Secured Network Design

Slides:



Advertisements
Similar presentations
CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
Advertisements

Chapter 5 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Describe the operation of the Ethernet sublayers.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Ethernet Introduction to Networks.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
CIM 2465 Fundamentals of Ethernet1 Fundamentals of Ethernet (Topic 3) Textbook: Networking Basics, CCNA 1 Companion Guide, Cisco Press Cisco Networking.
CCNA 3 v3.1 Module 4.
CCNA 1 v3.1 Module 6 Review. 2 What 3 things happen on an Ethernet network after a collision occurs? A backoff algorithm is invoked and transmission is.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
Service Providers & Data Link & Physical layers Week 4 Lecture 1.
Ethernet Frame PreambleDestination Address Source Address Length/ Type LLC/ Data Frame Check Sequence.
Module 6 Chapter 5. Ethernet Ethernet is now the dominant LAN technology in the world. Ethernet is not one technology but a family of LAN technologies.
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Connecting LANs, Backbone Networks, and Virtual LANs
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Switching CE
Semester 1 Module 8 Ethernet Switching Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Chapter 4: Managing LAN Traffic
Basic Switch Concept W.lilakiatsakun. Introduction Switch is typically a layer 2 device – Operate covers Physical and Data Link Layer Protocol that governs.
Chapter 5 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Describe the operation of the Ethernet sublayers.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Ethernet Introduction to Networks.
Ethernet, MAC podvrstva
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
1 CISCO NETWORKING ACADEMY PROGRAM (CNAP) SEMESTER 1/ MODULE 8 Ethernet Switching.
Brierley 1 Module 4 Module 4 Introduction to LAN Switching.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
Copyright Objectives: Chapter 3: Layer 2 Ethernet  Ethernet Fundamentals Ethernet Operations Carrier Sense Multiple Access/Collision.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Ethernet Introduction to Networks.
S3C2 – LAN Switching Addressing LAN Problems. Congestion is Caused By Multitasking, Faster operating systems, More Web-based applications Client-Server.
Module 8: Ethernet Switching
CCNA 3 Week 4 Switching Concepts. Copyright © 2005 University of Bolton Introduction Lan design has moved away from using shared media, hubs and repeaters.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
Cisco 3 – Switching Concepts Perrine. J Page 16/1/2016 Module 4 The use of bridges and switches for segmentation results in ____? 1.Multiple broadcast.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Ethernet Network Fundamentals – Chapter 9.
Semester 3—LAN Switching Chapter 2 Objectives  By the end of this chapter we will be able to perform tasks related to: – Various LAN Communication Problems.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
LAN Switching and Wireless Basic Switch Concepts and Configuration.
STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Copyright 2002Cisco Press: CCNA Instructor’s Manual Year 2 - Chapter 16/Cisco 4 - Module 9 CCNA Certification Exam Review By Your Name.
Switching Topic 1 Basic concepts. Agenda Ethernet CSMA/CD and duplex Frames and MACs Switching process – Store, forward and buffers Issues – Collisions.
Ethernet Overview it the IEEE standard for Ethernet.
Switching Concepts Introduction to Ethernet/802.3 LANs
Identify basic switching concepts and the operation of Cisco switches.
LAN Switching Semester 3, Chapter 2 Allan Johnson.
Renesas Electronics America Inc. © 2010 Renesas Electronics America Inc. All rights reserved. Overview of Ethernet Networking A Rev /31/2011.
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
Data Communications is the Real World OSI Layers 1 & 2 a.k.a TCP/IP Network Interface Layer.
1 CCNA 3 v3.1 Module 4 Switching Concepts Claes Larsen, CCAI.
CCNA3 v3 Module 4 v3 CCNA 3 Module 4 JEOPARDY K. Martin.
+ Lecture#2: Ethernet Asma ALOsaimi. + Objectives In this chapter, you will learn to: Describe the operation of the Ethernet sublayers. Identify the major.
Interconnecting Cisco Networking Devices Part 1 Pass4sureusa Pass4sure.
1 26-Jun-16 Switches CCNA Exploration Semester 3 Chapter 2-Part 1 Warning – horribly long! Taken from Slides provided by S Ward Abingdon and Witney College.
Slide จาก St. Clair College in Windsor, อาจารย์ ดร. ชัชวิน นามมั่น Twitter :
SKZ 1 Chapter 13 Wired LANs: Ethernet Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. And Exploration CCNA.
Chapter-2 Basic switch concept and configuration.
Youngstown State University Cisco Regional Academy
Introduction to Networks v6.0
Instructor Materials Chapter 5: Ethernet
Networking Devices.
MAC Addresses and ARP 32-bit IP address:
Instructor: Mr. Malik Zaib
Chapter 10: Ethernet Network Basics Chapter 10: Ethernet
Protocol layering and data
Instructor: Mr. Malik Zaib
Protocol layering and data
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Presentation transcript:

Secured Network Design W.Lilakiatsakun

Course Outline Part 1 Networking and Security Technology Part 2 Security on Enterprise Network Book and Ref: 1 Designing Network Security 2 RFCs

Part1 : Networking and Security Technology Networking Technology Layer2 (Data Link) Layer3 (Network ) Layer4 (Transport) Layer7 (Application)

Layer2 Technology Data Link Protocol 802.3 (Ethernet) ARP VLAN Spanning Tree Protocol 802.11/Encryption on Wireless LAN Attack on Layer2

Layer3 Technology Internet Protocol ICMP Routing Protocol IPv4 /IPv6 IPsec ICMP Routing Protocol RIP/OSPF BGP Attack on Layer3

Layer4 /7Technology Transport Protocol TCP / UDP TLS Attack on Layer4

Layer 7Technology Application Protocol HTTP DHCP DNS SMTP SNMP SYSLOG SMB Attack on Layer7

Part 2: Security on Enterprise Network Threats in an Enterprise Network Considerations for a Site Security Policy Design and Implementation of the Corporate Security Policy Incident Handling

Part 3: Practical Implementation Securing the Corporate Network Infrastructure Securing Internet Access Securing VPN, Wireless, and VoIP Network

IEEE 802.3 (Ethernet) CSMA/CD Framing Switch Operation Attacks Relating to 802.3

CSMA/CD (1) Important mechanism to do multi-access control in IEEE802.3 is CSMA/CD CSMA – Carrier Sense Multiple Access CS – Listen before transmitting If a device detects a signal from another device, it waits for a specified amount of time before attempting to transmit. When there is no traffic detected, a device transmits its message. While this transmission is occurring, the device continues to listen for traffic or collisions on the LAN. After the message is sent, the device returns to its default listening mode.

CSMA/CD (2)

CSMA/CD (3) CD – Collision Detection When a device is in listening mode, it can detect when a collision occurs on the shared media, because all devices can detect an increase in the amplitude of the signal above the normal level. When a collision occurs, the other devices in listening mode, as well as all the transmitting devices, detect the increase in the signal amplitude.

CSMA/CD (4)

CSMA/CD (5) Jam Signal When a collision is detected, the transmitting devices send out a jamming signal. The jamming signal notifies the other devices of a collision, so that they invoke a backoff algorithm. This backoff algorithm causes transmitting devices to stop transmitting for a random amount of time, which allows the collision signals to subside.

CSMA/CD (6) Jam signal sent by transmitting node Transmitting nodes stop transmitting and start backing off

CSMA/CD (7) Random Backoff After the delay has expired on a device, the device goes back into the "listening before transmit" mode. A random backoff period ensures that the devices that were involved in the collision do not try to send traffic again at the same time, which would cause the whole process to repeat. However, during the backoff period, a third device may transmit before either of the two involved in the collision have a chance to re-transmit.

Ethernet Communication (1) Unicast Communication in which a frame is sent from one host and addressed to one specific destination. HTTP / FTP Multicast Communication in which a frame is sent to a specific group of devices or clients. RIPv2 /OSPF Broadcast Communication in which a frame is sent from one address to all other addresses ARP (Address Resolution Protocol)

Ethernet Communication (2)

Ethernet Frame (1) Preamble and Start Frame Delimiter Fields The Preamble (7 bytes) and Start Frame Delimiter (SFD) (1 byte) fields are used for synchronization between the sending and receiving devices.

Ethernet Frame (2) Destination MAC Address Field The Destination MAC Address field (6 bytes) is the identifier for the intended recipient. The address in the frame is compared to the MAC address in the device. If there is a match, the device accepts the frame.

Ethernet Frame (3) Source MAC Address Field The Source MAC Address field (6 bytes) identifies the frame's originating NIC or interface. Switches use this address to add to their lookup tables.

Ethernet Frame (4) Length/Type Field If the two-octet value is equal to or greater than 0x0600 hexadecimal or 1536 decimal, the contents of the Data Field are decoded according to the protocol indicated (function as Type field) if the two-byte value is less than 0x0600 then the value represents the length of the data in the frame (Function as Length field)

Ethernet Frame (5) Data and Pad Fields The Data and Pad fields (46 to 1500 bytes) contain the encapsulated data from a higher layer, which is a generic Layer 3 PDU, or more commonly, an IPv4 packet. All frames must be at least 64 bytes long (minimum length aides the detection of collisions). If a small packet is encapsulated, the Pad field is used to increase the size of the frame to the minimum size.

Ethernet Frame (6) Frame Check Sequence Field The FCS field (4 bytes) detects errors in a frame. It uses a cyclic redundancy check (CRC). The sending device includes the results of a CRC in the FCS field of the frame. The receiving device receives the frame and generates a CRC to look for errors. If the calculations match, no error has occurred. If the calculations do not match, the frame is dropped.

MAC Address (1) MAC address is 48 bit address that consists of OUI 24 bit + Vendor assignment 24 bit OUI (Organizational Unique Identifier) is separated as Broadcast field (1 bit) Local field (1 bit) OUI number (22 bits)

MAC Address (2) Organizational Unique Identifier It is 24 bits long and identifies the manufacturer of the NIC card. OUI Number is 22 bits which is assigned by IEEE Within the OUI, there are 2 bits that have meaning only when used in the destination address, as follows: Broadcast or multicast bit: Indicates to the receiving interface that the frame is destined for all or a group of end stations on the LAN segment. Locally administered address bit: If the vendor-assigned MAC address can be modified locally, this bit should be set.

MAC Address (3) Vendor Assignment Number The vendor-assigned part of the MAC address is 24 bits long and uniquely identifies the Ethernet hardware. It can be a BIA (Burn in MAC Address) or modified by software indicated by the local bit.

MAC Address (4) Mapping IP Multicast to MAC Multicast The multicast address range of 01-00-5E-00-00-00 to 01-00-5E-7F-FF-FF for Ethernet

MAC Address (5) Example: 1 IP multicast address 239.255.0.6 becomes 01-00-5E-7F-00-06. 

MAC Address (6) Question Mapping IP Multicast as follows: 224.1.1.1 224.129.1.1 225.1.1.1 What can be noticed ?

Communication Type (1)

Communication Type (2) Half Duplex: Half-duplex communication relies on unidirectional data flow where sending and receiving data are not performed at the same time. Half-duplex communications have performance issues due to the constant waiting, because data can only flow in one direction at a time. Half-duplex connections are typically seen in older hardware, such as hubs.

Communication Type (3) Full Duplex In full-duplex communication, data flow is bidirectional, so data can be sent and received at the same time. Most Ethernet, Fast Ethernet, and Gigabit Ethernet NICs sold today offer full-duplex capability. In full-duplex mode, the collision detect circuit is disabled. Frames sent by the two connected end nodes cannot collide because the end nodes use two separate circuits in the network cable.

Switch Operation (1) A switch determines how to handle incoming data frames by using its MAC address table. (CAM, Content Addressable Memory Table) A switch builds its MAC address table by recording the MAC addresses of the nodes connected to each of its ports. Once a MAC address for a specific node on a specific port is recorded in the address table, the switch then knows to send traffic destined for that specific node out the port mapped to that node for subsequent transmissions.

Switch Operation (2) When an incoming data frame is received by a switch and the destination MAC address is not in the table, the switch forwards the frame out all ports, except for the port on which it was received.

Switch Operation (3) When the destination node responds, the switch records the node's MAC address in the address table from the frame's source address field

Broadcast Domain (1) Although switches filter most frames based on MAC addresses, they do not filter broadcast frames. For other switches on the LAN to get broadcasted frames, broadcast frames must be forwarded by switches. A collection of interconnected switches forms a single broadcast domain.

Broadcast Domain (2)

Broadcast Domain (3) When a device wants to send out a Layer 2 broadcast, the destination MAC address in the frame is set to all ones. (MAC address is FF-FF-FF-FF-FF-FF ) When a switch receives a broadcast frame, it forwards the frame to each of its ports, except the incoming port where the switch received the broadcast frame. Each attached device recognizes the broadcast frame and processes it. This leads to reduced network efficiency, because bandwidth is used to propagate the broadcast traffic.

LAN Segmentation (1) LANs are segmented into a number of smaller collision and broadcast domains using routers and switches. Previously, bridges were used, but this type of network equipment is rarely seen in a modern switched LAN.

LAN Segmentation (2) Uncontrolled LAN

LAN Segmentation (3) Hub Uncontrolled LAN

LAN Segmentation (4) Controlled LAN

LAN Segmentation (5) Router Switch Controlled LAN

Question ? How many collision domain and broadcast domain

Forwarding Frame (1) Store-and-Forward Switching In store-and-forward switching, when the switch receives the frame, it stores the data in buffers until the complete frame has been received. During the storage process, the switch analyzes the frame for information about its destination. In this process, the switch also performs an error check using the Cyclic Redundancy Check (CRC) trailer portion of the Ethernet frame.

Forwarding Frame (2) Store and forward switching

Forwarding Frame (3) Cut-through Switching The switch buffers just enough of the frame to read the destination MAC address so that it can determine to which port to forward the data. The destination MAC address is located in the first 6 bytes of the frame following the preamble. The switch looks up the destination MAC address in its switching table, determines the outgoing interface port, and forwards the frame onto its destination through the designated switch port. The switch does not perform any error checking on the frame

Forwarding Frame (4) Cut-through switching

Forwarding Frame (5) 2 types of cut-through switching Fast-forward switching Fragment-free switching

Forwarding Frame (6) Fast-forward switching immediately forwards a packet after reading the destination address. Because fast-forward switching starts forwarding before the entire packet has been received, there may be times when packets are relayed with errors Fragment-free switching, the switch stores the first 64 bytes of the frame before forwarding.

Question ?

Memory buffering (1) Buffering may also be used when the destination port is busy due to congestion and the switch stores the frame until it can be transmitted. The use of memory to store the data is called memory buffering.

Memory buffering (2) Port-based Memory Buffering Frames are stored in queues that are linked to specific incoming ports. A frame is transmitted to the outgoing port only when all the frames ahead of it in the queue have been successfully transmitted. It is possible for a single frame to delay the transmission of all the frames in memory because of a busy destination port.

Memory buffering (3) Shared Memory Buffering Shared memory buffering deposits all frames into a common memory buffer that all the ports on the switch share. The amount of buffer memory required by a port is dynamically allocated. This allows the packet to be received on one port and then transmitted on another port, without moving it to a different queue.

MAC Attacking (1) MAC Address Flooding MAC address flooding is a common attack. When a Layer 2 switch receives a frame, the switch looks in the MAC address table for the destination MAC address. As frames arrive on switch ports, the source MAC addresses are learned and recorded in the MAC address table. If an entry exists for the MAC address, the switch forwards the frame to the MAC address port designated in the MAC address table. If the MAC address does not exist, the switch acts like a hub and forwards the frame out every port on the switch.

MAC Attacking (2) MAC flooding makes use of MAC table limitation to bombard the switch with fake source MAC addresses until the switch MAC address table is full. The network intruder uses the attack tool to flood the switch with a large number of invalid source MAC addresses until the MAC address table fills up

MAC Attacking (3) Each switch has a limit on MAC(CAM) tables Size by basic switch 3xxx—16,000 4xxx—32,000 6xxx—128,000

MAC Attacking (4)

MAC Attacking (5)

CISCO Port Security Configuration: MAC Attacking (6) CISCO Port Security Configuration: http://www.cisco.com/c/en/us/td/docs/switches/lan/ catalyst4500/12-2/25ew/configuration/guide/conf/port_sec.html