1.5 Identify commonly used default network ports
Protocol |
IP protocol |
Port Used |
FTP (File Transfer Protocol) |
TCP |
21 |
SFTP (Secure FTP) |
SCTP,TCP |
22 |
FTPS (FTP Secure) |
FTP |
443 |
TFTP (Trivial FTP) |
UDP |
69 |
Telnet |
TCP |
23 |
HTTP (Hyper Text Transfer Protocol) |
TCP |
80 |
HTTPS (HTTP Secure) |
TCP |
443 |
SCP (Secure Copy) |
SCTP, TCP |
22 |
SSH (Secure SHell) |
SCTP, TCP |
22 |
SMTP (Simple Mail Transfer Protocol) |
TCP |
25 |
DNS (Domain Name Service) |
UDP |
53 |
SNMP (Simple Network Management Protocol) |
TCP, UDP |
161 |
SNMP Trap (Simple Network Management Protocol Trap ) |
TCP, UDP |
162 |
ISAKMP (VPN) – Internet Security Association and Key Management Protocol (virtual private network) |
UDP |
500 |
TACACS (Terminal Access Controller Access-Control System) |
TCP,UDP |
49 |
POP3 ( Post Office Protocol version 3) |
TCP |
110 |
NNTP (Network News Transfer Protocol) |
TCP |
119 |
IMAP4 (Internet message access protocol version 4) |
TCP |
143 |
Kerberos |
UDP |
88 |
Syslog |
TCP,UDP |
514 |
L2TP (Layer 2 Tunneling Protocol) |
UDP |
1701 |
PPTP (Point-to-Point Tunneling Protocol) |
TCP |
1723 |
RDP (Remote Desktop Protocol) |
TCP, UDP |
3389 |
NetBIOS (Network Basic Input/Output System): NetBIOS, or Network Basic Input/Output System, allows for session-layer communication on the OSI model. NetBIOS is primarily concerned with two functions: naming and starting/stopping NetBIOS "sessions." Since NetBIOS is not actually a networking protocol (it's an API) it is not routable and therefore nodes are only visible to other nodes within the same subnet.
1.6 Implement wireless network in a secure manner
WEP (Wired Equivalent Privacy): A deprecated wireless network security standard, less secure than WPA. Key size is 64 bit. WEP aims to provide security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another. However, it has been found that WEP is not very secure. WEP is used at the two lowest layers of the OSI model - the data link and physical layers; it therefore does not offer end-to-end security.
WPA (Wi-Fi Protected Access): A wireless encryption standard created by the Wi-Fi Alliance to secure wireless computer networks. WPA improves on the authentication and encryption features of WEP (Wired Equivalent Privacy). Key size is 128 bits. WPA provides stronger encryption than WEP through use of either of two standard technologies: Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES). WPA also includes built-in authentication support that WEP does not offer. WPA provides comparable security to VPN tunneling with WEP, with the benefit of easier administration and use.
WPA2 (Wi-Fi Protected Access Version 2): It is wireless encryption protocol and is based on the IEEE 802.11i technology standard for data encryption. Key size is 256 bits. It is more secure than WPA and WEP. WPA2 also improves the security of Wi-Fi connections by requiring use of stronger wireless encryption than what WPA requires. Specifically, WPA2 does not allow use of an algorithm called TKIP (Temporal Key Integrity Protocol) that has known security holes (limitations) in the original WPA implementation. There are two versions of WPA2: WPA2-Personal, and WPA2-Enterprise. WPA2-Personal protects unauthorized network access by utilizing a set-up password. WPA2-Enterprise verifies network users through a server. WPA2 is backward compatible with WPA.
Copyright © Anand Software and Training Private Limited.