Instructor: Mr Malik Zaib

Slides:



Advertisements
Similar presentations
Mitigating Layer 2 Attacks
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Common Layer 2 Attacks and Countermeasures.
Part 2: Preventing Loops in the Network
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement Inter- VLAN Routing LAN Switching and Wireless – Chapter 6.
Virtual LANs.
Switching & Operations. Address learning Forward/filter decision Loop avoidance Three Switch Functions.
Cisco 3 - Switch Perrine. J Page 15/8/2015 Chapter 8 What happens to the member ports of a VLAN when the VLAN is deleted? 1.They become inactive. 2.They.
Instructor & Todd Lammle
Sybex CCENT Chapter 10: Layer 2 Switching Instructor & Todd Lammle.
© 2002, Cisco Systems, Inc. All rights reserved..
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Layer 2 Switching. Overview Introduction Spanning Tree Protocol Spanning Tree Terms Spanning Tree Operations LAN Switch Types Configuring Switches.
Instructor & Todd Lammle
– Chapter 5 – Secure LAN Switching
Network Security1 – Chapter 5 – Secure LAN Switching Layer 2 security –Port security –IP permit lists –Protocol filtering –Controlling LAN floods (using.
Network Devices.
Sybex CCNA Chapter 8: Layer-2 Switching Instructor & Todd Lammle.
Instructor & Todd Lammle
Click to edit Master subtitle style Chapter 11: Switching and VLANs Instructor:
Click to edit Master subtitle style Chapter 9: Introduction to IP Routing Instructor:
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Enabling Port Security
Configuring Cisco Switches Chapter 13 powered by DJ 1.
Click to edit Master subtitle style
Routing and Routing Protocols
Instructor & Todd Lammle
Switching Topic 2 VLANs.
Finish up from Monday:. Today’s Agenda…  Day 1 Switching Technologies (Chapter 2 Sybex)Switching Technologies (Chapter 2 Sybex) VIRTUAL LAN’s [VLAN’S]
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
Layer-2 Switching and STP
Chapter-5 STP. Introduction Examine a redundant design In a hierarchical design, redundancy is achieved at the distribution and core layers through additional.
LAN Switching Virtual LANs. Virtual LAN Concepts A LAN includes all devices in the same broadcast domain. A broadcast domain includes the set of all LAN-connected.
CCNP Routing and Switching Exam Pass4sure.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 VLANs.
Instructor & Todd Lammle
Instructor & Todd Lammle
Instructor Materials Chapter 7: Access Control Lists
Chapter 10 Layer 2 Switching
Layer 2 Attacks and Security
Switching and VLANs.
Chapter 11 VLANs and Inter-VLAN Routing
Instructor & Todd Lammle
Switching and VLANs.
Spanning Tree Protocol
Instructor Materials Chapter 5: Ethernet
© 2002, Cisco Systems, Inc. All rights reserved.
Click to edit Master subtitle style
– Chapter 5 – Secure LAN Switching
Chapter 5: Switch Configuration
VLANs: Virtual Local Area Networks
Introduction to Networking
Chapter 2: Basic Switching Concepts and Configuration
Instructor & Todd Lammle
Lecture#10: LAN Redundancy
Instructor: Mr. Malik Zaib
Spanning Tree Protocol
Instructor & Todd Lammle
Spanning Tree Protocol
Chapter 5: Switch Configuration
Switching and VLANs.
© 2002, Cisco Systems, Inc. All rights reserved.
Routing Protocols and Concepts – Chapter 2
Chapter 5: Switch Configuration
© 2002, Cisco Systems, Inc. All rights reserved.
Cisco networking CNET-448
Chapter 2: Scaling VLANs
Click to edit Master subtitle style
Instructor: Mr. Malik Zaib Alam
Distance Vector Routing Protocols
© 2002, Cisco Systems, Inc. All rights reserved.
Presentation transcript:

Instructor: Mr Malik Zaib Chapter 6 Layer 2 Switching Instructor: Mr Malik Zaib

Chapter 7 Objectives Topics Covered in this chapter include: LAN Switching Technologies Describe and verify switching concepts a MAC learning and aging b Frame switching c Frame flooding d MAC address table Configure, verify, and troubleshoot port security a Static b Dynamic c Sticky d Max MAC addresses Violation actions f Err-disable recovery 2

Three Switch Functions at Layer 2 Address learning Layer 2 switches remember the source hardware address of each frame received on an interface and enter this information into a MAC database called a forward/ filter table. Forward/filter decisions When a frame is received on an interface, the switch looks at the destination hardware address, then chooses the appropriate exit interface for it in the MAC database. This way, the frame is only forwarded out of the correct destination port. Loop avoidance If multiple connections between switches are created for redundancy purposes, network loops can occur. Spanning Tree Protocol (STP) is used to prevent network loops while still permitting redundancy.

Empty forward/filter table on a switch When a switch is first powered on, the MAC forward/filter table (CAM) is empty

How switches learn hosts’ locations In this figure, you can see four hosts attached to a switch. When the switch is powered on, it has nothing in its MAC address forward/filter table

How switches learn hosts’ locations Let me give you an example of how a forward/filter table is populated using Figure: Host A sends a frame to Host B. Host A’s MAC address is 0000.8c01.000A; Host B’s MAC address is 0000.8c01.000B. The switch receives the frame on the Fa0/0 interface and places the source address in the MAC address table. Since the destination address isn’t in the MAC database, the frame is forwarded out all interfaces except the source port. Host B receives the frame and responds to Host A. The switch receives this frame on interface Fa0/1 and places the source hardware address in the MAC database. Host A and Host B can now make a point-to-point connection and only these two, specific devices will receive the frames. Hosts C and D won’t see the frames, nor will their MAC addresses be found in the database because they haven’t sent a frame to the switch yet.

Forward/Filter Decisions When a frame arrives at a switch interface, the destination hardware address is compared to the forward/filter MAC database. If the destination hardware address is known and listed in the database, the frame is only sent out of the appropriate exit interface. The switch won’t transmit the frame out any interface except for the destination interface, which preserves bandwidth on the other network segments. This process is called frame filtering. But if the destination hardware address isn’t listed in the MAC database, then the frame will be flooded out all active interfaces except the interface it was received on. If a device answers the flooded frame, the MAC database is then updated with the device’s location its correct interface.

Forward/filter Decisions Host A sends a data frame to Host D. What do you think the switch will do when it receives the frame from Host A?

Forward/filter table answer Since Host A’s MAC address is not in the forward/filter table, the switch will add the source address and port to the MAC address table, then forward the frame to Host D.

“Port security” on a switch port restricts port access by MAC address Figure shows two hosts connected to the single switch port Fa0/3 via either a hub or access point (AP). Port Fa0/3 is configured to observe and allow only certain MAC addresses to associate with the specific port, so in this example, Host A is denied access, but Host B is allowed to associate with the port.

Port Security Here are your options for configuring port security: Switch#config t Switch(config)#int f0/1 Switch(config-if)#switchport mode access Switch(config-if)#switchport port-security Switch(config-if)#switchport port-security ? aging Port-security aging commands mac-address Secure mac address maximum Max secure addresses violation Security violation mode <cr>

Protecting a PC in a lobby What can you do to ensure that only the MAC address of the lobby PC is allowed by switch port Fa0/1? The solution is pretty straightforward because in this case, the defaults for port security will work well. All I have left to do is add a static MAC entry: Switch(config-if)#switchport port-security Switch(config-if)#switchport port-security violation restrict Switch(config-if)#switchport port-security mac-address aa.bb.cc.dd.ee.ff

Port Security actions Configure the switchport port-security command when violation occurs can have the following actions: Protect: The protect violation mode drops packets with unknown source addresses until you remove enough secure MAC addresses to drop below the maximum value. Restrict: The restrict violation mode also drops packets with unknown source addresses until you remove enough secure MAC addresses to drop below the maximum value. However, it also generates a log message, causes the security violation counter to increment, and sends an SNMP trap. Shutdown: Shutdown is the default violation mode. The shutdown violation mode puts the interface into an error-disabled state immediately. The entire port is shut down. Also, in this mode, the system generates a log message, sends an SNMP trap, and increments the violation counter. To make the interface usable, you must perform a shut/no shut on the interface.

Loop Avoidance Redundant links between switches are important to have in place because they help prevent nasty network failures in the event one link stops working. If no loop avoidance schemes are put in place, the switches will flood broadcasts endlessly throughout the internetwork. This is sometimes referred to as a broadcast storm.

Multiple frame copies A device can receive multiple copies of the same frame because that frame can arrive from different segments at the same time. Figure demonstrates how a whole bunch of frames can arrive from multiple segments simultaneously. The server in the figure sends a unicast frame to Router C.

A Cisco Catalyst switch

Switch>en Switch#config t Switch(config)#hostname S1 S1(config)#enable secret todd S1(config)#int f0/1 S1(config-if)#int f0/15 S1(config-if)#description 1st connection to S3 S1(config-if)#int f0/16 S1(config-if)#description 2nd connection to S3 S1(config-if)#int f0/17 S1(config-if)#description 1st connection to S2 S1(config-if)#int f0/18 S1(config-if)#description 2nd connection to S2 S1(config-if)#int f0/8 S1(config-if)#desc Connection to IVR S1(config-if)#line con 0 S1(config-line)#password console S1(config-line)#login S1(config-line)#line vty 0 15 S1(config-line)#password telnet S1(config-line)#int vlan 1 S1(config-if)#ip address 192.168.10.17 255.255.255.240 S1(config-if)#no shut S1(config-if)#exit S1(config)#banner motd #this is my S1 switch# S1(config)#exit S1#copy run start Destination filename [startup-config]? [enter]

Verifying IOS Switches Show mac address-table Show interface vlan 1 Show ip interface brief

Written Labs and Review Questions Read through the Exam Essentials section together in class Open your books and go through all the written labs and the review questions. Review the answers in class. 19