Protocols

.docx

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

300

Subject

Information Systems

Date

May 9, 2024

Type

docx

Pages

5

Uploaded by vanevalleverdugo02 on coursehero.com

Vanessa Verdugo 10/2/2022 Ports and Protocols 1. IPsec (Internet Protocol Security) - Uses port 500 and 1500 UDP - IPsec is secure because it adds encryption and authentication to any process. It conceals information by altering data, basically utilizes secret codes to only give access to authorized users. - IPsec fits into the network layer of the OSI model. - The IPsec is a protocol that secures network communications at the IP layer. Makes it easier for two-way authentication between networks that exchange data. Also uses keys to authorize data packets. 2. ICMP (Internet Control Message Protocol) - This protocol uses port 1. - Not at all. ICMP is a security risk and should be blocked at the firewall. - ICMP belongs to the application layer of the OSI model. - ICMP is an error-reporting protocol that network devices utilize to generate error messages to the IP address source. 3. IGMP (Internet Group Management Protocol) - IGMP uses protocol number 2. - Yes, IGMP increased its security thanks to IGMPv3. - IGMP belongs to layer 3 of the OSI model which is the network layer. - IGMP is a communications protocol used by hosts and other routers; it provides a multicast group membership. It is a very important part in the IP multicast allowing hosts to have access if they requested. 4. TCP (Transmission Control Protocol) - Port number is 0 to 65535. - Not secure, any malicious entity on the network can read and understand the data. - TCP belongs to the application layer of the OSI model. - This protocol is used to enable data communication over network devices, it is one of the main protocols of the Internet. TCP breaks down data into small packets and send it to IP which is the Internet Protocol, these packets are then sent to their destination through different routes. 5. HTTP (Hypertext Transfer Protocol) - This protocol uses port 80. - This protocol is not secure. It was not designed to have security in the first place, therefore any information that comes from an insecure network will be leaked. The main problem is not the protocol itself but HTTP data is not encrypted. - HTTP belongs to the application layer of the OSI model. - The Hypertext Transfer Protocol is the foundation of the Web, this is where most users interact. This protocol is used to transfer data this is why it belongs to layer 7 which is the
application layer. It is all about communication between the web and servers by sending http requests and receiving http responses. 6. TLS/SSL (Transport Layer Security or Secure Sockets Layer) - This protocol uses port 433 - Yes, TLS is secure because it provides authentication, privacy and data integrity between computer applications. - TLS belongs int the transport layer of the OSI model. - This protocol is a security designed protocol to promote security and privacy to communications over the Internet. TLS encrypts communications between the web applications and servers keeping the integrity of the data shared between applications and servers. TLS uses cryptography to provide secure communication. 7. UDP (User Datagram Protocol) - UDP ranges from 0 to 65535 - UDP is not secure on its own, but it can be if it’s protected by a tool like FortiDDoS. UDP can be very susceptible to attacks, however UDP can be encrypted with legacy protocol. - UDP belongs to the Transport layer in the OSI model. - User Datagram Protocol is a communication protocol with high-speed data transfer, mostly with video playback or DNS. This protocol sends datagrams in packets to other hosts on the IP network. 8. BGP (Border Gateway Protocol - BGP port number is 179. - No, BGP does not acquire any security features, instead it supports the existing security tools and protocols that networks utilize. - BGP belongs to the application layer of the OSI model. - This protocol enables the internet to exchange routing information between systems. Since networks interact with one another they need a way to communicate. 9. EIGRP (Enhanced Interior Gateway Routing Protocol) - This protocol uses port number 88. - This protocol is secure because it is used to protect the protocol itself. It avoids any routing information to leak between the information that is being passed to another network. - This protocol belongs to the layer 4 which is the transport layer. - EIGRP is a distance-vector routing protocol, and it is used one a computer network for automating routing decisions. This protocol enables the exchange of information in a more effective way. 10. OSPF (Open Shortest Path First) - This protocol uses port number 89. - Yes, it can be secure. This protocol is protected with a cryptographic checksum. If for any reason there is a message sent that is not recognized, it will be rejected immediately. - This protocol works at layer 4 of the OSI model which is the transport layer.
- This protocol is a routing protocol for internet networks. It uses a link state routing algorithm and falls in IGPs. In general, it routes all the internet networks for its function at its best ability. 11. RIP (Routing Information Protocol) - RIP port number is 520. - No, this protocol does not support authentication, it is a hybrid routing protocol that allows packets to be authenticated via plain text. - This protocol works at layer 3 of the OSI model which is the network layer. - The RIP protocol defines how routers should share information between them, adding and implementing a limiting the amount of hops between the destination and the source. 12. ARP (Address Resolution Protocol) - ARP uses port 129 on both TCP and UDP. - This protocol is not designated for security; therefore, it does not verify if a response comes from an authorized party. - ARP fits between layers 2 and 3 which (data link layer and network layer). - Address resolution protocol takes care of discovering the link layer address, such as a MAC address that is associated with an internet layer. This is very crucial to the function of the Internet protocol suite. 13. RARP (Reverse Address Resolution Protocol) - Same as ARP, if it is running under UDP it uses port number 129. - This protocol cannot handle fully security because it is not possible to detect a suspicious user coming inside a network. - This protocol fits on layer 2 of the OSI model which is data link. - It is a protocol based on computer networking; it is in charge of requesting IP address from other servers. 14. IGRP (Interior Gateway Protocol) - IGRP uses IP which uses protocol number 9. - Yes, it has very secure techniques that support huge networks with high complexity that require high functioning capabilities at its best. - This protocol fits in layer 3 which is the network layer. - Interior Gateway Protocol is frequently used in routing loops since it has a capability to automatically update itself when any route changes in a network. Usually commonly used to share data inside a big system, very ideal for bigger networks. 15. IS-IS (Intermediate System-to-Intermediate System) - For IS-IS there are no port numbers or any IP protocol numbers because IS-IS does not carry messages. - It is a stable protocol; this protocol is very good for service providers. - This protocol belongs to the network layer of the OSI model. - This protocol does two types of networks a connectionless service and connection- oriented service. IS-IS is in charge of IP routing information, it devices routers into regions. 16. DHCP (Dynamic Host Configuration Protocol) - DHCP port numbers are 67 and 68.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help