Internet Security Association And Key Management Protocol
https://en.wikipedia.org/wiki/Internet_Security_Association_and_Key_Management_Protocol
https://en.wikipedia.org/wiki/Internet_Security_Association_and_Key_Management_Protocol
Can be used on Cisco routers to forward broadcast network traffic from client machines to a server on another subnet. Commonly used to provide DHCP from a server on a different network segment to the target network segment. Technically known as a UDP Helper Address. Source: https://en.wikipedia.org/wiki/UDP_Helper_Address
Used specifically for diagnosing IP and Networking issues on Windows systems. ipconfig /all - Shows detailed list of current IP config. ipconfig /release - Clears current IP config. Use when troubleshooting DHCP issues or if an APIPA address was issued ipconfig /renew - Renews the IP and config from the DHCP server. ipconfig /flushdns - Removes all DNS resolver cache entries ipconfig /registerdns - Refreshes all DHCP leases and reregisters DNS names. ...
Internet Protocol Security An authentication and encryption protocol suite that works at the Internet/Netwrok layer. Transport mode Only the actual payload of the IP packet is encrypted: the destination and source IP addresses and other IP header information are still readable. Tunnel mode The entire IP packet is encrypted and then placed into an IPsec endpoint where it is encapsulated inside another IP packet. Won’t be widely utilized until IPv6 is in more widespread use. ...
Mandatory Access Control # Mandatory access control (MAC) is the most secure form of access control . Secures information and resources by assigning sensitivity labels or attributes to objects and users. Enforced by an administrator on a system
Multifactor Authentication # Basically having 2 or more access methods as part of the authentication process. 5 MFA Factors # Something you know, password or PIN Something you have, smartcard, token, or identification device Something you are, fingerprints or retinal pattern (biometrics) Somewhere you are, location or geolocation Something you do, action you must take to complete authentication
Show all active and listening ports netstat -a Flag Description -a Show all used ports including listening ports -n Show raw port numbers and IP addresses -o Show process ID -b Show name of running program -r Shows the routing table of the local host -s shows TCP/IP statistics
Network Access Control # Network Access Control is a policy-based access management solution for endpoint security. Network Access Control (NAC) is an approach to computer security that attempts to unify endpoint security technology… Such as: Antivirus Host intrusion prevention Vulnerability assessment … user or system authentication and network security enforcement. Source: https://en.wikipedia.org/wiki/Network_Access_Control
NAT # NAT replaces the source IP address of a device with the source IP from the outside router. Port Address Translation (PAT) # Port Forwarding # Static NAT (SNAT) # Maps a single routable IP address (public) to a single machine on the network on a one-to-one basis. Dynamic NAT (DNAT) # Uses a pool of IP addresses to serve a larger number of devices on the LAN. ...
Network Interface Unit (NIU) # Smart Jacks # Used for remote diagnostics by ISP. Can setup a remote loopback.