0% found this document useful (0 votes)
26 views106 pages

Ch1-2-3 Introduction To TCP-IP Networking

This document serves as an introduction to TCP/IP networking, covering essential concepts such as IP networks, end devices, intermediary devices, and network topologies. It outlines the physical components of networks, including various types of media and devices like switches and routers, along with the OSI and TCP/IP models. Additionally, it discusses Ethernet fundamentals, including LAN types, Ethernet connection media, and the data link layer's role in network communication.

Uploaded by

Zaid Alkelani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views106 pages

Ch1-2-3 Introduction To TCP-IP Networking

This document serves as an introduction to TCP/IP networking, covering essential concepts such as IP networks, end devices, intermediary devices, and network topologies. It outlines the physical components of networks, including various types of media and devices like switches and routers, along with the OSI and TCP/IP models. Additionally, it discusses Ethernet fundamentals, including LAN types, Ethernet connection media, and the data link layer's role in network communication.

Uploaded by

Zaid Alkelani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 106

Chapter 1: Introduction to TCP/IP

Networking
Instructor Materials

CCNA R&S 200-301


What we will learn ?

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
What is IP Network?

It’s a group of components ( end devices,


intermediate devices , connectivity )
that connected together to provide a service
such :
- Easy sharing of files and data
- Easy sharing of expensive resources like
printers
- Voice
- Data
- VOIP
- IOT ( internet of Things)

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Physical Components of a Network

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
End Devices
An end device is where a message originates from or where it is received. Data originates with an
end device, flows through the network, and arrives at an end device.
- Computer
- Mobile
- IP CAM
- IP Phone
- Printers

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Intermediary Network Devices
An intermediary device interconnects end devices. Examples include switches, wireless
access points, routers, and firewalls.

Management of data as it flows through a network is also the role of an intermediary


device, including:
• Regenerate and retransmit data signals.
• Maintain information about what pathways exist in the network.
• Notify other devices of errors and communication failures.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Network Icons

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Switches
https://www.cisco.com/c/en/us/products/switches/index.ht
ml#~products

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Routers
https://www.cisco.com/c/en/us/products/routers/index.html#~products

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Firewalls/ NGFW / IPS
https://www.cisco.com/c/en/us/products/security/firewalls/index.html#~w
hy-cisco

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Firewalls/ WAF / IPS

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Access Point
https://www.cisco.com/c/en/us/products/wireless/index.html#~products

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
WLC – Wireless LAN Controller
https://www.cisco.com/c/en/us/products/wireless/index.html#~products

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
WLC – Wireless LAN Controller
- Physical

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
WLC – Wireless LAN Controller
- Cloud

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Network Media
Communication across a network is carried through a medium which allows a message to
travel from source to destination.

Media Types Description

Metal wires within cables Uses electrical impulses

Glass or plastic fibers Uses pulses of light.


within cables (fiber-optic
cable)

Wireless transmission Uses modulation of


specific frequencies of
electromagnetic waves.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Network Topologies :
How components are connected

Network diagrams, often called topology


diagrams, use symbols to represent
devices within the network.

Important terms to know include:


• Network Interface Card (NIC)
• Physical Port
• Interface

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Topology Diagrams
Point to Point : Ring by IBM:

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Topology Diagrams
Mesh : Bus:
a lot of network cards One Card for each Computer
One send all receive
A lot of collision (Network) and interference
(communication)

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Topology Diagrams
Star :
evolutions of intermediate Devices ( Hub , bridge , then
switches )
Hub : can’t understand MAC address and IP address

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Network Model

• It’s a group of concept that will help a


End
device to send data hop by hop and end to
end such :
hop hop
hop hop

• OSI Model : Open system interconnection


Developed by ISO OS IOS OS
• TCP/IP
Different OSs but install same
Network model

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Network Model
Network model consist of layers

• What is a layer ?
it’s a function that can be done either by S/W or H/W
• Why layered ?
cause all Functions are sequential

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Network Model
OSI Model

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Network Model
OSI Model vs TCP/IP

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Data Encapsulation

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Data De-Encapsulation

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Peer to Peer Communications

PDU : Protocol Data Unit

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Peer to Peer Communications
Encapsulating and De-Encapsulation

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Peer to Peer Communications
Encapsulating and De-Encapsulation

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Ch.2 Fundamentals of Ethernet
LANs

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
An Overview of LAN

Most enterprise computer networks can be separated into two general types
of technology: local-area networks (LANs) and wide-area networks (WANs).

LANs typically connect nearby devices: devices in the same room, in the
same building, or in a campus of buildings.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
LAN Components

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Small LAN vs Enterprise LAN

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Networks of Many Sizes
• Small Home Networks – connect a few
computers to each other and the Internet
• Small Office/Home Office – enables
computer within a home or remote office
to connect to a corporate network
Small Home SOHO • Medium to Large Networks – many
locations with hundreds or thousands of
interconnected computers
• World Wide Networks – connects
hundreds of millions of computers world-
wide – such as the internet

Medium/Large World Wide


© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Common Types of Networks
LANs and WANs
Network infrastructures vary greatly in
terms of:
• Size of the area covered
• Number of users connected
• Number and types of services
available
• Area of responsibility

Two most common types of networks:


• Local Area Network (LAN)
• Metropolitan Area Network (MAN)
• Wide Area Network (WAN).

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Common Types of Networks
LANs and WANs (cont.)
A LAN is a network infrastructure that spans A WAN is a network infrastructure that spans
a small geographical area. a wide geographical area.

LAN WAN
Interconnect end devices in a limited area. Interconnect LANs over wide geographical areas.
Administered by a single organization or Typically administered by one or more service
individual. providers.
Provide high-speed bandwidth to internal Typically provide slower speed links between LANs.
devices.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Physical Layer = Layer1

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Physical Layer = Layer 1

Physical Layer

Layer 1 devices
Cables Cards Connectors
Hub, repeater (its regenerate the signal),
SFPs
CSU/DSU

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Ethernet Connection Media

- Copper

- Fiber

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Ethernet Connection Media
- Copper

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Types of Ethernet LAN

Wave2 : up
to 2.5 G

1G
- Ethernet 1970s : 10Mbps

- Fast Ethernet : 100Mbps

- Giga Ethernet : 1000Mbps (2000) up to 100m


- Ten Giga Ethernet:10GMbps (2010)

- 100 Giga Ethernet : 2015

- WIFI ( Wireless Ethernet ) : up to 2.5 Gbps

- Multigig switches 1g, 2.5G , 5G and 10G


© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Ethernet Connection Media
- Copper Cable with Wires Inside , 100Mbps

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Ethernet Connection Media
- Copper Cable with Wires Inside

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Ethernet Connection Media
- Copper Cable with Wires Inside

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Ethernet Connection Media
- RJ-45 Connector and Jack

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Ethernet Connection Media
- Optical Fiber

For short distance up to 600M For long distance up to 15Km

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Ethernet Connection Media
- Fiber Connection Types

Lucent Connector (LC) Simplex Connectors


Straight-Tip (ST) Connectors

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47

Subscriber Connector (SC) Connectors Duplex Multimode LC Connectors


Fiber-Optic Cabling
Fiber Patch Cords

SC-SC MM Patch Cord LC-LC SM Patch Cord ST-LC MM Patch Cord ST-SC SM Patch Cord

A yellow jacket is for single-mode fiber cables and orange (or aqua) for multimode fiber
cables.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Ethernet Connection Media
- Fiber : 10G SFP+
- Copper : 1G SFP

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Hub
- Hubs are “dumb” devices that pass anything
received on one connection to all other connections
(flood).

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Data Link Layer = Layer2

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Data-Link Layer = Layer 2

Data Link Layer

Layer 2 Device
MAC Address MAC Frame Bridge , Switch

Max number of bridge ports is 16 cause can’t handle more than


16 frames = operates by software

Switch operates by ASIC (Hardware)


© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Purpose of the Data Link Layer
The Data Link Layer
• The Data Link layer is responsible for
communications between end-device
network interface cards.
• It allows upper layer protocols to access
the physical layer media and
encapsulates Layer 3 packets (IPv4 and
IPv6) into Layer 2 Frames.
• It also performs error detection and
rejects corrupts frames.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
IEEE 802 LAN/MAN Data Link Sublayers
IEEE 802 LAN/MAN standards are specific to
the type of network (Ethernet, WLAN, WPAN,
etc).

The Data Link Layer consists of two


sublayers. Logical Link Control (LLC) and
Media Access Control (MAC).
• The LLC sublayer communicates
between the networking software at the
upper layers and the device hardware at
the lower layers.
• The MAC sublayer is responsible for
data encapsulation and media access
control.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Purpose of the Data Link Layer
IEEE 802 LAN/MAN Data Link Sublayers

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Ethernet Frame Structure

- SFD: Start frame Delimiter


- FCS: Frame Check Sequence , check errors via CRC (cycle
redundancy check)
It also performs error detection and rejects corrupts frames.

- Type : type of Packet , IPV4 or IPV6

Max frame size= 1518


Min frame size = 64
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Ethernet Addressing ( MAC Addressing )

It is a 48 bit address burn on ROM


of NIC, It is used to send Data
hop to hop And represent
in Hexadecimal

1 Hex = 4 bit = 48 bit = 12 Hex

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Ethernet Addressing

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Ethernet Addressing

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Type of Destination MAC

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
Type of Destination MAC (cont.)

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Hub disadvantages
- Half Duplex mode:

https://www.youtube.com/watch?v=LMR
SS7ZYM50&t=202s

- collision domain:

https://www.youtube.com/watch?v=iKn0
GzF5-IU&t=132s

. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
Half and Full Duplex Communication

Half-duplex communication
• Only allows one device to send or receive at a time on a shared medium.
• Used on WLANs and legacy bus topologies with Ethernet hubs.

Full-duplex communication
• Allows both devices to simultaneously transmit and receive on a shared medium.
• Ethernet switches operate in full-duplex mode.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
Half and Full Duplex Communication

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
Half and Full Duplex Communication

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
Half and Full Duplex Communication

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67
Half and Full Duplex Communication

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68
Half and Full Duplex Communication

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69
Access Control Methods

Contention-based access
All nodes operating in half-duplex, competing for use of the medium. Examples are:
• Carrier sense multiple access with collision detection (CSMA/CD) as used on legacy
bus-topology Ethernet.
• Carrier sense multiple access with collision avoidance (CSMA/CA) as used on
Wireless LANs.

Controlled access
• Deterministic access where each node has its own time on the medium.
• Used on legacy networks such as Token Ring and ARCNET.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70
Contention-Based Access – CSMA/CD

CSMA/CD
• Used by legacy Ethernet LANs ( hub).
• Operates in half-duplex mode where only one device sends or receives at a time.
• Uses a collision detection process to govern when a device can send and what
happens if multiple devices send at the same time.

CSMA/CD collision detection process:


• Devices transmitting simultaneously will result in a signal collision on the shared
media.
• Devices detect the collision.
• Devices wait a random period of time and retransmit data.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71
Contention-Based Access – CSMA/CA

CSMA/CA
• Used by IEEE 802.11 WLANs.
• Operates in half-duplex mode where only one device sends or receives at a time.
• Uses a collision avoidance process to govern when a device can send and what
happens if multiple devices send at the same time.

CSMA/CA collision avoidance process:


• When transmitting, devices also include the time duration needed for the
transmission.
• Other devices on the shared medium receive the time duration information and know
how long the medium will be unavailable.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 72
Need For Switches
A collision domain: the part of a network
where packet collisions can occur. A collision
occurs when two devices send a packet at
the same time on the shared network
segment.

Collisions are often in a hub environment,


because each port on a hub is in the same
collision domain. By contrast, each port on a
bridge, a switch or a router is in a separate
collision domain.

The Solution to avoid collision in Network


is via Switch
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73
Need For Switches

A Broadcast domain : is the domain in


which a broadcast is forwarded on the
shared network segment.

All ports on a hub or a switch are by default


in the same broadcast domain. All ports on a
router are in the different broadcast domains
and routers don’t forward broadcasts from
one broadcast domain to another.

The Solution to avoid Broadcast in


Network is via VLAN

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74
Switches Functions and Operations
LAN Switch Function:

- Learning : it is forming MAC table by checking Source MAC Address in


incoming frames
- Forwarding : by checking destination MAC address
- Prevent L2 Loops : Spanning Tree Protocol

LAN Switch Modes:

- Cut through
- Store and forward
- Adaptive cut through / Fragment free Switching

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 75
Switches Functions and Operations (Learning)

Example : PCA to communicate with PCB

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 76
Switches Functions and Operations (Learning)

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77
Switches Functions and Operations (Forwarding)

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 78
Switches Functions and Operations (Forwarding)

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79
Switches Functions and Operations

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 80
Switches Functions and Operations

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81
Switches Functions and Operations
MAC table : store in RAM for 5 minutes by default

CAM - Content Addressable Memory, referring to the memory used for the
MAC address table.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 82
Layer 2 and Layer 3 ( Multilayer ) Switches

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83
fixed Switches , Modular Switches and Stackable Switches

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 84
fixed Switches , Modular Switches and Stackable Switches

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85
Chapter 3: Fundamentals of WANs
and IP Routing
why are WANs Needed?

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 87
WAN Devices

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 88
WAN Traffic

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 89
WAN Devices

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 90
WAN Devices

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 91
WAN Link Options

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 92
WAN Layer2 Protocols

MPLS over Ethernet

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 93
Common Types of Networks
WAN Connections
- DSL card (Digital Subscriber Line) : up to 7Km Public WAN

- X.25

- Frame Relay

- ATM ( Asynchronous Transfer media ) Private WAN


- PPP

- HDLC up to 15000Km

- MPLS

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 94
The Converging Network

Before converged networks, an


organization would have been
separately cabled for telephone, video,
and data. Each of these networks
would use different technologies to
carry the signal.
Each of these technologies would use a
different set of rules and standards.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 95
Internet Connections
The Converging Network (Cont.)
Converged data networks carry
multiple services on one link including:
• data
• voice
• video
Converged networks can deliver data,
voice, and video over the same
network infrastructure. The network
infrastructure uses the same set of
rules and standards.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 96
Reliable Network
Network Architecture
Network Architecture refers to the
technologies that support the infrastructure
that moves data across the network.
There are four basic characteristics that the
underlying architectures need to address to
meet user expectations:
• Fault Tolerance
• Scalability
• Quality of Service (QoS)
• Security

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 97
Reliable Network
Fault Tolerance
A fault tolerant network limits the impact of
a failure by limiting the number of affected
devices. Multiple paths are required for
fault tolerance.
Reliable networks provide redundancy by
implementing a packet switched network:
• Packet switching splits traffic into
packets that are routed over a network.
• Each packet could theoretically take a
different path to the destination.
This is not possible with circuit-switched
networks which establish dedicated
circuits.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 98
Reliable Network
Scalability

A scalable network can expand


quickly and easily to support
new users and applications
without impacting the
performance of services to
existing users.
Network designers follow
accepted standards and
protocols in order to make the
networks scalable.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 99
Reliable Network
Quality of Service
Voice and live video transmissions
require higher expectations for those
services being delivered.

Have you ever watched a live video with


constant breaks and pauses? This is
caused when there is a higher demand
for bandwidth than available – and QoS
isn’t configured.
• Quality of Service (QoS) is the primary
mechanism used to ensure reliable
delivery of content for all users.
• With a QoS policy in place, the router
can more easily manage the flow of
data and voice traffic.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 100
Reliable Network There are two main types of network
Network Security security that must be addressed:
• Network infrastructure security
• Physical security of network devices
• Preventing unauthorized access to
the devices
• Information Security
• Protection of the information or data
transmitted over the network
Three goals of network security:
• Confidentiality – only intended
recipients can read the data
• Integrity – assurance that the data
has not be altered with during
transmission
• Availability – assurance of timely and
reliable access to data for authorized
users© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 101
Network Security
Security Threats • Network security is an integral
part of networking regardless of
the size of the network.
• The network security that is
implemented must take into
account the environment while
securing the data, but still
allowing for quality of service that
is expected of the network.
• Securing a network involves
many protocols, technologies,
devices, tools, and techniques in
order to secure data and mitigate
threats.
• Threat vectors might be external
or internal.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 102
Network Security
External Threats:
Security Threats (Cont.)
• Viruses, worms, and Trojan
horses
• Spyware and adware
• Zero-day attacks
• Threat Actor attacks
• Denial of service attacks
• Data interception and theft
• Identity theft

Internal Threats:
• lost or stolen devices
• accidental misuse by employees
• malicious employees
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 103
Network Security
Security Solutions
Security must be implemented in multiple
layers using more than one security solution.
Network security components for home or
small office network:
• Antivirus and antispyware software
should be installed on end devices.
• Firewall filtering used to block
unauthorized access to the network.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 104
Network Security
Security Solutions (Cont.)

Larger networks have additional security


requirements:
• Dedicated firewall system
• Access control lists (ACL)
• Intrusion prevention systems (IPS)
• Virtual private networks (VPN)
The study of network security starts with a clear
understanding of the underlying switching and
routing infrastructure.

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 105

You might also like