Beruflich Dokumente
Kultur Dokumente
SECURITY
Contents
Page No.
1.
1.2
1.3
2.
Network Security
1.1
What is Network.
Network Security
Why do we need security? ..
1.4 Network Security and Vulnerability
1.5
Network Security Auditing..
1.6
Network Access Control
2.9
Network Attacks ..
2.1
Reconnaissance attacks..
2.2
Spoofing..
2.3
Sniffing. ..
2.4
Mapping. ..
2.5
Hijacking. ..
2.6
Trojans. ..
2.7
DoS and DDoS. ..
2.8
Social engineering. ..
Viruses ..
3.
3.1
3.2
3.3
3.4
3.5
3.6
4.
5.
Basics of cryptography ..
6.
Firewalls
6.1 What is Firewall
6.2 Network Layouts with Firewalls
6.3 Firewall Technologies
6.2.1 Application Gateways
6.2.2 Packet Filtering
6.2.3 Network Access Control
6.2.4 Virtual Private Networking
6.2.5 Hybrid Systems
8.
8.
Router..
8.1
ROUTER
8.2
Routing...
8.3
IP Addressing.
8.4 IP Routing..
8.5
Routing Process.....
8.6
Router Access Modes.
8.6.1 User mode...
8.6.2 Privileged mode..
8.6.3 Global configuration...
8.6.4 Line configuration mode.
8.6.5 Interface configuration mode..
8.6.6 Routing configuration mode
8.7
Configuring Password..
4.7.1 Console Password.
4.7.2 Vty Password
4.7.3 Auxiliary Password..
4.7.4 Enable Password..
4.7.5 Enable Secret Password...
4.7.6 Encryption all passwords.
Managing Configuration..
8.8
9
Types Of Routing...
9.1 Static Routing
9.1.1 Steps to perform static routing
9.1.2 Advantages of static routing
9.1.3 Disadvantages of static routing
9.1.4 Alternate command to specify static route..
9.2
9.3
9.1.5
Default
Dynamic
9.3.1
9.3.2
9.3.3
9.3.4
9.3.5
LAN Switching.
7.1
LAN Switching.
7.2
VLAN (Virtual LAN)...
Conclusion.
Bibliography..
List of Figures
1.1.
PCS CONNECTED VIA HUB.18
1.2
PCS CONNECTED VIA SWITCH..19
1.3
PCS CONNECTED VIA BRIDGE.20
1.4
DIFFERENT N/Ws CONNECTED VIA ROUTER20
1.5
Internal Network Interface Card21
1.6
PCMCIA Network Interface Card.21
1.7
UTP21
1.8
Cross & Straight Cable...22
1.9
RJ 45 Connector.22
1.10
Networking Model.23
2.1
OSI MODEL..24
2.2
Windowing.26
2.3
3 Way hand shaking...27
2.4
Connection Oriented Communication28
3.1
TCP/IP MODEL.30
3.2
TCP Header31
4.1
Routing Process......38
4.2
Router access modes..38
5.1
Static routing..45
5.2
Default routing...46
5.3
Distance vector routing..47
5.4
Flash updates..50
5.5
Split horizon...50
5.6
Configuring RIP.52
5.7
Autonomous system...59
5.8
Router ID60
5.9
Autonomous system...60
5.10
OSPF Hierarchical Model..61
5.11
LSA Flooding in OSPF..62
5.12
OSPF..63
6.1
Flow chart of Inbound ACL..66
6.2
Configuring ACL.......67