PACE-IT, Security+1.4: Common Network Protocols (part 3)

11
Common network protocols III.

Transcript of PACE-IT, Security+1.4: Common Network Protocols (part 3)

Page 1: PACE-IT, Security+1.4: Common Network Protocols (part 3)

Common network protocols III.

Page 2: PACE-IT, Security+1.4: Common Network Protocols (part 3)

Page 2

Instructor, PACE-IT Program – Edmonds Community College

Areas of expertise Industry Certifications PC Hardware Network

Administration IT Project

Management

Network Design User Training IT Troubleshooting

Qualifications Summary

Education M.B.A., IT Management, Western Governor’s University B.S., IT Security, Western Governor’s University

Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.

Brian K. Ferrill, M.B.A.

Page 3: PACE-IT, Security+1.4: Common Network Protocols (part 3)

Page 3

Common network protocols III.PACE-IT.

– Common protocols.

– End-to-end security.

Page 4: PACE-IT, Security+1.4: Common Network Protocols (part 3)

Page 4

Common protocols.Common network protocols III.

Page 5: PACE-IT, Security+1.4: Common Network Protocols (part 3)

Page 5

Common protocols.Common network protocols III.

– FTP (File Transfer Protocol).» A standard protocol for transferring files between

computing systems; requires user authentication but no encryption.

• Assigned to port 20 and to port 21 (TCP).

– SFTP (Secure File Transfer Protocol).

» A protocol for transferring files between computing systems; requires user authentication and encryption by default.

• Assigned to port 22 (TCP and UDP) when using SSH.

• Assigned to port 990 (TCP and UDP) when using TLS/SSL.

– SCP (Secure Copy Protocol).» A protocol for transferring files between computing

systems; requires user authentication and encryption by default.

• Assigned to port 22 (TCP and UDP).

Page 6: PACE-IT, Security+1.4: Common Network Protocols (part 3)

Page 6

Common protocols.Common network protocols III.

– TFTP (Trivial File Transfer Protocol).» Transfers files between servers and clients; no user

authentication required. Commonly used to upload and download network device configuration files.

• Assigned to port 69 (TCP and UDP).

– RDP (Remote Desktop Protocol).» Used in Microsoft networks by Remote Desktop

Connection and Remote Assistance to make remote connections.

• Assigned to port 3389 (TCP and UDP).

Page 7: PACE-IT, Security+1.4: Common Network Protocols (part 3)

Page 7

End-to-end security.Common network protocols III.

Page 8: PACE-IT, Security+1.4: Common Network Protocols (part 3)

Page 8

End-to-end security.Common network protocols III.

– IPsec (Internet Protocol Security).» Works at Layer 3 of the OSI model and above.

• The most common suite of protocols to secure a VPN connection.

» Can be used with the Authentication Header (AH) protocol.

• AH only offers authentication services, no encryption.» Can be used with Encapsulating Security Payload

(ESP).• ESP both authenticates and encrypts packets (the

most popular method).» Both AH and ESP will operate in one of two modes.

• Can be used in transport mode—between two devices (e.g., the host-to-host VPN).

• Can be used in tunnel mode—between two endpoints (e.g., the site-to-site VPN).

» IPSec implements Internet Security Association and Key Management (ISAKMP) by default.

• ISAKMP provides a method for transferring security keys and authentication data between systems, outside of the security key generating process (a much more secure process).

Page 9: PACE-IT, Security+1.4: Common Network Protocols (part 3)

Page 9

What was covered.Common network protocols III.

Common protocols include: FTP (20 and 21), SPTP (22 and 990), SCP (22), TFTP (69), and RDP (3389).

Topic

Common protocols.

Summary

IPsec is a suite of protocols that work at Layer 3 and above of the OSI reference model. It can be used to just authenticate users or it can also be used for authentication and encryption. It will use one of two modes—transport or tunnel. It implements ISAKMP by default for the security key exchange and for authenticating data.

End-to-end security.

Page 10: PACE-IT, Security+1.4: Common Network Protocols (part 3)

Page 10

THANK YOU!

Page 11: PACE-IT, Security+1.4: Common Network Protocols (part 3)

This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53.PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.