0% found this document useful (0 votes)
3 views1 page

Network Security

The document outlines various wireless communication technologies and security protocols, including spread spectrum techniques like FHSS and DSSS, as well as authentication methods such as OSA and SKA. It discusses best practices for network security, including the use of WPA, VPNs, and MAC address filtering, along with a list of protocols and their respective layers in the OSI model. Additionally, it covers WAN technologies, ISDN configurations, and the importance of network devices like routers and switches.

Uploaded by

ICEEEE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views1 page

Network Security

The document outlines various wireless communication technologies and security protocols, including spread spectrum techniques like FHSS and DSSS, as well as authentication methods such as OSA and SKA. It discusses best practices for network security, including the use of WPA, VPNs, and MAC address filtering, along with a list of protocols and their respective layers in the OSI model. Additionally, it covers WAN technologies, ISDN configurations, and the importance of network devices like routers and switches.

Uploaded by

ICEEEE
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Spread spectrum - distributed across frequency range

Frequency Hopping Spread Spectrum - FHSS - portion


Direct Sequence Spread Spectrum - DSSS - all
Need an Access Point - AP
Hosts in group must use Service Set ID - SSID
Open System Authentication - OSA - in clear
Shared Key Authentication - SKA = WEP
Wired Equivalent Privacy - WEP - weak Authentication Australia Post Sucks It Never Delivers Parcels

Wi-Fi Protected Access - WPA, WPA2 - uses TKIP Application - FTP, TFTP, SNMP, SMTP, Telnet, HTTP

Enable 802.11i e.g. WPA Presentation - ASCII, EBCDIC, TIFF, JPEG, MPEG, MIDI
Wireless
Change default SSID Session - NFS, NetBIOS, SQL, RPC
Disable broadcast SSID OSI Model Transport - TCP, UDP, SSL/TLS, SPX
Add RADIUS or Kerberos Network - IP, ICMP, IGMP, RIP, OSPF, IPX
Put AP at centre of building and in DMZ Best Practice
Data Link - ARP, RARP, PPP, SLIP
Implement VPN for wireless devices
Physical - HSSI, X.21, EIA/TIA-232, EIA/TIA-449
Configure AP to allow only known MAC addresses
Disable DHCP List of Protocols

WAP
i-Mode - Japan, Asia, Europe
Mobile Phones
Bluetooth - 802.15
Australian Trains Never Late
TCP - Stream
Application UDP - Message

Channel Service Unit/Data Service Unit - CSU/DSU TCP/IP TCP - Segment


Transport UDP - Packet
BRI ISDN = 2 x B + 1 x D
PRI ISDN = 23 x B + 1 B ISDN Network - TCP and UDP Datagram
Circuit
Broadband ISDN Data Link - TCP and UDP Frame
PSTN
Switching
X.25
Packet
Frame Relay
Well-known ports 0 - 1023
Cell - ATM
Switched Multimegabit Data Service - SMDS TCP: Sequence and Acknowledgement numbers

Synchronous Data Link Control - SDLC UDP: Source, Destination, Length, Checksum, Data

High-level Data Link Control - HDLC Packets 23 - Telnet


WAN
Technologies Telecommunications and Ports 25 - SMTP
High-Speed Serial Interface - HSSI
and 80 - HTTP
SS7, VoIP, Session Initiation Protocol - SIP
Network Security 161, 162 - SNMP
IPSec Mike Smith
PPP 26/04/10 - Rev.33 20, 21 - FTP
Tunneling
PPTP Protocols
L2TP

Password Authentication Protocol -


PAP - least secure IPv4 - 32 bits, IPv6 - 128 bits
Challenge Handshake Authentication Class A: 0.0.0.0 - 127.255.255.255
Protocol - CHAP Authentication
Class B: 128.0.0.0 - 191.255.255.255
Extensible Authentication Protocol - EAP Protocols
RADIUS, Diameter, TACACS IP Addressing Class C: 192.0.0.0 - 223.255.255.255
Class D - Multicast: 224.0.0.0 - 239.255.255.255
Class E - Reserved: 240.0.0.0 - 255.255.255.255
Subnetting
Works at Physical Layer
Amplify signal
Clean up signal
Repeaters
Hub = multiport repeater
Ring, Bus, Star, Mesh Topology
Hub also known as a concentrator
Ethernet - 10Base2, 10Base5, 10Base-T
Works at Data Link Layer
LAN Networking Fast Ethernet
Connect LAN segments
Token Ring
Filters based on MAC address
Bridges FDDI
Retains same broadcast domain
Isolates collision domains
Can translate between protocols

Works at Network Layer Network Fractional = 1/24th x T1, 1 voice channel, 0.06Mbps
Can connect different networks Devices
T1 = 24 voice channels, 1.544Mbps
Uses routing protocols: RIP, BGP, OSPF Routers
Can filter based on IP address and protocols
T- Carriers T2 = 4 x T1, 96 voice channels, 6.312Mbps
T3 = 28 x T1, 672 voice channels, 44,736Mbps
Combine functionality of a repeater and bridge
T4 = 168 x T1, 4032 voice channels, 274,760Mbps
Can work at layer 3 and 4, can use tags = MPLS
Switches
Used to provide QoS
Other: VLANs, Gateways, PBXs
Packet Filtering & Dynamic Packet Filtering
Stateful
Proxy & Kernel Proxy
Firewalls
Dual-Homed
Screened Host & Screened Subnet

You might also like