Deprecated: Using ${var} in strings is deprecated, use {$var} instead in /s/bach/a/class/cs000/public_html/pmwiki/cookbook/date.php on line 68

Warning: String offset cast occurred in /s/bach/a/class/cs000/public_html/pmwiki/cookbook/steganography.php on line 9

Deprecated: Implicit conversion from float 1260.2884615384614 to int loses precision in /s/bach/a/class/cs000/public_html/pmwiki/cookbook/steganography.php on line 9
CT320 | Lecture / TotalitarianNetworking
CT320

CT320: Network and System Administration

Fall 2017

Totalitarian Networking

See this page as a slide show

CT320: Totalitarian Networking

made at imgflip.com

Happytopia

Unhappy Information

We need to restrict access to:

Access vs. Security

Choke Points

Traffic by port

Any TCP or IP packet is associated with a service, which is mapped to a port:

PortNameExpansionMeaning
22SSHSecure SHellssh/scp commands
25SMTPSimple Mail Transfer Protocolsend email
53DNSDomain Name Systemhost name ⇒ ip address
80HTTPHyperText Transfer Protocolworld-wide web
110POP3Post Office Protocol 3fetch email
123NTPNetwork Time Protocolwhat time is it?
139SMBServer Message BlockWindows file sharing
143IMAPInternet Message Access Protocolfetch email
194IRCInternet Relay ChatChat rooms
443HTTPSHyperText Transfer Protocolworld-wide web
2049NFSNetwork File SystemLinux file sharing

Packet Filtering

DNS access

Email

Blame

IP addresses

The End

Modified: 2017-11-16T14:03

User: Guest

Check: HTML CSS
Edit History Source
Apply to CSU | Contact CSU | Disclaimer | Equal Opportunity
Colorado State University, Fort Collins, CO 80523 USA
© 2015 Colorado State University
CS Building