F5101 6 PDF
F5101 6 PDF
F5101 6 PDF
Application Layer
Session Layer
2
HTTP
3
HTTP
Application Layer
▰ Domain Name System (DNS) – TCP and UDP 53
▰ Simple Network Management Protocol (SNMP) – TCP 161, SNMP Traps 162
4
HTTP
Application Layer
▰ File Transfer Protocol (FTP) – TCP 20 and 21
▰ Telnet – TCP 23
5
HTTP
HTTP
▰ TCP Based Application Layer
▰ Connectionless
▰ Stateless
6
HTTP
Web Server
▰ Apache, NGINX or IIS
▰ HTML
▰ JavaScript
7
HTTP
Header Summary:
Accept-xxx
Content-Type
Content-Length
User-Agent
Referrer
8
HTTP
HTTP METHODS
▰ GET – Retrieves data from the Server
9
HTTP
HTTP RESONSE
10
HTTP
201 – OK Created
1xx: Informational
301 – Moved to new URL
Request received / processing
304 – Not modified (Cached version)
2xx: Success 400 – Bad Request
Successfully Received, understood and accepted 401 – Unauthorized
▰ Used to be only found in Banking, Retail sites (or any website with payment transactions)
▰ SSL Certificate is a small data files that digitally bind a cryptographic key to an organization’s details
▰ application protocol independent and can be used with many different applications
12
TLS/SSL
▰ information about the identity of its owner (called the subject), and the digital signature of an entity that has
verified the certificate's contents (called the issuer)
▰ If the signature is valid, and the software examining the certificate trusts the issuer (CA), then it can use that
key to communicate securely with the certificate's subject
▰ Trusted both by the subject (owner) of the certificate and by the party relying upon the certificate.
13
TLS/SSL
▰ also used on other applications such as email, instant messaging, and voice over IP (VoIP) etc
▰ Most of the time called by its older name Secure Sockets Layer (SSL)
▰ notable for being a part of HTTPS, a protocol for securely browsing the web
14
Virtual Private Network (VPN)
IPSec VPN
▰ Secure communication over an unsecured medium
Benefits
▰ Cost
▰ Scalability
▰ Flexibility
▰ Security
15
Virtual Private Network (VPN)
Types of VPN
▰ Secured VPN (IPsec, SSL VPN) Note: Generic Routing Encapsulation (GRE) is not a VPN
but just a tunnel. Though, you may enable IPsec to
▰ Trusted VPN (MPLS VPN) encrypt traffic that is sent thru the tunnel
▰ Hybrid (Combination of both)
VPN Deployment
▰ Site-to-Site
▰ Remote Access
IPsec Protocols
▰ Authentication Header (AH)
16
Virtual Private Network (VPN)
▰ Not scalable
▰ More flexible
17
Virtual Private Network (VPN)
Authentication
▰ Validate Identity
Privacy
▰ Encrypts and decrypt data
Integrity
▰ Uses hashing algorithm to detect if message has been changed
18
Domain Name Service (DNS) Data Center
Web Application
Root Name Server .com Name Server 128.199.224.58
192.33.4.12 100.1.1.1
Local DNS
http://zurien.com
19
Domain Name Service (DNS)
.com domain
f5.com domain
google.com
devcentral.f5.com
amazon.com
downloads.f5.com
20
Domain Name Service (DNS)
▰ Its also common to integrate our servers and devices using names
21
Network Time Protocol (NTP)
▰ client-server model, send and receives timestamps using UDP port 123
▰ Allows to get the correct time from internal or external time source – local, master, GPS
22
Network Time Protocol (NTP)
23
Syslog
Syslog
▰ standard for message logging, listens to UDP 514
▰ allows separation of the software that generates messages, the system that stores them, and the software that
reports and analyzes them
▰ Each message is labeled with a facility code, indicating the software type generating the message, and
assigned a severity level.
▰ When operating over a network, syslog uses a client-server architecture where a syslog server listens for logs
messages coming from clients.
Syslog Server
24
Syslog
25
Simple Network Management Protocol
▰ Can also modify information to change device behavior. RO and RW access privileges
▰ support cable modems, routers, switches, servers, workstations, printers, and more
SNMP
Manager
26
Simple Network Management Protocol
Protocol Versions
▰ SNMPv1
▰ SNMPv2c
revises version 1 and includes improvements in the areas of performance, security and communications.
▰ SNMPv3
makes no changes to the protocol aside from the addition of cryptographic security
security aspect is addressed by offering both strong authentication and data encryption for privacy
27
Simple Network Management Protocol
28