Notes Class 7
Notes Class 7
End Devices
The network devices that people are most familiar with are end devices. To
distinguish one end device from another, each end device on a network has an
address. When an end device initiates communication, it uses the address of the
destination end device to specify where to deliver the message.
Check the video in the PPT file to see an animation of data flowing through a
network.
Watch the video in the PPT file to learn more about end devices.
Routers
Routers are devices that operate at the OSI network layer (Layer 3). Routers are
used to interconnect remote sites. They use the process of routing to forward data
packets between networks. The routing process uses network routing tables,
protocols, and algorithms to determine the most efficient path for forwarding an IP
packet. Routers gather routing information and update other routers about
changes in the network. Routers increase the scalability of networks by
segmenting broadcast domains.
Routers have two primary functions: path determination and packet forwarding. To
perform path determination, each router builds and maintains a routing table which
is a database of known networks and how to reach them. The routing table can be
Check the video in the PPT file to see an animation of routers R1 and R2 receiving
a packet from one network and forwarding the packet toward the destination
network.
After the router has determined the exit interface using the path determination
function, the router must encapsulate the packet into the data link frame of the
outgoing interface.
What does a router do with a packet received from one network and destined for
another network? The router performs the following three major steps:
Now that the router has determined the best path for a packet based on the longest
match, it must determine how to encapsulate the packet and forward it out the
correct egress interface.
Check the image in the PPT file to knows how a router determines the best path
to use to forward a packet.
The following steps describe the packet forwarding process shown in the
mentioned image:
Routing Information
• Directly connected routes - These routes come from the active router
interfaces. Routers add a directly connected route when an interface is
configured with an IP address and is activated.
• Remote routes - These are remote networks connected to other routers.
Routes to these networks can either be statically configured or dynamically
learned through dynamic routing protocols.
Specifically, a routing table is a data file in RAM that is used to store route
information about directly connected and remote networks. The routing table
contains network or next hop associations. These associations tell a router that a
particular destination can be optimally reached by sending the packet to a specific
router that represents the next hop on the way to the final destination. The next
hop association can also be the outgoing or exit interface to the next destination.
The destination network entries in the routing table can be added in several ways:
Dynamic routing protocols have been used in networks since the late 1980s. One
of the first routing protocols was RIP. RIPv1 was released in 1988. As networks
evolved and became more complex, new routing protocols emerged. The RIP
protocol was updated to RIPv2 to accommodate growth in the network
environment. However, RIPv2 still does not scale to the larger network
implementations of today. To address the needs of larger networks, two advanced
routing protocols were developed: Open Shortest Path First (OSPF) and
Intermediate System-to-Intermediate System (IS-IS). Cisco developed the Interior
Gateway Routing Protocol (IGRP) and Enhanced IGRP (EIGRP), which also
scales well in larger network implementations.
Additionally, there was the need to connect different internetworks and provide
routing between them. The Border Gateway Protocol (BGP) is now used between
Internet Service Providers (ISPs). BGP is also used between ISPs and their larger
private clients to exchange routing information.
The table 1 classifies the protocols. Routers configured with these protocols will
periodically send messages to other routers. As a cybersecurity analyst, you will
see these messages in various logs and packet captures.
Watch the video in the PPT file to learn about static and dynamic routing.
Bridges have two interfaces and are connected between hubs to divide the network
into multiple collision domains. Each collision domain can have only one sender at
a time. Collisions are isolated by the bridge to a single segment and do not impact
devices on other segments. Just like a switch, a bridge makes forwarding decisions
based on Ethernet MAC addresses. Bridges are seldom used in modern networks.
LAN switches are essentially multiport bridges that connect devices into a star
topology. Like bridges, switches segment a LAN into separate collision domains,
one for each switch port. A switch makes forwarding decisions based on Ethernet
MAC addresses. The figure shows the Cisco series of 2960-X switches that are
commonly used to connect end devices on a LAN.
Switching Operation
LAN switches determine how to handle incoming data frames by maintaining the
MAC address table. A switch builds its MAC address table by recording the MAC
address of each device that is connected to each of its ports. The switch uses the
information in the MAC address table to send frames destined for a specific device
out of the port to which the device is connected.
The following two-step process is performed on every Ethernet frame that enters
a switch.
If the destination MAC address is a unicast address, the switch will look for a match
between the destination MAC address of the frame and an entry in its MAC
address table. If the destination MAC address is in the table, it will forward the
frame out the specified port. If the destination MAC address is not in the table, the
switch will forward the frame out all ports except the incoming port, as shown in
the figure. This is called an unknown unicast.
A switch can have multiple MAC addresses associated with a single port. This is
common when the switch is connected to another switch. The switch will have a
separate MAC address table entry for each frame received with a different source
MAC address.
Watch the video in the PPT file to see a demonstration of how two connected
switches build their MAC address tables.
VLANs
VLANs also prevent users on different VLANs from snooping on each other’s
traffic. For example, even though HR and Sales are connected to the same switch
in the figure, the switch will not forward traffic between the HR and Sales VLANs.
This allows a router or another device to use access control lists to permit or deny
the traffic. Access lists are discussed in more detail later in the chapter. For now,
just remember that VLANs can help limit the amount of data visibility on your LANs.
STP
Multiple paths need to be managed so that Layer 2 loops are not created. The best
paths are chosen, and an alternate path is immediately available should a primary
path fail. The Spanning Tree Protocol is used to maintain one loop-free path in the
Layer 2 network, at any time.
STP ensures that there is only one logical path between all destinations on the
network by intentionally blocking redundant paths that could cause a loop. A port
is considered blocked when user data is prevented from entering or leaving that
port. This does not include bridge protocol data unit (BPDU) frames that are used
by STP to prevent loops. Blocking the redundant paths is critical to preventing
loops on the network. The physical paths still exist to provide redundancy, but
these paths are disabled to prevent the loops from occurring. If the path is ever
needed to compensate for a network cable or switch failure, STP recalculates the
paths and unblocks the necessary ports to allow the redundant path to become
active.
Wireless Communications
Watch the video in the PPT file to learn about Wireless LAN (WLAN) operation.
WLANs use Radio Frequencies (RF) instead of cables at the physical layer and
MAC sublayer of the data link layer. WLANs share a similar origin with Ethernet
LANs. The IEEE has adopted the 802 LAN/MAN portfolio of computer network
architecture standards. The two dominant 802 working groups are 802.3 Ethernet,
which defined Ethernet for wired LANs, and 802.11 which defined Ethernet for
WLANs. There are important differences between the two.
• WLANs connect clients to the network through a wireless access point (AP)
or wireless router, instead of an Ethernet switch.
• WLANs connect mobile devices that are often battery powered, as opposed
to plugged-in LAN devices. Wireless NICs tend to reduce the battery life of
a mobile device.
• WLANs support hosts that contend for access on the RF media (frequency
bands). 802.11 prescribes collision-avoidance (CSMA/CA) instead of
collision-detection (CSMA/CD) for media access to proactively avoid
collisions within the media.
• WLANs use a different frame format than wired Ethernet LANs. WLANs
require additional information in the Layer 2 header of the frame.
• WLANs raise more privacy issues because radio frequencies can reach
outside the facility.
Frame Structure
The 802.11 frame format is similar to the Ethernet frame format, except that it
contains more fields.
• Frame Control - This identifies the type of wireless frame and contains
subfields for protocol version, frame type, address type, power
management, and security settings.
• Duration - This is typically used to indicate the remaining duration needed
to receive the next frame transmission.
• Address1 - This usually contains the MAC address of the receiving wireless
device or AP.
CSMA/CA
WLANs are half-duplex, shared media configurations. Half-duplex means that only
one client can transmit or receive at any given moment. Shared media means that
wireless clients can all transmit and receive on the same radio channel. This creates
a problem because a wireless client cannot hear while it is sending, which makes it
impossible to detect a collision.
To resolve this problem, WLANs use carrier sense multiple access with collision
avoidance (CSMA/CA) as the method to determine how and when to send data on the
network. A wireless client does the following:
1. Listens to the channel to see if it is idle, which means that is senses no other
traffic is currently on the channel. The channel is also called the carrier.
2. Sends a ready to send (RTS) message to the AP to request dedicated access
to the network.
3. Receives a clear to send (CTS) message from the AP granting access to send.
4. If the wireless client does not receive a CTS message, it waits a random
amount of time before restarting the process.
5. After it receives the CTS, it transmits the data.
6. All transmissions are acknowledged. If a wireless client does not receive an
acknowledgment, it assumes a collision occurred and restarts the process.
For wireless devices to communicate over a network, they must first associate with an
AP or wireless router. An important part of the 802.11 process is discovering a WLAN
and subsequently connecting to it. Wireless devices complete the following three
stage process.
• Discover a wireless AP
• Authenticate with AP
• Associate with AP
• SSID -The SSID name appears in the list of available wireless networks on a
client. In larger organizations that use multiple VLANs to segment traffic, each
SSID is mapped to one VLAN. Depending on the network configuration, several
APs on a network can share a common SSID.
• Password - This is required from the wireless client to authenticate to the AP.
• Network mode - This refers to the 802.11a/b/g/n/ac/ad WLAN standards. APs
and wireless routers can operate in a Mixed mode meaning that they can
simultaneously support clients connecting via multiple standards.
• Security mode - This refers to the security parameter settings, such as WEP,
WPA, or WPA2. Always enable the highest security level supported.
• Channel settings - This refers to the frequency bands used to transmit
wireless data. Wireless routers and APs can scan the radio frequency channels
and automatically select an appropriate channel setting. The channel can also
be set manually if there is interference with another AP or wireless device.
In active mode, wireless clients must know the name of the SSID. The wireless client
initiates the process by broadcasting a probe request frame on multiple channels.
The probe request includes the SSID name and standards supported. APs
configured with the SSID will send a probe response that includes the SSID,
supported standards, and security settings. Active mode may be required if an AP or
wireless router is configured to not broadcast beacon frames.
A wireless client could also send a probe request without a SSID name to discover
nearby WLAN networks. APs configured to broadcast beacon frames would respond
to the wireless client with a probe response and provide the SSID name. APs with
the broadcast SSID feature disabled do not respond.
All of the control and management functions of the APs on a network can be
centralized into a Wireless LAN Controller (WLC). When using a WLC, the APs no
longer act autonomously, but instead act as lightweight APs (LWAPs). LWAPs only
forward data between the wireless LAN and the WLC. All management functions, such
as defining SSIDs and authentication are conducted on the centralized WLC rather
than on each individual AP. A major benefit of centralizing the AP management
functions in the WLC is simplified configuration and monitoring of numerous access
points, among many other benefits.
Network Representations
Network Representations
Network architects and administrators must be able to show what their networks
will look like. They need to be able to easily see which components connect to
other components, where they will be located, and how they will be connected.
Diagrams of networks often use symbols to represent the different devices and
connections that make up a network.
Image shows symbols used in network diagrams. At the top are the following end
devices: desktop computer, laptop, printer, IP phone, wireless tablet, and
TelePresence endpoint. In the middle are the following intermediary devices:
wireless router, LAN switch, router, multilayer switch, and firewall appliance. At the
bottom are the following network media: blue waves depicting wireless media, a
solid black line depicting LAN media, and a red lighting bolt depicting WAN media.
• Network Interface Card (NIC) - A NIC physically connects the end device
to the network.
Note: The terms port and interface are often used interchangeably.
Topology Diagrams
The topologies shown in the physical and logical diagrams are appropriate for your
level of understanding at this point in the course. Search the internet for “network
topology diagrams” to see some more complex examples.
The two most common types of network infrastructures are Local Area Networks
(LANs), and Wide Area Networks (WANs). A LAN is a network infrastructure that
provides access to users and end devices in a small geographical area. A LAN is
typically used in a department within an enterprise, a home, or a small business
network. A WAN is a network infrastructure that provides access to other networks
LANs
A LAN is a network infrastructure that spans a small geographical area. LANs have
specific characteristics:
WANs
A WAN is a network infrastructure that spans a wide geographical area. WANs are
typically managed by service providers (SPs) or Internet Service Providers (ISPs).
WANs interconnect LANs over wide geographical areas such as between cities,
states, provinces, countries, or continents.
The campus wired LAN uses a hierarchical design model to separate the network
topology into modular groups or layers. Separating the design into layers allows
each layer to implement specific functions, which simplifies the network design.
This also simplifies the deployment and management of the network.
Even though the hierarchical model has three layers, some smaller enterprise
networks may implement a two-tier hierarchical design. In a two-tier hierarchical
design, the core and distribution layers are collapsed into one layer, reducing cost
and complexity.
The public network (or outside network) is untrusted, and the private network (or
inside network) is trusted.
A demilitarized zone (DMZ) is a firewall design where there is typically one inside
interface connected to the private network, one outside interface connected to the
public network, and one DMZ interface.
Security Devices
Watch the video in the PPT file to learn more about security devices.
Firewall
A firewall is a system, or group of systems, that enforces an access control policy between
networks.
Properties
Benefits
Limitations
IDS and IPS technologies are both deployed as sensors. An IDS or IPS sensor
can be in the form of several different devices:
Types of IPS
There are two primary kinds of IPS available: host-based IPS and network-
based IPS.
Host-based IPS
Network-based IPS
Security Devices
Watch the video in the PPT file to learn more about security services.
In addition to either permitting or denying traffic, ACLs can be used for selecting
types of traffic to be analyzed, forwarded, or processed in other ways. For
example, ACLs can be used to classify traffic to enable priority processing. This
capability is similar to having a VIP pass at a concert or sporting event. The VIP
pass gives selected guests privileges not offered to general admission ticket
holders, such as priority entry or being able to enter a restricted area.
SMTP
The Management Information Base (MIB) is a database on the agents that stores
data and operational statistics about the device.
The SNMP manager is part of a network management system (NMS). The SNMP
manager runs SNMP management software. The SNMP manager can collect
information from an SNMP agent by using the “get” action and can change
configurations on an agent by using the “set” action. In addition, SNMP agents can
forward information directly to a network manager by using “traps”.
NTP
It is important to synchronize the time across all devices on the network because
all aspects of managing, securing, troubleshooting, and planning networks require
accurate and consistent timestamping. When the time is not synchronized between
devices, it will be impossible to determine the order of the events that have
occurred in different parts of the network.
Typically, the date and time settings on a network device can be set using one of
two methods:
A better solution is to configure the NTP on the network. This protocol allows
routers on the network to synchronize their time settings with an NTP server. A
group of NTP clients that obtain time and date information from a single source
have more consistent time settings. When NTP is implemented in the network, it
NTP networks use a hierarchical system of time sources. Each level in this
hierarchical system is called a stratum. The stratum level is defined as the number
of hop counts from the authoritative source. The synchronized time is distributed
across the network using NTP.
• Stratum 0 - An NTP network gets the time from authoritative time sources.
These authoritative time sources, also referred to as stratum 0 devices, are
high-precision timekeeping devices assumed to be accurate and with little
or no delay associated with them.
• Stratum 1 - The stratum 1 devices are directly connected to the
authoritative time sources. They act as the primary network time standard.
• Stratum 2 and lower strata - The stratum 2 servers are connected to
stratum 1 devices through network connections. Stratum 2 devices, such as
NTP clients, synchronize their time using the NTP packets from stratum 1
servers. They could also act as servers for stratum 3 devices.
Smaller stratum numbers indicate that the server is closer to the authorized time
source than larger stratum numbers. The larger the stratum number, the lower the
stratum level. The max hop count is 15. Stratum 16, the lowest stratum level,
indicates that a device is unsynchronized. Time servers on the same stratum level
can be configured to act as a peer with other time servers on the same stratum
level for backup or verification of time.
VPN
A VPN is a private network that is created over a public network, usually the
internet.
A VPN is virtual in that it carries information within a private network, but that
information is actually transported over a public network. A VPN is private in that
In the simplest sense, a VPN connects two endpoints, such as a remote office to
a central office, over a public network, to form a logical connection. The logical
connections can be made at either Layer 2 or Layer 3. Common examples of Layer
3 VPNs are GRE, Multiprotocol Label Switching (MPLS), and IPsec. Layer 3 VPNs
can be point-to-point site connections, such as GRE and IPsec, or they can
establish any-to-any connectivity to many sites using MPLS.
IPsec is a suite of protocols developed with the backing of the IETF to achieve
secure services over IP packet-switched networks.