null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
733426
U2.3 TCP, Routers, VLAN
Description
Nework Security Mind Map on U2.3 TCP, Routers, VLAN, created by jjanesko on 08/04/2014.
No tags specified
nework security
nework security
Mind Map by
jjanesko
, updated more than 1 year ago
More
Less
Created by
jjanesko
over 10 years ago
47
0
0
Resource summary
U2.3 TCP, Routers, VLAN
TCP vs UDP
TCP
connection oriented
UDP
connectionless
TCP handshake
1. node sends packet with SYN flag set
1.1 receiving node puts entry in its connection-half-open table for sending node
2. receiving node replies with a packet that has both SYN and ACK flags set
3. sending node responds with a packed with the ACK flag set
3.1 receiving node removes entry for sending node from its connection-half-open table
RFC 793
4. parties are ready for communication
Denial of Service
SYN flood attack
1.Attacker sends many SYN packets to receiving node.
2. Receiving node adds requests to half-open-connection table.
3. Attacker does not send ACK packet.
4. Receiving node's table gets full. Cannot process anymore connections.
IP source address can be spoofed for a more effective attack.
router
connects and allows communication between networks
Attachments:
U2.3 TCP, Routers - Router Diagram
routes packets in one of 3 ways
1. direct delivery of a packet to a directly connected device
2. indirect delivery of a packet by forwarding the packet to a default router
3. next-hop delivery of a packet over a known route by forwarding to the next hop router
Layer 3 device
VLAN
virtual local area network
a switch's ports are split up so that logically there is more than one local area network configured
subnets - VLANs set up on one switch
VLANs are not meant to be a secure means of separating LANs.
network vulnerability summary
ARP spoofing
MAC flooding
SYN floods
IP Spoofing
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
U2.6 SNMPv3
jjanesko
U2.1 Cables, Hubs, Sniffers
jjanesko
U2.4 LANs, MANs, WANs
jjanesko
U2.5 SNMPv1
jjanesko
U2.1 Cables,Hubs,Sniffers- Thin Ethernet
jjanesko
U2.5 SNMPv1 - architectural model
jjanesko
U2.1 Cables, Hubs, Sniffers - Hub Diagram
jjanesko
U2.2 Switches, ARP - ARP spoofing steps
jjanesko
U2.3 TCP, Routers - Router Diagram
jjanesko
U2.5 SNMPv1 - SNMPv1 protocol stack
jjanesko
U2.2 Switches, ARP
jjanesko
Browse Library