Part 2 Logical Network Design

Slides:



Advertisements
Similar presentations
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Advertisements

Chapter 1: Introduction to Scaling Networks
Top-Down Network Design Chapter Five Designing a Network Topology
Top-Down Network Design Chapter Six Designing Models for Addressing and Naming Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Guide to Network Defense and Countermeasures Second Edition
Cisco Hierarchical Network Model RD-CSY /101.
Module 5 - Switches CCNA 3 version 3.0 Cabrillo College.
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
1 CCNA 3 v3.1 Module 1. 2 CCNA 3 Module 1 Introduction to Classless Routing.
CCNA 2 v3.1 Module 6.
CS335 Networking & Network Administration Tuesday, May 18, 2010.
Routing and Routing Protocols
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
Lecture Week 3 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts.
Networking Components
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Connecting LANs, Backbone Networks, and Virtual LANs
CH 9 L OGICAL N ETWORK D ESIGN 1  Network Topology  Addressing and Naming  Switching and Routing Protocols  Network Security Strategies  Management.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
Dr. John P. Abraham Professor University of Texas Pan American Internet Routing and Routing Protocols.
Chapter 4: Managing LAN Traffic
Characterizing the Existing Internetwork PART 1
1 Introducing Routing 1. Dynamic routing - information is learned from other routers, and routing protocols adjust routes automatically. 2. Static routing.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 6 Routing and Routing Protocols.
Network Admin Course Plan Accede Institute Of Science & Technology.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
1 Chapter 27 Internetwork Routing (Static and automatic routing; route propagation; BGP, RIP, OSPF; multicast routing)
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
1. 2 Anatomy of an IP Packet IP packets consist of the data from upper layers plus an IP header. The IP header consists of the following:
CCNA 1 Module 10 Routing Fundamentals and Subnets.
Communication Between Networks How the Internet Got Its Name.
C HAPTER 6 Part 2 1 Revised sem AAB-2013.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
ITEC 275 Computer Networks – Switching, Routing, and WANs Week 7 Robert D’Andrea Some slides provide by Priscilla Oppenheimer and used with permission.
CCNA 2 Week 6 Routing Protocols. Copyright © 2005 University of Bolton Topics Static Routing Dynamic Routing Routing Protocols Overview.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Routing and Routing Protocols
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
1 Version 3.1 Module 6 Routed & Routing Protocols.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
1 7-Jan-16 S Ward Abingdon and Witney College Dynamic Routing CCNA Exploration Semester 2 Chapter 3.
© 2002, Cisco Systems, Inc. All rights reserved..
+ Routing Concepts 1 st semester Objectives  Describe the primary functions and features of a router.  Explain how routers use information.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 Module 10 Routing Fundamentals and Subnets.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Networking Training (CCENT/CCT/CCNA R&S) Rick Rowe Ron Giannetti.
Top-Down Network Design Chapter 3.3 Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer.
PART1: NETWORK COMPONENTS AND TRANSMISSION MEDIUM Wired and Wireless network management 1.
Top-Down Network Design Chapter Six Designing Models for Addressing and Naming Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Instructor Materials Chapter 1: LAN Design
Planning and Troubleshooting Routing and Switching
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Routing.
Module 5 - Switches CCNA 3 version 3.0.
Chapter 3: Dynamic Routing
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Routing.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

Part 2 Logical Network Design Network Topology Addressing and Naming Switching and Routing Protocols Network Security Strategies Management Strategies

Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer

Network Topology Design Themes Hierarchy (opposite to flat or mesh network) Core layer Distribution layer Access layers Redundancy Modularity Well-defined entries and exits Protected areas

Why Use a Hierarchical Model? Reduces workload on network devices Avoids devices having to communicate with too many other devices (reduces “CPU adjacencies”) Constrains broadcast domains Minimize costs. Only buy appropriate devices for each layer Facilitates changes easy and cheap Good for modularity and scalability

Hierarchical Network Design Enterprise WAN Backbone Core Layer Campus A Campus B Campus C Distribution Layer Campus C Backbone Access Layer Building C-1 Building C-2

Cisco’s Hierarchical Design Model A core layer of high-end routers and switches that are optimized for availability and speed A distribution layer of routers and switches that implement policies and segment traffic An access layer that connects users via hubs, switches, and other devices

Access Layer requirements: Utilize the Hierarchical Design Model to Develop a Cost-Effective Network Design Access Layer requirements: Connectivity for existing devices and new devices VLANs to separate voice, security, wireless, and normal data services Redundancy QoS Graphic: 5.2.1.1

Distribution layer requirements: Redundant components and links Utilize the Hierarchical Design Model to Develop a Cost-Effective Network Design Distribution layer requirements: Redundant components and links High-density routing Traffic filtering QoS implementation High-bandwidth connectivity Fast convergence Route summarization Graphic: 5.2.2.2

Core Layer requirements: High-speed connectivity Utilize the Hierarchical Design Model to Develop a Cost-Effective Network Design Core Layer requirements: High-speed connectivity Routed interconnections High-speed redundant links Graphic: 5.2.3.2

Flat Versus Hierarchy Flat Loop Topology Headquarters in Medford Ashland Branch Office Klamath Falls Branch Office Grants Pass Branch Office White City Branch Office Headquarters in Medford Grants Pass Branch Office Ashland Branch Office Klamath Falls Branch Office Flat Loop Topology Hierarchical Redundant Topology

Mesh Designs Partial-Mesh Topology Full-Mesh Topology

A Partial-Mesh Hierarchical Design Headquarters (Core Layer) Regional Offices (Distribution Layer) Branch Offices (Access Layer)

A Hub-and-Spoke Hierarchical Topology for small company Corporate Headquarters Branch Office Home Office Branch Office

Avoid Chains and Backdoors Chain: extra layer Back door: connection between devices in the same layer, makes unexpected routing and switching problems. Core Layer Distribution Layer Access Layer Backdoor Chain

Campus Topology Design Use a hierarchical, modular approach Minimize the size of bandwidth domains Minimize the size of broadcast domains Provide redundancy

A Simple Campus Redundant Design Host A LAN X Switch 1 Switch 2 LAN Y Host B

Bridges and Switches use Spanning-Tree Protocol (STP) to Avoid Loops Host A LAN X X Switch 1 Switch 2 LAN Y Host B

Virtual LANs (VLANs) VLANs versus Real LANs Switch A Switch B To understand VLANs, it helps to think about real (non-virtual) LANs first. Imagine two switches that are not connected to each other in any way. Switch A connects stations in Network A and Switch B connects stations in Network B, When Station A1 sends a broadcast, Station A2 and Station A3 receive the broadcast, but none of the stations in Network B receive the broadcast, because the two switches are not connected. This same configuration can be implemented through configuration options in a single switch, with the result looking like the next slide. Station A1 Station A2 Station A3 Station B1 Station B2 Station B3 Network A Network B Two switches that are not connected to each other in any way. When Station A1 sends a broadcast, Station A2 and Station A3 receive the broadcast, but none of the stations in Network B receive the broadcast

A Switch with VLANs Through the configuration of the switch there are now two virtual LANs implemented in a single switch. The broadcast, multicast, and unknown-destination traffic originating with any member of VLAN A is forwarded to all other members of VLAN A, and not to a member of VLAN B. VLAN A has the same properties as a physically separate LAN bounded by routers. Station A1 Station A2 Station A3 VLAN A Station B1 Station B2 Station B3 VLAN B Through the configuration of the switch there are now two virtual LANs implemented in a single switch, instead of two separate physical LANs. This is the beauty of VLANs. The broadcast, multicast, and unknown-destination traffic originating with any member of VLAN A is forwarded to all other members of VLAN A, and not to a member of VLAN B. VLAN A has the same properties as a physically separate LAN bounded by routers. The protocol behavior in this slide is exactly the same as the protocol behavior in the previous slide.

VLANs Span Switches VLANs can span multiple switches. Switch A Station B1 Station B2 Station B3 Switch B Station B4 Station B5 Station B6 Station A1 Station A2 Station A3 Station A4 Station A5 Station A6 VLAN B VLAN A VLANs can span multiple switches. In this slide, both switches contain stations that are members of VLAN A and VLAN B. This design introduces a new problem, the solution to which is specified in the IEEE 802.1Q standard and the Cisco proprietary Inter-Switch Link (ISL) protocol. The problem has to do with the forwarding of broadcast, multicast, or unknown-destination frames from a member of a VLAN on one switch to the members of the same VLAN on the other switch. In this slide, all frames going from Switch A to Switch B take the same interconnection path. The 802.1Q standard and Cisco's ISL protocol define a method for Switch B to recognize whether an incoming frame belongs to VLAN A or to VLAN B. As a frame leaves Switch A, a special header is added to the frame, called the VLAN tag. The VLAN tag contains a VLAN identifier (ID) that specifies to which VLAN the frame belongs. Because both switches have been configured to recognize VLAN A and VLAN B, they can exchange frames across the interconnection link, and the recipient switch can determine the VLAN into which those frames should be sent by examining the VLAN tag. The link between the two switches is sometimes called a trunk link or simply a trunk. Trunk links allow the network designer to stitch together VLANs that span multiple switches. A major design consideration is determining the scope of each VLAN and how many switches it should span. Most designers try to keep the scope small. Each VLAN is a broadcast domain. In general, a single broadcast domain should be limited to a few hundred workstations (or other devices, such as IP phones). VLANs can span multiple switches.

Incorporate Wireless Connectivity into the LAN Design Factors influencing availability in a wireless network: Location of the AP Signal strength of the AP Number of users Dynamic reconfiguration Centralization Graphic: 5.4.3.1

WLANs and VLANs A wireless LAN (WLAN) is often implemented as a VLAN WLAN should be a separate subnet Clients roaming but Users remain in the same VLAN and IP subnet as they roam, so there’s no need to change addressing information Also makes it easier to set up filters ACL(Access Control Lists) to protect the wired network from wireless users.

Security Topologies DMZ Enterprise Internet Network Web, File, DNS, Mail Servers

DMZ DMZ: demilitarized zone:  is a physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN); an external attacker only has access to equipment in the DMZ, rather than any other part of the network. In a computer network, the hosts most vulnerable to attack are those that provide services to users outside of the local area network, such as e-mail, web and Domain Name System (DNS) servers.

Security Topologies Firewall: boundary between two or more networks Internet Firewall DMZ Enterprise Network Web, File, DNS, Mail Servers

Firewall A firewall can either be software-based or hardware-based and is used to help keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set.

Summary Use a systematic, top-down approach Plan the logical design before the physical design Topology design should feature hierarchy, redundancy, modularity, and security

Review Questions Why are hierarchy and modularity important for network designs? What are the three layers of Cisco’s hierarchical network design? What are the major components of Cisco’s enterprise composite network model? What are the advantages and disadvantages of the various options for multihoming an Internet connection?

Chapter Six Designing Models for Addressing and Naming Copyright 2010 Cisco Press & Priscilla Oppenheimer

Guidelines for Addressing and Naming Use a structured model for addressing and naming Assign addresses and names hierarchically Decide in advance

Advantages of Structured Models for Addressing & Naming It makes it easier to Read network maps Operate network management software Recognize devices in protocol analyzer traces Meet goals for usability Design filters on firewalls and routers Implement route summarization

Public IP Addresses Managed by the Internet Assigned Numbers Authority (IANA) Users are assigned IP addresses by Internet Service Providers (ISPs). ISPs obtain allocations of IP addresses from their appropriate Regional Internet Registry (RIR) Public address is essential for web server or other servers that external users access. But not necessary for all internal hosts and networks. Private address is ok. Addressing for internal host that need access to outside services can be handled by NAT (Network Address Translation) gateway.

Regional Internet Registries (RIR) American Registry for Internet Numbers (ARIN) serves North America and parts of the Caribbean. RIPE Network Coordination Centre (RIPE NCC) serves Europe, the Middle East, and Central Asia. Asia-Pacific Network Information Centre (APNIC) serves Asia and the Pacific region. Latin American and Caribbean Internet Addresses Registry (LACNIC) serves Latin America and parts of the Caribbean. African Network Information Centre (AfriNIC) serves Africa.

Private Addressing An enterprise network administrator assigns to internal networks and hosts without any coordination from an ISP or RIRs. 10.0.0.0 – 10.255.255.255 172.16.0.0 – 172.31.255.255 192.168.0.0 – 192.168.255.255 Advantages: Security. Private network numbers are not advertised. Flexibility. Easy to change to new ISP. Save IP address resources.

The Two Parts of an IP Address 32 Bits Prefix Host Prefix Length

Designing Networks with Subnets Determining subnet size Computing subnet mask Computing IP addresses

Subnets Subnetting is the process to divide a network into several smaller networks. Within a subnet, all the hosts have the same network ID in their IP addresses. With subnets, a physical network can be divided into logical units. The hosts in each unit can directly communicate with each other and use the same router to communicate with the hosts in the other subnets. Local broadcasting is limited within a subnet.

Reasons for Using Subnets To efficiently use IP addresses To reduce the number of collisions To reduce broadcasting traffic To strengthen network security control To implement the network structure at the site, building, department, and office levels To reduce the cost of paying the ISP for public IP addresses

Subnet Masks A subnet mask is a string of 32-bit binary code used to determine which part of an IP address is used as the network ID. Binary Subnet Mask Decimal Subnet Mask 11111111 00000000 00000000 00000000 255.0.0.0 11111111 11111111 00000000 00000000 255.255.0.0 11111111 11111111 11111111 00000000 255.255.255.0 11111111 11111111 11100000 00000000 255.255.224.0 11111111 11111111 11111111 11110000 255.255.255.240 The leftmost bits in a subnet mask are a sequence of consecutive 1s and rightmost bits must be consecutive 0s. Invalid masks are listed below. Binary Decimal 11111111 00000101 00000000 00000000 255.5.0.0 11111111 11111100 11111111 00000000 255.252.255.0 10000000 11111111 11111111 00000000 128.255.255.0 11111111 11111111 11111111 11110001 255.255.255.241

Addresses to Avoid When Subnetting A node address of all ones (broadcast) A node address of all zeros (network) A subnet address of all ones (all subnets) A subnet address of all zeros (confusing)

Classful IP Addressing Class First First Byte Prefix Intent Few Bits Length A 0 1-126* 8 Very large networks B 10 128-191 16 Large networks C 110 192-223 24 Small networks D 1110 224-239 NA IP multicast E 1111 240-255 NA Experimental *Addresses starting with 127 are reserved for IP traffic local to a host.

Division of the Classful Address Space Class Prefix Number of Addresses Length per Network A 8 224-2 = 16,777,214 B 16 216-2 = 65,534 C 24 28-2 = 254

Classful IP is Wasteful Class A uses 50% of address space Class B uses 25% of address space Class C uses 12.5% of address space Class D and E use 12.5% of address space

Classless Addressing Prefix/host boundary can be anywhere Less wasteful Supports route summarization (Aggregation) Also known as Aggregation Supernetting Classless routing Classless inter-domain routing (CIDR) Prefix routing

Enterprise Core Network Branch-Office Networks Supernetting 172.16.0.0 172.17.0.0 172.18.0.0 Branch-Office Router 172.19.0.0 Enterprise Core Network Branch-Office Networks Move prefix boundary to the left Branch office advertises 172.16.0.0/14

Guidelines for Assigning Names Names should be Short Meaningful Clear Distinct Case insensitive Avoid names with unusual characters Hyphens, underscores, asterisks, and so on

Domain Name System (DNS) Maps names to IP addresses Supports hierarchical naming example: eent3.lsbu.ac.uk A DNS server has a database of resource records (RRs) that maps names to addresses in the server’s “zone of authority” Client queries server Uses UDP port 53 for name queries and replies Uses TCP port 53 for zone transfers

Describe IPv6 Implementations and IPv6 to IPv4 Interactions Enhancements available with IPv6: Mobility and security Simpler header Address formatting Graphic: 6.3.1.2

Summary Use a systematic, structured, top-down approach to addressing and naming Assign addresses in a hierarchical fashion Distribute authority for addressing and naming where appropriate IPv6 looms in our future

Review Questions Why is it important to use a structured model for addressing and naming? When is it appropriate to use IP private addressing versus public addressing? When is it appropriate to use static versus dynamic addressing? What are some approaches to upgrading to IPv6?

Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer

Switching and Routing Choices Layer 2 transparent bridging (switching) Multilayer switching Spanning Tree Protocol enhancements VLAN technologies Routing Static or dynamic Distance-vector and link-state protocols Interior and exterior Etc.

Selection Criteria for Switching and Routing Protocols Network traffic characteristics Bandwidth, memory, and CPU usage The number of peers supported The capability to adapt to changes quickly Support for authentication

Example Decision Table

Transparent Bridging (Switching) Tasks Forward frames transparently Learn location of devices by source address in each frame Bridge develops a switch/bridge table, or MAC address table, or Content Address Memory (CAM) table. Floods unknown or broadcast frames Layer 1 and 2 device (physical address), don’t look at IP address. Store-and-forward device. Receive a complete frame, determines outgoing port, calculates CRC then transmits the frame when the port is free

Switching Table on a Bridge or Switch

Protocols for Transporting VLAN Information Switches need a method to make sure intra- VLAN traffic goes to the correct interfaces. IEEE 802.1Q VLAN Trunk Protocol (VTP) VLAN management protocol Switch A Station B1 Station B2 Station B3 Switch B Station B4 Station B5 Station B6 Station A1 Station A2 Station A3 Station A4 Station A5 Station A6 VLAN B VLAN A

Routing vs. Bridging and Switching Routing is operating at the Network Layer of the OSI Model. Bridging and switching occur on the Data Link Layer.

Selecting Routing Protocols A routing protocol lets a router dynamically learn how to reach other networks and exchange this information with other routers. They all have the same general goal: To share network reachability information among routers They differ in many ways: Interior versus exterior Metrics supported Dynamic versus static and default Distance-vector versus link-sate Classful versus classless Scalability

Interior Versus Exterior Routing Protocols Interior routing protocols are used within one organization. The current lead Interior Routing Protocol is OSPF. Other Interior Protocols include IS-IS, RIP, and EIGRP. Exterior routing protocols are used between organizations. The current lead Exterior Gateway Protocol is BGP. The current revision of BGP is BGP4. There are no other Exterior Gateway Routing protocols in current competition with BGP4.

Routing Protocol Metrics Metric: the determining factor used by a routing algorithm to decide which route to a network is better than another Examples of metrics: Bandwidth - capacity Delay - time Load - amount of network traffic Reliability - error rate Hop count - number of routers that a packet must travel through before reaching the destination network Cost - arbitrary value defined by the protocol or administrator

Routing Algorithms Static routing Default routing Calculated beforehand, offline Default routing “If I don’t recognize the destination, just send the packet to Router X” Cisco’s On-Demand Routing Routing for stub networks Uses Cisco Discovery Protocol (CDP) Dynamic routing protocol Distance-vector algorithms Link-state algorithms

Distance-Vector Vs. Link-State Distance-vector algorithms keep a list of networks, with next hop and distance (metric) information Link-state algorithms keep a database of routers and links between them Link-state algorithms think of the internetwork as a graph instead of a list When changes occur, link-state algorithms apply Dijkstra’s shortest-path algorithm to find the shortest path between any two nodes

Choosing Between Distance-Vector and Link-State Choose Distance- Vector Simple, flat topology Hub-and-spoke topology Junior network administrators Convergence time not a big concern Choose Link-State Hierarchical topology More senior network administrators Fast convergence is critical

Dynamic IP Routing Protocols Distance-Vector Routing Information Protocol (RIP) Version 1 and 2 Interior Gateway Routing Protocol (IGRP) Enhanced IGRP Border Gateway Protocol (BGP) Link-State Open Shortest Path First (OSPF) Intermediate System-to-Intermediate System (IS-IS)

Summary The selection of switching and routing protocols should be based on an analysis of Goals Scalability and performance characteristics of the protocols Transparent bridging is used on modern switches But other choices involve enhancements to STP and protocols for transporting VLAN information There are many types of routing protocols and many choices within each type

Review Questions What are some options for enhancing the Spanning Tree Protocol? What factors will help you decide whether distance-vector or link-state routing is best for your design customer? What factors will help you select a specific routing protocol? Why do static and default routing still play a role in many modern network designs?

Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer

Network Security Design The 12 Step Program Identify network assets Analyze security risks Analyze security requirements and tradeoffs Develop a security plan Define a security policy Develop procedures for applying security policies ch2 The first three steps were covered more in Chapter 2. Chapter 8 picks up that discussion and focuses on selecting the right security mechanisms for the different components of a modular network design. ch8

The 12 Step Program (continued) Develop a technical implementation strategy Achieve buy-in from users, managers, and technical staff Train users, managers, and technical staff Implement the technical strategy and security procedures Test the security and update it if any problems are found Maintain security out ch12 Maintain security by scheduling periodic independent audits, reading audit logs, responding to incidents, reading current literature and agency alerts, installing patches and security fixes, continuing to test and train, and updating the security plan and policy. ch8

Network Assets Hardware Software Applications Data Intellectual property Trade secrets Company’s reputation

Security Risks Hacked network devices Data can be intercepted, analyzed, altered, or deleted User passwords can be compromised Device configurations can be changed Reconnaissance attacks (gather information ) Denial-of-service attacks (make a computer resource unavailable to its intended users) Intercept—obstruct Home : Intrusion Detection System : Reconnaissance Attacks Email to a friend Print version Comments Reconnaissance Attacks Reconnaissance Attacks Reconnaissance attacks are used to gather information about a target network or system. Such attacks may seem harmless at the time and may be overlooked by security administrators as "network noise" or pestering behavior, but it is usually the information gained through reconnaissance attacks that is used in subsequent Access or DoS attacks. Several means may be used to gather information about an organization and could include automated and manual technological attacks as well as human social attacks. Examples might include ICMP ping sweeps against a network or SNMP walking techniques to gather network map and device configuration data. Likewise, application-level scanners could be used to search for vulnerabilities such as web server CGI or ASP weaknesses. No specific damage may be caused by the reconnaissance attack, but it is akin to burglars staking out a neighborhood, watching for times of inactivity, and occasionally testing windows and doors for access. Reconnaissance attacks are quite common and should be considered a serious threat to an organization as they may give potential attackers the information required to perform access or DoS attacks. A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person, or multiple people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. The term is generally used with regards to computer networks, but is not limited to this field; for example, it is also used in reference to CPU resource management.[1] One common method of attack involves saturating the target machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. Such attacks usually lead to a server overload. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately. Denial-of-service attacks are considered violations of the IAB's Internet proper use policy, and also violate the acceptable use policies of virtually all Internet service providers. They also commonly constitute violations of the laws of individual nations.[

Security Tradeoffs Tradeoffs must be made between security goals and other goals: Affordability Usability Performance Availability Manageability An example of a tradeoff is that security can reduce network redundancy. If all traffic must go through an encryption device, for example, the device becomes a single point of failure. This makes it hard to meet availability goals. Security adds to management work (user ID, passwords ), and affects network performance. Encryption consume upto 15% of CPU power on a router or network throughput.

A Security Plan High-level document that proposes what an organization is going to do to meet security requirements Specifies time, people, and other resources that will be required to develop a security policy and achieve implementation of the policy

A Security Policy A security policy is a The policy should address “Formal statement of the rules by which people who are given access to an organization’s technology and information assets must abide.” The policy should address Access, accountability, authentication, privacy, and computer technology purchasing guidelines

Security Mechanisms Physical security Authentication Authorization Accounting (Auditing) Data encryption Packet filters Firewalls Intrusion Detection Systems (IDS) Intrusion Prevention Systems (IPS)

Modularizing Security Design Security defense in depth Network security should be multilayered with many different techniques used to protect the network Belt-and-suspenders approach Don’t get caught with your pants down

Modularizing Security Design Secure all components of a modular design: Internet connections Public servers and e-commerce servers Remote access networks and VPNs Network services and network management Server farms User services Wireless networks

Securing Internet Connections Physical security Firewalls and packet filters Audit logs, authentication, authorization Well-defined exit and entry points Routing protocols that support authentication

Securing Public Servers Place servers in a DMZ that is protected via firewalls Run a firewall on the server itself Enable DoS protection Limit the number of connections per timeframe Use reliable operating systems with the latest security patches Maintain modularity Front-end Web server doesn’t also run other services (FTP services not run on the same server as Web services, e-commerce database should not be on the web server.) Security experts recommend that FTP services not run on the same server as Web services. FTP users have more opportunities for reading and possibly changing files than Web users do. A hacker could use FTP to damage a company’s Web pages, thus damaging the company’s image and possibly compromising Web-based electronic-commerce and other applications. In addition, any e-commerce database server that holds sensitive customer financial information should be separate from the front-end Web server that users see.

Securing Remote-Access and Virtual Private Networks (VPN) Physical security Firewalls Authentication, authorization, and auditing Encryption One-time passwords Security protocols CHAP RADIUS IPSec

Securing Network Services Treat each network device (routers, switches, and so on) as a high-value host and harden it against possible intrusions Require login IDs and passwords for accessing devices Require extra authorization for risky configuration commands Use SSH rather than Telnet Change the welcome banner to be less welcoming

Securing Server Farms Deploy network and host IDSs to monitor server subnets and individual servers Configure filters that limit connectivity from the server in case the server is compromised Fix known security bugs in server operating systems Require authentication and authorization for server access and management Limit root password to a few people Avoid guest accounts

Securing User Services Specify which applications are allowed to run on networked PCs in the security policy Require personal firewalls and antivirus software on networked PCs Implement written procedures that specify how the software is installed and kept current Encourage users to log out when leaving their desks Consider using 802.1X port-based security on switches

Securing Wireless Networks Place wireless LANs (WLANs) in their own subnet or VLAN Simplifies addressing and makes it easier to configure packet filters Require all wireless (and wired) laptops to run personal firewall and antivirus software Disable beacons that broadcast the SSID, and require MAC address authentication Except in cases where the WLAN is used by visitors

WLAN Security Options Wired Equivalent Privacy (WEP) (danger) IEEE 802.11i Wi-Fi Protected Access (WPA) IEEE 802.1X Extensible Authentication Protocol (EAP) Lightweight EAP or LEAP (Cisco) Protected EAP (PEAP) Virtual Private Networks (VPNs) Any other acronyms we can think of? :-)

Wired Equivalent Privacy (WEP) Defined by IEEE 802.11 Users must possess the appropriate WEP key that is also configured on the access point 64 or 128-bit key (or passphrase) WEP encrypts the data using the RC4 stream cipher method Infamous for being crackable (within 30 minutes by normal laptop)

WEP Alternatives Vendor enhancements to WEP Temporal Key Integrity Protocol (TKIP) Every frame has a new and unique WEP key Advanced Encryption Standard (AES) IEEE 802.11i Wi-Fi Protected Access (WPA) from the Wi- Fi Alliance

Extensible Authentication Protocol (EAP) With 802.1X and EAP, devices take on one of three roles: The supplicant resides on the wireless LAN client The authenticator resides on the access point An authentication server resides on a RADIUS server

EAP (Continued) An EAP supplicant on the client obtains credentials from the user, which could be a user ID and password The credentials are passed by the authenticator to the server and a session key is developed Periodically the client must reauthenticate to maintain network connectivity Reauthentication generates a new, dynamic WEP key

VPN Software on Wireless Clients Safest way to do wireless networking for corporations Wireless client requires VPN software Connects to VPN concentrator at HQ Creates a tunnel for sending all traffic VPN security provides: User authentication Strong encryption of data Data integrity

Summary Use a top-down approach Chapter 2 talks about identifying assets and risks and developing security requirements Chapter 5 talks about logical design for security (secure topologies) Chapter 8 talks about the security plan, policy, and procedures Chapter 8 also covers security mechanisms and selecting the right mechanisms for the different components of a modular network design

Review Questions How does a security plan differ from a security policy? Why is it important to achieve buy-in from users, managers, and technical staff for the security policy? What are some methods for keeping hackers from viewing and changing router and switch configuration information? How can a network manager secure a wireless network?

Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer

Network Management Helps an organization achieve availability, performance, and security goals Helps an organization measure how well design goals are being met and adjust network parameters if they are not being met Facilitates scalability Helps an organization analyze current network behavior, apply upgrades appropriately, and troubleshoot any problems with upgrades

Network Management Design Consider scalability, traffic patterns, data formats, cost/benefit tradeoffs Determine which resources should be monitored Determine metrics for measuring performance Determine which and how much data to collect

Proactive Network Management Plan to check the health of the network during normal operation, not just when there are problems Recognize potential problems as they develop Optimize performance Plan upgrades appropriately

Network Management Processes According to the ISO Fault management Configuration management Accounting management Performance management Security management

Fault Management Detect, isolate, diagnose, and correct problems Report status to end users and managers Track trends related to problems

Configuration Management Keep track of network devices and their configurations Maintain an inventory of network assets Log versions of operating systems and applications

Accounting Management Keep track of network usage by departments or individuals Facilitate usage-based billing Find abusers who use more resources than they should

Performance Management Monitor end-to-end performance Also monitor component performance (individual links and devices) Test reachability Measure response times Measure traffic flow and volume Record route changes

Security Management Maintain and distribute user names and passwords Generate, distribute, and store encryption keys Analyze router, switch, and server configurations for compliance with security policies and procedures Collect, store, and examine security audit logs

Network Management Components A managed device is a network node that collects and stores management information An agent is network-management software that resides in a managed device A network-management system (NMS) runs applications to display management data, monitor and control managed devices, and communicate with agents

Network Management Architecture NMS Agent Agent Agent Management Database Management Database Management Database Managed Devices

Architecture Concerns In-band versus out-of-band monitoring In-band control passes control data on the same connection as main data. Out-of-band control passes control data on a separate connection from main data. In-band is easier to develop, but results in management data being impacted by network problems Centralized versus distributed monitoring Centralized management is simpler to develop and maintain, but may require huge amounts of information to travel back to a centralized network operations center (NOC) In-band control is a characteristic of network protocols with which data control is regulated. In-band control passes control data on the same connection as main data. Protocols that use in-band control include HTTP and SMTP. This is as opposed to Out-of-band control used by protocols such as FTP. Out-of-band control is a characteristic of network protocols with which data control is regulated. Out-of-band control passes control data on a separate connection from main data. Protocols such as FTP use out-of-band control. FTP sends its control information, which includes user identification, password, and put/get commands, on one connection, and sends data files on a separate parallel connection. Because it uses a separate connection for the control information, FTP uses out-of-band control.

Simple Network Management Protocol (SNMP) Most popular network management protocol SNMPv3 should gradually supplant versions 1 and 2 because it offers better authentication SNMP works with Management Information Bases (MIBs)

Remote Monitoring (RMON) Developed by the IETF in the early 1990s to address shortcomings in standard MIBs Provides information on data link and physical layer parameters Nine groups of data for Ethernet The statistics group tracks packets, octets, packet-size distribution, broadcasts, collisions, dropped packets, fragments, CRC and alignment errors, jabbers, and undersized and oversized packets

Cisco Tools Cisco Discovery Protocol NetFlow Accounting With the show cdp neighbors detail command, you can display detailed information about neighboring routers and switches, including which protocols are enabled, network addresses for enabled protocols, the number and types of interfaces, the type of platform and its capabilities, and the version of Cisco IOS Software running on the neighbor. NetFlow Accounting An integral part of Cisco IOS Software that collects and measures data as it enters router or switch interfaces

Summary Determine which resources to monitor, which data about these resources to collect, and how to interpret that data Develop processes that address performance, fault, configuration, security, and accounting management Develop a network management architecture Select management protocols and tools

Review Questions Why is network management design important? Define the five types of network management processes according to the ISO. What are some advantages and disadvantages of using in-band network management versus out-of-band network management? What are some advantages and disadvantages of using centralized network management versus distributed network management?