Unit 3 NS Device Security 24 25
Unit 3 NS Device Security 24 25
Unit - 3
- Switch.
- Router.
- Network Management System.
- Administrative Practice.
- Centralize Account Management.
➢ In this growing world of Internet, a single network could not provide connectivity
to everyone. So, network designers have break a network into smaller portions
and connected them using various networking devices such as bridges, gateways
and switches. etc.
• Networking Devices: -
• Internetworking Devices: -
✓ The devices which are used to connect two networks are called
Internetworking Devices. Such devices are bridge, router, gateway
etc.
➢ Each Computer on a network has two address one is MAC (Media Access Control)
address and it is unique to every system and it is called Hardware/Physicaladdress.
➢ To communicate over a network, each network must know the IP as well as MAC
address of each system.
➢ IP address could be determined using Domain Name System (DNS) protocol and
to determine MAC address, the computer uses Address Resolution Protocol (ARP).
❖ Switch: -
➢ Network switches are essential components in any network, responsible for
directing network traffic between devices.
➢ They provide connectivity points to the devices of network, therefore switches are
attractive targets for cyberattacks.
➢ Hub forwards data to all the devices within system whereas switch forwards the
data only to the intended device/system.
➢ As switch forwards data only to the intended system, network traffic is reduced.
➢ As all the packets are not broadcasted, there is less chance of collision.
➢ When an opponent is able to get through the ARP table of the switch and change
the MAC address, so that an IP address points to another machine is called as ARP
poisoning.
➢ Example: If an attacker changes MAC address of some node with his own MAC
address, then he will be able to steal the information of the system/network.
➢ In some cases, when the MAC address may be of network connecting device, the
access to the web or other networks could be disabled by the attacker.
➢ As we know, the switch receives the data as frame and then forwards it to desired
node, a switch can use for techniques in forwarding a frame. Let us understand
them in brief : -
✓ Accuracy -> High (as errors are not propagated with frames.)
3. Fragment Free: -
• In this method, the packet will be checked for collision only. As the
collision status is determined, the packet is forwarded.
• For that it examines first few bytes (64 bytes) of the frame & from that it
determines whether it is proper or not.
• This technique is no longer used but with this speed and accuracy both are
achieved.
• It is also known as Modified cut-through method.
Ans. Router: -
➢ A router is a networking device that forwards data packets between computer
networks. Routers perform the "traffic directing" functions on the Internet.
➢ Routers perform ‘Traffic Directing’ functions on the Internet.
➢ They simply connects your system/area to the Internet. It acts as ‘Gateway’ to
your home network.
➢ Routers are smartest as well complicated device.
➢ A router derives its name from its functionality that it receives a packet of data,
reads it header and determines the destination address then forwards through best
possible route.
➢ Following points to be considered while discussing security of router:
1. Firewall:
• Most routers have a built-in firewall that acts as a barrier between your network and the
internet. It inspects incoming and outgoing traffic, blocking unauthorized access and
potential threats.
• You can often customize firewall rules to control which devices or applications can
access the internet or specific network resources.
3. Wireless Security:
• Encryption: Routers offer various encryption protocols to secure your Wi-Fi network.
These protocols encrypt the data transmitted over your wireless network, preventing
unauthorized access and eavesdropping.
• Guest networks: Many routers allow you to create a separate guest network with its own
password. This isolates guest devices from your main network, enhancing security.
4. Access Control:
• Strong passwords: It's crucial to set a strong and unique password for your router's
administration interface. This prevents unauthorized users from accessing and changing
your router settings.
• MAC address filtering: Some routers allow you to restrict network access based on the
Media Access Control (MAC) address of devices. This adds an extra layer of security by
only allowing authorized devices to connect.
Prepared By: Niyati S. Rajyaguru Page 6 of 17
SHREE SWAMINIRAYAN COLLEGE OF COMPUTER SCIENCE
Semester: 6 Sub: Network Security
5. Firmware Updates:
• Security patches: Router manufacturers regularly release firmware updates to patch
security vulnerabilities and improve performance. Keeping your router's firmware up to
date is essential for maintaining security.
1. Static Routing
2. Dynamic Routing
1. Static Routing: -
➢ Fixed Paths: The routes in a static routing table remain fixed unless the
administrator manually updates them. They do not change dynamically based on
network conditions.
➢ Predictable Behavior: Since the routes are fixed, static routing provides
predictable network behavior. This can be useful for specific applications that
require consistent latency and throughput.
➢ Limited Scalability: Static routing is not scalable for large and complex networks.
Maintaining the routing tables manually becomes cumbersome and error-prone as
the network grows.
Dynamic Routing: -
➢ In dynamic routing, routers use routing protocols to communicate with each other
and automatically update their routing tables. They exchange information about
network topology and calculate the best paths for data packets.
➢ Adaptive Paths: Dynamic routing allows routers to adapt to network changes and
failures. If a link goes down, the routers will automatically find alternative paths
for data to travel.
➢ Complex Implementation: Dynamic routing protocols can be more complex to
configure and manage than static routing. They require a deeper understanding of
network behavior and routing algorithms.
➢ Scalability: Dynamic routing is highly scalable and suitable for large and
complex networks. It automates the process of maintaining routing tables,
reducing the administrative overhead.
➢ Efficient Resource Utilization: Dynamic routing protocols can optimize network
resource utilization by dynamically adjusting to traffic conditions and finding the
most efficient paths.
➢ Overhead: Dynamic routing protocols introduce some overhead due to the
communication and processing required for route updates.
➢ Main task of dynamic routing algorithm is to find the optimum path. Following
protocols are used for dynamic routers :
➢ Difference between the two protocols is the way in which they calculate the
optimum path.
➢ One important security concern is controlling which device can find out the routes
for your network.
2. The router determines the destination address and forwards it to next step.
➢ Here, malicious route (suspicious routes) can disturb the normal communication or may
cause some data / information loss by routing to the unauthorized party.
➢ This selection of routing protocol is not a big thing in network security but the exchange
of routing information is considered a sensitive thing.
➢ There are number of routing protocols like Routing Information Protocol Version 2
(RIPv2), Open Shortest Path First (OSPF) etc. can perform tasks like authentication.
1. Monitoring : -
2. Configuration Management: -
✓ It allows admins to configure and manage network devices such
as routers, switches and servers centrally. This may include
tasks like firmware updates, policy enforcement etc.
3. Performance Management: -
4. Fault Management: -
5. Security Management: -
➢ It focuses on using routers and switches to increase the security of the network as
well as provide appropriate configuration steps for protecting the devices
themself from an attack.
➢ As a web interface could be accessed via a browser, the router can be managed or
monitored via a Simple Network Management System Protocol (SNMP), it is
important to adequate secure these services to provide adequate protection against
attack.
➢ As one can identify relevant attacks against the device by using information
obtained from banners.
➢ Secure Shell (SSH) provides same interface and access as TELNET, but it
encrypts all communications.
➢ There are basically few protocols are used to control access into
network are CISCO, TACAS (Terminal Access Controller Access
Control System) or RADIUS (Remote Authentication Dial-In User
Service) servers.
➢ Traps are uninvited or unsolicited messages that a device will send when a
configured threshold is exceeded or failure occurs.
➢ SNMP is used at the application layer of the TCP/IP architecture and is used
to manage network faults.
❖ SNMP Manager: -
➢ It is the centralized node which is used to monitor the network and is also called
a Network Management System (NMS).
➢ It interfaces between NMS node and other network elements in both the
directions. Here, the network elements are switches, routers, servers, computer
hosts, etc.
❖ SNMP Agent : -
➢ The agent is the module of network management software that is installed on a
network devices like host pc , servers , router , etc.