Posts

Switch, Firewall and Configuration

Image
Switch  A network switch (also called switching hub, bridging hub, officially MAC bridge) is a computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device. Different models of network switches support varying numbers of connected devices which are consumer-grade network switches provide either 4 or 8 connection, while corporate switches support between 32 and 128 connections.  A network switch is a multiport network bridge that uses hardware addresses to process and forward data at the data link layer (layer 2) of the OSI model and also process data at the network layer (layer 3) by additionally incorporating routing. switch is used to create a mirror image of data that can go to an external device. Since most switch port mirroring provides only one mirrored stream, network hubs can be useful for fanning out data to several read-only analyzers, such as intrusion detecti

Network Address Translation

Image
The process where a network device, usually a firewall, assigns a public address to a computer (or group of computers) inside a private network. The main use of NAT is to limit the number of public IP addresses an organization or company must use, for both economy and security purposes. The most common form of network translation involves a large private network using addresses in a private range (10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, or 192.168.0 0 to 192.168.255.255). Network Address Translation (NAT) are quite complex but happen so rapidly that the end user rarely knows it has occurred. Additionally, NAT can be used to allow selective access to the outside of the network. NAT is a very important aspect of firewall security. It conserves the number of public addresses used within an organization, and it allows for stricter control of access to resources on both sides of the firewall. http://whatismyipaddress.com/nat

IPv4 and Subnet Mask

Image
Subnet Mask Logical subdivision of an IP network and dividing a network into two or more networks is called subnetting. For IPv4, a network may also be characterized by its subnet mask. Subnets may be arranged logically in a hierarchical architecture, partitioning an organization's network address space into a tree-like routing structure.  https://en.wikipedia.org/wiki/Subnetwork

IPv4 and Subnet Mask

Image
IPv4 Fourth version of the Internet Protocol (IP). one of the core protocols of standards-based internet working methods in the Internet. IPv4 is a connectionless protocol for use on packet-switched networks and addressed by an upper layer transport protocol, such as the Transmission Control Protocol (TCP). IPv4 uses 32-bit addresses which limits the address space to 4294967296 (232) addresses. IPv4 reserves special address blocks for private networks (~18 million addresses) and multicast addresses (~270 million addresses). Reserved address blocks Private IP range https://en.wikipedia.org/wiki/IPv4

Structured Cabling

Image
Telecommunications cabling infrastructure that consists of a number of standardized smaller elements (hence structured) called subsystems. Design and installation of a cabling systems that will support multiple hardware uses systems and be suitable for today’s needs and those of the future.   Standards that specify wiring data centers, offices, and apartment buildings for data or voice communications using various kinds of cable, most commonly category 5e (CAT5e), category 6 (CAT6), and fiber optic cabling and modular connectors. Subsystem: Entrance facilities Equipment rooms Backbone cabling Horizontal cabling wiring Telecommunications rooms Work-area components https://en.wikipedia.org/wiki/Structured_cabling

OSI Layer

Image
Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to their underlying internal structure and technology. Layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that comprise the contents of that path. Two instances at the same layer are visualized as connected by a horizontal connection in that layer. https://en.wikipedia.org/wiki/OSI_model

Basic Networking

Process of prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Involves the authorization of access to data in a network controlled by network administrator. Security Management For different kind of situation on home or office may require high-maintenance and advanced software and hardware to prevent malicious attacks from hacking and spamming . Types of Attack : Passive Network - wiretapping, port scanner, idle scan, encryption and etc. Active Virus Data modification - Denial-of-service attack, DNS spoofing, ARP poisoning SQL injection, phishing, sniffing and etc. https://en.wikipedia.org/wiki/Network_security