Chapter 3
Chapter 3
Network-related problems such as choppy VoIP audio, lagging video calls, and application
slowness negatively impact office productivity. In many cases, these problems are a result of
using the wrong network components or settings.
WHAT IS A ROUTER?
A router is a networking device that facilitates communication between computer networks. In
simple terms, a router makes it possible for the devices such as laptops, smartphones, etc. on
your local network to communicate with other networks such as the internet.
There are different types of routers but the most common ones are those that connect LANs
(local area networks) and WANs (wide area networks).
Routers serve two main functions, namely, they manage the traffic moving between networks by
forwarding data to the desired IP address, and they allow multiple devices to use the same
internet connection.
Typical home networks don’t need switches because, on a small scale, wireless routers also
function as switches. So if you compare a simple home network with a business network,
understanding the function of a switch can be a little difficult. For simplicity, we can say that
while the router connects your network to the internet, a switch connects the different devices
within your network.
Switches perform an important role in a network and without them building small business
networks would not be possible. By connecting together the network devices and enabling them
to communicate with each other, switches facilitate the sharing of resources such as printers,
servers, NAS, etc.
Devices connect to the network using a network interface card (NIC) and each NIC has a media
access code (MAC) address. Switches note the MAC address of all devices connected to the
network and use it to identify which devices are sending packets and where to deliver those
packets. Unlike IP addresses, which can be dynamically assigned and change over time, MAC
addresses are associated with the physical device and don’t change.
Network switches can operate OSI layer 2 (the data link layer) as well as layer 3 (the network
layer). Switches that operate in Layer 2 forward data based on the destination MAC address.
While switches that operate in layer 3 forward data based on the destination IP address. Some
switches can operate in both layers. Most switches are those that operate in layer 2 and are
connected to the devices in their networks using Ethernet cables.
Using network switches, you can easily create logical network segments and virtual LANs by
configuring groups of ports on the network switch to behave as a separate network. Switches
have built-in routing capabilities that enable traffic to get from one subnet to another. Network
switches are, therefore, necessary components of any modern business network.
Although managed network switches are more expensive, all of the functionalities it offers make
it a great choice for businesses that have large, or complex networks.
here’s how they are different- network switches connect devices while routers connect networks.
Therefore, while routers are necessary for an Internet connection, switches are only necessary for
interconnecting devices.
Most home and small office networks need routers for Internet access, but they do not need
network switches. However, large offices with hundreds of connected devices need a large
number of Ethernet ports, which makes switches a necessity.
Hub vs. Switch vs. Routers – Differences Discussed
As mentioned, hubs, routers and switches function differently, and can be used as individual
devices in a network. Sometimes, two or more of these are combined into a single device. This
section offers a clear comparison of hub vs switch, switch vs router, and hub vs router based on
various parameters.
Hub vs. Switch
A hub is quite primitive and works on the physical layer (which is layer 1) of open system
interconnection (OSI) model. This was widely used earlier when virtual connectivity was not
required. A switch, on the other hand, works on the data link layer (layer 2) of the OSI model.
While a hub can connect multiple Ethernet devices as a single segment, it cannot filter a data
packet and forward it to the right device or destination. It sends a data packet to all the devices
on the network, and the devices then filter and accept or reject that packet. A switch can identify
the destination by reading the header on the data packet. It forwards the message to the right
device.
A hub can connect two or more devices on LAN via Ethernet. However, a switch can join
multiple devices in one LAN.
The hub uses a half-duplex mode to exchange the data. A switch uses a half/full-duplex mode.
A hub transmits data in the form of an electrical signal or bits, while a switch sends it in the form
of frame and packet.
Figure 1 shows three devices connected to the Alpha subnet on the left, three devices connected
to the Beta subnet on the right, and a third subnet named Gamma that interconnects the left and
right subnets over a WAN link. Collectively, the six devices and three subnets are contained
within the larger class B network prefix. In this example, the organization is assigned the
network prefix 172.16/16, which is a class B address. Each subnet is assigned an IP address that
falls within this class B network prefix.
In addition to sharing the class B network prefix (the first two octets), each subnet shares the
third octet. Because we are using a /24 network mask in conjunction with a class B address, the
third octet identifies the subnet. All devices on a subnet must have the same subnet address. In
this case, the alpha subnet has the IP address 172.16.1.0/24, the beta subnet has the IP
address 172.16.2.0/24, and the Gamma subnet is assigned 172.16.10.10/24.
Taking one of these subnets as an example, the Beta subnet address 172.16.2.0/24 is represented
in binary notation as:
content_copy zoom_out_map
10101100 . 00010000 . 00000010 . xxxxxxxx
Because the first 24 bits in the 32-bit address identify the subnet, the last 8 bits are available to
assign to hosts attachments on each subnet. To reference a subnet, the address is written
as 172.16.10.0/24 (or just 172.16.10/24). The /24 indicates the length of the subnet mask
(sometimes written as 255.255.255.0). This network mask indicates that the first 24 bits identify
the network and subnetwork while the last 8 bits identify hosts on the respective subnetwork.
IPv4 Variable-Length Subnet Masks
Traditionally, subnets were divided by address class. Subnets had either 8, 16, or 24 significant
bits, corresponding to 224, 216, or 28 possible hosts. As a result, an entire /16 subnet had to be
allocated for a network that required only 400 addresses, wasting 65,136 (216 – 400 = 65,136)
addresses.
To help allocate address spaces more efficiently, variable-length subnet masks (VLSMs) were
introduced. Using VLSM, network architects can allocate more precisely the number of
addresses required for a particular subnet.
For example, suppose a network with the prefix 192.14.17/24 is divided into two smaller
subnets, one consisting of 18 devices and the other of 46 devices.
To accommodate 18 devices, the first subnet must have 25 (32) host numbers. Having 5 bits
assigned to the host number leaves 27 bits of the 32-bit address for the subnet. The IP address of
the first subnet is therefore 192.14.17.128/27, or the following in binary notation:
content_copy zoom_out_map
11000000 . 00001110 . 00010001 . 100xxxxx
The subnet mask includes 27 significant digits.
To create the second subnet of 46 devices, the network must accommodate 26 (64) host numbers.
The IP address of the second subnet is 192.14.17.64/26, or
content_copy zoom_out_map
11000000 . 00001110 . 00010001 . 01xxxxxx
By assigning address bits within the larger /24 subnet mask, you create two smaller subnets that
use the allocated address space more efficiently.
Understanding IPv6 Address Space, Addressing, Address Format, and Address Types
Understanding IP Version 6 (IPv6)
Understanding IPv6 Address Types and How Junos OS for SRX Series Services Gateway
Uses Them
IPv6 Address Scope
IPv6 Address Structure
Understanding IPv6 Address Space, Addressing, and Address Types
Understanding IPv6 Address Format
Understanding IP Version 6 (IPv6)
The ongoing expansive growth of the Internet and the need to provide IP addresses to
accommodate it—to support increasing numbers of new users, computer networks, Internet-
enabled devices, and new and improved applications for collaboration and communication—is
escalating the emergent use of a new IP protocol. IPv6, with its robust architecture, was designed
to satisfy these current and anticipated near future requirements.
IP version 4 (IPv4) is widely used throughout the world today for the Internet, intranets, and
private networks. IPv6 builds upon the functionality and structure of IPv4 in the following ways:
Provides a simplified and enhanced packet header to allow for more efficient routing.
Improves support for mobile phones and other mobile computing devices.
Enforces increased, mandatory data security through IPsec (which was originally
designed for it).
Provides more extensive quality-of-service (QoS) support.
IPv6 addresses consist of 128 bits, instead of 32 bits, and include a scope field that identifies the
type of application suitable for the address. IPv6 does not support broadcast addresses, but
instead uses multicast addresses for broadcast. In addition, IPv6 defines a new type of address
called anycast.
Understanding IPv6 Address Types and How Junos OS for SRX Series Services Gateway Uses
Them
IP version 6 (IPv6) includes the following types of addresses:
Unicast
A unicast address specifies an identifier for a single interface to which packets are delivered.
Under IPv6, the vast majority of Internet traffic is foreseen to be unicast, and it is for this reason
that the largest assigned block of the IPv6 address space is dedicated to unicast addressing.
Unicast addresses include all addresses other than loopback, multicast, link-local-unicast, and
unspecified.
For SRX Series Firewalls, the flow module supports the following kinds of IPv6 unicast packets:
Pass-through unicast traffic, including traffic from and to virtual routers. The
device transmits pass-through traffic according to its routing table.
Host-inbound traffic from and to devices directly connected to SRX Series
interfaces. For example, host-inbound traffic includes logging, routing protocol,
and management types of traffic. The flow module sends these unicast packets to
the Routing Engine and receives them from it. Traffic is processed by the Routing
Engine instead of by the flow module, based on routing protocols defined for the
Routing Engine.
The flow module supports all routing and management protocols that run on the Routing Engine.
Some examples are OSPFv3, RIPng, TELNET, and SSH.
Multicast
A multicast address specifies an identifier for a set of interfaces that typically belong to different
nodes. It is identified by a value of 0xFF. IPv6 multicast addresses are distinguished from unicast
addresses by the value of the high-order octet of the addresses.
The devices support only host-inbound and host-outbound multicast traffic. Host inbound traffic
includes logging, routing protocols, management traffic, and so on.
Anycast
An anycast address specifies an identifier for a set of interfaces that typically belong to different
nodes. A packet with an anycast address is delivered to the nearest node, according to routing
protocol rules.
There is no difference between anycast addresses and unicast addresses except for the subnet-
router address. For an anycast subnet-router address, the low order bits, typically 64 or more, are
zero. Anycast addresses are taken from the unicast address space.
The flow module treats anycast packets in the same way as it handles unicast packets. If an
anycast packet is intended for the device, it is treated as host-inbound traffic, and it delivers it to
the protocol stack which continues processing it.
[edit]
user@host# set interfaces ge-0/0/0 unit 0 family ?
Possible completions:
+ apply-groups Groups from which to inherit configuration data
+ apply-groups-except Don't inherit configuration data from these groups
> ccc Circuit cross-connect parameters
> ethernet-switching Ethernet switching parameters
> inet IPv4 parameters
> inet6 IPv6 protocol parameters
> iso OSI ISO protocol parameters
> mpls MPLS protocol parameters
> tcc Translational cross-connect parameters
> vpls Virtual private LAN service parameters
[edit]
user@host# set interfaces ge-0/0/0 unit 0 family inet6 address 8d8d:8d01::1/64
user@host# show interfaces
ge-0/0/0 {
unit 0 {
family inet {
address 10.100.37.178/24;
}
family inet6 {
address 8d8d:8d01::1/64;
}
}
}
This article will discuss the differences between network security devices – firewalls, Intrusion
Prevention Systems (IPS), and Intrusion Detection Systems (IDS). The major distinction is that a
firewall blocks and filters network traffic, but an IDS/IPS detects and alerts an administrator or
prevents the attack, depending on the setup.
A firewall permits traffic depending on a set of rules that have been set up. It is based on the
source, destination, and port addresses. A firewall can deny any traffic that does not satisfy the
specified criteria. IDS are passive monitoring system devices that monitor network traffic as they
travel over the network, compare signature patterns, and raise an alarm if suspicious activity or
known security threat is detected. On the other hand, IPS is an active device that prevents attacks
by blocking them.
Firewalls
A firewall employs rules to filter incoming and outgoing network traffic. It uses IP addresses and
port numbers to filter traffic. It can be set to either Layer 3 or transparent mode. The firewall
should be the first line of defense and installed inline at the network’s perimeter.
There are also different types of firewalls like proxy firewall, stateful inspection firewall, unified
threat management (UTM) firewall, next-generation firewall (NGFW), threat-focused NGFW,
Many organizations looking to improve their cybersecurity want to implement the best solution
without paying too much or spending vast amounts of time and energy setting it up.
That’s why many compare IDS vs. IPS vs. firewalls, to help themselves understand the
differences between these security approaches and identify which solutions are best for their
needs.
Fully understanding the benefits of each solution and (more importantly) how they work together
is critical in ensuring that your organization’s approach to cybersecurity is proactive against
threats without slowing down productivity.
IPS vs. IDS
On the surface, IPS and IDS systems look very similar. They are both responsible for overseeing
network traffic and monitoring for suspicious activity. They identify suspicious or anomalous
activity by reading a database of known threats and comparing incoming traffic to that
information.
However, IDS vs. IPS differs when it comes to what happens after a threat or suspicious activity
is identified.
IDS systems exist as a monitoring tool and are not capable of taking any action other than
reporting the threat. If any proactive action needs to be taken, it must be triggered by a
human who reads the system alert and decides what should be done next.
IPS systems make decisions about suspicious activity or traffic and subsequently take
action based on a set of rules. These rules typically come from a reliable external source,
allowing the system to act on its own based on the prescribed rules.
Comparing IPS vs. firewalls can be challenging since they both work to prevent bad actors from
entering a closed system. Both do this by comparing incoming traffic to pre-programmed
intelligence. However, there are critical differences in how they operate.
IPS systems or devices inspect traffic with the ultimate goal of identifying suspicious
patterns or signatures. If this pattern matches something that had already been identified
as suspicious, the system blocks the attack.
In contrast, a firewall filters traffic based on IP addresses without analyzing the broader
pattern. A firewall should always be the first line of defense against bad actors.
An IDS system exists to alert IT personnel and other stakeholders about potential
suspicious events. It does not block any traffic or provide protection itself.