Está en la página 1de 17

Aadhithya rama sarma.

V
Ismail.N

KONGU ENGINEERING
COLLEGE, Erode.

WHAT IS NETWORK?
Inter

Connection of Autonomous
Computers

Large

Number of Separate But


Interconnected Computers

Introduction to Network
Security
Understand

the need & outline a


security policy relevant to any
company.
Each business has a different
threshold of well-being, different:
Many strong tools available to
secure a computer network:
Viruses

and Worms, Hacking

Introduction to
Networking
Basic technology terms used when
discussing networking.
How devices communicate with each other
over different
types of networks.
Types of high speed WAN connections.
Messaging services such as email, FTP, and
SMS.

Some Popular
UUCP
Networks

IPv6

UUCP

Unix to Unix Copy


Was developed to connect the
Unix hosts
VMS Host

IPv6

IETF
Next Generation Internet Protocol or
IPng
Connectionless service model
Used to Run High performance Network
Provide Platform for New Functionality
128 bits 2^128 = 340 trillion trillion
trillion addresses

IPv6 Address Type &


prefixes
Unicast
Anycast
Multicast
Prefixes
equivalent functionality to a subnet mask
in IPv4

IPv6 security options

Address spoofing
Wire Tapping (active and passive)
Replay
Traffic analysis

Transition Philosophy &


Scenario

IPv6 is inevitable
Prudent
Supports Teaching and Research
Choosing Different Ways
Support IPv6 operation (Goal)
Deployment not Straight Forward

Network Infra Structure


Component

Internal Name Servers


BIND9 is used
AAAA Records and AAAA Glue is
added
JANET supports IPv6 Transport

Routing & Configuration

RIPng used for Internal IPv6 Routing


IPv4 is Statistically Configured
External Routing is same
Site is not Multi Firmed
IPv4 client uses DHCP
IPv6 client uses DHCP v6

EXTENSIONS

Security

Network Management

Embrace IPv6
Transition mechanism to Deploy IPv6

Address Planning

Identifying new IPv6 related security.

Similar Percentage of Allocation


Multicast
IPv4 number of application

Source Specific Multicast Heavy in IPv6

Deployment
Methodology

Gaining Initial Connectivity

IPv6 Gannet through Regional MAN


Obtaining Global Address Space
56 prefix 256 IPv6 are Created

Deploying Basic Connectivity

Function Site Policy


IPv6 Updating
Ex Privacy Address

Deployment Basic Internal N/w


service
Supports DNS, Routing & Host Config.
Usage of VLAN for Parallel IPv6
Supporting IPv4 & IPv6 Inter working
Most Probably not Required.
Proxy Tools
WLAN access point & web cams
Transition Tool Box
Internal
Upgrade Core Network to Dual Stack

Applications

Many FTP servers are IPv6 enabled, ProFTPD is one


of the more well known
There are also many IPv6 enabled FTP clients (lftp,
tnftp, cftp) including the IPv6 enabled web
browsers
Many systems are shipped with IPv6 enabled
telnet, ssh, ftp etc, including *BSD, Solaris and
several Linux distributions
IPv6 enabled systems have ping, traceroute,
tracepath etc. Sometimes named ping6,
traceroute6, tracepath6

CONCLUSION

Fast-propagate worm is definitely possible in


IPv6, at least in /64 enterprise networks

Factors that speedup the propagation

A variety of scanning techniques, some of them


are theoretical and have not been found in the
wild nowadays
Bad design choices in IPv6 can be eliminated
easily

Densely allocated IPv6 addresses


Easy-to-remember IPv6 addresses