Unit 4
Unit 4
Handshake Protocol:
Handshake Protocol is used to establish sessions. This protocol allows the client
and server to authenticate each other by sending a series of messages to each
other. Handshake protocol uses four phases to complete its cycle.
Change-cipher Protocol:
This protocol uses the SSL record protocol.
Unless Handshake Protocol is completed, the SSL record Output will be in a
pending state. After the handshake protocol, the Pending state is
converted into the current state.
Change-cipher protocol consists of a single message which is 1 byte in
length and can have only one value.
This protocol’s purpose is to cause the pending state to be copied into the
current state.
Alert Protocol:
1. In this protocol alert related to SSL are sent to clients
2. It has 2 bytes
3. Byte 1- can have value as 1 or 2
-1 represents warnings and 2 represents fatal error
4. Byte 2 – it specify the type of error
Characteristics of Firewall
1. Physical Barrier: A firewall does not allow any external traffic to enter
a system or a network without its allowance. A firewall creates a choke
point for all the external data trying to enter the system or network and
hence can easily block access if needed.
2. Multi-Purpose: A firewall has many functions other than security
purposes. It configures domain names and Internet Protocol (IP)
addresses. It also acts as a network address translator. It can act as a
meter for internet usage.
3. Flexible Security Policies: Different local systems or networks need
different security policies. A firewall can be modified according to the
requirement of the user by changing its security policies.
4. Security Platform: It provides a platform from which any alert to the
issue related to security or fixing issues can be accessed. All the queries
related to security can be kept under check from one place in a system
or network.
5. Access Handler: Determines which traffic needs to flow first according
to priority or can change for a particular network or system. specific
action requests may be initiated and allowed to flow through the
firewall.
There are mainly three types of firewalls, such as software firewalls, hardware
firewalls, or both, depending on their structure.
Each type of firewall has different functionality but the same purpose.
Packet-filtering Firewalls
Packet filtering firewalls operate at the network layer (Layer 3) of the OSI model and
examine the headers of individual packets.
They compare the source and destination IP addresses, port numbers, and protocols
against a set of predefined rules.
Packets that meet the criteria defined in the rules are allowed, while others are
dropped.
This type of firewall is efficient but lacks the ability to inspect packet contents or detect
more sophisticated threats.
As the following figure illustrates, the SNMP architecture includes the following layers:
Master agents
A master agent is a software program that provides the interface between an
SNMP Network Manager and a subagent.
Subagents
A subagent is a software program that provides information to a master agent.
Managed components
A managed component is hardware or software that provides a subagent. For
example, database servers, operating systems, routers, and printers can be
managed components if they provide subagents.
Management Information Bases
A Management Information Base (MIB) is a group of tables that specify the
information that a subagent provides to a master agent. MIBs follow SNMP
protocols.
Strength of SNMP:
1. It is simple to implement.
2. Agents are widely implemented.
3. Agent level overhead is minimal.
4. It is robust and extensible.
5. Polling approach is good for LAN based managed object.
6. It offers the best direct manager agent interface.
7. SNMP meet a critical need.
Limitation of SNMP:
1. It is too simple and does not scale well.
2. There is no object orietned data view.
3. It has no standard control definition.
4. It has many implementation specific (private MIB) extensions.
5. It has high communication overhead due to polling