Security Enhancements Using Routers and Switches Under the Guidance of Mr. A.Chandrashekar  M.C.A,M.Tech
Abstract <ul><li>Design and Implement different secure techniques in WAN & LAN Communications. </li></ul><ul><li>WAN techn...
Introduction <ul><li>Routers and Switches are the basic building blocks of networking. </li></ul><ul><li>Routers are Layer...
Introduction (Cont…) <ul><li>Router </li></ul><ul><ul><li>It is a physical device used to communicate different geographic...
Introduction (Cont…) <ul><li>Switch </li></ul><ul><ul><li>It is physical device, used to communicate the local area device...
Introduction (Cont…) <ul><li>Internet work Operating System (IOS) </li></ul><ul><ul><li>It is a Operating system used to m...
Existing System Categories network attacks Reconnaissance Attacks Access Attacks Denial of Services Attack Management Prot...
Existing System (Cont…) <ul><li>Reconnaissance Attacks </li></ul><ul><ul><li>Packet Sniffer. </li></ul></ul><ul><ul><ul><l...
Existing System (Cont…) <ul><li>Access Attacks </li></ul><ul><ul><li>Password attacks </li></ul></ul><ul><ul><li>Man in th...
Existing System (Cont…) <ul><li>Viruses, worms and Trojan horses </li></ul><ul><ul><li>Viruses </li></ul></ul><ul><ul><ul>...
Proposed System <ul><li>Reconnaissance Attacks </li></ul><ul><ul><li>Mitigation :  </li></ul></ul><ul><ul><ul><li>Authenti...
Proposed System (Cont…) <ul><li>Denial of services </li></ul><ul><ul><li>Mitigation:  </li></ul></ul><ul><ul><ul><li>Crypt...
Requirements <ul><li>Software Requirements </li></ul><ul><ul><li>Packet tracer simulator. </li></ul></ul><ul><ul><li>Windo...
Simulator for Routers and Switches
Thank You Mallikarjunarao
Upcoming SlideShare
Loading in …5
×

Security Enhancements using Routers and Switches

588 views

Published on

Published in: Education, Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
588
On SlideShare
0
From Embeds
0
Number of Embeds
8
Actions
Shares
0
Downloads
88
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Security Enhancements using Routers and Switches

  1. 1. Security Enhancements Using Routers and Switches Under the Guidance of Mr. A.Chandrashekar M.C.A,M.Tech
  2. 2. Abstract <ul><li>Design and Implement different secure techniques in WAN & LAN Communications. </li></ul><ul><li>WAN technologies implemented by Routers and LAN Technologies are implement by Switches. </li></ul><ul><li>Routers and switches doesn’t provide any security. </li></ul><ul><li>Internet work operating system (IOS) is used to manage the routers and switches. </li></ul><ul><li>By enabling the secure technologies in routers and switches by using IOS to prevent attacks from intruders. </li></ul>
  3. 3. Introduction <ul><li>Routers and Switches are the basic building blocks of networking. </li></ul><ul><li>Routers are Layer 3 devices and switches are Layer 2 devices. </li></ul>
  4. 4. Introduction (Cont…) <ul><li>Router </li></ul><ul><ul><li>It is a physical device used to communicate different geographical locations and routed packets. </li></ul></ul><ul><ul><li>The Rear View of Cisco 2500 Series Router. </li></ul></ul>
  5. 5. Introduction (Cont…) <ul><li>Switch </li></ul><ul><ul><li>It is physical device, used to communicate the local area devices, and it forwards the frames. </li></ul></ul><ul><ul><li>The rear view of Cisco 2900 series Switch </li></ul></ul>
  6. 6. Introduction (Cont…) <ul><li>Internet work Operating System (IOS) </li></ul><ul><ul><li>It is a Operating system used to manage the routers and switches </li></ul></ul><ul><ul><li>Cisco IOS uses command line interface. </li></ul></ul><ul><ul><li>Reliable and secure access the network and resources. </li></ul></ul><ul><ul><li>Network scalability </li></ul></ul>
  7. 7. Existing System Categories network attacks Reconnaissance Attacks Access Attacks Denial of Services Attack Management Protocol Attacks Virus, worms and trogons attacks
  8. 8. Existing System (Cont…) <ul><li>Reconnaissance Attacks </li></ul><ul><ul><li>Packet Sniffer. </li></ul></ul><ul><ul><ul><li>Capturing the packets. </li></ul></ul></ul><ul><ul><ul><li>Ethereal tool used to capture packets send my Ethernet. </li></ul></ul></ul><ul><ul><li>Ping Sweeps. </li></ul></ul><ul><ul><ul><li>Identify the host in a network. </li></ul></ul></ul><ul><ul><ul><li>Angry IP scanner is a tool, used to identify the alive host. </li></ul></ul></ul>Ethereal tool Packets which are send by an network Observers the IP address in a network
  9. 9. Existing System (Cont…) <ul><li>Access Attacks </li></ul><ul><ul><li>Password attacks </li></ul></ul><ul><ul><li>Man in the Middle attacks </li></ul></ul><ul><li>Denial of service attacks </li></ul><ul><ul><li>IP spoofing </li></ul></ul><ul><ul><li>Distributed DOS </li></ul></ul><ul><li>Management Protocol Attacks </li></ul><ul><ul><li>Telnet </li></ul></ul><ul><ul><li>TFTP </li></ul></ul>
  10. 10. Existing System (Cont…) <ul><li>Viruses, worms and Trojan horses </li></ul><ul><ul><li>Viruses </li></ul></ul><ul><ul><ul><li>Virus is a program, when it open it automatically attach code to another file. </li></ul></ul></ul><ul><ul><li>Worms </li></ul></ul><ul><ul><ul><li>Worm is a programs that replicate without infecting other programs. It is generally slowdown the processor </li></ul></ul></ul><ul><ul><li>Trojan horses </li></ul></ul><ul><ul><ul><li>It is a program that contain code, that make the file unrecognizable. </li></ul></ul></ul>
  11. 11. Proposed System <ul><li>Reconnaissance Attacks </li></ul><ul><ul><li>Mitigation : </li></ul></ul><ul><ul><ul><li>Authentication. </li></ul></ul></ul><ul><ul><ul><li>Switches. </li></ul></ul></ul><ul><ul><ul><li>Cryptography. </li></ul></ul></ul><ul><li>Access Attacks </li></ul><ul><ul><li>Mitigation: </li></ul></ul><ul><ul><ul><li>Eliminate duplicate passwords. </li></ul></ul></ul><ul><ul><ul><li>Disable accounts after failed authentication. </li></ul></ul></ul><ul><ul><ul><li>Use strong authentication. </li></ul></ul></ul>
  12. 12. Proposed System (Cont…) <ul><li>Denial of services </li></ul><ul><ul><li>Mitigation: </li></ul></ul><ul><ul><ul><li>Cryptography. </li></ul></ul></ul><ul><li>Viruses, Worms and Trojans horses </li></ul><ul><ul><li>Mitigation: </li></ul></ul><ul><ul><ul><li>Cryptography, Isolate the infected devices by VLAN. </li></ul></ul></ul><ul><li>Management Protocol Attacks </li></ul><ul><ul><li>Mitigation: </li></ul></ul><ul><ul><ul><li>SSH, ACL’s. </li></ul></ul></ul>
  13. 13. Requirements <ul><li>Software Requirements </li></ul><ul><ul><li>Packet tracer simulator. </li></ul></ul><ul><ul><li>Windows XP or higher. </li></ul></ul><ul><ul><li>RAM 512. </li></ul></ul><ul><li>Hardware Requirements </li></ul><ul><ul><li>4 Cisco Routers. </li></ul></ul><ul><ul><li>5 Switches. </li></ul></ul><ul><ul><li>IOS. </li></ul></ul>
  14. 14. Simulator for Routers and Switches
  15. 15. Thank You Mallikarjunarao

×