ARP Address Resolution Protocol (ARP) is a protocol or procedure that connects an ever-changing Internet Protocol (IP) address to a fixed physical machine address, also known as a media access control (MAC) address, in a local-area network (LAN). Proxy ARP Proxy ARP is a technique by which a proxy device on a given network answers the ARP request for an IP address that is not on that network. The proxy is aware of the location of the traffic's destination and offers its own MAC address as the destination. Gratuitous ARP Gratuitous ARP is almost like an administrative procedure, carried out as a way for a host on a network to simply announce or update its IP-to-MAC address. Gratuitous ARP is not prompted by an ARP request to translate an IP address to a MAC address. Reverse ARP (RARP) Host machines that do not know their own IP address can use the Reverse Address Resolution Protocol (RARP) for discovery. Inverse ARP (IARP) Whereas ARP uses an IP address to find a MAC address, IARP uses a MAC address to find an IP address. The MTU, or ‘Maximum Transmission Unit’, is the largest block of data that can be handled at layer-3 of the OSI model. This is usually IP, so the MTU usually refers to the maximum size a packet can be. he MSS is the maximum size that the payload can be, after subtracting space for the IP, TCP, and other headers. So, if the MTU is 1500 bytes, and the IP and TCP headers are 20 bytes each, the MSS is 1460 bytes TCP is a connection-oriented protocol, whereas UDP is a connectionless protocol. A key difference between TCP and UDP is speed, as TCP is comparatively slower than UDP. Overall, UDP is a much faster, simpler, and efficient protocol, however, retransmission of lost data packets is only possible with TCP. What Is TCP Windowing? "TCP windowing" is what we call it when the Transmission Control Protocol (TCP) uses a sliding window protocol to mitigate problems with clients and servers trying to share segments of data that are too large or small, and therefore cannot transmit effectively. The 8 steps in a DNS lookup: 1. 2. 3. 4. 5. 6. A user types ‘example.com’ into a web browser and the query travels into the Internet and is received by a DNS recursive resolver. The resolver then queries a DNS root nameserver (.). The root server then responds to the resolver with the address of a Top Level Domain (TLD) DNS server (such as .com or .net), which stores the information for its domains. When searching for example.com, our request is pointed toward the .com TLD. The resolver then makes a request to the .com TLD. The TLD server then responds with the IP address of the domain’s nameserver, example.com. Lastly, the recursive resolver sends a query to the domain’s nameserver. 7. 8. The IP address for example.com is then returned to the resolver from the nameserver. The DNS resolver then responds to the web browser with the IP address of the domain requested initially. a. Once the 8 steps of the DNS lookup have returned the IP address for example.com, the browser is able to make the request for the web page: 9. The browser makes a HTTP request to the IP address. 10. The server at that IP returns the webpage to be rendered in the browser (step 10). Next Generation Firewall (NGFW) A next generation firewall (NGFW) provides capabilities beyond that of a stateful network firewall, technology that was first pioneered in 1994 by Check Point Software Technologies. A stateful firewall is a network security device that filters incoming and outgoing network traffic based upon Internet Protocol (IP) port and IP addresses. By intelligently inspecting the payload of some packets, new connection requests can be associated with existing legitimate connections. A next generation firewall adds additional features such as application control, integrated intrusion prevention (IPS) and often more advanced threat prevention capabilities like sandboxing. What is a stateful firewall? Stateful firewalls monitor all aspects of the traffic streams, their characteristics and communication channels. These firewalls can integrate encryption or tunnels, identify TCP connection stages, packet state and other key status updates. What is a stateless firewall? Stateless firewalls use clues from the destination address, source and other key values to assess whether threats are present, then block or restrict those deemed untrusted. Preset rules enforce whether traffic is permitted or denied, but the system is typically unable to determine the difference between truly desired communications and sophisticated attempts to disguise unauthorized communications as trusted ones. As one of the earlier iterations of firewalls, stateless firewalls don't look beyond the header of packet contents to determine if traffic is authorized. NAT types – There are 3 types of NAT: 1. Static NAT – In this, a single private IP address is mapped with a single Public IP address, i.e., a private IP address is translated to a public IP address. It is used in Web hosting. 2. Dynamic NAT – In this type of NAT, multiple private IP addresses are mapped to a pool of public IP addresses. It is used when we know the number of fixed users who want to access the Internet at a given point in time. 3. Port Address Translation (PAT) – This is also known as NAT overload. In this, many local (private) IP addresses can be translated to a single public IP address. Port numbers are used to distinguish the traffic, i.e., which traffic belongs to which IP address. This is most frequently used as it is cost-effective as thousands of users can be connected to the Internet by using only one real global (public) IP address. How NAT protect you:-It hides the IP address of any devices on your network from the outside world giving them all a single address. -It requires every incoming packet of information to have been asked for by a device. if a malicious data packet isn’t on the list of expected communications it gets rejected. -Some firewalls can use whitelisting to block unauthorized outgoing traffic so if you do contract a piece of malware your firewall may prevent it from communicating with your device. IPSEC MESSAGES MM #1 : initiator It includes the SA Proposal MM #2 : responder SA proposal that it chose MM #3 : initiator Diffie-Hellman exchange, beginning of the key exchange MM #4 : responder will send it's own key, encryption should be established MM #5 : initiator Send this message to authenticate the session MM #6 : responder will send back a similar packet and authenticate the session AM #1 : initiator SEND information that was contained in MM #1-3 SOME MM #5 AM #2 : information contained in MM # 2, 4, and 6 key generation, identity and authentication. AM #3 authentication and identity FROM MM #5 IPSEC QUESTIONS 1- What is IPSEC Suite of protocos, standards and algorithm to secure traffic over an untrusted network. 2- At which layer IPSEC works At layer 3 3- Why AH will work through a NATED device? NAT changes the IP of the packet but the has value is not changed. Packets seems altered. 4- IPSEC PORT? 500 FOR isakmp, Eps 50 and AH51 5- WHAT is IKE? Protocol used to setup a secure, authenticated communication, negotiate SAs 6- Advantages of IKEV2 over IKEV1 Requires less bandwidth , support EAP auth, build-in Nat, Asymetric authen 7- What is ISAKMP? Defines how to establish, negotiate, modify and delete SAs 8- What is DH? Public key crypto protocol, allows 2 partis to establish a shared secret over the insec network 9- What are SAs? Defines the algorithms to be applied to sensitive packets, unidirectional 10- What is a transform set? A combination of individual IPsec transform design to enact a specific security policy for traffic 11- IPSEC peers can authenticate with 2 methods? Pre-shared key and certificate 12- What is HMAC? Used to perform hashing function. Uses a secret key. 13- How ESP and AH provide Anti-replay Uses a sequence number