CT320: Network and System Administration

Fall 2018

Totalitarian Networking

See this page as a slide show

CT320 Totalitarian Networking

made at imgflip.com


Unhappy Information

We need to restrict access to:

Access vs. Security

Choke Points

Traffic by port

Any TCP or IP packet is associated with a service, which is mapped to a port:

22SSHSecure SHellssh/scp commands
25SMTPSimple Mail Transfer Protocolsend email
53DNSDomain Name Systemhost name ⇒ ip address
80HTTPHyperText Transfer Protocolworld-wide web
110POP3Post Office Protocol 3fetch email
123NTPNetwork Time Protocolwhat time is it?
139SMBServer Message BlockWindows file sharing
143IMAPInternet Message Access Protocolfetch email
194IRCInternet Relay ChatChat rooms
443HTTPSHyperText Transfer Protocolworld-wide web
2049NFSNetwork File SystemLinux file sharing

Packet Filtering

DNS access



IP addresses

The End

User: Guest

Edit History Source

Modified: 2018-06-24T18:14

Apply to CSU | Contact CSU | Disclaimer | Equal Opportunity
Colorado State University, Fort Collins, CO 80523 USA
© 2018 Colorado State University
CS Building