Managing Networks and Network Devices

Slides:



Advertisements
Similar presentations
© 2003, Cisco Systems, Inc. All rights reserved..
Advertisements

Mitigating Layer 2 Attacks
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implement VTP LAN Switching and Wireless – Chapter 4.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
Virtual LANs.
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
1 Semester 2 Module 4 Learning about Other Devices Yuda college of business James Chen
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 6 Switch Configuration.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Troubleshooting the Network Connecting Networks.
CCNA 2 v3.1 Module 2.
CCNA2 Routing Perrine modified by Brierley Page 18/6/2015 Module 11 Access Control Non e0e1 s server.
Layer 2: Redundancy and High Availability Part 1: General Overview on Assignment 1.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-1 Minimizing Service Loss and Data Theft Securing Network Services.
TCP/IP Addressing Design. Objectives Choose an appropriate IP addressing scheme based on business and technical requirements Identify IP addressing problems.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
Router Hardening Nancy Grover, CISSP ISC2/ISSA Security Conference November 2004.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Configuring Network Devices Working at a Small-to-Medium Business or ISP – Chapter.
Routers A router is a computer Computers have four basic components:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Exterior Gateway Protocol Border Gateway Protocol (BGP) Interior Gateway Protocol Routing Information Protocol (RIP) Enhanced Interior Gateway Protocol.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Implementing VLAN Security Routing And Switching.
Starting the switch Configuring the Switch
Virtual LAN Design Switches also have enabled the creation of Virtual LANs (VLANs). VLANs provide greater opportunities to manage the flow of traffic on.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 12: Routing.
Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1.
© 1999, Cisco Systems, Inc Chapter 10 Controlling Campus Device Access Chapter 11 Controlling Access to the Campus Network © 1999, Cisco Systems,
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration.
1 CCNA 3 v3.1 Module 6 Switch Configuration Claes Larsen, CCAI.
Cisco PIX firewall Set up 3 security zones ***CS580*** John Trafecanty Jules R. Nya Baweu August 23, 2005.
TCP/SYN Attack – use ACL to allow traffic from TCP connections that were established from the internal network and block packets from an external network.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 1 – Chapter 9 Ethernet Switch Configuration 1.
Discovery 2 Internetworking Module 5 JEOPARDY John Celum.
User Access to Router Securing Access.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Medium-Sized Switched Network Construction NetPro-ITI Implementing VLANs and Trunks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs.
Enabling Port Security
Module 3 Configuring a Router.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 8 Virtual LANs Cisco Networking Academy.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Basic Switch Configurations.
Chapter 3 Managing IP Traffic. Objectives Upon completion of this chapter you will be able to perform the following tasks: Configure IP standard access.
Switching Topic 2 VLANs.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 6 Switch Configuration.
Virtual LAN (VLAN) W.lilakiatsakun. VLAN Overview (1) A VLAN allows a network administrator to create groups of logically networked devices that act as.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
CCNA4 Perrine / Brierley Page 12/20/2016 Chapter 05 Access Control Non e0e1 s server.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
© 2002, Cisco Systems, Inc. All rights reserved..
Configuring a Router Module 3 Semester 2. Router Configuration Tasks Name a router Set passwords Examine show commands Configure a serial interface Configure.
What are the two types of routes used by network administrators? Static Dynamic.
Chapter 6.  Upon completion of this chapter, you should be able to:  Configure switches  Configure VLANs  Verify configuration settings  Troubleshoot.
Configuring Network Devices
Instructor Materials Chapter 2: Scaling VLANs
InterVLAN Routing 1. InterVLAN Routing 2. Multilayer Switching.
© 2002, Cisco Systems, Inc. All rights reserved.
Working at a Small-to-Medium Business or ISP – Chapter 8
© 2002, Cisco Systems, Inc. All rights reserved.
CCNA 3 v3.1 Module 6 Switch Configuration
Chapter 2: Scaling VLANs
Cisco Real Exam Dumps IT-Dumps
Presentation transcript:

Managing Networks and Network Devices S7C10 – Access Control Managing Networks and Network Devices

Access Policies Manage Network Devices User access via VLAN management Physical Security Access Control to devices via data communications User access via VLAN management Access to servers and services Define traffic permitted in and out of switch block Define filtering to core block and between switch blocks

Three-Layer Hierarchical Cisco Model Access Allows legitimate users into network Port security and passwords Distribution Layer 3 routing decisions; home of most access policy Ensures only necessary traffic gets to core Advertises correct routing and service information for core Core Little or no policy control Pass information as quickly as possible

Device Management Physical security Passwords Privilege levels Establish configurations for access policies Provide proper physical environment Control direct access to devices Secure access to network links Passwords (out-of-band) Console, Auxiliary, (in-band) TFTP CiscoWorks 2000, VTY ports Login with password or login authentication Privilege levels Restrict virtual terminal and telnet access Session timeouts

Privilege Levels 0 disable, enable, exit, help, logout Not included for levels greater than 0 1-15 define commands Privilege exec level 2 ping Privilege exec level show ip route

Virtual Terminal Access 5 VTY lines by default; more can be defined Access-class applies access lists HTTP Authentication can be enforced Ip http authentication [aaa|enable|local]

Access Layer Policy Port Security VLAN Management Limit MAC addresses that are allowed to use switch Lockdown – MAC address different from configured address Not usually available for trunk ports Static – assigned Dynamic– first address seen on port Set port security 3/1 enable aab.bcc.dde.eff Port secure [max-mac-count 6] -- can range 1-132 VLAN Management Can move management vlan from VLAN 1

Distribution Layer Policy Define user traffic between VLANs Define which routes are seen by core block Define which services will be advertised Control information with filters Standard and extended access lists Access-list, access-group, access-class, distributge-list In general, outbound list processes more efficiently than inbound list

Filtering Routing Update Traffic Reduces size of routing table at core clock Presvents users from getting to networks that have not been advertised Prevents incorrect information from propagating Route summarization Distribution lists Which routes the distribution layer can advertise

Core Layer QoS Congestion management and avoidance Queuing Minimize use of access lists

CWI A GUI alternative to the CLI and Simple Network Management Protocol (SNMP) interfaces the CWI provides a real-time graphical representation of the switch and detailed information, such as port status, module status, type of chassis, and modules. Uses HTTP to download Catalyst CV from the server to the client. HTTP is the TCP/IP protocol that the World Wide Web uses to exchange HTML documents.

CWI The Catalyst® Web Interface (CWI) is a browser-based tool Can use to configure the Catalyst 6000, 5000, and 4000 Family Switches. Consists of a graphical user interface (GUI) that runs on the client, Catalyst CV 5.0 (Catalyst version of CiscoView 5.0), and an HTTP server that runs on the switch.