Role of Router. The Router as a Perimeter Device  Usually the main function of a router is considered as the forwarding of packets between two network.

Slides:



Advertisements
Similar presentations
Chapter 7 RIP version 2.
Advertisements

RIP V2 W.lilakiatsakun.  RFC 2453 (obsoletes –RFC 1723 /1388)  Extension of RIP v1 (Classful routing protocol)  Classless routing protocol –VLSM is.
RIP V2 CCNP S1(5), Chapter 4.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: EIGRP Advanced Configurations and Troubleshooting Scaling.
Cisco S3 C5 Routing Protocols. Network Design Characteristics Reliable – provides mechanisms for error detection and correction Connectivity – incorporate.
IP Routing.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Routing Protocols and Concepts – Chapter 7 Sandra Coleman, CCNA, CCAI
Routing Basics By Craig Lindstrom. Overview Routing Process Routing Process Default Routing Default Routing Static Routing Static Routing Dynamic Routing.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—3-1 Determining IP Routes Introducing Routing.
1 CCNA 3 v3.1 Module 1. 2 CCNA 3 Module 1 Introduction to Classless Routing.
Chapter 5 IP Routing Routing Sending packets through network from one device to another What must routers know? – Destination address – Neighboring routers.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
CCNA 2 v3.1 Module 6.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—4-1 Implement an IPv4-Based Redistribution Solution Assessing Network Routing Performance and.
Institute of Technology Sligo - Dept of Computing Chapter 11 Layer 3 Protocols Paul Flynn.
Chapter 27 Q and A Victor Norman IS333 Spring 2015.
Chapter 5 – Routing Protocols: IGRP. Building a Network To Be Reliable – provide error detection and ability to correct errors To Provide Connectivity.
Lecture Week 3 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts.
Implementing Standard and Extended Access Control List (ACL) in Cisco Routers.
1 Semester 2 Module 6 Routing and Routing Protocols YuDa college of business James Chen
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—5-1 WAN Connections Enabling Static Routing.
CISCO NETWORKING ACADEMY Chabot College ELEC IP Routing Protocol Highlights.
M. Menelaou CCNA2 DYNAMIC ROUTING. M. Menelaou DYNAMIC ROUTING Dynamic routing protocols can help simplify the life of a network administrator Routing.
Routing/Routed Protocols. Remember: A Routed Protocol – defines logical addressing. Most notable example on the test – IP A Routing Protocol – fills the.
Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1.
Routing and Routing Protocols Routing Protocols Overview.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts.
Sybex CCNA Chapter 6: IP Routing Instructor & Todd Lammle.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 6 Routing and Routing Protocols.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 6 Routing and Routing Protocols.
Dynamic Routing Chapter 9. powered by DJ 1. C HAPTER O BJECTIVES At the end of this Chapter you will be able to:  Explain Dynamic Routing  Identify.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Access Control List ACL. Access Control List ACL.
Introduction to Classless Routing
1. 2 Anatomy of an IP Packet IP packets consist of the data from upper layers plus an IP header. The IP header consists of the following:
111 What Is VLSM and Why Is It Used?. 222 Classful and Classless Routing Classful (basic subnetting) Classful routing protocols require that a single.
© 2002, Cisco Systems, Inc. All rights reserved..
Chapter 9. Implementing Scalability Features in Your Internetwork.
© 2002, Cisco Systems, Inc. All rights reserved. 1 Determining IP Routes.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
Institute of Technology Sligo - Dept of Computing Sem 2 Chapter 12 Routing Protocols.
© 2002, Cisco Systems, Inc. All rights reserved. 1 Routing Overview.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Introduction to Dynamic Routing Protocol Routing Protocols and Concepts.
Routing and Routing Protocols
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
1 Version 3.1 Module 6 Routed & Routing Protocols.
1 7-Jan-16 S Ward Abingdon and Witney College Dynamic Routing CCNA Exploration Semester 2 Chapter 3.
CO5023 Single Area OSPF. Routing So far, we’ve looked at issues concerning the distribution and access layers. Routing is the process used to interconnect.
© 2002, Cisco Systems, Inc. All rights reserved..
 RIP — A distance vector interior routing protocol  IGRP — The Cisco distance vector interior routing protocol (not used nowadays)  OSPF — A link-state.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 Module 10 Routing Fundamentals and Subnets.
University of the Western Cape Chapter 12: Routing Protocols Interior and Exterior Routing Protocols Aleksandar Radovanovic.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
Sem 2 v2 Chapter 12: Routing. Routers can be configured to use one or more IP routing protocols. Two of these IP routing protocols are RIP and IGRP. After.
1 © 2004, Cisco Systems, Inc. All rights reserved. Introduction to Classless Routing.
Routing and Routing Protocols: Routing Static
© 2002, Cisco Systems, Inc. All rights reserved.
Chapter 4: Routing Concepts
CCNA 2 v3.1 Module 6 Routing and Routing Protocols
Chapter 3: Dynamic Routing
Routing Protocols and Concepts – Chapter 5
CCNA 3 v3 JEOPARDY Module 1 CCNA3 v3 Module 1 K. Martin.
Routing Protocols and Concepts – Chapter 5
Routing Protocols and Concepts – Chapter 5
Routing Protocols and Concepts – Chapter 5
© 2002, Cisco Systems, Inc. All rights reserved.
Presentation transcript:

Role of Router

The Router as a Perimeter Device  Usually the main function of a router is considered as the forwarding of packets between two network segments.  This is often forgotten when it is time to implement a security structure.  Many additional duties are thrust onto the router and, ultimately, performance suffers.  Routers, like computers, have processors, memory, and storage space.  You must consider these points when you're choosing a router for your specific network environment.

The Router as a Perimeter Device  Routers usually don't have much storage space available, and storage upgrades are at a premium.  When considering your design environment, think about the ramifications of implementing an external storage area for log files, configuration file backups, and operating software.  Most likely, the use Syslog for remote logging and Trivial File Transfer Protocol (TFTP) for the transfer of configuration files and operating software updates.

How Can You Tell Whether Your Router Is Overburdened? When your router is overtaxed, many strange things can happen. Packets can be dropped, things can pass that shouldn't, and so on. To check whether your router is overburdened, look at its processor utilization. With a Cisco router, you can do this with the following command: router#show processes cpu Following command shows your CPU usage in a graphical format for the past 60 seconds, the past 60 minutes, and the past 72 hours router#show proc cpu history Following commands shows how much memory each of the running router processes is using. router#sh proc memory

ROUTING  To begin routing in a simple environment, a router needs little configuration.  If you have two separate subnets that need to communicate, drop the router in and configure each connecting interface with an address for its attached network, make sure that routing is enabled.  The router knows the IP address of its two interfaces and can apply this knowledge to forward traffic sent from one network to the other.  Complexities begin to arise as network segments the router isn't directly connected to are added to the configuration.

ROUTING  in this case router must be told about networks with statements in its routing table. Such statements can be added manually by an administrator (static routes) or dynamically by updates from other routers.  Static routes are easy to configure in a small environment. On Cisco routers, configuration can be accomplished with a command such as the following: router_(config)#ip route

ROUTING  The ip route statement can also be used in circumstances in which hundreds of networks might be unknown to our router, such as for a connection to the Internet. for example: ip route gateway IP  Static routes offer a secure routing method for configuring a small environment, but what happens when we have 100 routers in our corporation? Do we want to program all the necessary static routes manually? Of course not! This is when dynamic routing protocols come into play.

ROUTING  Dynamic routing protocols allow properly configured routers to learn from each other about available routing paths. Protocols, such as Routing Information Protocol version 1 (RIPv1), Open Shortest Path First (OSPF), RIPv2, Interior Gateway Routing Protocol (IGRP), Enhanced Interior Gateway Routing Protocol (EIGRP), and so on.

Secure Dynamic Routing  One important part of keeping an environment that uses routing safe is secure implementation of dynamically updated routing protocols.  If Dynamic Routing Protocol are not configured correctly, these protocols can be an easily exploited security hole.  Some routing protocols use numbering schemes that require some knowledge of the specific details of your network's routing configuration to send acceptable routing updates. However, these numbers are transmitted in the clear (without encryption), so they can be sniffed.  In addition, often the numbers chosen are guessed easily and might not provide adequate protection.

Secure Dynamic Routing Following are the main configuration mechanism for secure dynamic route updating: 1. Route Authentication 2. Other Dynamic Routing Defenses

Route Authentication  Some dynamic routing protocols offer advanced protection known as route authentication.  On a Cisco router, the process of route authentication involves the use of a secret keyword that is configured into all routers that are to share their dynamic routing information.  This keyword, used in conjunction with the routing update information, generates a Message Digest 5 (MD5) hash signature to be sent with dynamic route updates.  If this hash information is not included with the updates or is incorrect, contacted routers will ignore the provided route information. Protocols that support routing authentication include RIPv2, OSPF, EIGRP, and BGP.

Route Authentication  Two dynamic routing protocols of note that don't support this feature are RIPv1 and IGRP.  Cisco routers have a feature that performs a simple check to help secure these two protocols. The validate-update-source command (which is configured by default) checks the source address of incoming RIP and IGRP updates to verify that they are from a neighboring device on the same  You could install route authentication on an OSPF routed network by using the command ip ospf message-digest-key 10 md5 secretkey

Route Authentication  You must enter previous command at the interface that will be propagating the routing updates.  10 is the key ID, which is a number that represents the unique secret key that you define, and secretkey is the actual key used to create the MD5 hashes that protect your routing updates.  The importance of the key ID value comes into play if you want to change keys in an active environment. You can simply add the new secretkey value in a similar statement with a different key ID number.  The router identifies that it has a new key and starts sending two routing updates: one with the new key value, and one with the original key value.

Route Authentication  To activate the MD5 authentication, use the statement area 0 authentication message-digest

Other Dynamic Routing Defenses  Another way you can be sure to prevent tampering with your route tables is by blocking updates from networks that are deemed unsafe.  For example, if you had an extranet connection to a customer, you might not want the customer's routers to have the ability to change the configuration of your routers (accidentally or on purpose).  You can configure the interface that connects your router to the customer's to deny routing updates.

Other Dynamic Routing Defenses  Cisco routers use the distribute-list command, which prevents the propagation, or the acceptance of specified route updates through configured interfaces.  For example, if you want to prevent outside routers from being able to make changes in routing information for a mission-critical network segment in your internal infrastructure, you can use distribute-list 112 in e1 Here, e1 is the interface that connects you to the outside routers, and 112 is an access control list (ACL) that defines the network address range of the mission-critical segment

Other Dynamic Routing Defenses  The access list can define ranges of allowed or disallowed IP routing information (depending on whether it is a permit or deny ACL).  In a similar manner, a distribute-list out command can be used to disallow the sending of route updates that include information on how to route traffic to your top-secret lab. The syntax is distribute-list 113 out e1

Other Dynamic Routing Defenses  To keep important details of your network infrastructure private, it may be necessary to prevent dynamic routing protocols from sharing internal route information with outsiders.  To accomplish this on a Cisco router, use the passive interface command to prevent the router from broadcasting route updates out of the specified interface. Its syntax is as follows: passive interface e1 In this case, e1 is the interface through which you want to disallow the sending of updates, while still accepting updates inbound.

Other Dynamic Routing Defenses  This command behaves in a slightly different manner with the EIGRP and OSPF routing protocols, by disallowing both the sending and receiving of routing information via the specified interface.