Ch07 - Protecting Advanced Communications

Ch07 - Protecting Advanced Communications - P...

Info iconThis preview shows pages 1–13. Sign up to view the full content.

View Full Document Right Arrow Icon
Protecting Advanced  Communications Security+ Guide to Network Security Fundamentals  Second Edition Chapter 7:
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Objectives Harden File Transfer Protocol (FTP) Secure remote access Protect directory services Secure digital cellular telephony Harden wireless local area networks (WLAN)
Background image of page 2
3 Hardening File Transfer Protocol (FTP) Three ways to work with FTP: Web browser FTP client  Command line FTP servers can be configured to allow unauthenticated users  to transfer files (called anonymous FTP or blind FTP)
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Hardening File Transfer Protocol (FTP) Vulnerabilities associated with using FTP FTP does not use encryption Files being transferred by FTP are vulnerable to man-in-the- middle attacks Use secure FTP to reduce risk of attack Secure FTP is a term used by vendors to describe encrypting  FTP transmissions Most secure FTP products use Secure Socket Layers (SSL) to  perform the encryption
Background image of page 4
5 Hardening File Transfer Protocol (FTP) FTP active mode Client connects from any random port >1,024 (PORT N) to  FTP server’s command port, port 21 (Step 1) Client starts listening to PORT N+1 and sends the FTP  command PORT N+1 to the FTP server FTP passive mode Client initiates both connections to server  When opening an FTP connection, client opens two local  random unprivileged ports >1,024
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Hardening File Transfer Protocol (FTP)
Background image of page 6
7 Secure Remote Access Windows NT includes User Manager to allow dial-in access,  while Windows 2003 uses Computer Management for  Workgroup access and Active Directory for configuring access  to the domain Windows 2003 Remote Access Policies can lock down a remote  access system to ensure that only those intended to have access  are actually granted it
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
8 Tunneling Protocols Tunneling: technique of encapsulating one packet of data  within another type to create a secure link of transportation
Background image of page 8
9 Tunneling Protocols (continued)
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
10 Point-to-Point Tunneling Protocol  (PPTP) Most widely deployed tunneling protocol Connection is based on the Point-to-Point Protocol (PPP),  widely used protocol for establishing connections over a serial  line or dial-up connection between two points Client connects to a network access server (NAS) to initiate  connection Extension to PPTP is Link Control Protocol (LCP), which  establishes, configures, and tests the connection
Background image of page 10
11 Point-to-Point Tunneling Protocol  (PPTP) (continued)
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
12 Layer 2 Tunneling Protocol (L2TP) Represents a merging of features of PPTP with Cisco’s Layer 2  Forwarding Protocol (L2F), which itself was originally  designed to address some of the weaknesses of PPTP
Background image of page 12
Image of page 13
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 55

Ch07 - Protecting Advanced Communications - P...

This preview shows document pages 1 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online