10 Topics About Networking

·

4 min read

1. Basics of Networking

  • NETWORK — Collection of computers and devices connected together for communication & data exchange between them.

  • NODES — Devices connected to the Network. Includes computers, servers, printers, routers

  • Protocols — Set of rules and standards how data is transfer over network like TCP,HTTP,FTP

  • LAN (LOCAL AREA NETWORK) — Network that covers a very small area

  • WAN (WIDE AREA NETWORK) — Network that covers a wide area like city, country.

  • IP Address — Unique Numerical Id for every device on network

  • Firewall — Monitor and control the inbound and outbound network traffic

2. IPv4 and Subnetting

IPv4 = Internet Protocol version 4

  • It uses 32 bit address. It has both public and private IP’s. Starts from 0.0.0.0 to 255.255.255.255 approx 4 billion ip address. Inthat 18million address are private.

10.0.0.0 — 10.255.255.255 — (24 bit) Class A — 1,67,77,216

172.16.0.0 — 172.31.255.255 — (20 bit) Class B — 10,48,576

192.168.0.0 — 192.168.255.255 — (16 bit) Class C — 65,536

Subnetting

  • It is a Network inside the network (dividing larger network into smaller)

  • To improve Network performance and security subnets are used.

3. FIREWALL

  • It’s a Network Security Device that monitors and filters inbound and outbound network traffic.

  • Firewall is the first line of defence in network security.

  • It can be Hardware, Software, Software as a Service (SaaS), Public Cloud , Private Cloud (virtual)

TYPES OF FIREWALL

  • PROXY FIREWALL — Filter network in Application layer ,Gateway from one network to another.

  • PACKET FILTERING — Control data flow

  • STATEFUL INSPECTION — Allow or Block Network traffic based on state,port and protocol

  • Next Generation Firewall — Deep pocket Inspection, intrustion prevention

  • UTM (Unified Threat Management) — Capabilities of stateful inspection, Intrustion Prevention and antivirus in a loosely linked manner

  • Thread Focused — Advanced Threat detection.

4. Inbound and Outbound rules in Firewall

INBOUND — Protect Network against incoming traffic

OUTBOUND — Project against outgoing traffic

5. DHCP Server

  • DHCP — Dynamic Host Configuration Protocol

  • It maintains a unique IP address for a host using the server

  • DHCP also provide DNS(Domain Name System) server

  • DHCP port numbers used for servers and clients are 67 and 68 respectively

6. DNS Server

  • Domain Name System (DNS) is the Phonebook of the Internet

  • Four servers work together to deliver IP address to the Client

  • DNS Caching — The recursive resolver store the information for a limited amount of time. Meantime host hit the same server instead of doing the domain lookup process, simply respond to the client instantly

  1. Recursive Resolver

  2. Root nameservers

  3. TLD nameservers — Top Level Domain

  4. Authoritative nameservers

DNS LOOKUP

7. Cloud Flare and How to Use

  • Cloud Flare — Its a large network of servers that can improve the Security, Performance and Reliability of anything connected to the Internet. Cloud flare is the Content Delivery Network by providing Edge locations.

  • Performance Improved by providing the Edge Locations. Example: If a cloud flare customer’s server is in USA, if the client access the server in Europe cloud flare provides their servers to reach the client without latency

8. DNS Records

  • Provides Information about a domain including what IP address is associated with the domain. DNS Records also have TTL (Time to Live) defines how often DNS Server clear the records

TYPES OF DNS RECORD:

  1. A record — Holds IP Address of the Domain. (IPv4)

  2. AAAA record — Holds IPv6 Address

  3. CNAME record — CNAME (Canonical Name) map one domain to another

  4. MX record — Directs mail to an E-mail server

  5. TXT record — Store text in records

  6. NS record — Store Name Server for DNS entry

  7. SOA record — Stores Admin Information

9. Point DNS Records

  • Connecting DOMAIN NAME to the Web Host Server

  • Pointing is the one last steps before server goes live

10. How to Secure Network

  1. Network Access Control — Only Authenticated and trusted endpoint devices can get into the system.

  2. Firewall Security — Monitor and filters the incoming and outgoing network traffic. It follows defined rules of IP address and ports to allow or deny traffic

  3. Intrusion Prevention System (IPS) — Identify and Prevent unusual network traffic. Its does not follow any static rules like firewall but actively analyze, learn and create rules. EXAMPLE: If Firewall is your Building Security Gate, IPS is like your security guard behind the gate

  4. Security Information and Event Management (SIEM) -It sends out reports on security-related events like failed logins and sends out alerts if its analysis indicates a potential security issue