See also Lightweight directory access protocol LDAP Distance vector routing protocol, 343 Distributed DoS DDoS attack, 429 DIX.. See Enhanced interior gateway routing protocol Elect
Trang 1Authentication POP (APOP), 436
Authentication server, 197
Automatic private IP addressing
(APIPA), 323
B
Bandwidth, 50–52, 89
Baseband, 242, 583
Basic rate interface (BRI), 111
WAN, 362
Bastion host, 407
Bayonet-Neill-Concelman (BNC),
48
BBSs See Bulletin board systems
Bearer code (BC) identifier, 114
BGP See Border gateway protocol
Big Brother, 418
Biometrics, 441
Bitwise ANDing, 308–310
Bluetooth, 182, 190–191
BNC See Bayonet-Neill-Concelman
Boolean operators, 308
BOOTP See Bootstrap protocol
Bootstrap protocol (BOOTP), 326,
329
Border gateway protocol (BGP),
342
BRI See Basic rate interface
Bridges, 104–105, 143
Broadband, 242, 583
Broadcast messages, 152
Broadcast traffic, 333
Buffer-overflow attacks, 444
Bulletin board systems (BBSs), 12
Bus topology, 25–26
benefit of, 26
disadvantage of, 26
C
Cable modem termination system
(CMTS), 109
Cable modems, 107, 109, 370–371
Cable testers
for Ethernet cable, 560
and troubleshooting, 58–62,
89–90, 559
Cable ties, 67
Cables, 33, 63, 87, 90
coaxial, 47, 78, 83
and connectors, 46, 89
copper, 63–64
fiber-optic, 48, 64, 84–85
fundamentals of, 46–48
installation, 66–67 interference, 49–50 issues in length of, 588 length problems, 52–54, 588 management and termination, 67–69
physical layer problem with, 587
physical media, 47 preparing, 64–66 problems with, 587–588 purpose of, 46
repair of, 57–58 security, 54–55 troubleshooting, 56–57 twisted-pair, 47 categories, 82 color codes, 65 Caching engines, 504 Campus area network, 35 Carrier protocol, 21 Carrier sense multiple access/
collision avoidance (CSMA/CA), 184–185, 245 Carrier sense multiple access/
collision detection (CSMA/
CD), 70, 184–185, 245, 648 Centralized access control, 17 Centralized network model, 15–16 Certificate authority (CA), 457 Challenge handshake authentication protocol (CHAP), 454–455 Channel service unit/data service unit (CSU/DSU), 116–117
CHAP See Challenge handshake
authentication protocol
CIA See Confidentiality, integrity,
and availability
CIDR See Classless interdomain
routing
CIFS See Server message block
Circuit level firewalls, 129, 393 Circuit switching, 600
WAN operating with, 358–359, 363
Cisco systems, 391 Classless interdomain routing (CIDR), 320–321 Cleartext authentication, 436 Client/server network model, 18–20
Coax networks, 73
Coaxial cable, 47, 78, 83 connectors, 76 Combo cards, 108, 263 Common Internet file system (CIFS)
See Server message block
Communications Assistance for Law Enforcement Act (CALEA), 491
Computers ENIAC I, 7 history on, 6–8 MARK I, 7 Confidentiality, integrity, and availability (CIA), 431, 432 Configuration management (CM), 478–493, 506–507
Configuration parameters, 328 Connection-oriented services, 605
Connectors, 45, 75, 91 BNC, 78
cabling and, 46
D connectors, 76 DIX, 77
fiber, 79–81 fundamentals of, 48–49 local connectors (LC), 80
RG and F-type, 79
RJ connectors, 76–77, 485 standard connector (SC), 48, 79
twisted-pair and coaxial cable, 76–79
Consultative Committee for International Telephony and Telegraph (CCITT), 111 Content filtering, 404 Content switches, 156–157, 163 Convergence, 99, 107
of security, 125 Copper cabling, 63–64 preparing, 64–66 Credit card adapters, 108 Crossover cable, 59–62 Crosstalk, 50, 89
CSMA/CA See Carrier sense
multiple access/collision avoidance
CSMA/CD See Carrier sense
multiple access/collision detection
Custom subnet mask See
Variable-length subnet masks
Trang 2D-channel signaling protocol, 362
D connectors, 76
Data link layer, 183
MAC addressing of, 593
OSI model, 242–243
troubleshooting, 591–598, 623
contention methods for, 592
polling methods for, 592
recognizing devices of,
594–595
token passing methods for,
592
Data terminal equipment (DTE)
devices, 367
Data transmission rates, 368
Datagram, 604
Decimal to binary numbers,
converting, 295–299
Deep packet inspection firewall See
Stateful inspection firewall
Default gateway, 137
Default subnet mask, 310–311
Defense Advanced Research Projects
Agency (DARPA) model See
Department of defense (DoD)
model
Demarc, 69
Demilitarized zone (DMZ),
129–131, 406
bastion host, 407
design, 406–413
DNS services, 408–409
e-commerce, 409, 410
data storage zone, 410, 411
financial processing network,
411
e-mail relaying, 408
FTP services, 408
IDS in, 409
Internet Web site access, 408
layered implementation, 406
multiple interface firewall
implementation, 406, 407
Denial of service (DoS) attacks, 207,
210–211, 396, 429
protecting, 212
Department of defense (DoD)
model, 257–265, 277–278
advantages of, 576–577
application layer of, 264–265
host-to-host transport layer, 264
Internet layer, 263–264
mapping OSI model with, 259 network interface layer of hardware/software, 262–263 MAC, 262
DHCP See Dynamic host
configura-tion protocol; Dynamic host control protocol
Dial-up modem speeds, 371–372 dig command, 555–556
syntax of, 555 Digital-Intel-Xerox (DIX), 72, 648 Digital signal zeros (DS0s), 361 Digital signaling
effects of attenuation on, 243
vs analog signaling, 240–242
Digital subscriber line (DSL), 362, 368–369
asymmetric, 369 benefit of, 368 drawback of, 368 modems, 107 symmetric, 369 Direct sequence spread spectrum (DSSS), 182–183
Directory access protocol (DAP), 448
Directory number (DN), 114, 115
Directory services, 447, 448 See
also Lightweight directory
access protocol (LDAP) Distance vector routing protocol, 343
Distributed DoS (DDoS) attack, 429
DIX See Digital-Intel-Xerox DMZ See Demilitarized zone DNS See Domain name system DoD model See Department of
defense model Domain name kiting, 429–430 Domain name system (DNS), 12, 273–274
application layer, 617 servers, 139, 203, 328, 408–409, 483
cache poisoning, 430–431 split-horizon, 409 Domain name tasting, 430
DoS attacks See Denial of service
attacks Dotted decimal notation, 294
DSL See Digital subscriber line DS0s See Digital signal zeros
DSSS See Direct sequence spread
spectrum
DTE devices See Data terminal
equipment devices Dual-homed firewall, 127 Dynamic host configuration protocol (DHCP), 139–140, 269–270, 483
application layer, 617 client service, 270 server service, 270 Dynamic host control protocol (DHCP), 201, 326 message types, 327–328 operations, 326–329 relay agents, 328–329 server, 324, 327–329 Dynamic routing protocols, 123–125, 599
E
E-commerce, DMZ, 409–411 E-mail gateway, 612
EAP See Extensible authentication
protocol
EAPoL See Extensible authentication
protocol over LAN
EAPoW See Extensible authentication
protocol over wireless Eavesdropping, 204 protecting, 206 eDirectory, 448
EGPs See Exterior gateway routing
protocols
EIGRP See Enhanced interior
gateway routing protocol Electrical numerical integrator and calculator (ENIAC I) computer, 7
Electromagnetic interference (EMI),
47, 89 Electronic-binary computer, 7 Electronic Industries Associate/
Telecommunications Industry Alliance (EIA/TIA), 484 Encapsulating protocol, 21 Enhanced interior gateway routing protocol (EIGRP), 342
ENIAC I computer See Electrical
numerical integrator and calculator computer Enterprise service provider (ESP), 135
Trang 3Eth0 interface, 554
configuration information for, 555
Ethernet, 11, 70, 263
802.3 networks, 184, 185
adapter, configuring, 555
cable, testers for, 560
crossover cable as troubleshooting
tool, 558–559
gigabit, 71
Event Viewer, logs in, 494
Extended industry standard
architecture (EISA), 118
Extensible authentication protocol
(EAP), 198, 199, 462
per-packet authentication, 462
vulnerabilities, 463–464
Extensible authentication protocol
over LAN (EAPoL), 197, 198,
460
Extensible authentication protocol
over wireless (EAPoW), 198,
460
Exterior gateway routing protocols
(EGPs), 342
F
F-type connectors, 79
Fast Ethernet, 70
Fault tolerance, 504
FDDI See Fiber distributed data
interface
Federal Communications
Commis-sion (FCC), 491, 640
FHSS See Frequency hopping
spread spectrum
Fiber cabling, 64
Fiber connectors, 79–81
Fiber distributed data interface
(FDDI), 364–365
frame relay, 365–366
MPLS, 366
SONET, 367–368
X.25 network, 366–367
Fiber-optic cable, 48
File system drivers, 256–257
File transfer protocol (FTP), 156,
272–273
active mode, 396
application layer, 615
configuring and implementing,
273
passive mode, 396
RFC 1579 firewall-friendly, 273
Finite-state machine, 390
Firewalls, 126, 144, 392–394 application layer gateway, 393, 399–400
application level, 128–129 architecture, 126
circuit level, 129, 393 dual-homed firewall, 127 features, 129
packet-filtering See
filtering firewall packet level, 128 proxy server, 394 screened host firewall, 127 stateful inspection, 393 technologies, 392–394 types, 128
vs IDS, 388
vs IPSs, 388
Flooding attacks, 210–211 protecting, 212 Fluhrer, Mantin, and Shamir attack, 463
Fractional T1 access, 361 Frequency division multiplexing (FDM), 117
Frequency hopping spread spectrum (FHSS), 181–183
Fresnel zone, concept of, 178–179
FTP See File transfer protocol
Full-duplex, 63, 90 configuring connection of, 611
G
Gateway services for NetWare (GSNW), 613
Gateways, 136, 144 and subnetworks, 137–138 Generic routing encapsulation (GRE) protocol, 413, 414 Geosynchronous earth orbits (GEOs), 373
GFI LANguard, 391 Gigabit Ethernet, 71 Google™, 502, 504
GRE protocol See Generic routing
encapsulation protocol
GSNW See Gateway services for
NetWare
h
Hacker, 201, 204–206, 209–211, 214
Half-duplex, 63, 90 transmission, 609
Hardware, 3, 9–11
address See MAC address
security devices, 386–405, 467–468
Hardware compatibility list (HCL), 118
Hardware loopback adapter, 62 Health Insurance Portability and Accountability Act (HIPAA), 491
Hermes chipset, 202 HomeRF, 182 Honeynets, 403–404 Honeypot, 400–403 characteristics of, 401–402 installing, 402–403 Host IDs, 299–305 rules for, 302 Host-to-host transport layer, 264
HTTP See Hypertext transfer
protocol
Hub topology See
multipoint topology Hubs, 101–103, 142 active, 102 passive, 102 switching, 101, 103 wireless, 172 Hybrid protocols, 343 Hypertext markup language (HTML), 129 Hypertext transfer protocol (HTTP),
156, 271–272 application layer, 616–617
I
IANA See Internet Assigned
Numbers Authority
ICANN See Internet Corporation
for Assigned Names and Numbers
ICMP See Internet control message
protocol
IDS See Intrusion detection
system IEEE
802 standards, 260–261, 640–649
CSMA/CD, 648 listing of, 642–647 LLC, 647
OSI and, 641–642 Token Ring, 649 wireless network, 649
Trang 4802.1x standard, authentication,
458–461
dynamic key derivation, 199,
461
user identification and strong
authentication, 199, 461
802.3 standard, 185
802.11 standard, 185, 187–190
802.11a, 188
802.11b, 187–188
802.11g, 189
802.11n, 189
authentication in, 195–200
control frames, 190
data frames, 190
management frames, 190
WEP encryption process in,
194
wireless networks, 181
802.11i authentication, 197–200
802.11w standard, 461
802.11x standard, 460
802.15 (bluetooth), 190–191
1394 (FireWire), 86
ifconfig command, 483, 545–546,
553–555
output of, 553–554
IGMP See Internet group
manage-ment protocol
IGPs See Interior gateway routing
protocols
IMAP See Internet message access
protocol
InARP See Inverse ARP
Industry standard architecture
(ISA), 118
Information age, 12–13
space age to, 8–9
Infrared, 191
communications, 29
Infrastructure network
configuration, 190
Initialization vector (IV), 193, 194,
463
Institute of Electrical and
Electron-ics Engineers (IEEE), 639
history and fundamentals of,
639–640
Institute of Radio Engineers (IRE),
639, 640
Integrated digital network (IDN), 111
Integrated services digital network
(ISDN), 107, 143, 361–362
adapters, 107, 110
advantages, 115 BRI, 362 channels, 112 concept of, 111 devices, 113 history of, 110–112 identifiers, 114–115 interfaces, 112–113 reference points, 113–114 Intelligent hubs, 582 Interface network layer, 258–261 Interior gateway routing protocols (IGPs), 342
International Telecommunications Union (ITU), 111
Internet access methods, 368–374 ADSL, 369
cable modem, 370–371 DSL, 368–369 POTS/PSTN, 371–372 satellite, 373–374 SDSL, 369 WWAN, 372–373 Internet Assigned Numbers Authority (IANA), 322, 395 Internet control message protocol (ICMP), 210
functions of, 532 Internet Corporation for Assigned Names and Numbers (ICANN), 322 Internet engineering task force (IETF), 651, 652–655 Internet group management protocol (IGMP), 330, 331 Internet layer, 263–264
Internet message access protocol (IMAP), 271
Internet Network Information
Center See InterNIC
Internet printing protocol (IPP), 268
Internet protocol (IP) See IP
Internet protocol security (IPsec),
193, 416 Internet security systems (ISSs), 391
Internet service providers (ISPs), 107
Internetwork, 4–5 InterNIC, 301, 306, 322 Intrusion detection system (IDS),
136, 160, 386–388 definition, 387
in DMZ, 409
limitations of, 390
vs firewalls, 388
Intrusion protection systems (IPSs), 388
vs firewalls, 388
Inverse ARP (InARP), 341
IP address, 294–305, 593
host See Host IDs
to MAC address resolution, 340
multicast, 334–335, 600
network See Network IDs
strategies to conserve CIDR, 320–321 private address, 322 VLSMs, 321–322
IP helper address, 329
IP routing, 335–346 determination process, 339
packets travel from network to network, 336–337
physical address resolution, 340–341
routers, 336 static and dynamic, 342–343 table entries, 337–339
utilities, 344–346
IP spoofing, 425–426 blind spoofing attacks, 425 informed attacks, 425 ipconfig command, 483
IPP See Internet printing protocol IPSec See Internet protocol security IPSs See Intrusion protection
systems IPv4, 287–289 header, 288
vs IPv6, 291–293
IPv6, 289–290 address, types, 290 benefits of, 290–291
vs IPv4, 291–293
ISA See Industry standard
architecture
ISDN See Integrated services digital
network ISP-Planet, 392
ISPs See Internet service providers
IV See Initialization vector
J
Jamming attacks on wireless networks, 215–216
Trang 5Kerberos realm, 445–447
components, 445
logon access in, 446
resource access in, 446
Key scheduling algorithm (KSA), 194
Kilobits per second (Kbps), 51
Known-plaintext attack, 196
l
LANs See Local area networks
Layer 2 switch, 154
Layer 3 switch See Multilayer
switches
Layer 2 tunneling protocol (L2TP),
134, 415–416
LDAP See Lightweight directory
access protocol
LDAP data interchange format
(LDIF), 451
LEO See Low earth orbit
Light emitting diodes (LEDs), 85, 108
Lightweight directory access
protocol (LDAP), 447–448
directories, 449
naming convention, 451
objects, attributes, and schema,
450–452
organizational units, 449–450
securing, 452–454
security realm, 453
with SSL, 452, 453
Line of sight (LOS), concept of,
178–179
Link state advertisements (LSAs), 343
Link state routing protocol, 343
LLC See Logical link control
Load balancer, 141
Local area networks (LANs), 31–34,
46, 100, 141–142, 151
technologies and standards,
69–71
Local connector (LC), 48, 80
Logical link control (LLC), 153
802 standards, 647
layers, 183, 243–244
Logical network diagrams, 487
Logical networking topologies
centralized, 15–16
client/server, 18–20
decentralized (distributed), 16
peer-to-peer, 16–18
VLANs, 23–24 VPN, 20–23 Loopback adapter, configuration information for, 554 Looping on bridges and switches, 596–597
LOS See Line of sight
Low earth orbit (LEO), 373
LSAs See Link state advertisements L2TP See Layer 2 tunneling protocol
M
MAC, 153, 262 layer, 183, 185 MAC address, 207–209, 223, 224,
431, 593 changing, 594 hardware, 244, 276
IP address to, 340
of NIC, 244 spoofing, 594 sublayer, 244–245, 262 addressing in data link layer, 244–245, 262
physical address in, 244 Man-in-the-middle (MITM) attacks, 212–215, 427–428, 431
Managed hub See Intelligent hubs
Managed security services providers (MSSPs), 391
Management information base (MIB), 275, 552
Manufacturer code, 593
MAPI See Messaging application
program interface MARK I computer, 7
MAU See Media attachment unit;
Multistation access units
MBONE See Multicast backbone
on the Internet McAfee, 391 Mechanical transfer registered jack (MTRJ), 48, 81
Media, 3
Media access control See MAC
Media attachment unit (MAU), 72 Megabits per second (Mbps), 51 Mesh topology, 27
Messaging application program interface (MAPI), 257 Metropolitan area network, 34
MIB See Management information
base
Micro channel architecture (MCA), 118
Microprocessors, 182 Microsoft Management Console (MMC), 418
Microsoft model, 253–255
MITM attacks See Man-in-
the-middle attacks
MMF See Multimode fiber
Mobile networking, 14 Modems, 32, 107, 240 analog, 108–109 cable, 107, 109, 370–371 DSL, 107, 109
external, 107 internal, 108 speeds, 371–372
MPLS See Multiprotocol label
switching Multicast, 329–331 advantage of, 334 basics of, 330–331
IP address, 600 dynamic, 334–335 static, 335
traffic, 333–334 See also
Broadcast traffic Multicast backbone on the Internet (MBONE), 304
Multifactor authentication, 438–439
Multilayer switches, 155–156, 163
Multimode fiber (MMF), 71 Multipath interference, 180 Multiple input/multiple output (MIMO) device, 189 Multiplexing, 117 Multiport bridging, 154
Multiport repeater See Active hubs
Multiprotocol label switching (MPLS), 499
FDDI, 365, 366 Multistation access units (MAU), 105
features of, 105 Mutual authentication, 199, 457–458
N
NACK See Negative
acknowledgment
NAS See Network attached storage
Trang 6NAT See Network address
translation
NBMA networks See
broadcast-based multiple
access networks
nbtstat command, 541–544
switches of, 543–544
NDIS See Network driver interface
specification
Ndis.sys, 256
Negative acknowledgment (NACK),
199
NetBIOS, 333, 347
API, 257
utilizing nbtstat command to
display, 543, 544
NetBIOS over TCP (NetBT),
265–266
datagram service, 266
name service, 266
session service, 266
netstat command, 538–541
command-line switches of,
538
NetStumbler, 201, 206
using, 202–204, 212
Network access problem, identifying
client’s remote, 619
Network access security, 468–469
AAA, 431–432
authentication See
Authentication
Network address translation (NAT),
291, 345–346, 601
Network analyzer See Protocol
analyzer
Network attached storage (NAS),
138–139
Network basic input/output system
(NetBIOS), 417
Network devices, 99
bridges, 104–105
historical, 100
hubs, 101–103
modern, 122
OSI model and, 100
repeaters, 103–104
routers, 122–125
security integration, 125–136
Network diagrams
logical, 487
physical, 485–487
Network documentation, 561, 565
Network driver interface specification (NDIS) boundary layer, 255 Network fundamentals history on networking and communications, 5–14 logical networking topologies, 14–24
network types, 31–35 physical network models, 24–30 Network hijacking and
modification, 213–214 protecting, 215
Network IDs, 299–305 class A, 303 class B, 303–304 class C, 304 class D, 304 class E, 305 rules for, 302 Network intrusion detection system (NIDS)
network design with, 389–392
vs NIPS, 388–389
Network intrusion protection system (NIPS)
network design with, 389–392
vs NIDS, 388–389
Network layer, 245–248 interface, 258–261 troubleshooting, 598–603, 623
Network layer firewalls See
Packet-filtering firewall Network management, 477, 506 baselines, 488–489
configuration management (CM), 478–493, 506–507 change control
documentation, 483–484 documentation types, 479–481 documenting configurations, 481–483
load balancing, 501 network monitoring, 493–504, 507–508
notification documentation, 496–497
password lists, 495–496 policies, procedures, and configurations, 489–490 regulations, 490–492 wiring schematics, 484
Network media, 582 problems with, 587–588 Network model, 3
DoD, 257–265 OSI, 237–257 Network monitoring, 59, 493–504, 507–508
network performance optimization, 497 Network news transfer protocol (NNTP), 272
application layer, 617 Network operating systems (NOS), 3 Network performance optimization, 497
Network ports, 417–422, 468 scanning for vulnerabilities, 419–422
Network protocols, 417–422 Network segmentation, 105 Network threats, 423–424, 468 ARP
poisoning, 431 spoofing, 426–427 DNS poisoning, 430–431 domain name kiting, 429–430 domain name tasting, 430
DoS attacks See Denial of
service attacks
IP spoofing, 425–426 man-in-the-middle attacks, 427–428, 431
null sessions, 424–425 replay attacks, 428–429 TCP/IP hijacking, 424 Network time protocol (NTP), 274
Network transport protocols, 256 Network troubleshooting tools cable testers, 559
Ethernet crossover cable, 558–559
Linux tools, 563–564 dig command, 555–556 ifconfig command, 553–555 traceroute command, 557 netware tools, 557–558, 564 oscilloscope, 559
OSI model, 525–529 data link layer, 527 network layer, 528 physical layer, 526–527 transport layer, 528–529
Trang 7tone generator, 559
windows tools, 563
arp command, 536–538
ipconfig command, 545–546
nbtstat command, 541–544
netstat command, 538–541
nslookup command, 546–549
pathping command, 533–536
ping command, 530–531
route command, 549–551
SNMP, 551–552
tracert command, 531–533
Network voice protocol (NVP),
140
Networking interface cards (NICs),
57, 106, 117, 154, 244, 262,
431, 489, 582, 584–585
buffers, 584
driver issues, 585
installing, 118–120
types and operation, 120
updating drivers of, 585–586
wireless, 649
Networking protocols, 278–279
advantages of, 576–577
DHCP, 269–270
DNS, 12, 273–274
FTP, 272–273
HTTP, 271–272
IMAP, 271
IPP, 268
NetBT, 265–266
NNTP, 272
NTP, 274
POP, 270–271
RIP, 274
SMB, 267–268
SMTP, 270
SNMP, 274–275
Telnet, 269
WINS, 266–267
WinSock, 268–269
Networking topologies, logical,
14–24
centralized, 15–16
client/server, 18–20
decentralized (distributed), 16
peer-to-peer, 16–18
VLANs, 23–24
VPN, 20–23
Newsreader, 617
NICs See Networking interface
cards
NIDS See Network intrusion
detection system
NIPS See Network intrusion
protection system Nmap, 418, 419
NNTP See Network news transfer
protocol Non-broadcast-based multiple access (NBMA) networks, 341 Nonfacility associated signaling (NFAS), 113
NOS See Network operating systems
Notification documentation, 496–497 nslookup command, 546–549 command line switches of, 556
NTP See Network time protocol
Null modem cable, 558 Null sessions, 424–425
NVP See Network voice protocol
o
OFDM See Orthogonal frequency
division multiplexing Onboard transceiver, 121 One-factor authentication, 434–436 Open authentication, 195
Open shortest path first (OSPF) routing protocol, 123, 331,
342, 343 Open systems interconnection (OSI) model, 100, 152, 183, 237–257, 276–277, 287, 393,
398, 399 and 802 IEEE standards, 641–642
advantages of, 576–577 application layer, 252–253 component layers applications and user mode services, 257
file system drivers, 256–257 NDIS wrapper, 256 data link layer of, 242–243 LLC sublayer, 243–244 MAC sublayer, 244–245 switches and bridges in, 527, 594
troubleshooting, 591–598, 623 encapsulation of data, 253 function of boundary layers, 255 API, 256
NDIS, 255 TDI, 256
Microsoft model, 253 network layer, 245–248 troubleshooting, 598–603, 623
physical layer of, 239–240 troubleshooting, 581–590 presentation layer, 251–252 troubleshooting, 612–614, 624
reviewing, 577–578 and switches, 152–153 transport layer, 248–249
as troubleshooting tool, 563 use of, in troubleshooting, 575–581, 622–623 establishing, 578–581 OpenLDAP, 448
Operating systems, 9–11 UNIX, 10
Optic cable fiber, 48, 64, 84–85 MMF, 85
SMF, 84–85 Optical carrier levels, 368 ORiNOCO card, 202 Orthogonal frequency division multiplexing (OFDM), 188 Oscilloscope, 59
as troubleshooting tool, 559
OSI model See Open systems
interconnection model
p
Pack analyzer See Protocol analyzer
Packet-filtering firewall, 393, 394–399
“allow by default” policy, 395 benefits of, 398
“deny by default” policy, 395 drawbacks of, 398
operation of, 398–399
Packet INternet Groper See Ping
command Packet level firewall, 128 Packet sequencing, 456 Packet sniffing, 453, 457, 493 Packet switching, 600 networks, 9 WAN operating with, 358–360, 363
Packet-switching exchange (PSE), 366
PAE See Port access entity
Trang 8PAN See Personal area network
PAP See Password authentication
protocol
Passenger protocol, 21
Passive attacks, 200–206
Passive hubs, 102, 582
troubleshooting, 590
Password authentication protocol
(PAP), 454
Password policies, 435
PAT See Port address translation
Patch panels, 68
66 block type, 68
110 block type, 69
pathping command, 533–536
PDUs See Protocol data units
Peer-to-peer network model, 16–18
Pentium 32-bit processor, 10
Per-packet authentication, 199–200
Peripheral component interconnect
(PCI), 118
Personal area network (PAN), 35
Personal digital assistants (PDAs),
481
Personal identification number
(PIN), 494
Physical address See MAC address
Physical layers
functions of, 526
hubs and repeaters operated at,
239–240
NIC functioning at, 582
of OSI model, 239–240
troubleshooting, 583–585,
623
devices of, 588–590
NIC driver issues, 584–585
role of NIC, 584–585
Physical media, 49–58
bandwidth capacity of, 51
installing, 55–56
length of, 52–53
standards for, 71
Physical network diagrams,
485–487
Physical network models, 24–30
bus topology, 25–26
hybrid topology, 29
mesh topology, 27
point-to-multipoint topology,
27–28
point-to-point topology, 27–28
rings topology, 27–28
star topology, 26–27 wireless topology, 29–30 ping command
switches of, 530–531 utilizing hostname with, 530 Ping flood, 207, 210
ping localhost command, 344 Plain old telephone service (POTS)
See Public switched telephone
network (PSTN) Point-to-multipoint topology, 27–28 Point-to-point protocol (PPP), 413, 454
Point-to-point topology, 27–28 Point-to-point tunneling protocol (PPTP), 134, 413–415
POP See Post office protocol
Port access entity (PAE), 197, 459 authenticator, 197
supplicant, 197 Port address translation (PAT), 291, 346
Port authentication, 160–161, 164 Port mirroring, 160
Ports, 395, 396 logical, 396
of Trojan Horses, 397 Post office protocol (POP), 270–271 Power over Ethernet (PoE), 157–158
PPP See Point-to-point protocol PPTP See Point-to-point tunneling
protocol Presentation layer function of, 613
of OSI model, 251–252 problems finding in, 614 troubleshooting, 612–614, 624
PRI See Primary rate interface
Primary rate interface (PRI), 112 WAN, 362–363
Private branch exchange (PBX), 68, 114
Private network address, 322–329 benefits of, 324–325
class A, 323, 324 class B, 323, 324 class C, 323, 324 considerations, 324–329 DHCP
operations, 326–329 relay agents, 328–329 static and dynamic assignments, 325–326
Private virtual dial-up network (PVDN), 135
PRNG See Pseudorandom number
generator Promiscuous mode, 205 Protected EAP (PEAP), advantages
of, 464–466 Protected management frames, 461
Protocol analyzer, 59, 404–405 Protocol data units (PDUs), 243 Protocols, 3
Proxy ARP, 341 Proxy server, 132, 394
PSE See Packet-switching exchange
Pseudorandom number generator (PRNG), 194
Public switched telephone network (PSTN), 108, 371
q
QPSK See Quadrature phase shift
keying Quadrature phase shift keying (QPSK), 188
Quality of service (QoS) protocols, 498–499
r
Radio frequency interference (RFI),
47, 89 Radio frequency (RF) behaviors absorption and scattering, 177–178
gain and loss, 176 reflection and refraction, 176–177
communications, 180–181 RADIUS, 198
authentication process, 442
distributed, 441 implementation, 442–443 Juniper Networks Steel-Belted, 443
proxy, 442 server, 198
vs TACACS+, 457
vulnerabilities, 444
RAID See Redundant array of
independent disks
Trang 9RARP See Reverse address
resolution protocol
RC4 encryption algorithm, 193,
223, 463
Redundant array of independent
disks (RAID), 482
Redundant network, 504
Registered jack (RJ), 48
Remote access policies, 440–441
Remote access service (RAS) servers,
133
Remote access VPN, 135
Remote authentication dial-in user
service See RADIUS
Repeaters, 53, 103–104, 143
Replay attacks, 428–429, 447, 456
Request for comments (RFC), 651
Resource reservation protocol
(RSVP), 499
Reverse address resolution protocol
(RARP), 340, 600
RFC See Request for comments
RFC 1918, 322–329
RG connectors, 79
Rings topology, 27–28
RIP See Routing information
protocol
RITs See Routing information
tables
RJ connectors, 76–77
RJ-11, 76–77
RJ-45, 77, 101, 485
RJ-48 and RJ-25, 77
Rogue APs, 208, 212, 213
route command, 549–551
configuration information for,
549–550
switches of, 551
Routers, 122, 144
static and dynamic, 123–125
switching, 125
Routing, 247
Routing and remote access service
(RRAS), 106, 339
Routing information protocol (RIP),
124, 274, 342, 343
Routing information tables (RITs),
339
Routing loop, 602
Roving analysis port (RAP), 160
RRAS See Routing and remote
access service
Rule of thumb, 580
S
Sarbanes-Oxley Act of 2002, 492 Satellite, 33, 373–374
LEO, 373 Screened host firewall, 127
SDSL See Symmetric digital
subscriber line Secure sockets layer (SSL) LDAP with, 452, 453 protocol, 186 Security zones, 405–406, 469–470 DMZs, 406–413
VPN, 413–416 Server message block (SMB), 267–268
Service access point identifier (SAPI), 114
Service profile identifier (SPID), 114 Service set identifier (SSID), 190,
203, 204
Session hijacking See Transmission
control protocol/Internet protocol
Session layer
of OSI model, 250–251 troubleshooting, 609–610, 624 Shared-key authentications, 195–196
Shielded twisted-pair (STP), 48, 83, 92
Signal attenuation, 242
Signal degradation See Signal
attenuation Signal quality error (SQE), 87 Signature, 389
definition of, 390 Simple mail transfer protocol (SMTP)
application layer, 616 Simple network management protocol (SNMP), 274–275 application layer, 615 GET message, 552 installing and configuring, 552–553
SET message, 552
as windows tool, 551–552 Simplex, 63, 90
Single-mode fiber (SMF), 71 Single sign-on (SSO), 439 Site survey, 221
Site-to-site VPNs, 133–134
Smart hubs See Intelligent hubs
Smart jack, 69
SMB See Server message block SMF See Single-mode fiber SMTP See Simple mail transfer
protocol
SNA See Systems network
architecture Sniffing, 204–206, 221 protecting, 206 Software, security devices, 386–405, 467–468
SolarWinds IP network browser, 525
SONET See Synchronous optical
network Sourcefire, 391 Space age to information age, 8–9 Spanning tree protocol (STP), 158–159, 164
Spoke topology See
multipoint topology
Spoofing, 207–209, 447 See also IP
spoofing ARP, 214, 426–427 protecting, 209 Spread spectrum technology, 181–183
Sputnik, 8
SSID See Service set identifier SSL See Secure sockets layer
Standard connector (SC), 48, 79 Star topology, benefit of, 26–27 Stateful inspection firewall, 393 Static routing, 123–125 Storage area networks (SAN), 35, 122
STP See Shielded twisted-pair;
Spanning tree protocol Straight tip (ST) connector, 48, 80 Stream cipher, 193
Subnet masking, 308–320 creating, 312, 316, 318 custom, 311–312 default, 310–311 defining, 316–317 using host ID bits, 306 Subnets, 294, 305–307 class A, 318–319 class B, 319–320 class C, 320 defining, 316–317 Supernetting, 308, 311 Switched port analyzer (SPAN), 160
Trang 10Switches, 151
basic, 154–155, 162
content, 156–157, 163
in data link layer, 249
features, 157–161, 163–164
multilayer, 155–156, 163
multiport bridging, 154
in network layer, 249
network performance
improvement with, 154–155
OSI model and, 152–153
in transport layer, 249
Switching hubs, 101, 103
Switching routers, 125, 249
Symmetric digital subscriber line
(SDSL), 369
Synchronous optical network
(SONET)
FDDI, 367–368
Systems network architecture (SNA)
gateway, 612
protocol, 136
T
T-carrier line, 116, 143
TACACS, 455
TACACS+, 455–456
vs RADIUS, 457
vulnerabilities in, 456–457
TAPI See Telephony application
program interface
TCP See Transmission control
protocol
TCP/IP See Transmission control
protocol/Internet protocol
TDI See Transport driver interface
Telecommunications, history on, 6
Telecommunications Industry
Association (TIA), 140
Telephony application program
interface (TAPI), 257
Telnet, 269
application layer, 616
to troubleshoot FTP, 620–621
Temporal key integrity protocol
(TKIP), 193
Terminal endpoint identifier (TEI),
114
Thinnet See 10Base2
Three-factor authentication See
Multifactor authentication
Three-way handshake, 428, 454
Ticket granting ticket (TGT), 446
Time division multiplexing (TDM), 117
Time domain reflectometer (TDR),
58, 89 TippingPoint, 391
TKIP See Temporal key integrity
protocol
TLS See Transport layer security
Token Ring network, 105, 106, 591, 649
Token signal, 28 Token technology, 437 Tone generator, 58, 89
as troubleshooting tool, 559 Topology, 3
traceroute command, 557 tracert command, 531–533 Traffic shaping, 500–501 Transceivers, 86–87, 121 Translation bridge in data link layer, 594
Transmission control protocol (TCP) three-way handshake, 607
in transport layer, 605–606 Transmission control protocol/
Internet protocol (TCP/IP), 9,
122, 156, 264, 285, 428, 652 handshake, 428
hijacking, 424 stack, 287, 337 Transport driver interface (TDI), 255 boundary layer, 256
Transport layer
of OSI model, 248–249 troubleshooting, 603–609, 624 TCP for, 605–606
UDP for, 606–608 Transport layer security (TLS), 452,
458, 464, 465 protocol, 186 Trap message, 552 Trojan Horse, 394 ports of, 397 Troubleshooting, 56–57 cable testers and, 58–62, 89–90 FTP, using Telnet, 620–621 methodology, 520–525, 563 analyzing and responding to problem, 522–523 for connectivity issue of computers, 523–524 gathering information about problem, 520–521
Trunk cable, 25 Trunking, 159–160 Tunneling, VPN, 21 Twisted-pair cable, 47 categories, 82 color codes, 65 Two-factor authentication, 437–438 Two-way handshake, 454
u
UDP See User datagram protocol
Unauthorized attacks, 208–209 protecting, 209
Unicast traffic, 332 Uniform resource locators (URLs), 156
UNIVersal automatic computer (UNIVAC), 7–8
UNIX, operating systems, 9–11 Unshielded twisted-pair (UTP), 48,
92, 101, 484 categories, 81–83
URLs See Uniform resource
locators User datagram protocol (UDP), 264,
415, 416
in transport layer, 606–607
UTP See Unshielded twisted-pair
v
Vampire tap, 54 Variable-length subnet masks (VLSMs), 311–312, 321–322 determining
IP address for each new subnet, 314–315 new subnetted network IDs, 314
number of host bits, 312–313 subnet mask, 316
VCD See Virtual collision detection
Virtual collision detection (VCD), 185
Virtual local area networks (VLANs), 23–24, 159, 163, 385
configuring, 24 Virtual private networks (VPNs), 20–23, 129, 133, 145, 192, 413–416, 440, 441
remote access, 22–23 site-to-site, 21–22