CT320: Network and System Administration

Fall 2018

Totalitarian Networking

See this page as a slide show

CT320: Totalitarian Networking

made at imgflip.com

Happytopia

Unhappy Information

We need to restrict access to:

Access vs. Security

Choke Points

Traffic by port

Any TCP or IP packet is associated with a service, which is mapped to a port:

PortNameExpansionMeaning
22SSHSecure SHellssh/scp commands
25SMTPSimple Mail Transfer Protocolsend email
53DNSDomain Name Systemhost name ⇒ ip address
80HTTPHyperText Transfer Protocolworld-wide web
110POP3Post Office Protocol 3fetch email
123NTPNetwork Time Protocolwhat time is it?
139SMBServer Message BlockWindows file sharing
143IMAPInternet Message Access Protocolfetch email
194IRCInternet Relay ChatChat rooms
443HTTPSHyperText Transfer Protocolworld-wide web
2049NFSNetwork File SystemLinux file sharing

Packet Filtering

DNS access

Email

Blame

IP addresses

The End

User: Guest

Check: HTML CSS
Edit History Source

Modified: 2017-11-16T14:03

Apply to CSU | Contact CSU | Disclaimer | Equal Opportunity
Colorado State University, Fort Collins, CO 80523 USA
© 2018 Colorado State University
CS Building