Week 7 - DNS, Management and Security Flashcards
What is DNS?
Domain Name System
- Solution to directory problem for hosts
- Distributed (no single point of failure)
- Local control and update (accuracy of information)
- Replicable (secure)
- Consistent (everyone has same view of data)
What are zones of control?
Each zone has a primary server
Each zone is in charge of information about the zone
For performance & availability each zone has backup servers
How does DNS lookup work?
- A local machine asks its local dns server for www.ibm.com
- The dns1 server asks a root name server m for www.ibm.com
- The root server m refers dns1 to the .com name server f (referral)
- The root server f refers dns1 to the ibm.com name servers y
- THe root server y responds with www.ibm.coms address
After this query the dns1 now knows:
- THe name and ip address of the .com name servers (m)
- The name and ip address of the ibm.com name servers (y)
- The IP address of www.ibm.com
Now the resolution process is cached to directly go to the correct root server and avoid referral. Cache will have a TTL that allows for reduced queries but without losing ability to change addresses efficiently.
DNS lookups can be done in an iterative mode or a recursive mode.
What is the difference between authoritative and non-authoritative dns lookup answers?
Authoritative is from the server, non-authoritative is from the cache.
What are the main types of DNS records?
What is SNMP?
Simple Network Management Protocol (SNMP)
Manages information that is:
- static: information that characterises the current config (e.g. number of interfaces)
- dynamic: related to events in the networks (e.g. number of packets)
- statistical: information derived from dynamic information (e.g. average packets per unit of time).
Runs over UDP as messages are small
How does SNMP work?
Monitoring application:
- functions visible to the user/manager
- performance monitoring, fault monitoring, security monitoring, account monitoring
Manager function:
- performs basic monitoring function of retrieving info
Agent function:
- gathers and records management information for one or more network elements and communicates the information to the network monitoring elements
- usually runs in the router/switch and listens/replies to information requests
Managed Objects:
- the resources
- queue sizes, number of packets on each interface, number of packets with errors, abnormal occurences
Monitoring Agent:
- Generates summaries and stats from info
Whats the difference between polling and traps?
Polling is when the management station continuously tries to get the status information about hte managed devices.
Traps occur when something abnormal happens in the management station.
Crucial for network efficiency.
Traps are not acknowledged by the monitoring station which can cause problems. Threshold of when trap is sent is configurable. Trap is usually packed with information in the form of MIB objects and their values.
What is MIB?
An MIB is a database where each resource is represented by an object. It is a tree structure. Each system (router, switch) maintains one for i its managed resources.
What is an SMI?
SMI (Structure of Management Information) defines the general framework in which an MIB can be defined.
What are the four main SNMP functions?
GetRequest()
GetNextRequest()
GetResponse()
SendTrap() - can only be run by server not client
How is polling frequency calculated?
Example:
Polling every 15 minutes
Processing time of 50ms
Network delay of 1ms
N <= 15x60/0.202=4500
What are the SNMPv2/SNMPv3 enhancements?
SNMPv2:
- No security mechanisms
- New structure of Management Information (SMI)
- Manager to Manager capabilities
- New protocol operations
SNMPv3:
- Administration and security added
Name some network security risks?
Confidentiality - Someone intercepts packets between two entities (man-in-the-middle attack) - packet sniffer.
Authentication - Someone pretends to be someone else (phishing, dns poisoning, fake email address)
Non-repudiation - Charlier sends message to ALice but then claims he didn’t send it.
Unauthorized Access - Charlie pretends to be Alice and accesses her resources (password capture, inadequate firewall)
Denial of service - Charlie sends a huge amount of traffic disabling Alice’s server (botnets, SYN floods, source spoofing, email spam)
What steps can be taken to protect a network?
- Security policy
- First step to decide what is to be protected - systems, data, cpu cycles, etc.
- Who is it to be protected from? Who gains the most from the organisations loss
- Is it affordable? Equipment, admin, frustration - extreme end is a system not connected to any network in a locked room. - Physical security
- Theft, access to console, power cuts, floods, fire
- Mitigation includes security, insurance, steel doors, cctv, uninterruptible power supplies (UPS)