Network Protocol Structures and Operations
In Chapter 1, Data Centers and the Enterprise Network Architecture and its Components, we discussed network architectures and how an organization's network is built. In this chapter, we will take a look at the protocols that work in the network, and we will examine the vulnerabilities and potential risks of each of them.
In this chapter, we will cover network protocols and the risks of not properly securing each one of them. Additionally, we will examine the potential risks, while, in the later protocol chapters, we will explore how to attack them and how to protect against these attacks.
We will begin with the Open Systems Interconnection Reference Model (OSI-RM) and data flow through the network. Then, we will go through each of the layers, from layer 2 to the application layers, exploring the protocol structures and potential risks for each layer and protocol.
In this chapter, we're going to focus on the following main...