ISACA – Charlotte Chapter June 3, 2014 Mark Krawczyk, CISA, CISSP, CCNA.

Slides:



Advertisements
Similar presentations
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I NETWORK LAYER AND IP Derived From CCNA Network Fundamentals.
Advertisements

Internetworking II: MPLS, Security, and Traffic Engineering
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Routing Basics By Craig Lindstrom. Overview Routing Process Routing Process Default Routing Default Routing Static Routing Static Routing Dynamic Routing.
Network Attacks Mark Shtern.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI Network Layer Network Fundamentals – Chapter 5.
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
Routing and Routing Protocols Introduction to Static Routing.
ROUTING PROTOCOL IGRP. REVIEW 4 Purpose of Router –determine best path to destination –pass the frames to the destination 4 Protocols –routed - used by.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—5-1 Implementing Path Control Lab 5-1 Debrief.
Chapter 27 Q and A Victor Norman IS333 Spring 2015.
COEN 252: Computer Forensics Router Investigation.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Exploring the Functions of Routing.
OSPF To route, a router needs to do the following: Know the destination address Identify the sources it can learn from Discover possible.
Connecting Networks © 2004 Cisco Systems, Inc. All rights reserved. Exploring How Routing Works INTRO v2.0—4-1.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—5-1 WAN Connections Enabling Static Routing.
Chapter 4: Managing LAN Traffic
Security in MobileIP Fahd Ahmad Saeed. Wireless Domain Problem Wireless domain insecure Data gets broadcasted to everyone, and anyone hearing this can.
1 Routing Introduction to Routing Static Routing.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
Network Components: Assignment Three
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 12: Routing.
Common Devices Used In Computer Networks
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
– Chapter 5 – Secure LAN Switching
Network Security1 – Chapter 5 – Secure LAN Switching Layer 2 security –Port security –IP permit lists –Protocol filtering –Controlling LAN floods (using.
Address Resolution Protocol(ARP) By:Protogenius. Overview Introduction When ARP is used? Types of ARP message ARP Message Format Example use of ARP ARP.
1/28/2010 Network Plus Network Device Review. Physical Layer Devices Repeater –Repeats all signals or bits from one port to the other –Can be used extend.
1 Chapter Overview Routing Principles. Understanding Routing--important Routing refers to the process of taking a packet from one device and sending it.
Routers. What is a Router? A multi-port connectivity device Can connect different types of LANs as well as WANS Works at Layer 3 – Network Layer using.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Introduction to Routing and Packet Forwarding Routing Protocols and.
TCP/IP Protocol Suite 1 Chapter 16 Upon completion you will be able to: Host Configuration: BOOTP and DHCP Know the types of information required by a.
Network Address Translation External/ Internal/. OVERLOADING In Overloading, each computer on the private network is translated to the same IP address;
Security fundamentals Topic 6 Securing the network infrastructure.
1 12-Jan-16 OSI network layer CCNA Exploration Semester 1 Chapter 5.
University of the Western Cape Chapter 12: Routing Protocols Interior and Exterior Routing Protocols Aleksandar Radovanovic.
CHAPTER 6: STATIC ROUTING Static Routing 2 nd semester
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Routing Talbles Routing Protocols 7.0.
Cisco Routers Routers collectively provide the main feature of the network layer—the capability to forward packets end-to-end through a network. routers.
Static Routing CCNA Routing and Switching Semester 2 Chapter 6
1 28-Sep-16 S Ward Abingdon and Witney College CCNA Exploration Semester 1 OSI network layer CCNA Exploration Semester 1 Chapter 5.
Network Fundamentals – Chapter 5
Host Configuration: BOOTP and DHCP
Chapter 6 – Routing.
Network Fundamentals – Chapter 5
Chapter 2: Static Routing
Introducing To Networking
Chapter 2: Basic Switching Concepts and Configuration
Introduction to Networking
Virtual LANs.
Network Fundamentals – Chapter 5
Working at a Small-to-Medium Business or ISP – Chapter 6
Chapter 2: Static Routing
Host Configuration: BOOTP and DHCP
Chapter 3: Dynamic Routing
Delivery and Routing of IP Packets
Network Fundamentals – Chapter 5
Network Fundamentals – Chapter 5
Chapter 2: Static Routing
Network Fundamentals – Chapter 5
Static and Default Routing
Network Fundamentals – Chapter 5
Introduction to networking (Yarnfield)
Network Fundamentals – Chapter 5
Network Fundamentals – Chapter 5
Network Fundamentals – Chapter 5
Network Fundamentals – Chapter 5
Network Fundamentals – Chapter 5
Computer Networks ARP and RARP
Network Fundamentals – Chapter 5
Presentation transcript:

ISACA – Charlotte Chapter June 3, 2014 Mark Krawczyk, CISA, CISSP, CCNA

Routers and Switches direct and control much of the data flowing across computer networks. The services provided are critical to the proper functioning and secure operations of Corporate networks. Properly configured secure routers and switches can greatly improve the overall security posture of a network.

Attacks on Network Devices Network devices are subject to various attacks: Unauthorized access – compromise device, routing tables, MAC tables. Session hijacking - an attacker can insert falsified IP packets after session establishment via IP spoofing. Rerouting - manipulating router updates to cause traffic to flow to unauthorized destinations (route injection). Masquerading - manipulates IP packets to falsify IP addresses. Denial of Service (DoS) - flooding the router with traffic or requests designed to consume all of some limited resource. Eavesdropping – insecure protocols, packet sniffers

Routing is accomplished using the IP addresses of the source and destination hosts and intermediary network devices such as Routers or Multilayer switches. The router examines the destination network address for each packet and then checks the routing table for forwarding information.

The routing table stores information about connected and remote networks. Connected networks are directly attached to one of the router interfaces. Remote networks are not directly connected to the router. Routes to these networks can be manually configured on the router or learned automatically using dynamic routing protocols.

Static Routing - Routes to remote networks are manually configured on the router. A default route can be statically configured. Dynamic Routing- As routers become aware of changes to the networks this information is passed on to other routers. When a router receives information about new or changed routes, it updates its own routing table and, in turn, passes the information to other routers.