Ngày tải lên: 14/02/2014, 08:20
Transportation Asset Management Guide: National Cooperative Highway Research Program (NCHRP) Project 20-24(11) pptx
Ngày tải lên: 08/03/2014, 14:20
Tổng quan về NAT (Network Address Translation)
... cả các DNS data đã được relay bởi NAT Phần I: Giới thiệu tổng quan về NAT (Network Address Translation) I : NAT (Network Address Translation) là gì ? NAT giống như một router, nó chuyển tiếp ... truy tìm chỉ IP thì hoàn toàn không hiệu quả. Đó là trong các ứng dụng virtual server và virtual network bởi vì traffic được sinh ra bởi một IP thì không thể nào phân chia được nữa. Khi chúng ... thế cho nhiều host thật sự (real server) . Chúng ta cũng có thể tạo ra kết nối mạng ảo (virtual network) gồm nhiều mạch thật sự (real wire) dùng kỹ thuật virtual server. Chúng ta có thể làm điều...
Ngày tải lên: 15/08/2012, 10:40
ORACLE NETWORK CONFIGURATION
... TRẢ LỜI BÀI TẬP ORACLE CHƯƠNG 26 ORACLE VÀ CẤU HÌNH MẠNG (ORACLE NETWORK CONFIGURATION) 1. Listener là gì? Cáùc Service chính nào được dùng để phục cho việc truy...
Ngày tải lên: 01/09/2012, 09:45
Network Managerment
... manager of exceptional event Network Management 9-17 SNMP protocol: message formats Network Management 9-2 Chapter 9: Network Management Chapter goals: ❒ introduction to network management ❍ motivation ❍ major ... Reserved Network Management 9-5 Infrastructure for network management agent data agent data agent data agent data managed device managed device managed device managed device managing entity data network management protocol definitions: managed ... IP routes.” REVISION “019331000Z” ……… ::= {mib-2 48} Network Management 9-4 What is network management? ❒ autonomous systems (aka network ): 100s or 1000s of interacting hardware/software...
Ngày tải lên: 12/09/2012, 15:05
Network Layer
... link physical network data link physical network data link physical network data link physical network data link physical network data link physical network data link physical application transport network data link physical application transport network data ... link Network Layer 4-11 Network layer connection and connection-less service ❒ datagram network provides network- layer connectionless service ❒ VC network provides network- layer connection ... layer ❒ network layer protocols in every host, router ❒ Router examines header fields in all IP datagrams passing through it network data link physical network data link physical network data...
Ngày tải lên: 12/09/2012, 15:06
Network Security
... K A-KDC (A,B) K A-KDC (R1, K B-KDC (A,R1) ) 8: Network Security 8-2 Chapter 8: Network Security Chapter goals: ❒ understand principles of network security: ❍ cryptography and its many uses ... All Rights Reserved Computer Networking: A Top Down Approach Featuring the Internet , 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2004. 8: Network Security 8-47 Key Distribution ... create a packet “spoofing” Alice’s address “I am Alice” Alice’s IP address 8: Network Security 8-1 Chapter 8 Network Security A note on the use of these ppt slides: We’re making these slides...
Ngày tải lên: 12/09/2012, 15:06
Windown 2003 network security
... Topic 3G Windown 2003 network security Trong chủ đề này, bạn sẽ xem xét các tác động của biến bật / tắt các giao thức NetBIOS trên một máy Windown 2003.NetBIOS là viết tắt của Network Basic Input ... spooled để tăng tốc độ in ấn. 17. Chọn Keep Printed Documents, và click OK. 18. Nhấp đôi chuột vào My Network Places. 19. Nhấp đôi chuột vào Computers Near Me. 20. Nhấp đôi chuột vào printer server...
Ngày tải lên: 14/09/2012, 09:57
Network Procedures
... network (serving network) to a terrestrial network or vice versa due to one of the reasons identified during the handover initiation phase. Handovers involved in two different but integrated networks ... networks. In designing a satellite network, the need for inter-FES handover should be kept to a minimum. Integrated Satellite-Terrestrial Network Scenario In an integrated network, an on-going call may ... For a group usage terminal, access to the network may still be maintained so that other users registered on this terminal can still access the network. Network Procedures 235 required. The path...
Ngày tải lên: 14/09/2012, 11:26
Network Management Quản trị hệ thống mạng
... Introduction to Networking Management 3. Simple Network Management Protocol 4. Network Security 5. Outsourcing the Network I – Cloud Computing & SaaS 6. Outsourcing the Network II – Green ... 10% (PF) + 50% (FE) • Sinh viên đậu khóa học khi: Tổng điểm ≥ 5 và Thi cuối môn học ≥ 5 (of 10) Network Management Quản trị hệ thống mạng Vũ Trí Dũng dungvt@uit.edu.vn Tài liệu tham khảo • Dùng ... Cloud Computing & SaaS 6. Outsourcing the Network II – Green IT and SAN 7. Managing Wireless Networks ...
Ngày tải lên: 15/09/2012, 10:03
The network layer Addressing and routing
... supposed that 2 IP sub -network share physically the same LAN. The stations on each sub -network then will see circulating all the packets diffused on the physic network. 1 The network layer Addressing ... rental lease) 7 - Engineers network link: 2B-14-62-91-C9-B1 - Engineers network link towards the external router: 2B-14-62-3F-39-21 - Commercial network link: 1C-96-AA-F4-C2-91 - Commercial network link towards ... 194.12.230.140. 1. Propose a mask of sub -network for the network of company. 194.12.230.0 is a Class C address, the last byte must be used to encode the numbers of sub -network and the numbers of hosts...
Ngày tải lên: 17/09/2012, 09:13
Securing the Network Infrastructure
... many false alarms Network Monitoring and Diagnostic Devices • SNMP enables network administrators to: – Monitor network performance – Find and solve network problems – Plan for network growth • Managed ... and network equipment – Can be used independently of the network and can have their own applications installed • Server: computer on a network dedicated to managing and controlling the network • Basic ... information and infecting the network Hardening Network Security Devices • The final category of network devices includes those designed and used strictly to protect the network • Include: – Firewalls – Intrusion-detection...
Ngày tải lên: 17/09/2012, 10:43
Outsourcing the Network II - Green IT and SAN
... giữa sáng kiến và hiệu quả của nó SAN solution Hợp nhất việc lưu trữ • SAN (Storage Area Network) và NAS (Network Attached Storage) là hai cách để tổ chức lại một hệ thống vào trong một nguồn ... chủ thông qua một card adapter, và thiết bị lưu trữ chỉ phục vụ cho một server duy nhất • NAS (network attached storage): là một dạng mạng LAN cơ bản chạy trên máy chủ file server sử dụng giao...
Ngày tải lên: 17/09/2012, 10:43
NETWORK SECURITY
... Header checksum Source Address Destination Address Options Data AN TOÀN DỮ LIỆU TRÊN ĐƯỜNG TRUYỀN Network Security Course 9 m m’ Trudy ♦ Making data un-readable by protocol analyzers and other “man-in-the-middle” methods on the network. Alice Bob BÀI TẬP 4 Sau khi dùng Sniffing software để bắt thông tin phân tích gói thông tin gửi đi từ host A Gói 1: Protocol ... description 0 0 echo reply (ping) 3 0 dest. network unreachable 3 1 dest host unreachable 3 2 dest protocol unreachable 3 3 dest port unreachable 3 6 dest network unknown 3 7 dest host unknown 4 ... nhập 6. Kỹ Thuật Mã hóa 7. Hệ thống xác thực 8. Virtual Private Networks 9. Kỹ Thuật tấn công 10. Luật, chính sách an toàn thông tin 11 Network Security Course CƠ BẢN VỀ AN NINH MẠNG CƠ BẢN VỀ AN NINH MẠNG Các...
Ngày tải lên: 17/09/2012, 10:44
Virtual Private Network (VPN)
... SUMMARY VPNs do not make use of dedicated leased lines VPNs send data through a secure tunnel that leads from one endpoint to another VPNs keep critical business communications private and secure VPN components VPN servers VPN clients Protocols 39 TUNNELING PROTOCOLS Layer 2 Tunneling Protocol (L2TP) Provides better security through IPSec IPSec enables L2TP to perform Authentication Encapsulation Encryption 18 TUNNELING PROTOCOLS Secure Shell (SSH) Provides authentication and encryption Works with UNIXbased systems Versions for Windows are also available Uses publickey cryptography Socks V. 5 Provides proxy services for applications That do not usually support proxying Socks version 5 adds encrypted authentication and support for UDP 20 16 ENCRYPTION SCHEMES USED BY VPNS (CONTINUED) Secure Sockets Layer (SSL) (continued) Steps Server uses its private key to decode premaster code Generates a master secret key Client and server use it to generate session keys Server and client exchange messages saying handshake is completed SSL session begins 34 SUMMARY (CONTINUED) VPN types Sitetosite Clienttosite Encapsulation encloses one packet within another Conceals the original information VPN protocols Secure Shell (SSH) Socks version 5 PointtoPoint Tunneling Protocol (PPTP) Layer 2 Tunneling Protocol (L2TP) 40 Virtual Private Network (VPN) 29 BIếN ĐổI ĐÓNG GÓI TRONG VPN (ENCAPSULATION) Các buớc trong tiến trình VPN Đóng gói (Encapsulation) Mã hoá (Encryption) Xác thực (Authentication) Encapsulation Đóng gói dữ liệu và các thông số khác nhau Ví dụ như IP header Bảo vệ tính nguyên vẹn dữ liệu 15 31 27 VPN CORE ACTIVITY 2: ENCRYPTION Encryption Process of rendering information unreadable by all but the intended recipient Components Key Digital certificate Certification Authority (CA) Key exchange methods Symmetric cryptography Asymmetric cryptography Internet Key Exchange FWZ 28 12 SUMMARY (CONTINUED) IPSec/IKE Encryption makes the contents of the packet unreadable Authentication ensures participating computers are authorized users Kerberos: strong authentication system VPN advantages High level of security at low cost VPN disadvantages Can introduce serious security risks 41 24 10 25 5 ENCRYPTION SCHEMES USED BY VPNS Triple Data Encryption Standard (3DES) Used by many VPN hardware and software 3DES is a variation on Data Encryption Standard (DES) DES is not secure 3DES is more secure Three separate 64bit keys to process data 3DES requires more computer resources than DES 30 WHY ESTABLISH A VPN? VPN combinations Combining VPN hardware with software adds layers of network security One useful combination is a VPN bundled with a firewall VPNs do not eliminate the need for firewalls Provide flexibility and versatility 13 FIREWALL CONFIGURATION FOR VPNS 37 Protocol ... SUMMARY VPNs do not make use of dedicated leased lines VPNs send data through a secure tunnel that leads from one endpoint to another VPNs keep critical business communications private and secure VPN components VPN servers VPN clients Protocols 39 TUNNELING PROTOCOLS Layer 2 Tunneling Protocol (L2TP) Provides better security through IPSec IPSec enables L2TP to perform Authentication Encapsulation Encryption 18 TUNNELING PROTOCOLS Secure Shell (SSH) Provides authentication and encryption Works with UNIXbased systems Versions for Windows are also available Uses publickey cryptography Socks V. 5 Provides proxy services for applications That do not usually support proxying Socks version 5 adds encrypted authentication and support for UDP 20 16 ENCRYPTION SCHEMES USED BY VPNS (CONTINUED) Secure Sockets Layer (SSL) (continued) Steps Server uses its private key to decode premaster code Generates a master secret key Client and server use it to generate session keys Server and client exchange messages saying handshake is completed SSL session begins 34 SUMMARY (CONTINUED) VPN types Sitetosite Clienttosite Encapsulation encloses one packet within another Conceals the original information VPN protocols Secure Shell (SSH) Socks version 5 PointtoPoint Tunneling Protocol (PPTP) Layer 2 Tunneling Protocol (L2TP) 40 Virtual Private Network (VPN) 29 BIếN ĐổI ĐÓNG GÓI TRONG VPN (ENCAPSULATION) Các buớc trong tiến trình VPN Đóng gói (Encapsulation) Mã hoá (Encryption) Xác thực (Authentication) Encapsulation Đóng gói dữ liệu và các thông số khác nhau Ví dụ như IP header Bảo vệ tính nguyên vẹn dữ liệu 15 31 27 VPN CORE ACTIVITY 2: ENCRYPTION Encryption Process of rendering information unreadable by all but the intended recipient Components Key Digital certificate Certification Authority (CA) Key exchange methods Symmetric cryptography Asymmetric cryptography Internet Key Exchange FWZ 28 12 SUMMARY (CONTINUED) IPSec/IKE Encryption makes the contents of the packet unreadable Authentication ensures participating computers are authorized users Kerberos: strong authentication system VPN advantages High level of security at low cost VPN disadvantages Can introduce serious security risks 41 24 10 25 5 ENCRYPTION SCHEMES USED BY VPNS Triple Data Encryption Standard (3DES) Used by many VPN hardware and software 3DES is a variation on Data Encryption Standard (DES) DES is not secure 3DES is more secure Three separate 64bit keys to process data 3DES requires more computer resources than DES 30 WHY ESTABLISH A VPN? VPN combinations Combining VPN hardware with software adds layers of network security One useful combination is a VPN bundled with a firewall VPNs do not eliminate the need for firewalls Provide flexibility and versatility 13 FIREWALL CONFIGURATION FOR VPNS 37 Protocol ... 1723 TUNNELING PROTOCOLS PointtoPoint Tunneling Protocol (PPTP) Used when you need to dial in to a server with a modem connection On a computer using an older OS version Encapsulates TCP/IP packets Header contains only information needed to route data from the VPN client to the server Uses Microsoft PointtoPoint Encryption (MPPE) Encrypt data that passes between the remote computer and the remote access server L2TP uses IPSec encryption More secure and widely supported 17 NỘI DUNG Nguyên lý VPN Các biến đổi đóng gói trong VPNs Mã hoá trong VPNs Xác thực trong VPNs Ưu nhược điểm của VPNs 2 VPN CORE ACTIVITY 3: AUTHENTICATION Authentication Identifying a user or computer as authorized to access and use network resources Types of authentication methods used in VPNs IPSec MSCHAP Both computers exchange authentication packets and authenticate one another VPNs use digital certificates to authenticate users 35 ...
Ngày tải lên: 17/09/2012, 10:44
Bạn có muốn tìm thêm với từ khóa: