Protocols of the TCPIP Suite Part 1

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
8 hours 19 minutes
Difficulty
Beginner
CEU/CPE
8
Video Transcription
00:05
So let's take a look at some of these protocols that are part of the TCP I P suite.
00:11
The first one will take a look at is FTP file transfer protocol.
00:15
This is for uploading and downloading files,
00:18
a few things to mention. First, there's a reference to the port numbers Port 20 and 21. We have to know those.
00:25
I also mention a specific fact about FTP.
00:28
It's not secure
00:29
credentials Travers, the network in plain text. So it's always going to be a problem when you think about network security.
00:35
We don't ever want passwords on the network in plain sight, so we really need to focus on securing the FTP, which is coming up on the side.
00:45
One of the tools that we can use to secure FTP is a protocol called ssh!
00:50
At this age is secure. Shell
00:52
secure Shallow is going to provide US security over an unsecured network.
00:58
Secure Shell uses TCP Port 22
01:00
and this was designed to replace some of the remote administration protocols like telnet and FTP, or, if you work with UNIX, their utilities called the Our Utilities.
01:11
All of those have traditionally sent passwords across the network and plain text
01:15
by using Ssh. Instead of playing FTP,
01:19
you get a more secure connection.
01:22
So if you're replacing FTP with secure FTP, then that now uses Port 22. Also, because ssh is really the protocol that's providing the transport and the security.
01:34
I will also mention that another protocol SCP Secure Copy protocol uses Ssh! Also Port 22.
01:42
They love to ask questions about this on the exam because it's not just ssh that uses Port 22. It's SCP and Sftp, which can be something that's tricky to remember. So make sure you know, these
01:59
just spoke about Telnet and said that Telnet is also another one of those protocols that transmits data across the wire in plain text.
02:07
We don't like that
02:08
Telnet. Instead of telling getting into a system
02:12
we access age in
02:14
Telnet uses TCP Port 23
02:19
SMTP
02:21
simple mail transfer protocol.
02:23
You have several different mail protocols.
02:25
What SMTP is for is sending mail from mail server to mail server.
02:30
When you're talking about, send email from your system up or from side to side, that's SMTP.
02:37
We've got other protocols that download our mail for us or allow us to viewer mail. But when we're talking about sending SMTP,
02:45
a friend of mine says to think of it as send mail to people, and that's exactly right.
02:51
SMTP, though, really stands for simple mail transfer protocol. Port 25
02:59
Another protocol that we can look at, is really a protocol in a service.
03:02
It's called Takacs Plus
03:05
Takacs Pluses. Port 49 this is a remote authentication server.
03:10
So when clients are trying to access your network from a remote location, maybe they're connecting in a VPN, a wireless access point. Even the back in the day when we used to dial up there needed to be a system where we could centralize control
03:24
and that system was Takacs. Plus,
03:27
we'll talk about that more with remote access in just a bit,
03:32
an important service on the network DNS domain name service.
03:38
Or you could hear a domain navy in service.
03:40
You and I like user friendly names, however, for systems to connect. They need I P addresses. So we have to have some sort of reference point that we can go to and say, Hey, what's the I P address for weather dot com or whatever it is we're looking for.
03:55
That's our DNS server.
03:58
So our DNS server provides us with name resolutions that we can connect via I p address to host
04:03
DNS were except Port 53.
04:06
Now, in a little bit, we'll talk about the DNS database and how it works. But for now, remote naming two i p addresses to I P addresses
04:15
to user friendly names to I p addresses. That's DNS Port 53
04:24
D, H. C. P.
04:26
Another important network service,
04:28
D H C P, provides IP addresses to clients automatically.
04:31
So rather than having an administrator walk around from host to host, typing out an assigned I p address
04:38
a client comes online periods the D. H C P server and gets an I P address.
04:43
That's very helpful.
04:45
One of the things we'll talk about is how D H C P works and the process called Dora Discover offer request acknowledge that's coming up in just a bit.
04:54
D H C P operates on Port 67 68.
05:00
Okay, now, an alternative to FTP.
05:02
We talked about this one a little bit earlier when we were at layer four of the OSI model.
05:08
We talked about an alternative to FTP called T ftp Trivial File transfer protocol.
05:15
T F T P is used in some environments when we're looking to download operating systems for devices.
05:20
So, for example, if I'm doing an operating system upgrade on a router or something, I might use to FTP
05:28
a lot of the times we think to use FTP or other means.
05:31
This is port 69. And if you'll remember the difference of T f p A piggybacks on UDP, which is connection lists
05:40
FTP piggybacks on TCP, which is connection oriented.
05:45
Lots of letters in this class. I hope you're keeping up.
05:49
Http,
05:50
I think we're all familiar with Web traffic Hypertext transfer protocol.
05:56
This is Port 80.
05:58
If we're communicating with Web traffic, we're using Port 80.
06:00
I'll mention that http is not secure in and of itself, So we're going to have to add some security in just a bit.
06:08
For now, http, is Port 80
06:12
pop post office protocol.
06:14
I mentioned to you that SMTP was for sending mail.
06:16
When you're downloading email to your devices, your fueling those devices perhaps even on the server.
06:23
What we're looking at is using one of the two protocols.
06:26
Pop is very common, and we're on version three pop. Three.
06:30
And there's also a protocol called IMAP, which will come up in just a minute. But that's Internet mail application protocol
06:36
that would be an alternative to pop. Three.
06:40
Pop three uses Port 1 10
06:45
Network time protocol
06:46
network Time protocol is really important because it controls the synchronization of devices on the network.
06:53
Many network services, particularly Kerberos and several others, require that our systems being sink
07:00
so network time protocol is a service running on your domain controller. That helps ensure everybody is using the same time clock and that were synchronized.
07:09
NTP uses part 123
07:12
You know what? I was going to tell you guys an NDP joke, but my time is always off. Hope you enjoyed that. I'll be here all week, folks.
07:20
All right,
07:21
there's our friend I map that we talked about earlier.
07:25
An alternative to pop
07:27
downloads mail from the server and uses Port 1 43
07:31
as an MP Simple network management protocol.
07:35
This is a protocol that allows us to capture information on our networks. That way we can monitor and be aware of the traffic and the various events that are going on
07:46
with S and M P. We have three main elements an agent, a central manager
07:50
and an M I B, which is our management information base.
07:55
So our agent is whatever network devices are running the S and M P software,
08:00
the central manager, which is ultimately your management system that's pulling all the information together and then our management information base.
08:09
All your agents contain an information database specific to the various parameters and the information that's being captured.
08:16
This is the database that's used to request the agent for specific information and then make sure that information is transmitting and formatting in such a way that can be useful.
08:26
That's the management information database.
08:28
A simple Network management protocol uses Port 1 61
Up Next