Module 4 Flashcards

Learning Unit 3 (38 cards)

1
Q

TCP/IP Message Encapsulation Process

A
  • Layers 7–5 (Application, Presentation, Session): Payload (data and instructions) created by an app (e.g., a browser).
  • Layer 4 (Transport): TCP/UDP adds a header with port numbers → becomes a segment (TCP) or datagram (UDP).
  • Layer 3 (Network): IP adds its header with destination IP address → becomes a packet.
  • Layer 2 (Data Link): NIC adds header and trailer with physical (MAC) address → becomes a frame.
  • Layer 1 (Physical): Frame is transmitted as electrical/light/wave signals.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Connectivity Devices by OSI Layer

A
  • Layer 1: Devices like hubs only pass bits along, no processing.
  • Layer 2: Switches read/process Data Link (MAC) headers. Known as Layer 2 devices.
  • Layer 3: Routers read/process Network (IP) headers. Known as Layer 3 devices.
  • Layer 4+: Firewalls read Transport headers (ports). Layer 7 firewalls read entire messages to detect malware.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TCP Overview – Reliable Delivery

A
  • Connection-Oriented: Establishes a session using a three-way handshake before transmitting.
  • Sequencing & Checksums: Adds sequence numbers and checksums for reordering and error detection.
  • Flow Control: Sender adjusts transmission rate to match receiver’s buffer using sliding window.
  • Encapsulation: All management is handled in the TCP header; the payload comes from the higher OSI layers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TCP Segment Header Fields (Key Structure)

A
  • Source Port (16 bits): Originating application/process.
  • Destination Port (16 bits): Target application/process.
  • Sequence Number (32 bits): Position in the stream.
  • Acknowledgment Number (32 bits): Confirms receipt, = previous Seq + 1.
  • Header Length (4 bits): TCP header size (20–60 bytes).
  • Reserved (6 bits): For future use.
  • Flags (6 bits): URG, ACK, PSH, RST, SYN, FIN.
  • Window Size (16 bits): Max bytes before needing ACK (flow control).
  • Checksum (16 bits): Error-checking of the segment.
  • Urgent Pointer (16 bits): Marks urgent data location.
  • Options (0–32 bits): E.g., max segment size.
  • Padding (variable): Aligns header to 32-bit multiple.
  • Data (variable): Payload from application layer—not part of header.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TCP Segment Flags (Control Bits)

A
  • URG: Urgent pointer is valid.
  • ACK: Acknowledgment number is valid.
  • PSH: Push data to app immediately.
  • RST: Reset the connection.
  • SYN: Initiate connection (sync sequence numbers).
  • FIN: Terminate the connection.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TCP Three-Way Handshake (Connection Establishment)

A
  • Step 1 (SYN): Client sends SYN segment (SYN=1), picks random Seq # (e.g., 937013558), ACK=0.
  • Step 2 (SYN-ACK): Server replies with SYN=1 and ACK=1. ACK number = client’s Seq + 1. Server sends its own Seq #.
  • Step 3 (ACK): Client responds with ACK=1. Seq = previous ACK, ACK = server’s Seq + 1.
  • Data Transmission Follows: Real payload begins after this, with sequence numbers increasing by data length.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCP Flow Example: Sequence Numbers

A
  • Initial Seq # from A: 937013558 → A sends SYN
  • B Responds with: ACK=937013559, Seq=3043958669
  • A Responds with: Seq=937013559, ACK=3043958670
  • Next payload (e.g., 725 bits): A’s new Seq = 937014284 (937013559 + 725)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IP Protocol Overview

A
  • Internet Protocol (IP) is a network layer (Layer 3), connectionless protocol.
  • It enables data delivery across multiple LANs and networks via routers.
  • IP does not ensure packet order or delivery—this is handled by TCP or UDP.
  • Each IP packet is routed independently and may take different paths to the destination.
  • Versions:
    o IPv4: Introduced 1981, still most used.
    o IPv6: Released 1998, offers more addresses, security, and prioritization.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPv4 Packet Structure

A
  • Version (4 bits): Protocol version (IPv4).
  • IHL (4 bits): Header length in bytes (20–60).
  • DiffServ (8 bits): Router processing priority (QoS).
  • Total Length (16 bits): Entire packet size (max 65,535 bytes).
  • Identification (16 bits): Helps reassemble fragmented packets.
  • Flags (3 bits): Fragmentation control.
  • Fragment Offset (13 bits): Position of fragment in sequence.
  • TTL (8 bits): Router hops allowed before discard (usually 32 or 64).
  • Protocol (8 bits): Type of payload (TCP, UDP, ICMP, etc.).
  • Header Checksum (16 bits): Detects header corruption.
  • Source/Destination IP (32 bits each): IPv4 addresses.
  • Options (variable): Optional routing/timing info.
  • Padding (variable): Aligns header to 32-bit multiple.
  • Data (variable): Encapsulated data from higher layers (not part of header).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IPv6 Packet Structure

A
  • Version (4 bits): Protocol version (IPv6).
  • Traffic Class (8 bits): Packet priority (similar to DiffServ).
  • Flow Label (20 bits): Identifies related packet flow for prioritization.
  • Payload Length (16 bits): Size of data (not header).
  • Next Header (8 bits): Type of following header (e.g., TCP/UDP).
  • Hop Limit (8 bits): Max router hops (like TTL).
  • Source/Destination IP (128 bits each): Full IPv6 addresses.
  • Data (variable): Encapsulated higher-layer data (not part of header).
  • IPv6 does not include fragmentation fields (host adjusts size before sending).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ICMP and ICMPv6

A
  • ICMP (Internet Control Message Protocol): Layer 3 protocol for error reporting and diagnostics.
  • Informs about delivery failures, TTL expiry, or congestion.
  • ICMP does not fix errors—higher layers (like TCP) do that.
  • Commonly used by tools like ping.
  • ICMP messages include both IP and ICMP headers.

ICMP Header Fields:
* Type (8 bits): ICMP message type (e.g., Destination Unreachable).
* Code (8 bits): Message subtype (e.g., Host Unknown).
* Checksum (16 bits): Corruption detection.
* Rest of Header (32 bits): Varies by message type.
* Data (variable): Includes triggering IP header + 8 bytes of data (not part of ICMP header).

ICMPv6:
* Replaces ICMPv4 + ARP in IPv6.
* Adds neighbor discovery, error messages, and multicast group management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARP (Address Resolution Protocol)

A
  • ARP resolves IPv4 addresses to MAC addresses (used within local subnet).
  • Operates at Layer 2 but interacts with Layer 3 (often called Layer 2.5).
  • Sends broadcasts asking, “Who has IP X? Tell me your MAC.”
  • Replies are unicast with the MAC address.

ARP Table (aka ARP Cache):
* Stores IP-to-MAC mappings.
* Dynamic Entries: Auto-added from ARP responses.
* Static Entries: Manually added with arp command.
* To view ARP table on Windows: use arp -a in Command Prompt or PowerShell.
* Each OS formats ARP tables differently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

States of Data Security

A

Data exists in three states:
* At rest: Most secure; protected by firewalls, anti-malware, physical security (e.g., locked room). Best practice: divide data into separate, individually meaningless parts.
* In use: Inherently risky as it must be accessible. Controlled via strict access and authentication.
* In motion: Most vulnerable. Transmitted data (especially wirelessly) faces risks of interception or tampering. Encryption adds essential protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CIA Triad

A

The CIA triad guides encryption protocol design:
* Confidentiality: Only intended recipients can view data.
* Integrity: Data isn’t altered during transmission.
* Availability: Data is accessible to intended users when needed. Sender must ensure delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Key Encryption Types

A

Key encryption scrambles data into ciphertext using keys and algorithms.
* Private key encryption (symmetric): Same key used for encryption and decryption. Risk: secure key sharing.
* Public key encryption (asymmetric):
o Data is encrypted with a public key, decrypted with a private key (or vice versa).
o Ensures confidentiality and integrity.
o Uses key pairs (public + private key).
o Public keys are distributed via public key servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PKI and Digital Certificates

A
  • Digital certificate: Small file with verified ID + public key.
  • Issued/verified by a CA (Certificate Authority).
  • System of managing certificates = PKI (Public-Key Infrastructure).
  • Helps identify users and securely manage public keys.
17
Q

IPsec Overview

A

IPsec (Internet Protocol Security) secures TCP/IP transmissions at the network layer.
* Native to IPv6; adds security headers and encrypts payloads.
* Supports both authentication and encryption.

Five IPsec steps:
1. Initiation: Triggered by policy-defined traffic.
2. Key management (via IKE & ISAKMP):
o IKEv2: Negotiates/exchanges keys.
o ISAKMP: Establishes key management policies.
3. Security negotiation: Define protection parameters.
4. Data transfer:
o Encrypted via AH (Authentication Header) or ESP (Encapsulating Security Payload).
o ESP encrypts full IP packet; both ensure authentication.
5. Termination: Regular renegotiation to prevent attacks.

Modes:
* Transport mode: Host-to-host encryption.
* Tunnel mode: Used in VPNs between network devices.

18
Q

SSL and TLS Overview

A
  • SSL (Secure Sockets Layer) and TLS (Transport Layer Security) encrypt TCP/IP transmissions (e.g., websites, email).
  • SSL = legacy; TLS = modern standard (TLS is preferred, SSL deprecated).
  • Encrypts protocols like HTTP (HTTPS = TCP port 443), SMTP, IMAP, POP3, LDAP.
  • Public key encryption establishes secure sessions.
19
Q

SSL/TLS Session and Handshake Process

A
  • A session defines agreed-upon encryption for communication between client/server.
  • Handshake Protocol:
    1. Client Hello: Sends capabilities + random session ID.
    2. Server Hello: Confirms terms, may provide certificate or public key.
    3. Certificate exchange: Establishes session keys; client encrypts data using server’s public key.
    4. Secure session starts.
  • TLS 1.2: Up to 10 steps, 3 round trips, uses public key encryption to set up, then switches to private key for speed.
  • TLS 1.3: Streamlined—1 round trip. 0-RTT mode can skip handshake for faster reconnections.
20
Q

Remote Access Overview

A

Remote access allows a client to connect to a LAN, WAN, or server from a different location to access files, apps, and resources.
Requires:
* A transmission path
* Remote access server (RAS) software on both client and host

Types of RAS:
* Dedicated Devices: e.g., Digi Connect IT 48, authenticate via credential matching
* Software on Server: e.g., Windows DirectAccess (since Server 2008 R2) and Always On VPN (since Server 2012 R2), authenticate users to Windows domain

Common Methods:
* Remote file access (e.g., FTP)
* Terminal emulation (e.g., SSH, Telnet)
* VPNs

Security: Encryption is often necessary. Some protocols natively support it; others require pairing with encryption protocols.

21
Q

Remote File Access Protocols

A
  • FTP: Transfers files using port 21 (control) and port 20 (data). No encryption.
  • FTPS: FTP over SSL/TLS. Encrypts control and data channels. Uses ports 989 & 990 or negotiates a port range. Complex with firewalls.
  • SFTP: Built on SSH (not FTP). Uses single channel over port 22. Provides encryption and authentication. Incompatible with FTP/FTPS.
  • TFTP: Simplified FTP using UDP and port 69. No authentication or encryption. Limited to 4 GB transfers. Used for boot/config files in internal networks.
22
Q

Terminal Emulation Concepts

A

Terminal emulation lets a remote client control a host as if physically present.
Privileges can range from screen viewing to full app execution and file editing.
Examples:
* CLI-based: Telnet, SSH
* GUI-based: RDP (Windows Remote Desktop), VNC, TeamViewer, join.me
Use cases: Accessing proprietary software remotely, managing network devices, remote IT support.

23
Q

Telnet

A

A command-line terminal emulation protocol with minimal security.
* No encryption
* Poor authentication
* Uses default port (not specified; typically port 23)

Usage:
* Enable Telnet in OS
* Command: telnet <IP>
* End session: Ctrl + ] → quit
Example: A network admin modifies a remote router's settings via Telnet.</IP>

24
Q

SSH (Secure Shell)

A

SSH provides secure remote terminal access via encryption and authentication.
* Encrypts full session (data and commands)
* Prevents: unauthorized access, data interception, IP & DNS spoofing
* Port: 22

Encryption: Triple DES, AES, Blowfish, etc.

Authentication Methods:
1. Password
2. Public/Private Keys:
o Generate keys (ssh-keygen)
o Transfer public key to host
o Upon connection, keys are exchanged for authentication
* Tools: PuTTY (supports SSH & Telnet)
* Built into UNIX/Linux/macOS; Windows requires separate SSH client

25
Remote Desktop Protocol (RDP)
A Microsoft protocol for GUI-based remote access to Windows computers. • Provides full desktop GUI (windows, sound, shortcut keys) • Can interact with remote hypervisors and VMs • Uses SSL/TLS for secure transmission • Handles multiple users via Remote Desktop Gateway: o Uses a single public IP with port forwarding o Integrates with Active Directory for authentication o Authorizes user access and logs RDP activity o Avoids the need for VPN encryption Use case: Providing students or remote workers with consistent virtual desktop access via hosted VMs.
26
VPN Overview
* VPN = Virtual Private Network; encrypted, private connection over public networks (e.g., Internet) * Enables secure access to remote networks without costly leased lines * Uses encryption and encapsulation for privacy * Often built into OS or hardware (routers, firewalls) * Common in UNIX: router-based VPNs * Common in Windows: server-based VPNs * Third-party VPN software available for Windows, UNIX, Linux
27
VPN Types
Site-to-site VPN: * Connects multiple LANs via VPN gateways (router/firewall/remote access server with VPN software). * No VPN software needed on individual hosts. * Requires static public IPs at all locations. Client-to-site VPN (host-to-site): * Individual clients connect to a VPN headend at the LAN edge. * Headend needs static IP * clients use software or SSL/TLS-secured browser (clientless VPN). * Hosts on LAN do not require VPN software. Host-to-host VPN: * Direct tunnel between two computers, each requiring VPN software. * Site receiving VPN usually needs a static IP or uses Dynamic DNS.
28
VPN Characteristics
VPNs provide: * Privacy over public networks * Encryption via IPsec, OpenSSL, or SSL/TLS * Encapsulation of entire data frames Each configuration is unique and depends on needs like distance, user count, and bandwidth.
29
Tunneling Concepts
VPNs use tunneling to encapsulate higher-layer protocols, allowing traffic (like full frames) to be securely transported within IP packets. The original frame is extracted and used normally at the destination. * Full Tunnel: All traffic (local + corporate) goes through the VPN. Local network is inaccessible; IP address is assigned from remote network. * Split Tunnel: Only corporate traffic goes through VPN; local and Internet access is direct. Reduces latency, increases privacy, and saves bandwidth.
30
VPN Tunneling Protocols
* L2TP: Layer 2 protocol by Cisco + IETF. Connects routers, remote access servers, or clients. Always paired with IPsec for encryption. Vendor-neutral. * GRE: Layer 3 Cisco protocol for tunneling IP and other protocols. Used with IPsec for added security. Supports IPv6-over-IPv4. * OpenVPN: Open-source, highly secure, customizable protocol using OpenSSL. Works through firewalls where IPsec might fail. * IKEv2: Part of IPsec suite. Known for fast performance, stability during network changes, and wide compatibility. Often seen as most secure.
31
Multipoint VPNs (Enterprise VPNs)
When connecting multiple branches: * GRE: Supports VPN tunneling but is point-to-point only. * mGRE (Multipoint GRE): Cisco’s enhancement allowing multiple tunnels from one interface. Adds routing layer for overlay (VPN) and underlay (Internet) networks. * DMVPN (Dynamic Multipoint VPN): Cisco protocol using mGRE to dynamically establish tunnels. Hub router needs static IP; spoke routers use it to discover others. Enables spoke-to-spoke tunnels and scales better.
32
Remote Access Policies
To ensure secure remote access: * Devices must have up-to-date patches, anti-malware, firewalls. * Strong password + biometric security. Auto-lock after inactivity. * Passwords must be strong, changed regularly, and not shared. * Encrypt internal and external storage (watch for legal restrictions abroad). * Company/customer data must be kept secure during all access, storage, or transfer. * Lost/stolen devices must be reported promptly (e.g., within 72 hours). * VPNs with encryption are required for remote access to company resources. * Full tunnel VPNs prevent access to other networks while connected. * Remote sessions must be closed when unused and set to auto-timeout.
33
TCP/IP Troubleshooting Tools – Part 1
* ping: Verifies network connectivity between two nodes using ICMP echo requests and replies. * ipconfig (Windows) / ip / ifconfig (Linux/UNIX): Displays/manages TCP/IP configuration (IP, DNS, gateway). * hostname: Shows the local device’s name on the network. * nslookup: Queries DNS servers, provides basic DNS record lookup. * dig: More advanced DNS querying than nslookup. * telnet: Opens an unsecured CLI session with a remote host. * ssh: Opens a secured CLI session with a remote host. * arp: Views or manipulates the ARP table (IP-to-MAC mappings).
34
TCP/IP Troubleshooting Tools – Part 2
* netstat: o Shows TCP/IP statistics, active connections, and listening ports o Displays data errors and traffic by interface o Useful for detecting traffic bottlenecks or hardware issues o Windows and Linux versions differ in syntax * nmap: o Detects, identifies, and monitors devices on a network o Useful for scanning open ports and discovering hosts * tcpdump: o Command-line packet sniffer (Linux/UNIX) o Captures traffic on network interface, outputs to file o Must run as root or with sudo o More raw than Wireshark; great for security diagnostics * Wireshark (mentioned indirectly): GUI-based protocol analyzer for in-depth traffic analysis
35
traceroute / tracert Overview
* Purpose: Traces the path between nodes, showing each intermediate hop * Mechanism: o Uses limited TTL values on packets (probes) o Each router along the path returns an error or reply o Sends 3 probes per TTL to measure latency * OS Differences: o traceroute (Linux/macOS): Uses UDP datagrams to random unused port o tracert (Windows): Uses ICMP echo requests * Final responses: o traceroute: ICMP "port unreachable" o tracert: ICMP echo reply * Failure reasons: 1. Destination is offline 2. Target is too busy to respond to probes 3. Firewall blocking ICMP/UDP * Workaround: o Use –z option (traceroute only) to delay probes o Use TCP probes if ICMP/UDP are blocked * Limitations: o Cannot detect router misconfigurations or dynamic route changes o Works best when familiar with expected route behavior
36
Common Troubleshooting Scenarios & Tools Summary
* Command | Use o arp: View/edit ARP table o dig: Advanced DNS queries o ipconfig/ip/ifconfig: View/manage IP config o netstat: View connection stats and port use o nmap: Network scanning and host discovery o nslookup: Basic DNS server queries o ping: Verify node-to-node connectivity o ssh: Secure remote CLI session o telnet: Insecure remote CLI session o tcpdump: Capture network traffic o traceroute/tracert: Path trace between nodes
37
Duplicate MAC Addresses
* Acceptable: On separate networks, no issues occur * Problematic: On same network, causes intermittent connectivity * Causes: o Manufacturer error (reusing MACs) o MAC spoofing (intentional impersonation) * Security risk: o Attackers can spoof MACs to bypass MAC filtering o MAC filtering is not reliable for network access control * Symptoms: o ARP tables flip-flop between two devices with same MAC o Some devices send data to the wrong machine * Most common in: o Large networks with many virtual devices * Solutions: o Detect via switch error logs o Reconfigure duplicate devices manually
38
Hardware Failure Diagnosis
* Symptoms: Slowdowns, outages, or intermittent connectivity * Detection steps: 1. Use traceroute/tracert repeatedly to identify where path fails or delays 2. Aim probes beyond suspected routers for clearer results 3. Use ping to test connectivity to specific devices * Note: ICMP (used by traceroute/ping) is low-priority traffic, so confirm with multiple tests * Devices to check: NICs, routers, switches * Example: o One NIC handles 80% traffic due to failure in another o Use netstat to view traffic per NIC o Confirm issue with hardware diagnostics