(Chapter 1 Overview of Internetworking Protocols and Specifications 11.1 Internet Protocol 31.1.1 IP Addressing 31.1.2 IP Security Dangers 41.2 User Datagram Protocol 71.2.1 Attacks on User Datagram Protocol Services: SATAN Ease 71.2.2 For UNIX and Windows NT The Internet Security System 71.3 Transmission Control Protocol 91.4 Extending IP Addresses via CIDR 111.4.1 TCP/IP Security Dangers and Their Countermeasures 111.4.2 IPSEC—IP Security Countermeasures Proposed by IETF 151.4.3 IPSO—(US) Department of Defense IP Security Countermeasures 151.5 Routing Information Protocol 151.6MBONE—Multicast Backbone 161.7 Internet Control Message Protocol 181.8 Internet Group Management Protocol 181.9 Open Shortest Path First 191.10 Border Gateway Protocol Version 4 (BGP-4) 201.11 Address Translation Protocol 201.11.1 Reverse Address Translation Protocol 201.11.2 Security Dangers of Passing IP Datagrams Through Routers 201.12 Simple Network Management Protocol 211.13 Monitoring ISP Connections 211.14 Next-Generation IP Protocol IPv6 211.14.1 Address Extensions 221.14.2 Automatic Configuration of Network Devices 221.14.3 Security 221.14.4 Real-Time Capabilities 221.14.5 Groups 231.14.6 IPv6 Security 231.15 Network Time Protocol 231.16 Dynamic Host Configuration Protocol 231.17 Windows Sockets (Winsock) Specification 241.18 Domain Name System 241.19 Firewall Concepts 241.19.1 Firewall Failures 271.19.2 Ceasefire Zones 271.19.3 Authentication Issues 281.19.4 Peripheral Trust 281.19.5 Intranets 28 Chapter 2 Basic Connections 302.1 For TTY312.2UNIXtoUNIXCopy332.3SLIP and PPP342.4Rlogin342.5 Virtual Terminal Protocols 352.5.1 Columbia University's Kermit: A Secure and Reliable Telnet Server 352.5.2Security Considerations for Telnet Services 402.5.3 Network Security System Administrator 402.5.4 Telnet Session Security Checklist 422.6 Simple File Transfer Protocol 432.7 File Transfer Protocol 442.8 Some Challenges of Using Firewalls 452.9 The Increasing Security Needs of IP Networks 47 Chapter 3 Encryption: Satisfied 483.1 Introduction 503.2 Symmetry Key Encryption (Private Key) 503.2.1 Data Encryption Specification 503.2.2 World Data Encryption Algorithm 523.2.3CAST Algorithm 533.2.4Skipjack Algorithm 583.2.5RC2/RC4 Algorithm 593.3 Asymmetric Key Encryption/Public Key Encryption 593.3.1RSA603. 3.2 Digital Signature Specification 613.4 Message Digest Algorithm 623.4.1M D2, MD4, and MD5 623.4.2 Secure Hash Specifications/Secure Hash Algorithms 643.5 Certificates 643.6 Key Management 713.6.1 Kerberos Protocol 713.6.2 Key Exchange Algorithms 783.7 Cryptanalysis and Attacks 793.7.1 Ciphertext-Only Attacks 793.7.2 Known Plaintext attack 793.7.3 Selected plaintext attack 803.7.4 Adaptive selected plaintext attack 803.7.5 Man-in-the-middle attack 80 and so on)