1 / 34

Chapter 9 Intermediate TCP /IP/ Access Control Lists (ACLs)

Chapter 9 Intermediate TCP /IP/ Access Control Lists (ACLs). Objectives. TCP Operation. The transport layer is responsible for the reliable transport of and regulation of data flow from source to destination. Synchronization or Three-Way Handshake. Denial - of - Service Attacks.

keiko-gill
Download Presentation

Chapter 9 Intermediate TCP /IP/ Access Control Lists (ACLs)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 9Intermediate TCP/IP/ Access Control Lists (ACLs)

  2. Objectives

  3. TCP Operation The transport layer is responsible for the reliable transport of and regulation of data flow from source to destination.

  4. Synchronization or Three-Way Handshake

  5. Denial-of-Service Attacks

  6. Simple Windowing

  7. TCP Sequence and Acknowledgment Numbers

  8. Positive ACK • Acknowledgement is a common step in the synchronization process which includes sliding windows and data sequencing.

  9. Protocol Graph: TCP/IP

  10. UDP Segment Format

  11. Port Numbers

  12. Telnet Port Numbers

  13. Reserved TCP and UDP Port Numbers

  14. Ports for Clients • Whenever a client connects to a service on a server, a source and destination port must be specified. • TCP and UDP segments contain fields for source and destination ports.

  15. Port Numbering and Well-Known Port Numbers • Port numbers are divided into three different categories: • well-known ports • registered ports • dynamic or private ports

  16. Port Numbers and Socket

  17. Comparison of MAC addresses, IP addresses, and port numbers • A good analogy can be made with a normal letter. • The name on the envelope would be equivalent to a port number, the street address is the MAC, and the city and state is the IP address.

  18. Summary

  19. Access Control Lists (ACLs)

  20. Objectives

  21. What are ACLs? • ACLs are lists of conditions used to test network traffic that tries to travel across a router interface. These lists tell the router what types of packets to accept or deny.

  22. How ACLs Work

  23. Protocols with ACLs Specified by Numbers

  24. Creating ACLs

  25. The Function of a Wildcard Mask

  26. Verifying ACLs • There are many show commands that will verify the content and placement of ACLs on the router. • show ip interface • show access-lists • Show running-config

  27. Standard ACLs

  28. Extended ACLs

  29. Named ACLs

  30. Placing ACLs • Standard ACLs should be placed close to the destination. • Extended ACLs should be placed close to the source.

  31. Firewalls A firewall is an architectural structure that exists between the user and the outside world to protect the internal network from intruders.

  32. Restricting Virtual Terminal Access

  33. Summary

  34. Question/Answer

More Related