Professor Mike Meyers Flashcards
What is the PDU called the transport layer?
TCP PDU is called TCP segment
UDP PDU is called UDP datagram
Is ICMP just one packet?
No, it is not just one packet. There is a type field in the packet that will define what this particular ICMP packet is for?
For example this type field might mean host not found.
Define main fields of IGMP?
It has following ->
Source address + Group address + checksum + type
Define IGMP?
So when a sever hosting some live video for example and it needs to go to a large number of recipients, it can use a Multicast address. So it will assign a Multicast address to hosts or routers that comes in the way of hosts that want to listen to this live video, a multicast address. This way it can just send a one stream of data instead of sending multiple streams to cover all recipients.
What is traceroute and what is its windows equivalent?
It is a troubleshooting protocol that tell us the hop by hop patch to reach a remote host from the local host.
Windows equivalent is tracert
In some case if traceroute does not work as it is not allowed by some routers, we can use “ pathping “ command as it uses a different protocol.
When the things are running great, use the traceroute command so that you can get familiar with it.
What is one of the things that you should check if you are not getting right speed from ISP?
Look for cheap routers
Learn wireshark
I will
Name of the packet capturing tool that we can use in linux from command prompt?
tcpdump - it will start capturing the frames and we can save these into some file and then use some analyzer like wireshark to analyze the frames.
What is netstat command used for?
It is a command that we can use to list all the open ports and connections on our system.
It has no of different options.
Define some popular netstat options.
netstat -n This will give us the raw numbers like destination IP addresses instead of names.
netstat -b It will tell us the executable as well linked to a connection
netstat -o It will give us the process ID as well that we can use to find the associated applications in Task manager
netstat -nbo
netstat -a It shows all the active ports
What is netstat -r used for?
We can also use this to see the routing table in windows
If we need to check if some device is running a web server, how do we check that?
We use
netstat -a command and see if it is listening on port 80 or 443
What are the 2 common kind of web servers out there in the world?
One are Microsoft servers - Microsoft IIS ( internet information service )
Another is Apache ( open source )
What does FTP server listens on?
It listens on port no 21
And send the data back to clients on port 20
If we want people to connect to our FTP SRVER to download some files, without requiring to enter any USER NAME / PASSWORD, what kind of account do we need to create on FTP SERVER?
We can create ANONYMOUS account with no password
Can Inter Explorer acts as a FTP server and how?
Yes, we can type
ftp://202.13.212.104
Does windows have in-built ftp client?
We can use command prompt as ftp client.
Just type -> ftp serverName/ip address
Once connected, we can use GET command for file downloads and PUT command for file uploads.
What are the different modes that AP can work in?
- Repeater - it will just repeat the signal from the AP. Normally these repeaters have 2 set of transmitters and receivers. One set of transmitter and receiver is used to get the signal from AP and the other one is used to retransmit the signal. So this way there is no interference.
- Workgroup bridge - in this mode, it can act as wireless NIC for a wired client that does not have wireless capability. So WGB will work on the same frequency as the AP.
- Outdoor bridge - this used to connect 2 or more different buildings or cities that are apart by a large distance.
- Mesh network - it can also work in a Mesh topology.
Give an example of Cloud-based AP Architecture?
Cisco Meraki is a cloud based and offers centralized management of wireless, switched, and security networks built from Meraki products.
What is Split-Mac architecture terminology in ACCESS POINTS?
In split-mac, duties are divided between WLC (wireless controller) and the light weight APs.
Activities performed by AP is divided into 2 groups -> management functions and real time processes.
What are the management functions in Split -MAC AP architecture?
RF management, authentication, security management, QOS, Association and roaming management
What are the real time functions in AP?
RF transmit/receive
MAC management,
Encryption
How the WLC and AP talk to each other?
Using CAPWAP - Control and provisioning of wireless access point
What are the 2 kind of messages that travel in CAPWAP tunnels?
- CAPWAP control messages - these are the messages that travel between LWAP and WLC for controlling light weight APs. These messages are authenticated and encrypted so the AP is securely controlled by the appropriate WLC.
- CAPWAP data - this is used for packets travelling to and from wireless clients that are associated with AP. Data packets are transported over the data tunnel but are not encrypted by default. When the data encryption is enabled for AP, packets are protected with the Datagram Transport Layer Security (DTLS)
In an enterprize WLAN, how is it ensured that no unauthorized AP connect to your network?
Every AP and WLC must also authenticate each other with digital certificates. An x.509 certificate is preinstalled in each device when it is purchased. By using certificates behind the scenes, every device is properly authenticated before becoming part of the wireless network. This process helps assure that one one add an an authorized AP to your network.
How can we use a browser as FTP server?
By default, they act as web browsers.
So we type ftp://202.13.212.104
Can our command prompt also act as file server?
Yes it can. We just type
ftp server_address
“get” command downloads the stuff and “ put” command uploads the stuff
What port number IMAP uses?
It uses port number 143
What protocol helps with encrypting emails and what port does it use?
The STARTTLS extension uses only one port (587) for encryption communication.
What was the traditional TLS terminology in securing email protocols?
So when the emails were secured for the first time, they used TSL in such a way in clients that first clients connected to email servers using olds ports like SMTP 25, IMAP 143 and then it switched to secure TLS encrypted session.
So attackers could monitor and see some data.
Then as a solution came the STARTTLS that encrypted the email data from the beginning. It used just one port number for all protocols (IMAP, pop, SMTP) which was 465.
And then STARTTLS start happening on port number 587
For network+ exam, there was rlogin client as well which ran on port 513
It has been replaced by SSH.
What are IPAM ( IP ADDRESS MANAGEMENT ) tools?
IPAM tool tracks and manage allotted IP addresses, keeping address requirement available for server and VM farms.
Define main 3 kinds of access controls.
MAC - Mandatory Access Control - in this one, the actual resource was labeled like too secret, and based on this label we had access to it or not. These is a oldy thing.
Then cane the this one -
DAC - Discretionary Access Control - in this one, resources were given tags like this one is owner of this file and this can only read file. Better than MAC
THEN ->
Role-Based Access Control - RBAC - in this one, permissions are given to groups like Sales, or accounting group (based on the role)
What does a RADIUS setup look like?
RADIUS - Remote authentication dial-in user service
RADIUS Supplicant——-R client——R server
RADIUS client cane be a wireless router but not the actual device that provides user name / password or some other means of authentication.
It’s not necessary for RADIUS server to have all the user name / password database. Fot example - in a enterprise environment, it can check the user name password with the database in ACTIVE DIRECTORY
It uses UDP Connection
What port number is used by TACACS+
TCP 49
What is the common use of Kerbros?
It provides authentication service in Local Area Networks.
Define kerberos.
Kerberos is setup in windows server who can act as a KDC - key distribution centre
KDC consists of 2 services - 1st is authentication service and 2nd is TGS (Ticket granting service)
Here is how it works -
A client sends a hash of user name and password to the KDC / Kerberos server and KDC authenticates it and sends back a TGT (Ticket granting Ticket). Then TGT is time stamped and sent back to the server for authorization.
Then a Token ( time stamped one) is sent back to the client and it kind of usually stays active of 8 hours.
Define EAP. Extensible authentication protocol.
It is a kind of authentication protocol in which server can ask client what kind of authentication client supports and then use that authentication.
Different authentication methods that it can negotiate from are following-
- EAP PSK ( pre shared key)
- PEAP (protected extensible authentication protocol) - uses user name and password
- EAP MD5 - uses hash
- EAP TLS - it can use certificates in which certificates come from the server side and passed down to clients.
Where EAP is mostly used?
It is used in wireless networks. Kerberos dominates over wired networking authentication.