CISSP Cheat Sheet Series OSI Reference Model TCP 3-Way

Total Page:16

File Type:pdf, Size:1020Kb

CISSP Cheat Sheet Series OSI Reference Model TCP 3-Way Common TCP Protocols CISSP Cheat Sheet Series OSI Reference Model Port Protocol IP Addresses Port Ranges 20,21 FTP 7 layers, Allow changes between layers, Standard hardware/software interoperability. • Class A: 0.0.0.0 – 127.255.255.255 Authentication methods: 22 SSH Public IPv4 • Class B: 128.0.0.0 – 191.255.255.255 • PAP=Clear text, unencrypted Tip, OSI Mnemonics 23 TELNET address space Point to Point Tunneling Protocol (PPTP) All People Seem To Need Data Processing • Class C: 192.0.0.0 – 223.255.255.255 • CHAP=unencrypted, encrypted 25 SMTP • Class A: 10.0.0.0 – 10.255.255.255 • MS-CHAP=encrypted, encrypted Please Do Not Throw Sausage Pizza Away Private IPv4 53 DNS • Class B: 172.16.0.0 – 172.31.255.255 Layer Data Security address space Challenge-Handshake Authentication Encrypt username/password and 110 POP3 • Class C: 192.168.0.0 – 192.168.255.255 Protocol (CHAP) re-authenticate periodically. Use in PPP. Application Data C, I, AU, N 80 HTTP • Class A: 255.0.0.0 Presentation Data C, AU, Encryption 143 IMAP Subnet Masks • Class B: 255.255.0.0 Layer 2 Tunneling Protocol (L2TP) Use with IPsec for encryption. Session Data N • Class C: 255.255.255.0 389 LDAP Provide authentication and integrity, no Transport Segment C, AU, I IPv4 32 bit octets Authentication Header (AH) 443 HTTPS confidentiality. Network Packets C, AU, I IPv6 128 bit hexadecimal 636 Secure LDAP Data link Frames C Encapsulating Security Payload (ESP) Encrypted IP packets and preserve integrity. 445 ACTIVE DIRECTORY Physical Bits C Network Types Shared security attributes between two 1433 Microsoft SQL Security Associations (SA) C=Confidentiality, AU=Authentication, I=Integrity, N=Non repudiation Geographic Distance and are is limited to one network entities. Local Area 3389 RDP building. Usually connect using copper wire or Hardware / Network (LAN) Transport Mode Payload is protected. Layer (No) Functions Protocols 137-139 NETBIOS fiber optics Formats Tunnel Mode IP payload and IP header are protected. Campus Area Multiple buildings connected over fiber or Cables, HUB, Internet Key Exchange (IKE) Exchange the encryption keys in AH or ESP. Attacks in OSI layers Network (CAN) wireless Electrical signal USB, DSL Remote Authentication Dial-In User Service Password is encrypted but user Physical (1) Layer Attack Metropolitan Bits to voltage Repeaters, (RADIUS) authentication with cleartext. ATM Area Network Metropolitan network span within cities Phishing - Worms - SNMP v3 Encrypts the passwords. (MAN) Frames setup Application Trojans PPP - PPTP - L2TP - - ARP - Dynamic Ports 49152 - 65535 Error detection and control Wide Area Interconnect LANs over large geographic area RARP - SNAP - CHAP - LCP - Layer 2 Phishing - Worms - Data Link Check integrity of packets network (WAN) such as between countries or regions. MLP - Frame Relay - HDLC - Switch - Presentation Trojans Layer (2) Destination address, Frames Intranet A private internal network Remote Access Services ISL - MAC - Ethernet - Token bridges Session Session hijack use in MAC to IP address Ring - FDDI connects external authorized persons access to Telnet Username /Password authentication. No encryption. conversion. Transport SYN flood - fraggle Extranet intranet Remote login (rlogin) No password protection. Routing, Layer 3 switching, Layer 3 smurfing flooding - Network ICMP - BGP - OSPF - RIP - IP - Internet Public network SSH (Secure Shell) Secure telnet segmentation, logical Switch - Network ICMP spoofing - DOS layer BOOTP - DHCP - ICMP addressing. ATM. Packets. Router Collision - DOS /DDOS Networking Methods & Standards Terminal Access Controller User credentials are stored in a server known as a Access-Control System TACACS server. User authentication requests are TCP - UDP datagrams. Data link - Eavesdropping Routers - Software Decoupling the network control and the (TACACS) handled by this server. Reliable end to end data Segment - Connection VPN Signal Jamming - defined forwarding functions. Transport transfer - More advanced version of TACACS. Use two factor oriented concentrato Physical Wiretapping networking Features -Agility, Central management, TACACS+ Segmentation - sequencing - authentication. rs - Gateway (SDN) Programmatic configuration, Vendor neutrality. and error checking Hardware Devices Remote Authentication Dial-In Client/server protocol use to enable AAA services for Converged TCP - UDP - NSF - SQL - Transfer voice, data, video, images, over single User Service (RADIUS) remote access servers. Session Data, simplex, half duplex, full Layer 1 device forward protocols for RADIUS - and RPC - PPTP - Gateways HUB network. Secure and encrypted communication channel Layer dupl Eg. peer connections. frames via all ports media transfer PPP between two networks or between a user and a digital to analog Fibre Channel Virtual private network (VPN) Modem network. Use NAT for IP address conversion. Secured Data Gateways conversion Presentation over Ethernet Running fiber over Ethernet network. with strong encryptions such as L2TP or IPSEC. compression/decompression TCP - UDP messages JPEG - TIFF - (FCoE) layer Routers Interconnect networks and encryption/decryption MID - HTML Interconnect networks in Multiprotocol Bridge Transfer data based on the short path labels TCP - UDP - FTP - TELNET - Ethernet Label VPN encryption options instead of the network IP addresses. No need of Application TFTP - SMTP - HTTP CDP - Inbound/outbound data Switching • PPP for authentication Data Gateways Gateways route table lookups. layer SMB - SNMP - NNTP - SSL - entry points for networks (MPLS) • No support for EAP Point-to-Point Tunneling Protocol • Dial in HTTP/HTTPS. Frame forward in local Internet Small Standard for connecting data storage sites such Switch (PPTP) • Connection setup uses plaintext network. Computer as storage area networks or storage arrays. TCP/IP Model Interface (ISCI) Location independent. • Data link layer Share network traffic • Single connection per session Layers Action Example Protocols Encryption and different protocols at different load by distributing Multilayer Load balancers levels. Disadvantages are hiding coveted channels • Same as PPTP except more secure Token ring • Frame Relay • FDDI traffic between two Protocols Layer 2 Tunneling Protocol (L2TP) Network access Data transfer done at this layer • Commonly uses IPsec to secure L2TP packets • Ethernet • X.25 devices and weak encryptions. Voice over • Network layer Create small data chunks called Hide internal public IP Allows voice signals to be transferred over the Internet • Multiple connection per session Internet datagrams to be transferred via IP • RARP • ARP • IGMP • ICMP address from external public Internet connection. Internet Protocol Security (IPsec) • Encryption and authentication network access layer Proxies public internet Protocol (VoIP) • Confidentiality and integrity /Connection caching and Packet switching technology with higher Transport Flow control and integrity TCP • UDP Asynchronous filtering. bandwidth. Uses 53-byte fixed size cells. On Convert data into readable Telnet • SSH • DNS • HTTP • FTP transfer mode Application demand bandwidth allocation. Use fiber optics. Communication Hardware Devices format • SNMP • DHCP Use to create VPN or (ATM) aggregate VPN Popular among ISPs Divides connected devices into one input signal for transmission over VPNs and VPN Concentrator connections provide PTP connection between Data terminal equipment one output via network. TCP 3-way Handshake concentrators using different internet X25 (DTE) and data circuit-terminating equipment Multiplexer Combines multiple signals into one signal for transmission. SYN - SYN/ACK - ACK links (DCE) Hubs Retransmit signal received from one port to all ports. LAN Topologies Capture or monitor Use with ISDN interfaces. Faster and use multiple Repeater Amplifies signal strength. Protocol analyzers network traffic in PVCs, provides CIR. Higher performance. Need to Frame Relay Topology Pros Cons real-time ad offline have DTE/DCE at each connection point. Perform WAN Transmission Types • No redundancy New generation error correction. Unified threat • Dedicated permanent circuits or communication paths required. BUS • Simple to setup • Single point of failure vulnerability scanning Synchronous Circuit-switched management IBM proprietary protocol use with permanent • Stable speed. Delay sensitive. application Data Link networks • Difficult to troubleshoot dedicated leased lines. • Mostly used by ISPs for telephony. Create collision Control (SDLC) RING • Fault tolerance • No middle point • Fixed size packets are sending between nodes and share domains. Routers High-level Data Start • Fault tolerance • Single point of failure VLANs Use DTE/DCE communications. Extended Packet-switched bandwidth. separate broadcast Link Control • Redundant protocol for SDLC. networks • Delay sensitive. Mesh • Fault tolerance domains (HDLC) • Expensive to setup • Use virtual circuits therefore less expensive. Intrusion detection and Domain name Map domain names /host names to IP Address IDS/IPS Types of Digital Subscriber Lines (DSL) prevention. system (DNS) and vice versa. Wireless Networking Asymmetric Digital • Download speed higher than upload Leased Lines Wireless personal area network (WPAN) standards Subscriber Line • Maximum 5500 meters distance via telephone lines. Firewall and Perimeter T1 1.544Mbps via telephone line IEEE 802.15 Bluetooth (ADSL) • Maximum download 8Mbps, upload 800Kbps. Security T3 45Mbps via telephone line IEEE 802.3 Ethernet Rate Adaptive DSL • Upload speed adjust
Recommended publications
  • Solutions to Chapter 2
    CS413 Computer Networks ASN 4 Solutions Solutions to Assignment #4 3. What difference does it make to the network layer if the underlying data link layer provides a connection-oriented service versus a connectionless service? [4 marks] Solution: If the data link layer provides a connection-oriented service to the network layer, then the network layer must precede all transfer of information with a connection setup procedure (2). If the connection-oriented service includes assurances that frames of information are transferred correctly and in sequence by the data link layer, the network layer can then assume that the packets it sends to its neighbor traverse an error-free pipe. On the other hand, if the data link layer is connectionless, then each frame is sent independently through the data link, probably in unconfirmed manner (without acknowledgments or retransmissions). In this case the network layer cannot make assumptions about the sequencing or correctness of the packets it exchanges with its neighbors (2). The Ethernet local area network provides an example of connectionless transfer of data link frames. The transfer of frames using "Type 2" service in Logical Link Control (discussed in Chapter 6) provides a connection-oriented data link control example. 4. Suppose transmission channels become virtually error-free. Is the data link layer still needed? [2 marks – 1 for the answer and 1 for explanation] Solution: The data link layer is still needed(1) for framing the data and for flow control over the transmission channel. In a multiple access medium such as a LAN, the data link layer is required to coordinate access to the shared medium among the multiple users (1).
    [Show full text]
  • Data Link Layer
    Data link layer Goals: ❒ Principles behind data link layer services ❍ Error detection, correction ❍ Sharing a broadcast channel: Multiple access ❍ Link layer addressing ❍ Reliable data transfer, flow control: Done! ❒ Example link layer technology: Ethernet Link layer services Framing and link access ❍ Encapsulate datagram: Frame adds header, trailer ❍ Channel access – if shared medium ❍ Frame headers use ‘physical addresses’ = “MAC” to identify source and destination • Different from IP address! Reliable delivery (between adjacent nodes) ❍ Seldom used on low bit error links (fiber optic, co-axial cable and some twisted pairs) ❍ Sometimes used on high error rate links (e.g., wireless links) Link layer services (2.) Flow Control ❍ Pacing between sending and receiving nodes Error Detection ❍ Errors are caused by signal attenuation and noise. ❍ Receiver detects presence of errors signals sender for retrans. or drops frame Error Correction ❍ Receiver identifies and corrects bit error(s) without resorting to retransmission Half-duplex and full-duplex ❍ With half duplex, nodes at both ends of link can transmit, but not at same time Multiple access links / protocols Two types of “links”: ❒ Point-to-point ❍ PPP for dial-up access ❍ Point-to-point link between Ethernet switch and host ❒ Broadcast (shared wire or medium) ❍ Traditional Ethernet ❍ Upstream HFC ❍ 802.11 wireless LAN MAC protocols: Three broad classes ❒ Channel Partitioning ❍ Divide channel into smaller “pieces” (time slots, frequency) ❍ Allocate piece to node for exclusive use ❒ Random
    [Show full text]
  • OSI Data Link Layer
    OSI Data Link Layer Network Fundamentals – Chapter 7 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Explain the role of Data Link layer protocols in data transmission. Describe how the Data Link layer prepares data for transmission on network media. Describe the different types of media access control methods. Identify several common logical network topologies and describe how the logical topology determines the media access control method for that network. Explain the purpose of encapsulating packets into frames to facilitate media access. Describe the Layer 2 frame structure and identify generic fields. Explain the role of key frame header and trailer fields including addressing, QoS, type of protocol and Frame Check Sequence. © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 2 Data Link Layer – Accessing the Media Describe the service the Data Link Layer provides as it prepares communication for transmission on specific media © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3 Data Link Layer – Accessing the Media Describe why Data Link layer protocols are required to control media access © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4 Data Link Layer – Accessing the Media Describe the role of framing in preparing a packet for transmission on a given media © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 5 Data Link Layer – Accessing the Media Describe the role the Data Link layer plays in linking the software and hardware layers © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 6 Data Link Layer – Accessing the Media Identify several sources for the protocols and standards used by the Data Link layer © 2007 Cisco Systems, Inc.
    [Show full text]
  • OSI Model and Network Protocols
    CHAPTER4 FOUR OSI Model and Network Protocols Objectives 1.1 Explain the function of common networking protocols . TCP . FTP . UDP . TCP/IP suite . DHCP . TFTP . DNS . HTTP(S) . ARP . SIP (VoIP) . RTP (VoIP) . SSH . POP3 . NTP . IMAP4 . Telnet . SMTP . SNMP2/3 . ICMP . IGMP . TLS 134 Chapter 4: OSI Model and Network Protocols 4.1 Explain the function of each layer of the OSI model . Layer 1 – physical . Layer 2 – data link . Layer 3 – network . Layer 4 – transport . Layer 5 – session . Layer 6 – presentation . Layer 7 – application What You Need To Know . Identify the seven layers of the OSI model. Identify the function of each layer of the OSI model. Identify the layer at which networking devices function. Identify the function of various networking protocols. Introduction One of the most important networking concepts to understand is the Open Systems Interconnect (OSI) reference model. This conceptual model, created by the International Organization for Standardization (ISO) in 1978 and revised in 1984, describes a network architecture that allows data to be passed between computer systems. This chapter looks at the OSI model and describes how it relates to real-world networking. It also examines how common network devices relate to the OSI model. Even though the OSI model is conceptual, an appreciation of its purpose and function can help you better understand how protocol suites and network architectures work in practical applications. The OSI Seven-Layer Model As shown in Figure 4.1, the OSI reference model is built, bottom to top, in the following order: physical, data link, network, transport, session, presentation, and application.
    [Show full text]
  • Understanding Linux Internetworking
    White Paper by David Davis, ActualTech Media Understanding Linux Internetworking In this Paper Introduction Layer 2 vs. Layer 3 Internetworking................ 2 The Internet: the largest internetwork ever created. In fact, the Layer 2 Internetworking on term Internet (with a capital I) is just a shortened version of the Linux Systems ............................................... 3 term internetwork, which means multiple networks connected Bridging ......................................................... 3 together. Most companies create some form of internetwork when they connect their local-area network (LAN) to a wide area Spanning Tree ............................................... 4 network (WAN). For IP packets to be delivered from one Layer 3 Internetworking View on network to another network, IP routing is used — typically in Linux Systems ............................................... 5 conjunction with dynamic routing protocols such as OSPF or BGP. You c an e as i l y use Linux as an internetworking device and Neighbor Table .............................................. 5 connect hosts together on local networks and connect local IP Routing ..................................................... 6 networks together and to the Internet. Virtual LANs (VLANs) ..................................... 7 Here’s what you’ll learn in this paper: Overlay Networks with VXLAN ....................... 9 • The differences between layer 2 and layer 3 internetworking In Summary ................................................. 10 • How to configure IP routing and bridging in Linux Appendix A: The Basics of TCP/IP Addresses ....................................... 11 • How to configure advanced Linux internetworking, such as VLANs, VXLAN, and network packet filtering Appendix B: The OSI Model......................... 12 To create an internetwork, you need to understand layer 2 and layer 3 internetworking, MAC addresses, bridging, routing, ACLs, VLANs, and VXLAN. We’ve got a lot to cover, so let’s get started! Understanding Linux Internetworking 1 Layer 2 vs.
    [Show full text]
  • Medium Access Control Layer
    Telematics Chapter 5: Medium Access Control Sublayer User Server watching with video Beispielbildvideo clip clips Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller Data Link Layer Data Link Layer Data Link Layer Computer Systems and Telematics (CST) Physical Layer Physical Layer Physical Layer Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Metropolitan Area Networks ● Network Topologies (MAN) ● The Channel Allocation Problem ● Wide Area Networks (WAN) ● Multiple Access Protocols ● Frame Relay (historical) ● Ethernet ● ATM ● IEEE 802.2 – Logical Link Control ● SDH ● Token Bus (historical) ● Network Infrastructure ● Token Ring (historical) ● Virtual LANs ● Fiber Distributed Data Interface ● Structured Cabling Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.2 Design Issues Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.3 Design Issues ● Two kinds of connections in networks ● Point-to-point connections OSI Reference Model ● Broadcast (Multi-access channel, Application Layer Random access channel) Presentation Layer ● In a network with broadcast Session Layer connections ● Who gets the channel? Transport Layer Network Layer ● Protocols used to determine who gets next access to the channel Data Link Layer ● Medium Access Control (MAC) sublayer Physical Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.4 Network Types for the Local Range ● LLC layer: uniform interface and same frame format to upper layers ● MAC layer: defines medium access ..
    [Show full text]
  • Importance of DNS Suffixes and Netbios
    Importance of DNS Suffixes and NetBIOS Priasoft DNS Suffixes? What are DNS Suffixes, and why are they important? DNS Suffixes are text that are appended to a host name in order to query DNS for an IP address. DNS works by use of “Domains”, equitable to namespaces and usually are a textual value that may or may not be “dotted” with other domains. “Support.microsoft.com” could be considers a domain or namespace for which there are likely many web servers that can respond to requests to that domain. There could be a server named SUPREDWA.support.microsoft.com, for example. The DNS suffix in this case is the domain “support.microsoft.com”. When an IP address is needed for a host name, DNS can only respond based on hosts that it knows about based on domains. DNS does not currently employ a “null” domain that can contain just server names. As such, if the IP address of a server named “Server1” is needed, more detail must be added to that name before querying DNS. A suffix can be appended to that name so that the DNS sever can look at the records of the domain, looking for “Server1”. A client host can be configured with multiple DNS suffixes so that there is a “best chance” of discovery for a host name. NetBIOS? NetBIOS is an older Microsoft technology from a time before popularity of DNS. WINS, for those who remember, was the Microsoft service that kept a table of names (NetBIOS names) for which IP address info could be returned.
    [Show full text]
  • The OSI Model: Understanding the Seven Layers of Computer Networks
    Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer Networks Paul Simoneau, Global Knowledge Course Director, Network+, CCNA, CTP Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding data communications between any two networked systems. It divides the communications processes into seven layers. Each layer both performs specific functions to support the layers above it and offers services to the layers below it. The three lowest layers focus on passing traffic through the network to an end system. The top four layers come into play in the end system to complete the process. This white paper will provide you with an understanding of each of the seven layers, including their functions and their relationships to each other. This will provide you with an overview of the network process, which can then act as a framework for understanding the details of computer networking. Since the discussion of networking often includes talk of “extra layers”, this paper will address these unofficial layers as well. Finally, this paper will draw comparisons between the theoretical OSI model and the functional TCP/IP model. Although TCP/IP has been used for network communications before the adoption of the OSI model, it supports the same functions and features in a differently layered arrangement. An Overview of the OSI Model Copyright ©2006 Global Knowledge Training LLC. All rights reserved. Page 2 A networking model offers a generic means to separate computer networking functions into multiple layers.
    [Show full text]
  • PDF Version of DM3530-005
    CHAPTER 6 – PART 5 Encryption Security Standards 1 BACKGROUND All USDA agencies and staff offices need to transmit Sensitive But Unclassified (SBU) over open networks. In using IT to continuously improve mission performance, the USDA is becoming more interconnected to open networks and other emergent global networks. The openness of these networks enables malicious cyber attacks against sensitive USDA assets and increases the potential risk to sensitive information. This risk is compounded through the use of the Internet and other non-secure mediums such as Wireless Local Area Network technology, Microwave, and Radio technologies. This technology includes utilizing Laptops and Personal Electronic Devices (such as cellular telephones, pagers and hand held computers) to communicate and process USDA information from any location. Encryption methods can protect sensitive information during storage and transmission. They provide important functionality to reduce the risk of intentional and accidental compromise and alteration of data. Encryption algorithms use a mechanism called a key, which is used to render the information unreadable during transmission. While the information is encrypted it is mathematically protected against disclosure because it is cannot be read by some one who does not have a corresponding key to decrypt the information. Encryption methods serve as part of the USDA defense-in-depth strategy and provide reasonable protection of sensitive information at a comparatively low cost. The primary factor that must be considered when determining if encryption is required is data sensitivity. Data sensitivity is a measure of the importance and nature of the information processed, stored, and transmitted by an IT system to the organization’s mission and day-to-day operations.
    [Show full text]
  • Lab – Configuring Frame Relay and Subinterfaces
    Lab – Configuring Frame Relay and Subinterfaces Topology © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 19 Lab – Configuring Frame Relay and Subinterfaces Addressing Table Device Interface IPv4 and IPv6 Address Default Gateway 192.168.1.1/24 2001:DB8:ACAD:A::1/64 R1 G0/0 FE80::1 link-local N/A 10.1.1.1/30 2001:DB8:ACAD:B::1/64 S0/0/0 (DCE) FE80::1 link-local N/A FR S0/0/0 N/A N/A S0/0/1 (DCE) N/A N/A 192.168.3.1/24 2001:DB8:ACAD:C::3/64 R3 G0/0 FE80::3 link-local N/A 10.1.1.2/30 2001:DB8:ACAD:B::3/64 S0/0/1 FE80::3 link-local N/A 192.168.1.3/24 192.168.1.1 PC-A NIC 2001:DB8:ACAD:A::A/64 FE80::1 192.168.3.3/24 192.168.3.1 PC-C NIC 2001:DB8:ACAD:C::C/64 FE80::3 Objectives Part 1: Build the Network and Configure Basic Device Settings Part 2: Configure a Frame Relay Switch Part 3: Configure Basic Frame Relay Part 4: Troubleshoot Frame Relay Part 5: Configure a Frame Relay Subinterface Background / Scenario Frame Relay is a high-performance WAN protocol that operates at the physical and data link layers of the OSI reference model. Unlike leased lines, Frame Relay requires only a single access circuit to the Frame Relay provider to communicate with multiple sites that are connected to the same provider.
    [Show full text]
  • Operator's Guide
    MILITARY POWER SUPPLY Operator’s Guide Ethernet & SNMP MPS-4000-1U MPPS-4000-1U Made in USA 1.888.567.9596 (USA only) | SynQor Headquarters 155 Swanson Road, Boxborough, MA 01719-1316 USA | www.synqor.com QMS: 006-0006748 Rev. E 01\19\2021 MPS with Ethernet Interface Contents 1 Overview ............................................................................................................................................... 2 2 Initial Configuration .............................................................................................................................. 2 2.1 DHCP Server .................................................................................................................................. 2 2.2 NetBIOS Hostname ....................................................................................................................... 2 2.3 Local Connection ........................................................................................................................... 2 3 Web Interface ....................................................................................................................................... 3 3.1 MONITOR Page ............................................................................................................................. 4 3.2 CONTROL Page .............................................................................................................................. 5 3.3 NETWORK Page ............................................................................................................................
    [Show full text]
  • Linux Networking Cookbook.Pdf
    Linux Networking Cookbook ™ Carla Schroder Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Linux Networking Cookbook™ by Carla Schroder Copyright © 2008 O’Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Editor: Mike Loukides Indexer: John Bickelhaupt Production Editor: Sumita Mukherji Cover Designer: Karen Montgomery Copyeditor: Derek Di Matteo Interior Designer: David Futato Proofreader: Sumita Mukherji Illustrator: Jessamyn Read Printing History: November 2007: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. The Cookbook series designations, Linux Networking Cookbook, the image of a female blacksmith, and related trade dress are trademarks of O’Reilly Media, Inc. Java™ is a trademark of Sun Microsystems, Inc. .NET is a registered trademark of Microsoft Corporation. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
    [Show full text]