Introduction to Network Security
Chapter 6 Network Layer Protocols
1
- Dr. Doug Jacobson - Introduction to
Network Security - 2009
Introduction to Network Security Chapter 6 Network Layer Protocols - - PowerPoint PPT Presentation
Introduction to Network Security Chapter 6 Network Layer Protocols Dr. Doug Jacobson - Introduction to 1 Network Security - 2009 Topics The network layer IP V4 BOOTP & DHCP IP V6 Common IP countermeasures Dr.
1
Network Security - 2009
Network Security - 2009 2
3
Network Security - 2009
1 2 3 1 2 3 Private/Closed End-to-End Network
4
Network Security - 2009
5
Network Security - 2009
Differences Remediation Physical network layer addressing schemes The network will need to adapt to the different address types which is more complex in devices like routers Maximum and minimum packet sizes The network layer will need to implement segmentation and reassembly Network access methods The network layer will need to provide buffering which handle different access methods, especially in a router Error and flow control The network layer will need to handle lost and delayed packets Machine and user authentication The network layer will need to provide authentication to the physical network if required
6
Network Security - 2009
7
Network Security - 2009
8
Network Security - 2009
The Internet Computer A Attacker Computer B 1) First packet: Destination = A Source = B (spoofed) 2) Reply Packet from A: Destination = B Source = A 3) Reply packet from B: Destination = A Source = B 9
Network Security - 2009
Computer 1 HW = A1 Computer 2 HW = C2 Router 1 HW = A2, B1 Router 2 HW = B3, C1 Attacker 1 Attacker 2 Attacker 3 Network A Network C Network B
10
Network Security - 2009
11
Network Security - 2009
12
Network Security - 2009
13
Network Security - 2009
14
Network Security - 2009
15
Network Security - 2009
16
Network Security - 2009
17
Network Security - 2009
18
Network Security - 2009
19
Network Security - 2009
20
Network Security - 2009
21
Network Security - 2009
22
Network Security - 2009
23
Network Security - 2009
Internet 172.16.0.0 Router Router Router Router Router 172.16.1.0 172.16.2.0 172.16.253.0 172.16.254.0 Netmask = 255.255.255.0 24
Network Security - 2009
25
Network Security - 2009
26
Network Security - 2009
27
Network Security - 2009
28
Network Security - 2009
129.186.15.0 129.186.55.0
29
Network Security - 2009
30
Network Security - 2009
31
Network Security - 2009
IP Address Hardware Address SRC DEST SRC DEST H1 H2 H1 H2
IP Address Hardware Address SRC DEST SRC DEST H1 H2 H1 R1 (EN0) H1 H2 R1 (EN1) H3
32
Network Security - 2009
33
Network Security - 2009
34
Network Security - 2009
35
Network Security - 2009
IP Address Hardware Address SRC DEST SRC DEST H3 H4 H3 H4
IP Address Hardware Address SRC DEST SRC DEST H3 H1 H3 R1 (EN1) H3 H1 R1 (EN0) H1
IP Address Hardware Address SRC DEST SRC DEST H3 H5 H3 R2 (EN0)
36
Network Security - 2009
Destination Next 129.186.5.0 129.186.5.15 Default 129.186.5.254 5.0 55.0 205.0 5.254
37
Network Security - 2009
38
Network Security - 2009
D=1: don’t fragment M=:1 more data. M=0: last packet of fragment
39
Network Security - 2009
1 Internet Control Message Protocol (ICMP) 3 Gateway-to-Gateway protocol 5 Stream 6 Transport Control Protocol (TCP) 8 Exterior Gateway Protocol 9 Any private interior gateway protocol 11 Network voice protocol 17 User datagram protocol (UDP) 20 Host Monitoring Protocol 22 Xerox Network System Internet Datagram Protocol 27 Reliable Datagram Protocol 28 Internet Reliable Transaction Protocol 30 Bulk Data Transfer Protocol 61 Any Host Internet Protocol
40
Network Security - 2009
41
Network Security - 2009
42
Network Security - 2009
43
Network Security - 2009
44
Network Security - 2009
45
Network Security - 2009
46
Network Security - 2009
47
Network Security - 2009
48
Network Security - 2009
49
Network Security - 2009
50
Network Security - 2009
51
Network Security - 2009
52
Network Security - 2009
53
Network Security - 2009
54
Network Security - 2009
55
Network Security - 2009
– 0Redirect for the NET – 1Redirect for the Host – 2Redirect for type of service and net – 3Redirect for type of service and host
56
Network Security - 2009
57
Network Security - 2009
58
Network Security - 2009
59
Network Security - 2009
60
Network Security - 2009
61
Network Security - 2009
62
Network Security - 2009
63
Network Security - 2009
64
Network Security - 2009
65
Network Security - 2009
66
Network Security - 2009
67
Network Security - 2009
68
Network Security - 2009
69
Network Security - 2009
70
Network Security - 2009
71
Network Security - 2009
72
Network Security - 2009
73
Network Security - 2009
74
Network Security - 2009
75
Network Security - 2009
76
Network Security - 2009
77
Network Security - 2009
78
Network Security - 2009
79
Network Security - 2009
80
Network Security - 2009
81
Network Security - 2009
82
Network Security - 2009
83
Network Security - 2009
hp255:\ :hn:ht=ether:vm=rfc1048:\ :ha=0800094ce9f5:\ :ip=129.186.5.7:\ :sm=255.255.255.0:\ :gw=129.186.5.254:\ :lg=129.186.5.2:\ :T144=“hp.printer”: Hardware address Gateway Logging device Netmask IP
84
Network Security - 2009
85
Network Security - 2009
86
Network Security - 2009
87
Network Security - 2009
88
Network Security - 2009
89
Network Security - 2009
90
Network Security - 2009
91
Network Security - 2009
92
Network Security - 2009
93
Network Security - 2009
94
Network Security - 2009
95
Network Security - 2009
96
Network Security - 2009
97
Network Security - 2009
98
Network Security - 2009
99
Network Security - 2009
100
Network Security - 2009
101
Network Security - 2009
102
Network Security - 2009
103
Network Security - 2009
– If Ethernet, Ethernet MAC address recommended
104
Network Security - 2009
105
Network Security - 2009
106
Network Security - 2009
107
Network Security - 2009
108
Network Security - 2009
109
Network Security - 2009
110
Network Security - 2009
111
Network Security - 2009
112
Network Security - 2009
113
Network Security - 2009
114
Network Security - 2009
115
Network Security - 2009
116
Network Security - 2009
117
Network Security - 2009
118
Network Security - 2009
119
Network Security - 2009
120
Network Security - 2009
121
Network Security - 2009
122
Network Security - 2009
123
Network Security - 2009
124
Network Security - 2009
125
Network Security - 2009
126
Network Security - 2009
127
Network Security - 2009
128
Network Security - 2009
129
Network Security - 2009
130
Network Security - 2009
131
Network Security - 2009
132
Network Security - 2009
133
Network Security - 2009
134
Network Security - 2009
135
Network Security - 2009
136
Network Security - 2009
137
Network Security - 2009
138
Network Security - 2009
139
Network Security - 2009
140
Network Security - 2009
141
Network Security - 2009
142
Network Security - 2009
143
Network Security - 2009
144
Network Security - 2009
145
Network Security - 2009
146
Network Security - 2009
147
Network Security - 2009
148
Network Security - 2009
149
Network Security - 2009
150
Network Security - 2009
151
Network Security - 2009
152
Network Security - 2009