Networking Notes
Networking Notes
Security;
-Is the state to be free from danger zones.
Network security
- Is the state of network to be free from threat. E.g. malware, cyber
attacker, unauthorized access;
Security issues
Authentication
-Is the process of identifying the user.
Data confidentiality(privacy)
Data integrity(no modification)
-refer to the accuracy, consistency and reliability of data thought its lifecycle.
DoS (denial of services)
NETWORK VULNERABILITY; extent degree of weakness of a network and users
1) Technological vulnerabilities:
2) Configuration weakness:
Use of easily guessed password
Use of default settings
Unencrypted storage
3) ICT Policy
Procurement of ICT equipment tools
Deployment
Maintenance
ICT security
Backup and recovery
Disaster recovery
Disposal of ICT equipment
Acceptable user
Weak policy
Hidden policy
4) Implementation failure
Low budget/lack of resources
Lack of skilled ICT personnel/lack of technical experts
Institution politics/lack of government support
Ignorance/lack of awareness
Poor infrastructure
5) Absence of policy
THREATS; is a person or thing that is capable of using the vulnerabilities to launch an attack
1. Physical threats;
-Theft and vandalism; distraction is not accentual destroy the infrastructure
2. Electrical threats; fluctuations, and cutoff
-may lead to burning if electricity is high
-may lead to poor functionality of an equipment’s if electricity is low
3. Environmental threats; e.g. rainfall, sun rays, humidity, dust
4. Maintenance threats; expose the system to the personal who are not interested
2. Malware attack
-viruses; attack the executable files of the computer
TYPES OF SECURITY
1. Firewall security
-a set of tools and processes that limit access to resources, such as networks,
applications, and other assets.
-It's a key component of data security and privacy, and can be used to protect
sensitive information, such as health records or cardholder data. E.g.
- Port security
5. Application security
- is the use of measures to protect people, property, and assets from harm or loss. It
involves preventing unauthorized access to facilities, equipment, and resources.
-Physical security can also include protecting against damage, theft, vandalism,
natural disasters, and other threats.
1. access
2. Distribution
3. core
1. Access
- It’s a layer containing end user devices
- Wireless access points are also found layer
2. Distribution layer
- Aggregate traffics from access layer to core
- Security policies are implemented (firewall)
- It containing redundant pairs of switches
3. Core
- Aggregate traffics from distribution layer to the external
network
- The switches in this layer are in redundant pair
Switch features
1. Access layer
- Power over Ethernet(PoE)
2. Port security
3. VLAN
-should support VLAN. Is logical grouping of devices on a network, regardless of their physical
location.
Are powerful tool for network administrators to improve security, performance and manageability
4. Port speed
- In access layer required port speed with fast Ethernet speed –
100mbps
- Is standard for most local area networks (LAN)
5. Port aggregation.
- Allow the speed of unused ports to be accessed by the port in
use;
Unused port speed dedicate nits port speed to used port to
increase speed
6. Quality of services(QS)
- Should support both data and video and provide priority to the
traffic particularly video and provide priority to the traffic
particularly video/audio
- Switch should provide high priority for data required high
bandwidth to reduce delay time.
2. Distribution switch features
a) Inter VLAN routing
- should be able to forward traffics between different VLANs
b) Should support security policy access control list (ACL) firewall.
c) Should be a layer 1 and 2 functionality
Layer 1-pc
Layer 2- switch
Layer 3 router
- Switch functioning like router.
d) Port speed.
It require high port speed with at least high bits or 10 high bits port speed.
e) High forward rates
- Switch with high capacity in forwarding the packets transmitted.
f) Link aggregation/port aggregation
g) Quality of services
3. Core switch features
a) Inter VLAN routing
b) Should be a layer 3 switch
c) Port speed
d) Higher forward rates than in distributed switch
e) Link aggregation
f) Quality of services
VLAN
Virtual Local Area Network, is the logical separation of the same physical network infrastructure
to behaves as separate networks
Aims/Objectives of VlAN
i) Enhanced security
By default pc available in separate network cannot communicate. Through IP
Isolation; VLAN isolate network traffics, preventing unauthorized access to sensitive data
and limit. The spread of malware within the network e.g. VLAN for guest Wi-Fi can be
separated from the internal network, restricting access to critical resources
Controlled access; by defining which devices can communicate with a VLAN,
administrator can control access to specific network resources and enforce security policies
ii) Improve performance;
- Due to limited broadcast domain; all broadcast occur in a
specific VLAN group not in a LAN.
. Reduce broadcast traffic: VLAN significantly reduce the
amount of broadcast traffics on the network. Broadcast traffic
sent to all devices on a network segment.
So by segmenting the network, broadcast traffic VLAN
minimizing its impact on other parts of the network.
iii) Simplify network management
iv) Cost
Server
- Is a device or application that provides services, resources or
data to other machines added client?
Common features/ x’stics of computer server/ server machine
Question
Factor that ensures server machine services reliability
i.) Reality refers to a systems ability to operate continuously without failure and to
maintain data integrity. While
System availability ; refer to ability of a system to recover to an operation state
after failure, with minimal impacts
i.) Redundancy
ii.) Regular maintenance and update
iii.) Robust security measures
iv.) Scalability
v.) Monitoring and Alerting
vi.) Disaster recovery planning
vii.) Qualified personnel
viii.) Environmental control
Functionality provided to user account includes set password expire data, block account
etc.
iii) Provides remote access includes remotes desktop connection, SSH
iv) Virtualization service
- Virtual machine management; crate delete, add and monitoring
v) Security service
- Firewall; filtering traffics
- Encryption; process of converting data into a format that
cannot be understood by third part
- Logs; record events performed per day
- IDS&IPS (Intrusion Detection & Intrusion Preventions
vi) Email service
-
- Sometime it can act as email server management of email
services; send, upload, storage
1. Performance monitoring
- Focus on uptime and downtime speed
2. Bandwidth utilization monitoring
- Normal consumption(trend)
- Define by administrator
3. Configuration management
- Monetarize configuration
- Detect changes; altering
- Rollback
4. Log management
5. Device management
Switch and router
- CPU utilization
- Port status
- Temperature
- Switch state(off/on)
End device
- Account/ name
- Device name
- Application in use
Reports and analytics
- Qualitative
- Quantitative
6 Mobile access
Dynamic MAC Table: The switch learns MAC addresses dynamically. When a device
connects, the switch records its MAC address and the port it's connected to. These entries
can age out.
Static MAC Table: You manually configure static MAC address entries. They are
permanently stored and do not age out. This provides more control and security. You
associate a MAC address with a specific port and VLAN. This prevents unauthorized
devices from connecting, even if they try to spoof a MAC address.
o Elements of a MAC Table Entry:
MAC Address: The unique identifier of a network device.
Port ID: The switch port the device is connected to.
VLAN: The VLAN the device belongs to (if applicable).
2. Port Security
Port security allows you to control which devices can connect to a switch port.
Configuration Commands
#en
#config t
#interface fa0/1
#switchport mode access (Common for connecting end devices)
#switchport port-security
#switchport port-security mac address <MAC_ADDRESS> (Static MAC)
#switchport port-security mac-address sticky (Dynamically learn and
"stick" MAC)
#switchport port-security maximum <NUMBER> (Limit number of MACs)
#switchport port-security violation {restrict | protect | shutdown}
Violation Modes:
o protect: Drops traffic from violating MAC addresses but does not shut down the
port or log violations extensively.
o restrict: Drops traffic, increments a violation counter, and logs the violation.
o shutdown: Shuts down the port, requiring manual re-enablement. This is the most
secure option.
While switches don't have full firewall capabilities, ACLs provide basic traffic filtering. You
create rules to permit or deny traffic based on criteria like source/destination IP addresses,
protocols, and ports.
Configuration Commands
R1>#en
#config t
Explanation:
o access-list 120 deny ...: Creates rules to deny traffic. ACL numbers 100-
199 are typically used for extended ACLs (IP).
o ip 192.168.0.192 0.0.0.63: Specifies the source IP address range. 0.0.0.63
is the wildcard mask, defining the subnet (192.168.0.192 to 192.168.0.255).
o any: Matches any IP address.
o interface <INTERFACE> ip access-group 120 in: Applies the ACL to the
specified interface. in means incoming traffic.
Network Segmentation: Your example suggests a network segmentation plan:
o 192.168.0.0/26 (192.168.0.0 - 192.168.0.63) - Student Network
o 192.168.0.64/26 (192.168.0.64 - 192.168.0.127) - Staff Network
o 192.168.0.128/26 (192.168.0.191) - Guest Network
o 192.168.0.192/26 (192.168.0.255) - Management or other
The ACLs are designed to isolate these networks from each other.
Key Points:
Switches have limited firewall functionality. Dedicated firewalls are essential for robust
network security.
ACLs provide basic traffic filtering on switches.
Port security prevents unauthorized devices from connecting.
Static MAC addresses provide more control than dynamic MAC addresses.
#config t
#default-router 10.0.0.1
#dns-server 10.0.0.2