utside f utside f utside f prtcl surce prt prt TCP > any UDP > UDP 53 > deny all all all all all all Firewalls 25-9 *Table f rules, applied tp t bttm t incming packets: (actin, cnditin) pairs. Firewalls Prblems with stateless filters Stateful packet filters Althugh restrictive, the access cntrl list in the previus table allws packets arriving frm the utside with ACK=1 and surce prt 80, even when n TCP cnnectin has been established. actin allw surce utside f prtcl surce prt prt Such packets culd be used by attackers in attempts t crashed internal systems with malfrmed packets, carry ut denial-f-service attacks, r map the internal netwrk. Stateful filters track all nging TCP cnnectins in a cnnectin table. The firewall bserves the beginning f a new cnnectin (SYN, SYNACK, and ACK); and it can bserve the end f the cnnectin with it sees a FIN packet.* surce addr addr surceprt prt Firewalls *The firewall can (cnservatively) assume that the cnnectin is ver when it hasn t seen any activity fr say 60 secnds. Firewalls
4 Augmented access cntrl list fr stateful filter actin surce allw allw utside f allw allw utside f utside f utside f prt surce prt prt TCP > any check cnxin x UDP > UDP 53 > deny all all all all all all x S far, s gd, but suppse nw that Wellesley wants t prvide Telnet services t a restricted set f internal users, as ppsed t IP es) and suppse Wellesley wants such privileged users t authenticate themselves first befre being allwed t create a Telnet sessin t the utside wrld. *ACL augmented t indicate need t check cnnectin state table befre admitting packet Firewalls *Such tasks are beynd stateful filters. The identity f internal users is an applicatin-layer data and is nt included in the IP/TCP/UDP headers. Firewalls Applicatin T d this, we must... An applicatin is an applicatin-specific server thrugh which all applicatin data must pass. It lks beynd IP/TCP/ UDP headers t make plicy decisins based n applicatin data. We design a firewall that allws nly a restricted set f internal users t Telnet utside and prevents all external clients frm Telneting inside. hst-t- telnet sessin applicatin -t-remte hst telnet sessin ruter and filter 1. Require all Telnet users t Telnet thrugh the applicatin. 2. Fr authrized users, sets up Telnet cnnectin t hst. Gateway relays data between 2 cnnectins 3. Ruter filter blcks all telnet cnnectins nt riginating frm. hst-t- telnet sessin applicatin ruter and filter -t-remte hst telnet sessin Firewalls Firewalls
5 Intrusin detectin systems Multiple IDS sensrs Packet filtering: perates n TCP/IP headers nly; n crrelatin check amng sessins. T detect many attacks, we need a deep packet inspectin, e.g., check character strings in packet against database f knwn virus strings. Additinally we may wish t examine crrelatin amng multiple packets t detect: prt scanning; netwrk mapping; DS attack. Firewalls IDS sensrs Internal netwrk Applicatin Firewall Web DNS server FTP server server demilitarized zne Internet Firewalls Curse grain classificatin Signature-based IDS maintains an database f attack signatures, sniffs every packet, cmparing cntents with tis database.* Anmaly-based IDS creates a traffic prfile in nrmal peratin, then lks fr statistically unusual packet streams.** *Mst cmmn, but cmpletely blind t new attacks. Subject t false psitives. **Can ptentially detect new attacks, but ften difficult t distinguish between nrmal traffic and statistically unusual traffic. Handshake pitfalls
On the road again. The network layer. Data and control planes. Router forwarding tables. The network layer data plane. CS242 Computer Networks
On the rad again The netwrk layer data plane CS242 Cmputer Netwrks The netwrk layer The transprt layer is respnsible fr applicatin t applicatin transprt. The netwrk layer is respnsible fr hst t hst transprt.
More informationChapter 8 roadmap. Network Security
Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing
More informationCCNA Security v2.0 Chapter 9 Exam Answers
CCNA Security v2.0 Chapter 9 Exam Answers 1. Refer t the exhibit. An administratr creates three znes (A, B, and C) in an ASA that filters traffic. Traffic riginating frm Zne A ging t Zne C is denied, and
More informationMoving packets. Moving datagrams. Suppose host A want to send IP to host B. Host A wants to send to host E. Generalized forwarding and SDN
Mving packets Generalized frwarding and SDN Mving datagrams 1. Surce hst fills in its address... 3. Data field is filled with paylad. CS242 Cmputer Netwrks 2.... and addresses destinatin address. Department
More informationTransmission Control Protocol Introduction
Transmissin Cntrl Prtcl Intrductin TCP is ne f the mst imprtant prtcls f Internet Prtcls suite. It is mst widely used prtcl fr data transmissin in cmmunicatin netwrk such as Internet. Features TCP is reliable
More informationCCNA 1 Chapter v5.1 Answers 100%
CCNA 1 Chapter 5 2016 v5.1 Answers 100% 1. What happens t runt frames received by a Cisc Ethernet switch? The frame is drpped. The frame is returned t the riginating netwrk device. The frame is bradcast
More informationLink-layer switches. Jurassic Park* LANs with backbone hubs are good. LANs with backbone hubs are bad. Hubs, bridges, and switches
Link-layer switches Jurassic Park* Hubs, bridges, and switches CS4 Cmputer Netwrks Department f Cmputer Science Wellesley Cllege *A multi-tier hub design. Switches 0- LANs with backbne hubs are gd. Prvide
More informationThe transport layer. Transport-layer services. Transport layer runs on top of network layer. In other words,
The transprt layer An intrductin t prcess t prcess cmmunicatin CS242 Cmputer Netwrks Department f Cmputer Science Wellesley Cllege Transprt-layer services Prvides fr lgical cmmunicatin* between applicatin
More informationPractical Exercises in Computer Networks and Distributed Systems
(V..6, Nv 2) Practical Exercises in Cmputer Netwrks and Distributed Systems Stream Sckets and the Client/Server mdel (C language, W) 2-, Jsé María F Mrán This practical illustrates basic cncepts prtcl
More informationCCNA 1 Chapter v5.1 Answers 100%
CCNA 1 Chapter 9 2016 v5.1 Answers 100% 1. Which tw characteristics are assciated with UDP sessins? (Chse tw.) Destinatin devices receive traffic with minimal delay. Transmitted data segments are tracked.
More informationTroubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools.
Q.1 What is Trubleshting Tls? List their types? Trubleshting f netwrk prblems is find and slve with the help f hardware and sftware is called trubleshting tls. Trubleshting Tls - Hardware Tls They are
More informationCCNA Security v2.0 Chapter 10 Exam Answers
CCNA Security v2.0 Chapter 10 Exam Answers 1. Which statement describes the functin prvided t a netwrk administratrwh uses the Cisc Adaptive Security Device Manager (ASDM) GUI that runs as a Java Web Start
More informationChapter 5. The Network Layer IP
Chapter 5 The Netwrk Layer IP These slides are taken frm the bk Cmputer etwrking, A Tp Dwn Apprach Featuring the Internet by Kurse & Rss and frm the bk Cmputer etwrks by Andrew Tanenbaum. The Netwrk Layer
More informationCCNA 1 Chapter v5.1 Answers 100%
CCNA 1 Chapter 11 2016 v5.1 Answers 100% 1. A newly hired netwrk technician is given the task f rdering new hardware fr a small business with a large grwth frecast. Which primary factr shuld the technician
More informationVMware AirWatch Certificate Authentication for Cisco IPSec VPN
VMware AirWatch Certificate Authenticatin fr Cisc IPSec VPN Fr VMware AirWatch Have dcumentatin feedback? Submit a Dcumentatin Feedback supprt ticket using the Supprt Wizard n supprt.air-watch.cm. This
More informationCCNA Security v2.0 Chapter 3 Exam Answers
CCNA Security v2.0 Chapter 3 Exam Answers 1. Because f implemented security cntrls, a user can nly access a server with FTP. Which AAA cmpnent accmplishes this? accunting accessibility auditing authrizatin
More informationThe Internet protocol
The Internet prtcl Party time! IPv4 datagram frmat IPv4 2 bytes n ptins delue r ecnmy? header + data mre later CS242 Cmputer Netwrks Department f Cmputer Science Wellesley Cllege decremented by each ruter;
More informationCounterSnipe Software Installation Guide Software Version 10.x.x. Initial Set-up- Note: An internet connection is required for installation.
CunterSnipe Sftware Installatin Guide Sftware Versin 10.x.x CunterSnipe sftware installs n any system cmpatible with Ubuntu 14.04 LTS server which is supprted until 2019 Initial Set-up- Nte: An internet
More informationPacket Tracer - Configuring a Zone-Based Policy Firewall (ZPF)
Packet Tracer - Cnfiguring a Zne-Based Plicy Firewall (ZPF) Tplgy Addressing Table R1 R2 R3 Device Interface IP Address Subnet Mask Default Gateway Switch Prt G0/1 192.168.1.1 255.255.255.0 N/A S1 F0/5
More informationCCNA Security v2.0 Chapter 1 Exam Answers
CCNA Security v2.0 Chapter 1 Exam Answers 1. What methd can be used t mitigate ping sweeps? using encrypted r hashed authenticatin prtcls installing antivirus sftware n hsts deplying antisniffer sftware
More informationUsing SPLAY Tree s for state-full packet classification
Curse Prject Using SPLAY Tree s fr state-full packet classificatin 1- What is a Splay Tree? These ntes discuss the splay tree, a frm f self-adjusting search tree in which the amrtized time fr an access,
More informationSafeDispatch SDR Gateway for MOTOROLA TETRA
SafeDispatch SDR Gateway fr MOTOROLA TETRA SafeMbile ffers a wrld f wireless applicatins that help rganizatins better manage their mbile assets, fleet and persnnel. Fr mre infrmatin, see www.safembile.cm.
More informationCCNA Security v2.0 Chapter 2 Exam Answers
CCNA Security v2.0 Chapter 2 Exam Answers 1. An administratr defined a lcal user accunt with a secret passwrd n ruter R1 fr use with SSH. Which three additinal steps are required t cnfigure R1 t accept
More informationWelcome to Remote Access Services (RAS) Virtual Desktop vs Extended Network. General
Welcme t Remte Access Services (RAS) Our gal is t prvide yu with seamless access t the TD netwrk, including the TD intranet site, yur applicatins and files, and ther imprtant wrk resurces -- whether yu
More informationVulnerability Protection A Buffer for Patching
Vulnerability Prtectin A Buffer fr Patching A Lucid Security Technical White Paper February 2004 By Vikram Phatak, Chief Technlgy Officer Santsh Pawar, Vulnerability Analyst Lucid Security Crpratin 124
More informationChapter 6 Delivery and Routing of IP Packets. PDF created with FinePrint pdffactory Pro trial version
Chapter 6 Delivery and Ruting f IP Packets PDF created with FinePrint pdffactry Pr trial versin www.pdffactry.cm Outline Cnnectin Delivery Ruting methds Static and dynamic ruting Ruting table and mdule
More informationIT Essentials (ITE v6.0) Chapter 8 Exam Answers 100% 2016
IT Essentials (ITE v6.0) Chapter 8 Exam Answers 100% 2016 1. A user ntices that the data transfer rate fr the gigabit NIC in the user cmputer is much slwer than expected. What is a pssible cause fr the
More informationModel 86A00-2 Home Theater Extender 2 (HTX2)
Mdel 86A00-2 Hme Theater Extender 2 (HTX2) DESCRIPTION The Mdel 86A00-2 Hme Theater Extender 2 (HTX2) allws yu t extend yur hme cntrl t the audi/vide equipment in yur hme theater. The HTX2 cmmunicates
More informationFIREWALL RULE SET OPTIMIZATION
Authr Name: Mungle Mukupa Supervisr : Mr Barry Irwin Date : 25 th Octber 2010 Security and Netwrks Research Grup Department f Cmputer Science Rhdes University Intrductin Firewalls have been and cntinue
More informationFIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS 1 FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN ooding: attacker
More informationSIEM Use Cases 45 use cases for Security Monitoring
www.paladin.net SIEM Use Cases 45 use cases fr Security Mnitring Paladin - SIEM Use Cases Use Case 02 Descriptin DMZ Jumping This rule will fire when cnnectins seemed t be bridged acrss the netwrk's DMZ.
More informationChapter 4. IP Addresses: Classful Addressing. PDF created with FinePrint pdffactory Pro trial version
Chapter 4 IP Addresses: Classful Addressing Outlines Intrductin Classfuladdressing Other issues A sample Internet 4.1 INTRODUCTION Intrductin IP address, r Internet Address 32-bit binary address Uniquely
More informationCCNA 1 Chapter 1 v5.03 Exam Answers 2016
CCNA 1 Chapter 1 v5.03 Exam Answers 2016 1. A cmpany is cntemplating whether t use a client/server r a peer-t-peer netwrk. What are three characteristics f a peer-t-peer netwrk? (Chse three.) better security
More informationConnect+/SendPro P Series Networking Technical Specification
Shipping & Mailing Pstage Meters Cnnect+/SendPr P Series Netwrking Technical Specificatin Intrductin 2 Netwrk Requirements 2 Prt/Cmmunicatin Requirements 2 URL Infrmatin 3 FAQs 10 Service Cllateral SV62440
More informationNetworks: Communicating and Sharing Resources. Chapter 7: Networks: Communicating and Sharing Resources
Netwrks: Cmmunicating and Sharing Resurces Chapter 7: Netwrks: Cmmunicating and Sharing Resurces 1 Netwrks: Cmmunicating and Sharing Resurces 2 Objectives Understand basic netwrking cncepts. Distinguish
More informationE. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering
IT2042 - Infrmatin Security 1-1 E. G. S. Pillay Engineering Cllege, Nagapattinam Cmputer Science and Engineering Elective II IT 2042 INFORMATION SECURITY VIII Sem CSE QUESTION BANK - UNIT-IV 1) What is
More informationDynamic Storage (ECS)
User Guide Dynamic Strage (ECS) Swisscm (Schweiz) AG 1 / 10 Cntent 1 Abut Dynamic Strage... 3 2 Virtual drive, the EMC CIFS-ECS Tl... 4 3 Amazn S3 Brwer... 6 4 Strage Gateway Appliance... 9 5 Amazn S3
More informationLinking network nodes
Linking netwrk ndes The data link layer CS242 Cmputer Netwrks The link layer The transprt layer prvides cmmunicatin between tw prcesses. The netwrk layer prvides cmmunicatin between tw hsts. The link layer
More informationDNS (Domain Name Service)
mywbut.cm DNS (Dmain Name Service) The internet primarily uses IP addresses fr lcating ndes. Hwever, its humanly nt pssible fr us t keep track f the many imprtant ndes as numbers. Alphabetical names as
More informationChapter 2. The OSI Model and TCP/IP Protocol Suite. PDF created with FinePrint pdffactory Pro trial version
Chapter 2 The OSI Mdel and TCP/IP Prtcl Suite PDF created with FinePrint pdffactry Pr trial versin www.pdffactry.cm Outline THE OSI MODEL LAYERS IN THE OSI MODEL TCP/IP PROTOCOL SUITE ADDRESSING TCP/IP
More informationCommunication across the ether
Cmmunicatin acrss the ether Ethernet CS242 Cmputer Netwrks Department f Cmputer Science Wellesley Cllege Lcal Area Netwrks (LANs) Multiple access prtcls are used fr satellite and wireless channels. They
More information2. When logging is used, which severity level indicates that a device is unusable?
CCNA 4 Chapter 8 v5.0 Exam Answers 2015 (100%) 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput
More informationAdobe Connect 8 Event Organizer Guide
Adbe Cnnect 8 Event Organizer Guide Questins fr Meeting HOST t ask at rganizatin meeting: Date (r dates) f event including time. Presenting t where Lcal ffice cubicles, reginal r glbal ffices, external
More informationTRAINING GUIDE. Lucity Mobile
TRAINING GUIDE The Lucity mbile app gives users the pwer f the Lucity tls while in the field. They can lkup asset infrmatin, review and create wrk rders, create inspectins, and many mre things. This manual
More information1. The first section examines common performance bottlenecks that need to be considered.
OAKS Online Intrductin Oregn s OAKS Online is a cmputer-based adaptive test in which items are selected accrding t each student s ability. OAKS Online has incrprated a number f features and updates based
More informationCCNA 1 Chapter v5.1 Answers 100%
CCNA 1 Chapter 6 2016 v5.1 Answers 100% 1. Which characteristic f the netwrk layer in the OSI mdel allws carrying packets fr multiple types f cmmunicatins amng many hsts? the de-encapsulatin f headers
More informationASM Educational Center (ASM) Est Authorized SCNS Security Certified Network Specialist Boot Camp
ASM Educatinal Center (ASM) Est. 1992 11200 Rckville Pike, Suite 220 Rckville, MD 20852 Phne: 301-984-7400 Fax: 301-984-7401 Web: www.asmed.cm E-mail: inf@asmed.cm Authrized SCNS Security Certified Netwrk
More informationUsers, groups, collections and submissions in DSpace. Contents
Users, grups, cllectins and submissins in DSpace Cntents Key cncepts... 2 User accunts and authenticatin... 2 Authrisatin and privileges... 2 Resurce plicies... 2 User rles and grups... 3 Submissin wrkflws...
More informationKnowledge Exchange (KE) System Cyber Security Plan
Knwledge Exchange (KE) System Cyber Security Plan OVERVIEW This dcument prvides recmmendatins t enhance the security prfile f the Knwledge Exchange (KE) System. Yu are respnsible fr identifying the security
More informationPacket Tracer - Skills Integration Challenge Topology
Packet Tracer - Skills Integratin Challenge Tplgy 2015 Cisc and/r its affiliates. All rights reserved. This dcument is Cisc Public. Page 1 f 6 Packet Tracer - Skills Integratin Challenge Addressing Table
More informationNiceLabel LMS. Installation Guide for Single Server Deployment. Rev-1702 NiceLabel
NiceLabel LMS Installatin Guide fr Single Server Deplyment Rev-1702 NiceLabel 2017. www.nicelabel.cm 1 Cntents 1 Cntents 2 2 Architecture 3 2.1 Server Cmpnents and Rles 3 2.2 Client Cmpnents 3 3 Prerequisites
More informationApply power, the appliance may be powered by connecting:
ACM5508-2- GS- I Quick Start Guide Thank yu fr purchasing the ACM5508-2-GS-I management gateway. This Quick Start walks yu thrugh installatin, cnfiguratin & lcal peratin. Mre details are available in the
More informationNetwork programming 14/01/2013. Introduction. Session objectives. Client/Server working model. Advanced Java Programming Course
Advanced Java Prgramming Curse Netwrk prgramming Sessin bjectives Netwrking intrductin URL Class InetAddress Class By Võ Văn Hải Faculty f Infrmatin Technlgies Industrial University f H Chi Minh City Wrking
More informationHow to set up Dell SonicWALL Aventail SRA Appliance with OPSWAT GEARS Client
Hw t set up Dell SnicWALL Aventail SRA Appliance with OPSWAT GEARS Client Abut This Guide:... 2 End Pint Cntrl... 3 Device Prfile Definitin... 3 1 Abut This Guide: GEARS is a platfrm fr netwrk security
More informationBMC Remedyforce Integration with Remote Support
BMC Remedyfrce Integratin with Remte Supprt 2003-2018 BeyndTrust, Inc. All Rights Reserved. BEYONDTRUST, its lg, and JUMP are trademarks f BeyndTrust, Inc. Other trademarks are the prperty f their respective
More informationEnterprise Installation
Enterprise Installatin Mnnit Crpratin Versin 3.6.0.0 Cntents Prerequisites... 3 Web Server... 3 SQL Server... 3 Installatin... 4 Activatin Key... 4 Dwnlad... 4 Cnfiguratin Wizard... 4 Activatin... 4 Create
More information1. What is a characteristic of Frame Relay that provides more flexibility than a dedicated line?
CCNA 4 Chapter 4 v5.0 Exam Answers 2015 (100%) 1. What is a characteristic f Frame Relay that prvides mre flexibility than a dedicated line? Dedicated physical circuits are installed between each site.
More informationCCNA 3 Chapter 2 v5.0 Exam Answers 2015 (100%)
CCNA 3 Chapter 2 v5.0 Exam Answers 2015 (100%) 1. Which tw netwrk design features require Spanning Tree Prtcl (STP) t ensure crrect netwrk peratin? (Chse tw.) static default rutes implementing VLANs t
More informationRSA SOLUTION OVERVIEW
RSA Advanced Threat Detectin and Respnse with RSA NetWitness Lgs and Packets SPOTTING ADVANCED THREATS WITH BEHAVIOR ANALYTICS AND DATA SCIENCE MODELING Using Behavir Analytics and Data Science t Identify
More informationBMC Remedyforce Integration with Bomgar Remote Support
BMC Remedyfrce Integratin with Bmgar Remte Supprt 2017 Bmgar Crpratin. All rights reserved wrldwide. BOMGAR and the BOMGAR lg are trademarks f Bmgar Crpratin; ther trademarks shwn are the prperty f their
More informationQuestions and Answers
Questins and Answers 1. Actin = Redirect is applied in A. Chain=srcnat B. Chain=dstnat C. Chain=fward 2. Chse all valid hsts address range fr subnet 15.242.55.62/27 A. 15.242.55.31-15.242.55.62 B. 15.242.55.32-15.242.55.63
More informationb) The browser is running HTTP version 1.1, as indicated just before the first <cr><lf> pair.
Prblem a) F b) T c) F d) F e) F Prblem 3 Applicatin layer prtcls: DNS and HTTP Transprt layer prtcls: UDP fr DNS; TCP fr HTTP Prblem 4 a) The dcument request was http://gaia.cs.umass.edu/cs453/index.html.
More informationCCNA 1 v5.1 Practice Final Exam Answers %
CCNA 1 v5.1 Practice Final Exam Answers 2016 100% 1. Which term refers t a netwrk that prvides secure access t the crprate ffices by suppliers, custmers and cllabratrs? Internet intranet extranet extendednet
More informationIT Essentials (ITE v6.0) Chapter 7 Exam Answers 100% 2016
IT Essentials (ITE v6.0) Chapter 7 Exam Answers 100% 2016 1. Hw many devices can a Bluetth device cnnect t simultaneusly? 127 7 10 24 5 2. A device has an IPv6 address f 2001:0DB8:75a3:0214:0607:1234:aa10:ba01
More informationGetting it there in one piece
Getting it there in ne piece Service mdel and implementatin Principles f reliable data transfer CS242 Cmputer Netwrks Department f Cmputer Science Wellesley Cllege Reliable transfer 9-2 Terminlgy Finite
More informationSoftware Defined Networking and OpenFlow. Jeffrey Dalla Tezza and Nate Schloss
Sftware Defined Netwrking and OpenFlw Jeffrey Dalla Tezza and Nate Schlss Agenda What is SDN SDN Tday What is OpenFlw Why OpenFlw What s next fr SDN Our OpenFlw Demnstratin Sftware Defined Netwrking Wikipedia
More informationTN How to configure servers to use Optimise2 (ERO) when using Oracle
TN 1498843- Hw t cnfigure servers t use Optimise2 (ERO) when using Oracle Overview Enhanced Reprting Optimisatin (als knwn as ERO and Optimise2 ) is a feature f Cntrller which is t speed up certain types
More informationApp Orchestration 2.6
App Orchestratin 2.6 Terminlgy in App Orchestratin 2.6 Last Updated: July 8, 2015 Page 1 Terminlgy Cntents Elements f App Orchestratin... 3 Dmains... 3 Multi-Datacenter Deplyments... 4 Delivery Sites...
More informationCAMPBELL COUNTY GILLETTE, WYOMING
CAMPBELL COUNTY GILLETTE, WYOMING System Supprt Analyst I System Supprt Analyst II Senir System Supprt Analyst Class specificatins are intended t present a descriptive list f the range f duties perfrmed
More informationRecommended Minimum Requirements for Cisco Meeting Application Web RTC Use
Recmmended Minimum Requirements fr Cisc Meeting Applicatin Web RTC Use Fr the best experience the fllwing requirements and recmmendatins shuld be fllwed. Requirements: External USB web camera capable f
More informationTRAINING GUIDE. Overview of Lucity Spatial
TRAINING GUIDE Overview f Lucity Spatial Overview f Lucity Spatial In this sessin, we ll cver the key cmpnents f Lucity Spatial. Table f Cntents Lucity Spatial... 2 Requirements... 2 Setup... 3 Assign
More informationAvaya 9610 IP Telephone End User Guide
Avaya 9610 IP Telephne End User Guide 9610 IP Telephne End User Guide 1 P age Table f Cntents Abut Yur Telephne... 3 Abut Scrlling and Navigatin... 3 Selecting Names, Numbers, r Features... 3 Starting
More informationImage publishing on the web. Frank Gasking
Image publishing n the web Frank Gasking Intrductin Many methds f publishing images Cmmn methds include: Uplading t a web server Using tls built int web applicatin tls (Wrdpress) Using nline image repsitries
More informationKNX integration for Project Designer
KNX integratin fr Prject Designer Intrductin With this KNX integratin t Prject Designer it is pssible t cntrl KNX devices like n/ff, dimming, blinds, scene cntrl etc. This implementatin is intended fr
More informationThe VMs in the CIS VLab (Virtual Lab) We will be using a number of different Virtual Machines (VMs) in VLab for this course.
Lab 1: Using the CIS 192 Lab Resurces The purpse f this lab is t becme familiar with the CIS Lab resurces and t start practicing sme ld and new Linux cmmands. Resurces The Opus server CIS VLab (Virtual
More information2. Which command can be used to view the cable type that is attached to a serial interface?
CCNA 4 Chapter 3 v5.0 Exam Answers 2015 (100%) 1. At which layer f the OSI mdel des multiplexing take place? Layer 1 Layer 2 Layer 3 Layer 4 2. Which cmmand can be used t view the cable type that is attached
More informationSecure Mobile Access to the Local ICS Network. Jan Vossaert Veilige industriële netwerken 29/09/2016
Secure Mbile Access t the Lcal ICS Netwrk Jan Vssaert Veilige industriële netwerken 29/09/2016 Intrductin ffice netwrk prductin cell ruter 192.168.2.0/24 Internet ICS DMZ servers 192.168.1.0/24 prductin
More informationAn Introduction to Crescendo s Maestro Application Delivery Platform
An Intrductin t Crescend s Maestr Applicatin Delivery Platfrm Intrductin This dcument is intended t serve as a shrt intrductin t Crescend s Maestr Platfrm and its cre features/benefits. The dcument will
More informationRelease Notes System Software
Release Ntes System Sftware 10.2.5 Cntent Cntent... 1 1 Release 10.2.5.100... 2 1.1 New functins... 2 1.2 Changes... 3 1.3 Errr crrectins... 3 1.4 Knwn Restrictins... 5 Release Ntes 10.2.5 V. 1.0 20181220
More informationInfinity Connect Web App via Chrome Quick Guide
Infinity Cnnect Web App via Chrme Quick Guide Making a call We recmmend using a headset when using the Infinity Cnnect Web App. T make a call t a Virtual Meeting Rm r Virtual Auditrium, r t call anther
More informationInstructions for Accessing Online Testing Resources
Instructins fr Accessing Online Testing Resurces 2018-2019 Hw t get help fr Testing Applicatin Functinality / System Errrs (nt lgin issues): IMPORTANT: The rle f the District s IT staff and Help Desk in
More informationFirewalls. Firewall. means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense
FIREWALLS 3 Firewalls Firewall means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense administered network public Internet firewall
More information2. What is the most cost-effective method of solving interface congestion that is caused by a high level of traffic between two switches?
CCNA 3 Chapter 3 v5.0 Exam Answers 2015 (100%) 1. Refer t the exhibit. Which switching technlgy wuld allw each access layer switch link t be aggregated t prvide mre bandwidth between each Layer 2 switch
More informationLIN101 RS232 / LAN INTERFACE
LIN101 24/02/2004 English 1 1. LIN101 LIN101 is a Serial Device Server, the main functin f the LIN101 is t netwrk-enable existing serial devices. Using the LIN101 yu can add an Ethernet prt practically
More informationIowa State University
Iwa State University Cyber Security Smart Grid Testbed Senir Design, Design Dcument Dec 13-11 Derek Reiser Cle Hven Jared Pixley Rick Suttn Faculty Advisr: Prfessr Manimaran Gvindarasu Table f Cntents
More informationPlease contact technical support if you have questions about the directory that your organization uses for user management.
Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP
More informationTelkom VPN-Lite router setup User Manual Billion 810VGTX
Telkm VPN-Lite ruter setup User Manual Billin 810VGTX Cntents Intrductin... 3 Befre yu start... 4 VPN-Lite Setup Using Windws Utility... 5 VPN-Lite Setup using yur web brwser... 7 VPN-Lite Manual Setup
More informationSeaLinx Guide. Table of Contents
SeaLinx Guide Table f Cntents SeaLinx Overview... 2 Cre Cmpnent... 2 Physical Layer... 2 Mac Layer... 3 Netwrk Layer... 4 Transprt Layer... 5 Applicatin Layer... 6 Quick Start Guide... 6 Sftware Installatin
More informationImagine for MSDNAA Student SetUp Instructions
Imagine fr MSDNAA Student SetUp Instructins --2016-- September 2016 Genesee Cmmunity Cllege 2004. Micrsft and MSDN Academic Alliance are registered trademarks f Micrsft Crpratin. All rights reserved. ELMS
More informationComprehensive LAN Security for the Banking Financial Services and Insurance Industries
Cmprehensive LAN Security fr the Banking Financial Services and Insurance Industries Nevis Netwrks Persistent LAN Security Slutins Nevis Netwrks LAN Security fr BFSI 1 Overview f the Banking Financial
More informationSUB-USER ADMINISTRATION HELP GUIDE
P a g e 1 SUB-USER ADMINISTRATION HELP GUIDE Welcme t Prsperity Bank. Any previusly created Sub-User lgin frm the F&M system befre Friday, May 16 cnverted t the Prsperity system. Once lgged n t the Prsperity
More informationNetwork Layer. Internet Control Message Protocol (ICMP)
Handut 5 CAN1102 Netwrk Layer Internet Cntrl Message Prtcl (ICMP) Netwrks Netwrk Layer Services Ruting principles: path selectin Hierarchal ruting IP Internet Ruting Prtcls: Reliable Transfer a. Intra
More informationSASAC v1.0 Implementing Core Cisco ASA Security Cisco Training
SASAC v1.0 Implementing Cre Cisc ASA Security Cisc Training Curse Length: 5 Curse Delivery: Traditinal Classrm Online Live Curse Overview Cisc ASA Cre v1.0 is a new 5-day ILT class that cvers the Cisc
More informationCCNA 3 Chapter 8 v5.0 Exam Answers 2015 (100%) CCNA 5 Page 1
CCNA 3 Chapter 8 v5.0 Exam Answers 2015 (100%) 1. Refer t the exhibit. All netwrks are active in the same EIGRP ruting dmain. When the aut-summary cmmand is issued n R3, which tw summary netwrks will be
More informationThese tasks can now be performed by a special program called FTP clients.
FTP Cmmander FAQ: Intrductin FTP (File Transfer Prtcl) was first used in Unix systems a lng time ag t cpy and mve shared files. With the develpment f the Internet, FTP became widely used t uplad and dwnlad
More informationTelecommunication Protocols Laboratory Course
Telecmmunicatin Prtcls Labratry Curse Lecture 2 March 11, 2004 http://www.ab.fi/~lpetre/teleprt/teleprt.html 1 Last time We examined sme key terms: prtcl, service, layer, netwrk architecture We examined
More informationSecure File Transfer Protocol (SFTP) Interface for Data Intake User Guide
Secure File Transfer Prtcl (SFTP) Interface fr Data Intake User Guide Cntents Descriptin... 2 Steps fr firms new t batch submissin... 2 Acquiring necessary FINRA accunts... 2 SFTP Access t FINRA... 2 SFTP
More informationHP OpenView Performance Insight Report Pack for Quality Assurance
Data sheet HP OpenView Perfrmance Insight Reprt Pack fr Quality Assurance Meet service level cmmitments Meeting clients service level expectatins is a cmplex challenge fr IT rganizatins everywhere ging
More informationREST; WebSocket (RFC 6455)
REST; WebScket (RFC 6455) Web Oriented Technlgies and Systems Prf. Michele Ruta Master s Degree Curse in Cmputer Engineering - (A.Y. 2016/2017) REST REST = Representatinal State Transfer. Anther architectural
More informationCCNA course contents:
CCNA curse cntents: Prerequisites: The knwledge and skills that yu must have befre attending this curse are as fllws: Basic cmputer literacy Windws navigatin skills Basic Internet usage skills Fundamental
More information