SlideShare a Scribd company logo
1 of 49
LAN Switching and Wireless
Abdelkhalik Mosa
If you found any mistake’s’ on these slides or if
you have any other questions or comments,
please feel free to contact me at:
abdu.elsaid@gmail.com or abdu.elsaid@yahoo.com
Linkedin : https://www.linkedin.com/in/AbdelkhalikMosa
Twitter : https://twitter.com/AbdelkhalikMosa
Facebook : https://www.facebook.com/Abdelkhalik.Mosa
Thanks,
Abdelkhalik Elsaid Mosa
Suez Canal University
Faculty of Computers and Informatics - Ismailia - Egypt
Remember !
Key Elements of Ethernet/802.3 Networks: CSMA/CD
Carrier Sense
Multiple Access
Collision Detection
JAM Signal
Random Backoff
Key Elements of Ethernet/802.3 Networks: Communication
Key Elements of Ethernet/802.3 Networks: Ethernet Frame
MAC Address
Ethernet Frame
Key Elements of Ethernet/802.3 Networks: Duplex Settings
Half Duplex
Full Duplex
• Switch Port Settings: Ports on a Cisco Catalyst 2960 Series can
be configured as follows:
– auto : allows the two ports to communicate in order to decide the mode.
– full : sets full-duplex mode.
– half : sets half-duplex mode.
• auto-MDIX
 When the auto-MDIX feature is enabled, the switch detects the required
cable type for copper Ethernet connections and configures the interfaces
accordingly.
Switch# conf t
Switch(config)# interface f0/1
Switch(config-if)# speed auto
Switch(config-if)# duplex auto
Switch(config-if)# mdix auto
Switch(config-if)# end
Key Elements of Ethernet/802.3 Networks: Switch Port Settings
1
2
3 4
5 6
Key Elements of Ethernet/802.3 Networks: Switch MAC Table
The initial MAC address table is empty
Design Considerations for Ethernet networks: Transfer Capacity
• Differences between bandwidth, throughput and goodput:
1. Bandwidth (Theoretical): The capacity of a medium to carry
data in a given amount of time.
 Usually measured in kbps or Mbps.
2. Throughput (Practical): is the measure of the transfer of bits
across the media over a given period of time.
Throughput <= Bandwidth.
 Number of devices affect the throughput.
3. Goodput (Qualitative): is the measure of usable data
transferred over a given period of time.
Application level throughput.
Goodput = Throughput - traffic overhead for establishing sessions,
acknowledgements, and encapsulation.
• Broadcast and Collision domains
– Each switch reduces the size of the collision domain on the LAN to a
single link.
– Each router reduces the size of the broadcast domain on the LAN.
• LAN Segmentation
Design Considerations for Ethernet networks
• Network Latency: is the time a frame or a packet takes to travel
from the source station to the final destination.
Design Considerations for Ethernet networks: Network Latency
1. Store and Forward
2. Cut-Through (Fast-forward switching or Fragment-free switching)
Switch Forwarding Methods
Switch Forwarding Methods
Symmetric and Asymmetric Switching
• Switching may be classified as symmetric or asymmetric based
on the way in which bandwidth is allocated to the switch ports.
Symmetric and Asymmetric Switching
Memory Buffering
• The switch uses a buffering technique to store and forward
frames and when the destination port is busy.
• The switch stores the data in the memory buffer.
• The memory buffer can port-based memory or shared memory.
Layer 3 Switching
• Layer 3 switches are superfast routers that do Layer 3 forwarding
in hardware.
Just Refresh
The Command Line Interface Modes
GUI-based Alternatives to the CLI
• Cisco Network Assistant CiscoView
• Security Device Manager SNMP Network Management
http://www.cisco.com/go/networkassistant
.
http://www.cisco.com/en/US/products/sw/cscowork
/ps4565/prod_bulletin0900aecd802948b0.html
http://h20229.www2.hp.com/news/about/index.html
Accessing the Command History
Describe the Boot Sequence
Prepare to configure the switch
Switch Management Configuration
• To be able to telnet to or from the switch you should set an IP address and
the default gateway on the switch.
aLayer2switch,suchas2960,onlyPermits
asingleVLANinterfacetobeactiveatatime.
Switch Management Configuration
• Configure Duplex and Speed
Switch Management Configuration
• Configure a Web Interface
• Managing the MAC Address Table
 show mac-address-table
 The MAC address table was previously referred to as Content
Addressable Memory (CAM) or as the CAM table.
• Dynamic Mac addresses: are source MAC addresses that the switch
learns and then ages when they are not in use.
 The default time is 300 seconds.
• Static Mac addresses: MAC addresses assigned to certain ports by
the network admin.
 Static addresses are not aged out.
 mac-address-table static <MAC address> vlan {1-4096, ALL}
interface interface-id.
 The maximum size of the MAC table varies, but 8192 in Catalyst 2960
Switch Management Configuration
Using the Show Commands
Back up and Restore Switch Configurations
Note:copystartrun
Back up Configuration Files to a TFTP Server
• Backing Up Configuration
1.switch#copy system:running-config
tftp:[[[//location]/directory]/filename]
2.or switch#copy nvram:startup-config
tftp:[[[//location]/directory]/filename].
• Restoring Configuration
1.Switch#copy tftp:[[[//location]/directory]/filename]
system:running-config
2.or switch#copy tftp:[[[//location]/directory]/filename]
nvram:startup-config.
Ex: S1# copy running-config tftp://192.168.1.1/abdo-config
Configuring Passwords
• Enable
 FCI(config)# enable password cisco
 FCI(config-line)# enable secret cisco
• Console
 FCI(config)# line console 0
 FCI(config-line)# password cisco
 FCI(config-line)# login
• Telnet
 FCI(config)# line vty 0 14
 FCI(config-line)# password cisco
 FCI(config-line)# login
The
No
command
Password Recovery
• Password Recovery Steps:
1. Press the Mode button for awhile //load the boot loader
2. Flash-init //Initialize the Flash file system
3. Rename flash:config.text flash:config.text.old // rename
4. Boot // Boot the system
5. Rename flash:config.text.old flash:config.text
6. Copy flash:config.text system:running-config
7. Change the passwords
8. Save Changes
9. Reload
dir flash: Display the contents of Flash memory
Banner and Clearing Configuration
• Banner Commands
1.FCI(config)# banner MOTD “Device maintenance on Friday!”
2.FCI(config)# banner LOGIN “Authorized Personnel Only!”
• Clearing Configuration Information
Switch#erase nvram: or the erase startup-config
• Deleting a Stored Configuration File
Switch#delete flash:filename
Configuring Telnet and SSH
FCI(config)#crypto key zeroize rsa // To delete the RSA key pair
After the RSA key pair is deleted, the SSH server is automatically disabled.
• Time-out: the amount of time the switch allows for a connection to
be established.
• FCI(config)#ip ssh {timeout seconds | authentication-retries number}
Common Security Attacks (MAC Address Flooding)
Common Security Attacks (MAC Address Flooding)
Common Security Attacks (MAC Address Flooding)
Common Security Attacks (MAC Address Flooding)
Common Security Attacks (MAC Address Flooding)
Common Security Attacks (Spoofing Attacks)
DHCP Starvation attack
DHCP Spoofing attack
Solving Spoofing Attacks using Snooping and Port Security
•DHCP snooping: is a Cisco Catalyst feature that determines which
switch ports can respond to DHCP requests.
1. S(config)# ip dhcp snooping.
2. ip dhcp snooping vlan number {number}.
3. ip dhcp snooping trust.
4. (Optional) Limit the rate at which an
attacker can continually send bogus
DHCP requests through untrusted ports
to the DHCP server using the ip dhcp
snooping limit rate command.
Common Security Attacks (CDP Attacks)
• It is recommended that you disable the use of CDP on devices
that do not need to use it.
Common Security Attacks (Telnet Attacks)
• Types of Telnet attacks
1. Brute Force Password Attack: guesses password and uses a
program to establish a Telnet session using each guessed
password.
• Solution: Change your password frequently, use strong
passwords, and limit who can communicate with the vty
lines.
2. DoS attack: the attacker exploits a flaw in the Telnet server
software running on the switch that renders the Telnet
service unavailable.
• Solution: Update to the newest version of the cisco IOS.
Configuring Port Security
• Port security enables you to:
 Specify a group of valid MAC addresses allowed on a port.
 Allow only the specified MAC add. to access the port.
 Specify that the port will automatically shutdown if
unauthorized MAC addresses are detected.
• Secure MAC Address Types
1. Static secure MAC addresses: MAC addresses are manually configured by
using the switchport port-security mac-address mac-address.
2. Dynamic secure MAC addresses: MAC addresses are dynamically learned
and stored only in the address table.
3. Sticky secure MAC addresses: You can configure a port to dynamically
learn MAC addresses and then save these MAC addresses to the running
configuration using switchport port-security mac-address sticky.
Security violation Modes
• Security violation when either of these situations occurs:
 The maximum number of secure MAC addresses have been added to the
address table, and a station whose MAC address is not in the address table
attempts to access the interface.
 An address learned or configured on one secure interface is seen on
another secure interface in the same VLAN.
• Security Violation Modes
Security violation Modes
Configure Sticky Port Security
Verify Port Security
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration

More Related Content

What's hot

What's hot (20)

Vlans
VlansVlans
Vlans
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
VirtuaL area network (VLAN)
VirtuaL area network (VLAN)  VirtuaL area network (VLAN)
VirtuaL area network (VLAN)
 
Lan & vlan
Lan & vlanLan & vlan
Lan & vlan
 
VLAN Trunking Protocol
VLAN Trunking ProtocolVLAN Trunking Protocol
VLAN Trunking Protocol
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
CCNP Switching Chapter 3
CCNP Switching Chapter 3CCNP Switching Chapter 3
CCNP Switching Chapter 3
 
Switched networks (LAN Switching – Switches)
Switched networks (LAN Switching – Switches)Switched networks (LAN Switching – Switches)
Switched networks (LAN Switching – Switches)
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
Basic network training2
Basic network training2Basic network training2
Basic network training2
 
WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars WSN protocol 802.15.4 together with cc2420 seminars
WSN protocol 802.15.4 together with cc2420 seminars
 
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram SnehiVLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
VLAN Virtual Area Network ,Switch,Ethernet ,VIkram Snehi
 
CCNA- part 10 wan link-isdn
CCNA- part 10 wan link-isdnCCNA- part 10 wan link-isdn
CCNA- part 10 wan link-isdn
 
Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)
 
Chapter9ccna
Chapter9ccnaChapter9ccna
Chapter9ccna
 
CCNA- part 8 switch
CCNA- part 8 switchCCNA- part 8 switch
CCNA- part 8 switch
 
vlan
vlanvlan
vlan
 
CCNA- part 11 frame relay
CCNA- part 11 frame relayCCNA- part 11 frame relay
CCNA- part 11 frame relay
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 

Viewers also liked

LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationAbdelkhalik Mosa
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerAbdelkhalik Mosa
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)Abdelkhalik Mosa
 
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Saurav Pandey
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing NetworksDsunte Wilson
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic ConfigurationProf. Erwin Globio
 
Switch configuration
Switch configurationSwitch configuration
Switch configurationMuuluu
 
Academic Poster Design, Review and Presentation
Academic Poster Design, Review and PresentationAcademic Poster Design, Review and Presentation
Academic Poster Design, Review and PresentationAbdelkhalik Mosa
 
LAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignLAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignAbdelkhalik Mosa
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsAbdelkhalik Mosa
 
1000 Ccna Questions And Answers
1000 Ccna Questions And Answers1000 Ccna Questions And Answers
1000 Ccna Questions And AnswersCCNAResources
 
Network Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network LayerNetwork Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network LayerAbdelkhalik Mosa
 
Technical interview questions -networking
Technical interview questions -networkingTechnical interview questions -networking
Technical interview questions -networkingrafiq123
 
Unit ii physical layer
Unit ii  physical layerUnit ii  physical layer
Unit ii physical layerSumathi Kv
 
PaaS for Network Engineers
PaaS for Network EngineersPaaS for Network Engineers
PaaS for Network EngineersJustyna Bak
 

Viewers also liked (20)

LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport Layer
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
 
Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0Network Design on cisco packet tracer 6.0
Network Design on cisco packet tracer 6.0
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic Configuration
 
Switch configuration
Switch configurationSwitch configuration
Switch configuration
 
Academic Poster Design, Review and Presentation
Academic Poster Design, Review and PresentationAcademic Poster Design, Review and Presentation
Academic Poster Design, Review and Presentation
 
LAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN DesignLAN Switching and Wireless: Ch1 - LAN Design
LAN Switching and Wireless: Ch1 - LAN Design
 
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and ProtocolsNetwork Fundamentals: Ch3 - Application Layer Functionality and Protocols
Network Fundamentals: Ch3 - Application Layer Functionality and Protocols
 
1000 Ccna Questions And Answers
1000 Ccna Questions And Answers1000 Ccna Questions And Answers
1000 Ccna Questions And Answers
 
Router commands
Router commandsRouter commands
Router commands
 
Network Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network LayerNetwork Fundamentals: Ch5 - Network Layer
Network Fundamentals: Ch5 - Network Layer
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Technical interview questions -networking
Technical interview questions -networkingTechnical interview questions -networking
Technical interview questions -networking
 
01600 ppt ch09
01600 ppt ch0901600 ppt ch09
01600 ppt ch09
 
Unit ii physical layer
Unit ii  physical layerUnit ii  physical layer
Unit ii physical layer
 
PaaS for Network Engineers
PaaS for Network EngineersPaaS for Network Engineers
PaaS for Network Engineers
 
Wireless LANs and Mobile Networks
Wireless LANs and Mobile NetworksWireless LANs and Mobile Networks
Wireless LANs and Mobile Networks
 

Similar to LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration

Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1aghacrom
 
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutionsSwitching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutionsMike McLain
 
Security Concerns in LANs.pptx
Security Concerns in LANs.pptxSecurity Concerns in LANs.pptx
Security Concerns in LANs.pptxjoko
 
Ch2 ccna exploration 3 lan switching and wireless
Ch2 ccna exploration 3 lan switching and wirelessCh2 ccna exploration 3 lan switching and wireless
Ch2 ccna exploration 3 lan switching and wirelesskratos2424
 
Ccna 3 chapter 2 v4.0 answers 2011
Ccna 3 chapter 2 v4.0 answers 2011Ccna 3 chapter 2 v4.0 answers 2011
Ccna 3 chapter 2 v4.0 answers 2011Dân Chơi
 
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions ManualScaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manualnudicixox
 
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...abdenour boussioud
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05Irsandi Hasan
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1Chaing Ravuth
 

Similar to LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration (20)

Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1
 
Cap2 configuring switch
Cap2   configuring switchCap2   configuring switch
Cap2 configuring switch
 
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutionsSwitching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
Switching vla ns_secugenius_harksh_mikemclain_secugenius security solutions
 
Security Concerns in LANs.pptx
Security Concerns in LANs.pptxSecurity Concerns in LANs.pptx
Security Concerns in LANs.pptx
 
Ch2 ccna exploration 3 lan switching and wireless
Ch2 ccna exploration 3 lan switching and wirelessCh2 ccna exploration 3 lan switching and wireless
Ch2 ccna exploration 3 lan switching and wireless
 
Ccna 3 chapter 2 v4.0 answers 2011
Ccna 3 chapter 2 v4.0 answers 2011Ccna 3 chapter 2 v4.0 answers 2011
Ccna 3 chapter 2 v4.0 answers 2011
 
Switching
SwitchingSwitching
Switching
 
Vlan
VlanVlan
Vlan
 
Ccna 9
Ccna  9Ccna  9
Ccna 9
 
Ccna Imp Guide
Ccna Imp GuideCcna Imp Guide
Ccna Imp Guide
 
Attack.pptx
Attack.pptxAttack.pptx
Attack.pptx
 
ENCOR_Capitulo 1.pptx
ENCOR_Capitulo 1.pptxENCOR_Capitulo 1.pptx
ENCOR_Capitulo 1.pptx
 
27 Switching.pptx
27 Switching.pptx27 Switching.pptx
27 Switching.pptx
 
Switch security
Switch securitySwitch security
Switch security
 
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions ManualScaling Networks Lab Manual 1st Edition Cisco Solutions Manual
Scaling Networks Lab Manual 1st Edition Cisco Solutions Manual
 
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...
Best practices for catalyst 4500 4000, 5500-5000, and 6500-6000 series switch...
 
CCNA_ITN_Chp5.pptx
CCNA_ITN_Chp5.pptxCCNA_ITN_Chp5.pptx
CCNA_ITN_Chp5.pptx
 
Hacking L2 Switches
Hacking L2 SwitchesHacking L2 Switches
Hacking L2 Switches
 
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 05
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 

More from Abdelkhalik Mosa

Towards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADOTowards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADOAbdelkhalik Mosa
 
Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...Abdelkhalik Mosa
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesAbdelkhalik Mosa
 
Accessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAccessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAbdelkhalik Mosa
 
Routing Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPRouting Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPAbdelkhalik Mosa
 
Network Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerNetwork Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerAbdelkhalik Mosa
 
Network Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerNetwork Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerAbdelkhalik Mosa
 
Network Fundamentals: Ch6 - Addressing the Network IP v4
Network Fundamentals: Ch6 - Addressing the Network IP v4Network Fundamentals: Ch6 - Addressing the Network IP v4
Network Fundamentals: Ch6 - Addressing the Network IP v4Abdelkhalik Mosa
 
Network Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - EthernetNetwork Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - EthernetAbdelkhalik Mosa
 

More from Abdelkhalik Mosa (10)

Towards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADOTowards a Cloud Native Big Data Platform using MiCADO
Towards a Cloud Native Big Data Platform using MiCADO
 
Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...Virtual machine consolidation for cloud data centers using parameter based ad...
Virtual machine consolidation for cloud data centers using parameter based ad...
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling Technologies
 
IPv6
IPv6IPv6
IPv6
 
Accessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAccessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network Security
 
Routing Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRPRouting Protocols and Concepts: Ch9 - EIGRP
Routing Protocols and Concepts: Ch9 - EIGRP
 
Network Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical LayerNetwork Fundamentals: Ch8 - Physical Layer
Network Fundamentals: Ch8 - Physical Layer
 
Network Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link LayerNetwork Fundamentals: Ch7 - Data Link Layer
Network Fundamentals: Ch7 - Data Link Layer
 
Network Fundamentals: Ch6 - Addressing the Network IP v4
Network Fundamentals: Ch6 - Addressing the Network IP v4Network Fundamentals: Ch6 - Addressing the Network IP v4
Network Fundamentals: Ch6 - Addressing the Network IP v4
 
Network Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - EthernetNetwork Fundamentals: Ch9 - Ethernet
Network Fundamentals: Ch9 - Ethernet
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 

LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration

  • 1. LAN Switching and Wireless Abdelkhalik Mosa
  • 2. If you found any mistake’s’ on these slides or if you have any other questions or comments, please feel free to contact me at: abdu.elsaid@gmail.com or abdu.elsaid@yahoo.com Linkedin : https://www.linkedin.com/in/AbdelkhalikMosa Twitter : https://twitter.com/AbdelkhalikMosa Facebook : https://www.facebook.com/Abdelkhalik.Mosa Thanks, Abdelkhalik Elsaid Mosa Suez Canal University Faculty of Computers and Informatics - Ismailia - Egypt Remember !
  • 3. Key Elements of Ethernet/802.3 Networks: CSMA/CD Carrier Sense Multiple Access Collision Detection JAM Signal Random Backoff
  • 4. Key Elements of Ethernet/802.3 Networks: Communication
  • 5. Key Elements of Ethernet/802.3 Networks: Ethernet Frame MAC Address Ethernet Frame
  • 6. Key Elements of Ethernet/802.3 Networks: Duplex Settings Half Duplex Full Duplex
  • 7. • Switch Port Settings: Ports on a Cisco Catalyst 2960 Series can be configured as follows: – auto : allows the two ports to communicate in order to decide the mode. – full : sets full-duplex mode. – half : sets half-duplex mode. • auto-MDIX  When the auto-MDIX feature is enabled, the switch detects the required cable type for copper Ethernet connections and configures the interfaces accordingly. Switch# conf t Switch(config)# interface f0/1 Switch(config-if)# speed auto Switch(config-if)# duplex auto Switch(config-if)# mdix auto Switch(config-if)# end Key Elements of Ethernet/802.3 Networks: Switch Port Settings
  • 8. 1 2 3 4 5 6 Key Elements of Ethernet/802.3 Networks: Switch MAC Table The initial MAC address table is empty
  • 9. Design Considerations for Ethernet networks: Transfer Capacity • Differences between bandwidth, throughput and goodput: 1. Bandwidth (Theoretical): The capacity of a medium to carry data in a given amount of time.  Usually measured in kbps or Mbps. 2. Throughput (Practical): is the measure of the transfer of bits across the media over a given period of time. Throughput <= Bandwidth.  Number of devices affect the throughput. 3. Goodput (Qualitative): is the measure of usable data transferred over a given period of time. Application level throughput. Goodput = Throughput - traffic overhead for establishing sessions, acknowledgements, and encapsulation.
  • 10. • Broadcast and Collision domains – Each switch reduces the size of the collision domain on the LAN to a single link. – Each router reduces the size of the broadcast domain on the LAN. • LAN Segmentation Design Considerations for Ethernet networks
  • 11. • Network Latency: is the time a frame or a packet takes to travel from the source station to the final destination. Design Considerations for Ethernet networks: Network Latency
  • 12. 1. Store and Forward 2. Cut-Through (Fast-forward switching or Fragment-free switching) Switch Forwarding Methods
  • 14. Symmetric and Asymmetric Switching • Switching may be classified as symmetric or asymmetric based on the way in which bandwidth is allocated to the switch ports.
  • 16. Memory Buffering • The switch uses a buffering technique to store and forward frames and when the destination port is busy. • The switch stores the data in the memory buffer. • The memory buffer can port-based memory or shared memory.
  • 17. Layer 3 Switching • Layer 3 switches are superfast routers that do Layer 3 forwarding in hardware.
  • 19. The Command Line Interface Modes
  • 20. GUI-based Alternatives to the CLI • Cisco Network Assistant CiscoView • Security Device Manager SNMP Network Management http://www.cisco.com/go/networkassistant . http://www.cisco.com/en/US/products/sw/cscowork /ps4565/prod_bulletin0900aecd802948b0.html http://h20229.www2.hp.com/news/about/index.html
  • 22. Describe the Boot Sequence
  • 23. Prepare to configure the switch
  • 24. Switch Management Configuration • To be able to telnet to or from the switch you should set an IP address and the default gateway on the switch. aLayer2switch,suchas2960,onlyPermits asingleVLANinterfacetobeactiveatatime.
  • 25. Switch Management Configuration • Configure Duplex and Speed
  • 26. Switch Management Configuration • Configure a Web Interface
  • 27. • Managing the MAC Address Table  show mac-address-table  The MAC address table was previously referred to as Content Addressable Memory (CAM) or as the CAM table. • Dynamic Mac addresses: are source MAC addresses that the switch learns and then ages when they are not in use.  The default time is 300 seconds. • Static Mac addresses: MAC addresses assigned to certain ports by the network admin.  Static addresses are not aged out.  mac-address-table static <MAC address> vlan {1-4096, ALL} interface interface-id.  The maximum size of the MAC table varies, but 8192 in Catalyst 2960 Switch Management Configuration
  • 28. Using the Show Commands
  • 29. Back up and Restore Switch Configurations Note:copystartrun
  • 30. Back up Configuration Files to a TFTP Server • Backing Up Configuration 1.switch#copy system:running-config tftp:[[[//location]/directory]/filename] 2.or switch#copy nvram:startup-config tftp:[[[//location]/directory]/filename]. • Restoring Configuration 1.Switch#copy tftp:[[[//location]/directory]/filename] system:running-config 2.or switch#copy tftp:[[[//location]/directory]/filename] nvram:startup-config. Ex: S1# copy running-config tftp://192.168.1.1/abdo-config
  • 31. Configuring Passwords • Enable  FCI(config)# enable password cisco  FCI(config-line)# enable secret cisco • Console  FCI(config)# line console 0  FCI(config-line)# password cisco  FCI(config-line)# login • Telnet  FCI(config)# line vty 0 14  FCI(config-line)# password cisco  FCI(config-line)# login The No command
  • 32. Password Recovery • Password Recovery Steps: 1. Press the Mode button for awhile //load the boot loader 2. Flash-init //Initialize the Flash file system 3. Rename flash:config.text flash:config.text.old // rename 4. Boot // Boot the system 5. Rename flash:config.text.old flash:config.text 6. Copy flash:config.text system:running-config 7. Change the passwords 8. Save Changes 9. Reload dir flash: Display the contents of Flash memory
  • 33. Banner and Clearing Configuration • Banner Commands 1.FCI(config)# banner MOTD “Device maintenance on Friday!” 2.FCI(config)# banner LOGIN “Authorized Personnel Only!” • Clearing Configuration Information Switch#erase nvram: or the erase startup-config • Deleting a Stored Configuration File Switch#delete flash:filename
  • 34. Configuring Telnet and SSH FCI(config)#crypto key zeroize rsa // To delete the RSA key pair After the RSA key pair is deleted, the SSH server is automatically disabled. • Time-out: the amount of time the switch allows for a connection to be established. • FCI(config)#ip ssh {timeout seconds | authentication-retries number}
  • 35. Common Security Attacks (MAC Address Flooding)
  • 36. Common Security Attacks (MAC Address Flooding)
  • 37. Common Security Attacks (MAC Address Flooding)
  • 38. Common Security Attacks (MAC Address Flooding)
  • 39. Common Security Attacks (MAC Address Flooding)
  • 40. Common Security Attacks (Spoofing Attacks) DHCP Starvation attack DHCP Spoofing attack
  • 41. Solving Spoofing Attacks using Snooping and Port Security •DHCP snooping: is a Cisco Catalyst feature that determines which switch ports can respond to DHCP requests. 1. S(config)# ip dhcp snooping. 2. ip dhcp snooping vlan number {number}. 3. ip dhcp snooping trust. 4. (Optional) Limit the rate at which an attacker can continually send bogus DHCP requests through untrusted ports to the DHCP server using the ip dhcp snooping limit rate command.
  • 42. Common Security Attacks (CDP Attacks) • It is recommended that you disable the use of CDP on devices that do not need to use it.
  • 43. Common Security Attacks (Telnet Attacks) • Types of Telnet attacks 1. Brute Force Password Attack: guesses password and uses a program to establish a Telnet session using each guessed password. • Solution: Change your password frequently, use strong passwords, and limit who can communicate with the vty lines. 2. DoS attack: the attacker exploits a flaw in the Telnet server software running on the switch that renders the Telnet service unavailable. • Solution: Update to the newest version of the cisco IOS.
  • 44. Configuring Port Security • Port security enables you to:  Specify a group of valid MAC addresses allowed on a port.  Allow only the specified MAC add. to access the port.  Specify that the port will automatically shutdown if unauthorized MAC addresses are detected. • Secure MAC Address Types 1. Static secure MAC addresses: MAC addresses are manually configured by using the switchport port-security mac-address mac-address. 2. Dynamic secure MAC addresses: MAC addresses are dynamically learned and stored only in the address table. 3. Sticky secure MAC addresses: You can configure a port to dynamically learn MAC addresses and then save these MAC addresses to the running configuration using switchport port-security mac-address sticky.
  • 45. Security violation Modes • Security violation when either of these situations occurs:  The maximum number of secure MAC addresses have been added to the address table, and a station whose MAC address is not in the address table attempts to access the interface.  An address learned or configured on one secure interface is seen on another secure interface in the same VLAN. • Security Violation Modes