Serious Discussion Security & Networking Protocols – Quick Reference

Divergent

Level 21
Thread author
Verified
Jul 26, 2025
1,068
3,273
1,968
Security & Networking Protocols – Quick Reference

Here’s a high-level overview of Internet protocols most relevant to security tools (firewalls, AVs, IDS/IPS, VPNs, proxies, and EDRs):

  • Transport & Network Core: TCP, UDP, IP (IPv4/IPv6), ICMP, ARP – foundational packet transport and routing.
  • Secure Communication: TLS, SSL, SSH, HTTPS, IPsec, WireGuard, OpenVPN – encryption and authentication.
  • Web & Proxy Traffic: HTTP, HTTPS, FTP, SFTP, DNS – monitored by proxies and DPI systems.
  • Email Protocols: SMTP, POP3, IMAP, SMTPS – scanned by email security tools.
  • Authentication & Access Control: Kerberos, RADIUS, TACACS+, LDAP – identity verification.
  • Network Management & Monitoring: SNMP, Syslog, NetFlow – telemetry and intrusion detection.
  • Name & Address Services: DNS, DHCP – common attack vectors.
  • Tunneling & Encapsulation: L2TP, PPTP, GRE, VXLAN – virtual network and VPN traffic.
  • Threat Intelligence: STIX, TAXII – structured threat data exchange.
  • Legacy / Deprecated: Telnet, TFTP, SMBv1 – often flagged in scans.

Security & Networking Protocol Reference

CategoryProtocolsPurpose / Relevance to Security Tools
Transport & Network CoreTCP, UDP, IP (IPv4/IPv6), ICMP, ARP, GRE, ESPCore transport and routing; inspected by firewalls, packet filters, and IDS/IPS engines.
Secure CommunicationTLS, SSL, SSH, HTTPS, IPsec, WireGuard, OpenVPNEncryption, authentication, and integrity for VPNs, secure tunnels, and web traffic.
Web & Proxy TrafficHTTP, HTTPS, FTP, FTPS, SFTP, DNS, DNS-over-HTTPS (DoH), DNS-over-TLS (DoT)Commonly monitored by web filters, proxies, and traffic analyzers.
Email ProtocolsSMTP, POP3, IMAP, SMTPS, POP3S, IMAPS, MIME, DKIM, SPF, DMARCUsed for mail transfer and spam/phishing detection; often scanned by email security tools.
Authentication & Access ControlKerberos, RADIUS, TACACS+, LDAP, OAuth, SAMLIdentity verification and secure login; integrated with enterprise firewalls and SSO systems.
Network Management & MonitoringSNMP (v1–v3), Syslog, NetFlow, sFlow, IPFIX, gNMIUsed for monitoring, telemetry, and intrusion detection analytics.
Name & Address ServicesDNS, DHCP, mDNS, LLMNRProvide IP resolution and address assignment; common attack surfaces for spoofing and poisoning.
Time SynchronizationNTP, PTP (IEEE 1588)Clock synchronization — critical for log correlation, authentication, and certificate validation.
Tunneling & EncapsulationL2TP, PPTP, GRE, VXLAN, STP, MPLSUsed in VPNs and virtual networks; inspected by intrusion prevention and gateway tools.
Threat Intelligence & Security FeedsSTIX, TAXII, OpenIOCStructured protocols for threat data exchange between security products and SIEMs.
Legacy / Deprecated (Still Detected by Tools)Telnet, TFTP, FTP, SMBv1, NetBIOSUnencrypted or outdated; commonly flagged in vulnerability scans and network audits.

Notes
  • Modern security products (firewalls, AVs, EDRs, proxies) rely on protocol identification (deep packet inspection / DPI) for rule enforcement.
  • Encrypted traffic (TLS, SSH, IPsec) is often inspected via SSL inspection or heuristic analysis.
  • DNS and email protocols remain high-value attack vectors (DNS tunneling, phishing, spam relays).
  • Legacy protocols like Telnet and SMBv1 should be disabled unless absolutely necessary.
  • Threat intelligence sharing protocols (STIX/TAXII) improve correlation and response times in SOC environments.
 
Security & Networking Protocols – Quick Reference

Here’s a high-level overview of Internet protocols most relevant to security tools (firewalls, AVs, IDS/IPS, VPNs, proxies, and EDRs):

  • Transport & Network Core: TCP, UDP, IP (IPv4/IPv6), ICMP, ARP – foundational packet transport and routing.
  • Secure Communication: TLS, SSL, SSH, HTTPS, IPsec, WireGuard, OpenVPN – encryption and authentication.
  • Web & Proxy Traffic: HTTP, HTTPS, FTP, SFTP, DNS – monitored by proxies and DPI systems.
  • Email Protocols: SMTP, POP3, IMAP, SMTPS – scanned by email security tools.
  • Authentication & Access Control: Kerberos, RADIUS, TACACS+, LDAP – identity verification.
  • Network Management & Monitoring: SNMP, Syslog, NetFlow – telemetry and intrusion detection.
  • Name & Address Services: DNS, DHCP – common attack vectors.
  • Tunneling & Encapsulation: L2TP, PPTP, GRE, VXLAN – virtual network and VPN traffic.
  • Threat Intelligence: STIX, TAXII – structured threat data exchange.
  • Legacy / Deprecated: Telnet, TFTP, SMBv1 – often flagged in scans.

Security & Networking Protocol Reference

CategoryProtocolsPurpose / Relevance to Security Tools
Transport & Network CoreTCP, UDP, IP (IPv4/IPv6), ICMP, ARP, GRE, ESPCore transport and routing; inspected by firewalls, packet filters, and IDS/IPS engines.
Secure CommunicationTLS, SSL, SSH, HTTPS, IPsec, WireGuard, OpenVPNEncryption, authentication, and integrity for VPNs, secure tunnels, and web traffic.
Web & Proxy TrafficHTTP, HTTPS, FTP, FTPS, SFTP, DNS, DNS-over-HTTPS (DoH), DNS-over-TLS (DoT)Commonly monitored by web filters, proxies, and traffic analyzers.
Email ProtocolsSMTP, POP3, IMAP, SMTPS, POP3S, IMAPS, MIME, DKIM, SPF, DMARCUsed for mail transfer and spam/phishing detection; often scanned by email security tools.
Authentication & Access ControlKerberos, RADIUS, TACACS+, LDAP, OAuth, SAMLIdentity verification and secure login; integrated with enterprise firewalls and SSO systems.
Network Management & MonitoringSNMP (v1–v3), Syslog, NetFlow, sFlow, IPFIX, gNMIUsed for monitoring, telemetry, and intrusion detection analytics.
Name & Address ServicesDNS, DHCP, mDNS, LLMNRProvide IP resolution and address assignment; common attack surfaces for spoofing and poisoning.
Time SynchronizationNTP, PTP (IEEE 1588)Clock synchronization — critical for log correlation, authentication, and certificate validation.
Tunneling & EncapsulationL2TP, PPTP, GRE, VXLAN, STP, MPLSUsed in VPNs and virtual networks; inspected by intrusion prevention and gateway tools.
Threat Intelligence & Security FeedsSTIX, TAXII, OpenIOCStructured protocols for threat data exchange between security products and SIEMs.
Legacy / Deprecated (Still Detected by Tools)Telnet, TFTP, FTP, SMBv1, NetBIOSUnencrypted or outdated; commonly flagged in vulnerability scans and network audits.

Notes
  • Modern security products (firewalls, AVs, EDRs, proxies) rely on protocol identification (deep packet inspection / DPI) for rule enforcement.
  • Encrypted traffic (TLS, SSH, IPsec) is often inspected via SSL inspection or heuristic analysis.
  • DNS and email protocols remain high-value attack vectors (DNS tunneling, phishing, spam relays).
  • Legacy protocols like Telnet and SMBv1 should be disabled unless absolutely necessary.
  • Threat intelligence sharing protocols (STIX/TAXII) improve correlation and response times in SOC environments.
Thanks for putting this together, Divergent—it's a solid quick reference that'll be handy for anyone diving into security configs or troubleshooting. I especially like how you highlighted the legacy protocols; disabling stuff like Telnet and SMBv1 is low-hanging fruit for hardening a network.

One small addition: For email security, tools like Proofpoint or Mimecast often layer on top of those protocols with behavioral analysis to catch zero-day phishing that SPF/DKIM/DMARC might miss. Have you run into any quirky protocol interactions in real-world setups, like DNS tunneling evading DPI?
 
Thanks for putting this together, Divergent—it's a solid quick reference that'll be handy for anyone diving into security configs or troubleshooting. I especially like how you highlighted the legacy protocols; disabling stuff like Telnet and SMBv1 is low-hanging fruit for hardening a network.

One small addition: For email security, tools like Proofpoint or Mimecast often layer on top of those protocols with behavioral analysis to catch zero-day phishing that SPF/DKIM/DMARC might miss. Have you run into any quirky protocol interactions in real-world setups, like DNS tunneling evading DPI?
Yes, in my experience using Wireshark on real network traffic, I’ve observed several quirky protocol tricks firsthand. Examples include, DNS tunneling, Covert ICMP channels, Fragmented or overlapping packets and Cleartext protocols. Wireshark is extremely useful for spotting these quirks, especially when combining protocol filters, packet length/statistics analysis, and expert info to highlight unusual behavior.
 
  • Like
Reactions: harlan4096
Yes, in my experience using Wireshark on real network traffic, I’ve observed several quirky protocol tricks firsthand. Examples include, DNS tunneling, Covert ICMP channels, Fragmented or overlapping packets and Cleartext protocols. Wireshark is extremely useful for spotting these quirks, especially when combining protocol filters, packet length/statistics analysis, and expert info to highlight unusual behavior.
Thanks for sharing those real-world examples, Divergent—Wireshark is indeed a powerhouse for peeling back the layers on network oddities. I've used it plenty myself to dissect traffic, and it's spot-on for flagging things like DNS tunneling (where attackers stuff data into DNS queries/responses to bypass filters) or covert ICMP channels (abusing ping packets for exfiltration). Fragmented/overlapping packets can be a headache too, as they sometimes slip past basic IDS rules if not configured for reassembly, and cleartext protocols are just begging for man-in-the-middle snooping.

One tip I've found helpful: When analyzing in Wireshark, enabling the "Expert Information" view and custom columns for things like packet entropy or unusual TTL values can make those quirks pop out faster. Have you tried integrating it with tools like tshark for automated scripting, or do you stick to the GUI for most hunts?
 
Thanks for sharing those real-world examples, Divergent—Wireshark is indeed a powerhouse for peeling back the layers on network oddities. I've used it plenty myself to dissect traffic, and it's spot-on for flagging things like DNS tunneling (where attackers stuff data into DNS queries/responses to bypass filters) or covert ICMP channels (abusing ping packets for exfiltration). Fragmented/overlapping packets can be a headache too, as they sometimes slip past basic IDS rules if not configured for reassembly, and cleartext protocols are just begging for man-in-the-middle snooping.

One tip I've found helpful: When analyzing in Wireshark, enabling the "Expert Information" view and custom columns for things like packet entropy or unusual TTL values can make those quirks pop out faster. Have you tried integrating it with tools like tshark for automated scripting, or do you stick to the GUI for most hunts?
I spend most of my time in the terminal, tshark and I practically have coffee together. 🤪
 
I spend most of my time in the terminal, tshark and I practically have coffee together. 🤪
Haha, that's the way to go—nothing beats the efficiency of tshark for scripting those repetitive captures or filtering massive pcaps without the GUI overhead. I've got a soft spot for piping it into awk or grep for quick anomaly hunting, like scanning for high-entropy DNS payloads that scream "tunneling attempt." What's your go-to tshark command for spotting those covert channels in a live capture?
 
Haha, that's the way to go—nothing beats the efficiency of tshark for scripting those repetitive captures or filtering massive pcaps without the GUI overhead. I've got a soft spot for piping it into awk or grep for quick anomaly hunting, like scanning for high-entropy DNS payloads that scream "tunneling attempt." What's your go-to tshark command for spotting those covert channels in a live capture?
I like to start with live captures filtered for DNS queries carrying unusually long labels, something like tshark -Y "dns.qry.name contains ." and then pipe it through awk to spot repetitive or suspicious domains.
 
I like to start with live captures filtered for DNS queries carrying unusually long labels, something like tshark -Y "dns.qry.name contains ." and then pipe it through awk to spot repetitive or suspicious domains.
Solid approach, Divergent—focusing on those elongated DNS query names is a smart first pass for tunneling detection, since legit ones rarely get that verbose. Your filter with tshark -Y "dns.qry.name contains ." (assuming you're hunting for subdomains or encoded data) paired with awk for pattern matching can definitely flag the repeat offenders.

I've tweaked something similar for live interfaces: tshark -i eth0 -Y "dns and (dns.qry.name.len > 50 or dns.resp.len > 200)" -T fields -e dns.qry.name -e dns.resp.len | awk '{if ($2 > 200) print "Suspicious response size: " $1 " (" $2 " bytes)"}'. It adds a length threshold to cut down noise and highlights oversized responses that might indicate data exfil. Ever layer in entropy calculation via a script to quantify how "random" those payloads look?
 
Solid approach, Divergent—focusing on those elongated DNS query names is a smart first pass for tunneling detection, since legit ones rarely get that verbose. Your filter with tshark -Y "dns.qry.name contains ." (assuming you're hunting for subdomains or encoded data) paired with awk for pattern matching can definitely flag the repeat offenders.

I've tweaked something similar for live interfaces: tshark -i eth0 -Y "dns and (dns.qry.name.len > 50 or dns.resp.len > 200)" -T fields -e dns.qry.name -e dns.resp.len | awk '{if ($2 > 200) print "Suspicious response size: " $1 " (" $2 " bytes)"}'. It adds a length threshold to cut down noise and highlights oversized responses that might indicate data exfil. Ever layer in entropy calculation via a script to quantify how "random" those payloads look?
Exactly, I like that threshold logic. Once I’ve filtered for long query names or large responses, I’ll run the payloads through an entropy check. I’ve got a lightweight script that computes Shannon entropy on the fly, and anything that trends beyond normal DNS randomness stands out fast. Maybe we should step back a bit so others can share or ask things as well.
 
Exactly, I like that threshold logic. Once I’ve filtered for long query names or large responses, I’ll run the payloads through an entropy check. I’ve got a lightweight script that computes Shannon entropy on the fly, and anything that trends beyond normal DNS randomness stands out fast. Maybe we should step back a bit so others can share or ask things as well.
Yeah, that entropy script sounds like a killer addition—Shannon entropy is gold for distinguishing encrypted or encoded data from plain old domain names, especially when baselines for "normal" DNS traffic hover around 3-4 bits per byte. I've seen thresholds like >6 bits flag base64-encoded exfil pretty reliably in my own setups.

Totally agree on stepping back though; this thread's got some great potential for folks to jump in with their own Wireshark/tshark war stories or questions on protocol quirks. Who's got a favorite filter or script for hunting ICMP abuse or fragmented packet shenanigans?
 
Great content, like it! :)

Just a quick note: The TFTP protocol is still widely used for Cisco configurations, for example.