Image Gallery: TCP/IP Protocol Suite and Security

Image Gallery: TCP/IP Protocol Suite and Security

OSI and DoD Reference Model

Relationship between application layer protocols and services

  • HTTP uses TCP port 80 by default
  • FTP uses TCP port 21 by default.
  • SMTP uses TCP port 25 by default.
  • POP3 uses TCP port 110 by default.
  • HTTPS uses TCP port 443 by default
  • DNS uses UDP port 53
  • The Remote Desktop Protocol (RDP) uses TCP port 3389 by default.
  • Telnet uses TCP port 23. Windows uses TCP port 445 to access shared resources.

View local listening ports and processes

  1. Netstat –a

What Windows Firewall does

Prevent ARP spoofing arp firewall

  1. Arp –a
  2. Arp –s 192.168.80.1 C8-60-00-2E-6E-1B

AR parsing process:

ICMP is (Internet Control Message Protocol) Internet Control Message Protocol:

  • Ping
  • pathping

Computer communication process

Network layer header

Using IPSec to protect server security

<<:  GaussDB T database cloud service officially launched on Huawei Cloud with Kunpeng computing power

>>:  4000 words on TCP timeout and retransmission. If you don't learn anything from reading this, I'll lose.

Recommend

XenSpec: Chicago/San Jose 1Gbps Unlimited VPS Starting at $2.95/month

XenSpec is a foreign hosting company registered s...

Why is there no movement in China for the popular wireless mesh network?

The wireless mesh network that emerged in the sec...

Why can a TCP connection only have "3-way handshake" and not 2 or 4?

We know that the communication modes between clie...

The Matter protocol is rising rapidly. Do you really understand it?

The topic we are going to talk about today is rel...

G Suite vs. Office 365: Which is the right productivity suite for your business?

Choosing an office suite used to be a simple matt...

What does the expansion of 4G mean for big data?

As the market share of smartphones continues to g...

What is the difference between 5G bearer network?

Hello everyone, I am Xiaozaojun. In today’s artic...

Port security technology: Where is your network defense line?

Port Security Technology Background The enterpris...

The battle for future wireless network communication technology

Wireless communication is closely related to our ...

Gigsgigscloud Japan CN2 Special Package Simple Test

The day before yesterday, we shared the product i...