Security & Networking Protocols – Quick Reference
Here’s a high-level overview of Internet protocols most relevant to security tools (firewalls, AVs, IDS/IPS, VPNs, proxies, and EDRs):
Here’s a high-level overview of Internet protocols most relevant to security tools (firewalls, AVs, IDS/IPS, VPNs, proxies, and EDRs):
- Transport & Network Core: TCP, UDP, IP (IPv4/IPv6), ICMP, ARP – foundational packet transport and routing.
- Secure Communication: TLS, SSL, SSH, HTTPS, IPsec, WireGuard, OpenVPN – encryption and authentication.
- Web & Proxy Traffic: HTTP, HTTPS, FTP, SFTP, DNS – monitored by proxies and DPI systems.
- Email Protocols: SMTP, POP3, IMAP, SMTPS – scanned by email security tools.
- Authentication & Access Control: Kerberos, RADIUS, TACACS+, LDAP – identity verification.
- Network Management & Monitoring: SNMP, Syslog, NetFlow – telemetry and intrusion detection.
- Name & Address Services: DNS, DHCP – common attack vectors.
- Tunneling & Encapsulation: L2TP, PPTP, GRE, VXLAN – virtual network and VPN traffic.
- Threat Intelligence: STIX, TAXII – structured threat data exchange.
- Legacy / Deprecated: Telnet, TFTP, SMBv1 – often flagged in scans.
Security & Networking Protocol Reference
Notes
| Category | Protocols | Purpose / Relevance to Security Tools |
|---|---|---|
| Transport & Network Core | TCP, UDP, IP (IPv4/IPv6), ICMP, ARP, GRE, ESP | Core transport and routing; inspected by firewalls, packet filters, and IDS/IPS engines. |
| Secure Communication | TLS, SSL, SSH, HTTPS, IPsec, WireGuard, OpenVPN | Encryption, authentication, and integrity for VPNs, secure tunnels, and web traffic. |
| Web & Proxy Traffic | HTTP, HTTPS, FTP, FTPS, SFTP, DNS, DNS-over-HTTPS (DoH), DNS-over-TLS (DoT) | Commonly monitored by web filters, proxies, and traffic analyzers. |
| Email Protocols | SMTP, POP3, IMAP, SMTPS, POP3S, IMAPS, MIME, DKIM, SPF, DMARC | Used for mail transfer and spam/phishing detection; often scanned by email security tools. |
| Authentication & Access Control | Kerberos, RADIUS, TACACS+, LDAP, OAuth, SAML | Identity verification and secure login; integrated with enterprise firewalls and SSO systems. |
| Network Management & Monitoring | SNMP (v1–v3), Syslog, NetFlow, sFlow, IPFIX, gNMI | Used for monitoring, telemetry, and intrusion detection analytics. |
| Name & Address Services | DNS, DHCP, mDNS, LLMNR | Provide IP resolution and address assignment; common attack surfaces for spoofing and poisoning. |
| Time Synchronization | NTP, PTP (IEEE 1588) | Clock synchronization — critical for log correlation, authentication, and certificate validation. |
| Tunneling & Encapsulation | L2TP, PPTP, GRE, VXLAN, STP, MPLS | Used in VPNs and virtual networks; inspected by intrusion prevention and gateway tools. |
| Threat Intelligence & Security Feeds | STIX, TAXII, OpenIOC | Structured protocols for threat data exchange between security products and SIEMs. |
| Legacy / Deprecated (Still Detected by Tools) | Telnet, TFTP, FTP, SMBv1, NetBIOS | Unencrypted or outdated; commonly flagged in vulnerability scans and network audits. |
Notes
- Modern security products (firewalls, AVs, EDRs, proxies) rely on protocol identification (deep packet inspection / DPI) for rule enforcement.
- Encrypted traffic (TLS, SSH, IPsec) is often inspected via SSL inspection or heuristic analysis.
- DNS and email protocols remain high-value attack vectors (DNS tunneling, phishing, spam relays).
- Legacy protocols like Telnet and SMBv1 should be disabled unless absolutely necessary.
- Threat intelligence sharing protocols (STIX/TAXII) improve correlation and response times in SOC environments.
