SlideShare a Scribd company logo
1 of 55
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 11: It’s a
Network
Introduction to Networking
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 11
11.1 Create and Grow
11.2 Keeping the Network Safe
11.3 Basic Network Performance
11.4 Managing IOS Configuration Files
11.5 Integrated Routing Services
11.6 Summary
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 11: Objectives
 Identify the devices and protocols used in a small
network
 Explain how a small network serves as the basis of
larger networks.
 Explain the need for basic security measures on
network devices.
 Identify security vulnerabilities and general mitigation
techniques
Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 11: Objectives (continued)
 Use the output of ping and tracert commands to
establish relative network performance.
 Use basic show commands to verify the configuration
and status of a device interface.
 Explain the file systems on Routers and Switches.
 Apply the commands to back up and restore an IOS
configuration file.
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Devices in a Small Network
Small Network Topologies
 Typical Small Network Topology
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Devices in a Small Network
Device Selection for a Small Network
 Factors to be considered when selecting intermediate
devices
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Devices in a Small Network
Addressing for a Small Network
 IP addressing scheme should be planned, documented
and maintained based on the type of devices receiving
the address.
 Examples of devices that will be part of the IP design:
End devices for users
Servers and peripherals
Hosts that are accessible from the Internet
Intermediary devices
 Planned IP schemes help the administrator:
Track devices and troubleshoot
Control access to resources
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Devices in a Small Network
Redundancy in a Small Network
 Redundancy helps to eliminate single points of failure.
 Improves the reliability of the network.
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Devices in a Small Network
Design Considerations for a Small Network
 The following should be included in the network
design:
Secure file and mail servers in a centralized location.
Protect the location by physical and logical security measures.
Create redundancy in the server farm.
Configure redundant paths to the servers.
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Protocols in a Small Network
Common Applications in a Small Network
 Network-Aware Applications - software programs
used to communicate over the network.
 Application Layer Services - programs that interface
with the network and prepare the data for transfer.
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Protocols in a Small Network
Common Protocols in a Small Network
 Network Protocols Define:
Processes on either end of a communication session
Types of messages
Syntax of the messages
Meaning of informational fields
How messages are sent and the expected response
Interaction with the next lower layer
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Protocols in a Small Network
Real-Time Applications for a Small Network
 Infrastructure - needs to be evaluated to ensure it will
support proposed real time applications.
 VoIP is implemented in organizations that still use
traditional telephones
 IP telephony - the IP phone itself performs voice-to-IP
conversion
 Real-time Video Protocols - Use Time Transport
Protocol (RTP) and Real-Time Transport Control
Protocol (RTCP)
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Growing to Larger Networks
Scaling a Small Network
Important considerations when growing to a larger network:
 Documentation – physical and logical topology
 Device inventory – list of devices that use or comprise the
network
 Budget – itemized IT budget, including fiscal year
equipment purchasing budget
 Traffic Analysis – protocols, applications, and services
and their respective traffic requirements should be
documented
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Growing to Larger Networks
Protocol Analysis of a Small Network
Information gathered by protocol analysis can be used to
make decisions on how to manage traffic more efficiently.
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Growing to Larger Networks
Evolving Protocol Requirements
 Network administrator can obtain IT “snapshots” of
employee application utilization.
 Snapshots track network utilization and traffic flow
requirements.
 Snapshots help inform
network modifications
needed.
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Device Security Measures
Threats to Network Security
 Categories of Threats to Network Security
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Device Security Measures
Physical Security
Four classes of physical threats are:
 Hardware threats - physical damage to servers, routers,
switches, cabling plant, and workstations.
 Environmental threats - temperature extremes (too hot
or too cold) or humidity extremes (too wet or too dry)
 Electrical threats - voltage spikes, insufficient supply
voltage (brownouts), unconditioned power (noise), and
total power loss
 Maintenance threats - poor handling of key electrical
components (electrostatic discharge), lack of critical
spare parts, poor cabling, and poor labeling
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Device Security Measures
Types of Security Vulnerabilities
 Technological weaknesses
 Configuration weaknesses
 Security policy weaknesses
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Vulnerabilities and Network Attacks
Viruses, Worms and Trojan Horses
 A virus - malicious software that is attached to another
program to execute a particular unwanted function on a
workstation.
 A Trojan horse - the entire application was written to
look like something else, when in fact it is an attack
tool.
 Worms - self-contained programs that attack a system
and try to exploit a specific vulnerability in the target.
The worm copies its program from the attacking host to
the newly exploited system to begin the cycle again.
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Vulnerabilities and Network Attacks
Reconnaissance Attacks
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Vulnerabilities and Network Attacks
Access Attacks
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Vulnerabilities and Network Attacks
Denial of Service Attacks (DoS)
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Mitigating Network Attacks
Backup, Upgrade, Update, and Patch
 Keep current with the latest versions of antivirus
software.
 Install updated security patches
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Mitigating Network Attacks
Authentication, Authorization, and Accounting
Authentication, Authorization, and Accounting (AAA, or
“triple A”)
 Authentication - Users and administrators must prove
their identity. Authentication can be established using
username and password combinations, challenge and
response questions, token cards, and other methods.
 Authorization - which resources the user can access
and which operations the user is allowed to perform.
 Accounting - records what the user accessed, the
amount of time the resource is accessed, and any
changes made.
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Mitigating Network Attacks
Firewalls
A firewall resides between two or more networks. It
controls traffic and helps prevent unauthorized access.
Methods used are:
 Packet Filtering
 Application Filtering
 URL Filtering
 Stateful Packet Inspection
(SPI) - Incoming packets
must be legitimate
responses to requests from
internal hosts.
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Mitigating Network Attacks
Endpoint Security
 Common endpoints are laptops, desktops, servers,
smart phones, and tablets.
 Employees must follow the companies documented
security policies to secure their devices.
 Policies often include the use of anti-virus software and
host intrusion prevention.
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Securing Devices
Introduction to Securing Devices
 Part of network security is securing devices, including
end devices and intermediate devices.
 Default usernames and passwords should be changed
immediately.
 Access to system resources should be restricted to only
the individuals that are authorized to use those
resources.
 Any unnecessary services and applications should be
turned off and uninstalled, when possible.
 Update with security patches as they become available.
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Securing Devices
Passwords
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Securing Devices
Basic Security Practices
 Encrypt passwords
 Require minimum length passwords
 Block brute force attacks
 Use Banner Message
 Set EXEC timeout
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Securing Devices
Enable SSH
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ping
Interpreting ICMP Messages
 ! - indicates receipt of an ICMP echo reply message
 . - indicates a time expired while waiting for an ICMP
echo reply message
 U - an ICMP unreachable message was received
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ping
Leveraging Extended Ping
 The Cisco IOS offers an "extended" mode of the ping
command
R2# ping
Protocol [ip]:
Target IP address: 192.168.10.1
Repeat count [5]:
Datagram size [100]:
Timeout in seconds [2]:
Extended commands [n]: y
Source address or interface: 10.1.1.1
Type of service [0]:
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Ping
Network Baseline
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Tracert
Interpreting Tracert Messages
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Show Commands
Common Show Commands Revisited
 The status of nearly every process or function of the
router can be displayed using a show command.
 Frequently used show commands:
show running-config
show interfaces
show arp
show ip route
show protocols
show version
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Show Commands
Viewing Router Settings with Show Version
Cisco IOS version
System bootstrap
Cisco IOS image
CPU and RAM
Config. register
Number and type of
physical interfaces
Amount of NVRAM
Amount of Flash
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Show Commands
Viewing Switch Settings with Show Version
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Host and IOS Commands
ipconfig Command Options
 ipconfig - displays ip address, subnet mask, default
gateway.
 ipconfig /all – also displays MAC address.
 Ipconfig /displaydns - displays all cached dns entries in
a Windows system .
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Host and IOS Commands
arp Command Options
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Host and IOS Commands
show cdp neighbors Command Options
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Host and IOS Commands
Using show ip interface brief Command
 Can be used to verify the status of all network
interfaces on a router or a switch.
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router and Switch File Systems
Router File Systems
 show file systems command - lists all of the available
file systems on a Cisco 1941 route
 * Asterisk indicates this is the current default file system
Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Router and Switch File Systems
Switch File Systems
 show file systems command - lists all of the available
file systems on a Catalyst 2960 switch.
Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Backup and Restore Configuration Files
Backup and Restore using Text Files
Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Backup and Restore Configuration Files
Backup and Restore using TFTP
 Configuration files can be stored on a Trivial File
Transfer Protocol (TFTP) server.
 copy running-config tftp – save running configuration to
a tftp server
 copy startup-config tftp - save startup configuration
to a tftp server
Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Backup and Restore Configuration Files
Using USB Interfaces on a Cisco Router
 USB flash drive must be formatted in a FAT16 format.
 Can hold multiple copies of the Cisco IOS and multiple
router configurations.
 Allows administrator to easily move configurations from
router to router.
Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Backup and Restore Configuration Files
Backup and Restore Using USB
Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Integrated Router
Multi-function Device
 Incorporates a switch, router, and wireless access point.
 Provides routing, switching and wireless connectivity.
 Linksys wireless routers, are simple in design and used
in home networks
 Cisco Integrated Services Router (ISR) product family
offers a wide range of products, designed for small office
to larger networks.
Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Integrated Router
Wireless Capability
 Wireless Mode -Most integrated
wireless routers support 802.11b,
802.11g and 802.11n
 Service Set Identifier (SSID) -
Case-sensitive, alpha-numeric
name for your home wireless
network.
 Wireless Channel – RF
spectrum divided up into
channels.
Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Integrated Router
Basic Security of Wireless
 Change default values
 Disable SSID broadcasting
 Configure Encryption using WEP or WPA
 Wired Equivalency Protocol (WEP) - uses pre-
configured keys to encrypt and decrypt data.
Every wireless device allowed to access the
network must have the same WEP key entered.
 Wi-Fi Protected Access (WPA) – also uses
encryption keys from 64 bits up to 256 bits. New
keys are generated each time a connection is
established with the AP. Therefore more secure.
Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Integrated Router
Configuring the Integrated Router
 Access the router by cabling
a computer to one of the
router’s LAN Ethernet ports.
 The connecting device will
automatically obtain IP
addressing information from
Integrated Router
 Change default username
and password and the default
Linksys IP address for
security purposes.
Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Integrated Router
Enabling Wireless
 Configure the wireless mode
 Configure the SSID
 Configure RF channel
 Configure any desired security encryption
Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Integrated Router
Configure a Wireless Client
 The wireless client configuration settings must match that
of the wireless router.
SSID
Security Settings
Channel
 Wireless client software can be integrated into the device
operating system or stand alone, downloadable, wireless
utility software.
Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 11: Summary
 Good network design incorporates reliability, scalability, and
availability.
 Networks must be secured from viruses, Trojan horses,
worms and network attacks.
 Document Basic Network Performance.
 Test network connectivity using ping and traceroute.
 Use IOS commands to monitor and view information about
the network and network devices.
 Backup configuration files using TFTP or USB.
 Home networks and small business often use integrated
routers, which provide the functions of a switch, router and
wireless access point.
Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

What's hot

CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2Irsandi Hasan
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4Irsandi Hasan
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5Irsandi Hasan
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsTiago Monteiro
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkVuz Dở Hơi
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3Irsandi Hasan
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11Irsandi Hasan
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2Nil Menon
 
Chapter 02 - Configuring a Network Operating System
Chapter 02 - Configuring a Network Operating SystemChapter 02 - Configuring a Network Operating System
Chapter 02 - Configuring a Network Operating SystemYaser Rahmati
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityVuz Dở Hơi
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignVuz Dở Hơi
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4Nil Menon
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3Irsandi Hasan
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9Irsandi Hasan
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9Nil Menon
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10Irsandi Hasan
 

What's hot (18)

CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2CCNA RS_ITN - Chapter 2
CCNA RS_ITN - Chapter 2
 
CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4CCNA RS_ITN - Chapter 4
CCNA RS_ITN - Chapter 4
 
CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5CCNA RS_ITN - Chapter 5
CCNA RS_ITN - Chapter 5
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
 
CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3CCNA RS_NB - Chapter 3
CCNA RS_NB - Chapter 3
 
CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11CCNA RS_ITN - Chapter 11
CCNA RS_ITN - Chapter 11
 
CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2CCNA RS_NB - Chapter 2
CCNA RS_NB - Chapter 2
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2CCNA 1 Routing and Switching v5.0 Chapter 2
CCNA 1 Routing and Switching v5.0 Chapter 2
 
Chapter 02 - Configuring a Network Operating System
Chapter 02 - Configuring a Network Operating SystemChapter 02 - Configuring a Network Operating System
Chapter 02 - Configuring a Network Operating System
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network DesignCCNAv5 - S4: Chapter 1 Hierarchical Network Design
CCNAv5 - S4: Chapter 1 Hierarchical Network Design
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
 
CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3CCNA RS_ITN - Chapter 3
CCNA RS_ITN - Chapter 3
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 

Viewers also liked

Ccna v5-S1-Chapter 9
Ccna v5-S1-Chapter 9Ccna v5-S1-Chapter 9
Ccna v5-S1-Chapter 9Hamza Malik
 
Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7Hamza Malik
 
Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Hamza Malik
 
Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6Hamza Malik
 
Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Hamza Malik
 
Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5Hamza Malik
 
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Hamza Malik
 
Ccna v5-S1-Chapter 2
Ccna v5-S1-Chapter 2Ccna v5-S1-Chapter 2
Ccna v5-S1-Chapter 2Hamza Malik
 
Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Hamza Malik
 
CCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the networkCCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the networkVuz Dở Hơi
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsDsunte Wilson
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing NetworksDsunte Wilson
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
CCENT Certification
CCENT CertificationCCENT Certification
CCENT CertificationChris Mouk
 

Viewers also liked (20)

Ccna v5-S1-Chapter 9
Ccna v5-S1-Chapter 9Ccna v5-S1-Chapter 9
Ccna v5-S1-Chapter 9
 
Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7Ccna v5-S1-Chapter 7
Ccna v5-S1-Chapter 7
 
Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10
 
Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6Ccna v5-S1-Chapter 6
Ccna v5-S1-Chapter 6
 
Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8Ccna v5-S1-Chapter 8
Ccna v5-S1-Chapter 8
 
Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5Ccna v5-S1-Chapter 5
Ccna v5-S1-Chapter 5
 
Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3Ccna v5-S1-Chapter 3
Ccna v5-S1-Chapter 3
 
Ccna v5-S1-Chapter 2
Ccna v5-S1-Chapter 2Ccna v5-S1-Chapter 2
Ccna v5-S1-Chapter 2
 
Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4Ccna v5-S1-Chapter 4
Ccna v5-S1-Chapter 4
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
CCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the networkCCNAv5 - S4: Chapter 9 troubleshooting the network
CCNAv5 - S4: Chapter 9 troubleshooting the network
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
Exploration network chapter6
Exploration network chapter6Exploration network chapter6
Exploration network chapter6
 
Ite pc v40_chapter9
Ite pc v40_chapter9Ite pc v40_chapter9
Ite pc v40_chapter9
 
Assignment
AssignmentAssignment
Assignment
 
CCENT Certification
CCENT CertificationCCENT Certification
CCENT Certification
 
Cisco CCNA module 10
Cisco CCNA module 10Cisco CCNA module 10
Cisco CCNA module 10
 

Similar to Ccna v5-S1-Chapter 11

CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11Nil Menon
 
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkCCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkVuz Dở Hơi
 
Chapter 11 : It’s a network
Chapter 11 : It’s a networkChapter 11 : It’s a network
Chapter 11 : It’s a networkteknetir
 
Chapter 11 - It’s a Network
Chapter 11 - It’s a NetworkChapter 11 - It’s a Network
Chapter 11 - It’s a NetworkYaser Rahmati
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptxJohn572978
 
Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02Mustapha Kohili
 
Chapter 1 : Exploring the Network
Chapter 1 : Exploring the NetworkChapter 1 : Exploring the Network
Chapter 1 : Exploring the Networkteknetir
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxsirajmohammed35
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1Irsandi Hasan
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1Irsandi Hasan
 
Chapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptxChapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptxKennedyRodriguez10
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksVuz Dở Hơi
 
Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalCamTESOL2015
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Mukesh Chinta
 
CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7Chaing Ravuth
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11Waqas Ahmed Nawaz
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfThangDang53
 

Similar to Ccna v5-S1-Chapter 11 (20)

CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11CCNA 1 Routing and Switching v5.0 Chapter 11
CCNA 1 Routing and Switching v5.0 Chapter 11
 
CCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A NetworkCCNAv5 - S1: Chapter11 It's A Network
CCNAv5 - S1: Chapter11 It's A Network
 
Chapter 11 : It’s a network
Chapter 11 : It’s a networkChapter 11 : It’s a network
Chapter 11 : It’s a network
 
Chapter 11 - It’s a Network
Chapter 11 - It’s a NetworkChapter 11 - It’s a Network
Chapter 11 - It’s a Network
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02
 
Chapter 1 : Exploring the Network
Chapter 1 : Exploring the NetworkChapter 1 : Exploring the Network
Chapter 1 : Exploring the Network
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
 
ITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptxITN_instructorPPT_Chapter1.pptx
ITN_instructorPPT_Chapter1.pptx
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
 
Ccna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mmeCcna routing and_switching_chapter-1-2-3_mme
Ccna routing and_switching_chapter-1-2-3_mme
 
CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1CCNA RS_NB - Chapter 1
CCNA RS_NB - Chapter 1
 
Chapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptxChapter 1 Exploring the Network. Intoduction.pptx
Chapter 1 Exploring the Network. Intoduction.pptx
 
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling NetworksCCNAv5 - S3: Chapter1 Introduction to Scaling Networks
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
 
Sca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_finalSca n instructorppt_chapter1_final
Sca n instructorppt_chapter1_final
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
 
CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 

Recently uploaded

Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 

Recently uploaded (20)

Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 

Ccna v5-S1-Chapter 11

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 11: It’s a Network Introduction to Networking
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 11 11.1 Create and Grow 11.2 Keeping the Network Safe 11.3 Basic Network Performance 11.4 Managing IOS Configuration Files 11.5 Integrated Routing Services 11.6 Summary
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 11: Objectives  Identify the devices and protocols used in a small network  Explain how a small network serves as the basis of larger networks.  Explain the need for basic security measures on network devices.  Identify security vulnerabilities and general mitigation techniques
  • 4. Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 11: Objectives (continued)  Use the output of ping and tracert commands to establish relative network performance.  Use basic show commands to verify the configuration and status of a device interface.  Explain the file systems on Routers and Switches.  Apply the commands to back up and restore an IOS configuration file.
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Devices in a Small Network Small Network Topologies  Typical Small Network Topology
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Devices in a Small Network Device Selection for a Small Network  Factors to be considered when selecting intermediate devices
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Devices in a Small Network Addressing for a Small Network  IP addressing scheme should be planned, documented and maintained based on the type of devices receiving the address.  Examples of devices that will be part of the IP design: End devices for users Servers and peripherals Hosts that are accessible from the Internet Intermediary devices  Planned IP schemes help the administrator: Track devices and troubleshoot Control access to resources
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Devices in a Small Network Redundancy in a Small Network  Redundancy helps to eliminate single points of failure.  Improves the reliability of the network.
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Devices in a Small Network Design Considerations for a Small Network  The following should be included in the network design: Secure file and mail servers in a centralized location. Protect the location by physical and logical security measures. Create redundancy in the server farm. Configure redundant paths to the servers.
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Protocols in a Small Network Common Applications in a Small Network  Network-Aware Applications - software programs used to communicate over the network.  Application Layer Services - programs that interface with the network and prepare the data for transfer.
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Protocols in a Small Network Common Protocols in a Small Network  Network Protocols Define: Processes on either end of a communication session Types of messages Syntax of the messages Meaning of informational fields How messages are sent and the expected response Interaction with the next lower layer
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Protocols in a Small Network Real-Time Applications for a Small Network  Infrastructure - needs to be evaluated to ensure it will support proposed real time applications.  VoIP is implemented in organizations that still use traditional telephones  IP telephony - the IP phone itself performs voice-to-IP conversion  Real-time Video Protocols - Use Time Transport Protocol (RTP) and Real-Time Transport Control Protocol (RTCP)
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Growing to Larger Networks Scaling a Small Network Important considerations when growing to a larger network:  Documentation – physical and logical topology  Device inventory – list of devices that use or comprise the network  Budget – itemized IT budget, including fiscal year equipment purchasing budget  Traffic Analysis – protocols, applications, and services and their respective traffic requirements should be documented
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Growing to Larger Networks Protocol Analysis of a Small Network Information gathered by protocol analysis can be used to make decisions on how to manage traffic more efficiently.
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Growing to Larger Networks Evolving Protocol Requirements  Network administrator can obtain IT “snapshots” of employee application utilization.  Snapshots track network utilization and traffic flow requirements.  Snapshots help inform network modifications needed.
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Device Security Measures Threats to Network Security  Categories of Threats to Network Security
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Device Security Measures Physical Security Four classes of physical threats are:  Hardware threats - physical damage to servers, routers, switches, cabling plant, and workstations.  Environmental threats - temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry)  Electrical threats - voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss  Maintenance threats - poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Device Security Measures Types of Security Vulnerabilities  Technological weaknesses  Configuration weaknesses  Security policy weaknesses
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Vulnerabilities and Network Attacks Viruses, Worms and Trojan Horses  A virus - malicious software that is attached to another program to execute a particular unwanted function on a workstation.  A Trojan horse - the entire application was written to look like something else, when in fact it is an attack tool.  Worms - self-contained programs that attack a system and try to exploit a specific vulnerability in the target. The worm copies its program from the attacking host to the newly exploited system to begin the cycle again.
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Vulnerabilities and Network Attacks Reconnaissance Attacks
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Vulnerabilities and Network Attacks Access Attacks
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Vulnerabilities and Network Attacks Denial of Service Attacks (DoS)
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Mitigating Network Attacks Backup, Upgrade, Update, and Patch  Keep current with the latest versions of antivirus software.  Install updated security patches
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Mitigating Network Attacks Authentication, Authorization, and Accounting Authentication, Authorization, and Accounting (AAA, or “triple A”)  Authentication - Users and administrators must prove their identity. Authentication can be established using username and password combinations, challenge and response questions, token cards, and other methods.  Authorization - which resources the user can access and which operations the user is allowed to perform.  Accounting - records what the user accessed, the amount of time the resource is accessed, and any changes made.
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Mitigating Network Attacks Firewalls A firewall resides between two or more networks. It controls traffic and helps prevent unauthorized access. Methods used are:  Packet Filtering  Application Filtering  URL Filtering  Stateful Packet Inspection (SPI) - Incoming packets must be legitimate responses to requests from internal hosts.
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Mitigating Network Attacks Endpoint Security  Common endpoints are laptops, desktops, servers, smart phones, and tablets.  Employees must follow the companies documented security policies to secure their devices.  Policies often include the use of anti-virus software and host intrusion prevention.
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Securing Devices Introduction to Securing Devices  Part of network security is securing devices, including end devices and intermediate devices.  Default usernames and passwords should be changed immediately.  Access to system resources should be restricted to only the individuals that are authorized to use those resources.  Any unnecessary services and applications should be turned off and uninstalled, when possible.  Update with security patches as they become available.
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Securing Devices Passwords
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Securing Devices Basic Security Practices  Encrypt passwords  Require minimum length passwords  Block brute force attacks  Use Banner Message  Set EXEC timeout
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Securing Devices Enable SSH
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ping Interpreting ICMP Messages  ! - indicates receipt of an ICMP echo reply message  . - indicates a time expired while waiting for an ICMP echo reply message  U - an ICMP unreachable message was received
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ping Leveraging Extended Ping  The Cisco IOS offers an "extended" mode of the ping command R2# ping Protocol [ip]: Target IP address: 192.168.10.1 Repeat count [5]: Datagram size [100]: Timeout in seconds [2]: Extended commands [n]: y Source address or interface: 10.1.1.1 Type of service [0]:
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Ping Network Baseline
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Tracert Interpreting Tracert Messages
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Show Commands Common Show Commands Revisited  The status of nearly every process or function of the router can be displayed using a show command.  Frequently used show commands: show running-config show interfaces show arp show ip route show protocols show version
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Show Commands Viewing Router Settings with Show Version Cisco IOS version System bootstrap Cisco IOS image CPU and RAM Config. register Number and type of physical interfaces Amount of NVRAM Amount of Flash
  • 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Show Commands Viewing Switch Settings with Show Version
  • 38. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Host and IOS Commands ipconfig Command Options  ipconfig - displays ip address, subnet mask, default gateway.  ipconfig /all – also displays MAC address.  Ipconfig /displaydns - displays all cached dns entries in a Windows system .
  • 39. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Host and IOS Commands arp Command Options
  • 40. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Host and IOS Commands show cdp neighbors Command Options
  • 41. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Host and IOS Commands Using show ip interface brief Command  Can be used to verify the status of all network interfaces on a router or a switch.
  • 42. Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router and Switch File Systems Router File Systems  show file systems command - lists all of the available file systems on a Cisco 1941 route  * Asterisk indicates this is the current default file system
  • 43. Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Router and Switch File Systems Switch File Systems  show file systems command - lists all of the available file systems on a Catalyst 2960 switch.
  • 44. Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Backup and Restore Configuration Files Backup and Restore using Text Files
  • 45. Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Backup and Restore Configuration Files Backup and Restore using TFTP  Configuration files can be stored on a Trivial File Transfer Protocol (TFTP) server.  copy running-config tftp – save running configuration to a tftp server  copy startup-config tftp - save startup configuration to a tftp server
  • 46. Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Backup and Restore Configuration Files Using USB Interfaces on a Cisco Router  USB flash drive must be formatted in a FAT16 format.  Can hold multiple copies of the Cisco IOS and multiple router configurations.  Allows administrator to easily move configurations from router to router.
  • 47. Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Backup and Restore Configuration Files Backup and Restore Using USB
  • 48. Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Integrated Router Multi-function Device  Incorporates a switch, router, and wireless access point.  Provides routing, switching and wireless connectivity.  Linksys wireless routers, are simple in design and used in home networks  Cisco Integrated Services Router (ISR) product family offers a wide range of products, designed for small office to larger networks.
  • 49. Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Integrated Router Wireless Capability  Wireless Mode -Most integrated wireless routers support 802.11b, 802.11g and 802.11n  Service Set Identifier (SSID) - Case-sensitive, alpha-numeric name for your home wireless network.  Wireless Channel – RF spectrum divided up into channels.
  • 50. Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Integrated Router Basic Security of Wireless  Change default values  Disable SSID broadcasting  Configure Encryption using WEP or WPA  Wired Equivalency Protocol (WEP) - uses pre- configured keys to encrypt and decrypt data. Every wireless device allowed to access the network must have the same WEP key entered.  Wi-Fi Protected Access (WPA) – also uses encryption keys from 64 bits up to 256 bits. New keys are generated each time a connection is established with the AP. Therefore more secure.
  • 51. Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Integrated Router Configuring the Integrated Router  Access the router by cabling a computer to one of the router’s LAN Ethernet ports.  The connecting device will automatically obtain IP addressing information from Integrated Router  Change default username and password and the default Linksys IP address for security purposes.
  • 52. Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Integrated Router Enabling Wireless  Configure the wireless mode  Configure the SSID  Configure RF channel  Configure any desired security encryption
  • 53. Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Integrated Router Configure a Wireless Client  The wireless client configuration settings must match that of the wireless router. SSID Security Settings Channel  Wireless client software can be integrated into the device operating system or stand alone, downloadable, wireless utility software.
  • 54. Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 11: Summary  Good network design incorporates reliability, scalability, and availability.  Networks must be secured from viruses, Trojan horses, worms and network attacks.  Document Basic Network Performance.  Test network connectivity using ping and traceroute.  Use IOS commands to monitor and view information about the network and network devices.  Backup configuration files using TFTP or USB.  Home networks and small business often use integrated routers, which provide the functions of a switch, router and wireless access point.
  • 55. Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential