ITNW3101 Lecture10
ITNW3101 Lecture10
ITNW3101 Lecture10
Duplex Communication
Configuring Switch Ports
Auto-MDIX Feature
• Certain cable types (straight-through or crossover) were historically
required when connecting devices.
• The automatic medium-dependent interface crossover (auto-MDIX)
feature eliminates this problem.
• When auto-MDIX is enabled, the interface automatically detects and
appropriately configures the connection.
• When using auto-MDIX on an interface, the interface speed and duplex
must be set to auto.
Configuring Switch Ports
SSH Operation
• Secure Shell (SSH) is a protocol that provides a secure (encrypted),
command-line based connection to a remote device.
• SSH is commonly used in UNIX-based systems.
• The Cisco IOS software also supports SSH.
• A version of the IOS software, including cryptographic (encrypted)
features and capabilities, is required to enable SSH on Catalyst 2960
switches.
• Because its strong encryption features, SSH should replace Telnet for
management connections.
• SSH uses TCP port 22, by default. Telnet uses TCP port 23.
Secure Remote Access
Configuring SSH
Secure Remote Access
Verifying SSH
Security Concerns in LANs
DHCP Spoofing
DHCP is a network protocol used to automatically assign IP information.
Two types of DHCP attacks are:
• DHCP spoofing
• DHCP starvation
In DHCP spoofing attacks, a fake DHCP server is placed in the network to
issue DHCP addresses to clients.
DHCP starvation is often used before a DHCP spoofing attack to deny
service to the legitimate DHCP server.
Security Concerns in LANs
Leveraging Telnet
The Telnet protocol is insecure and should be replaced by SSH.
An attacker can use Telnet as part of other attacks:
• Brute force password attack
• Telnet DOS attack
When passwords cannot be captured, attackers will try as many
combinations of characters as possible. This attempt to guess the password
is known as brute force password attack.
Telnet can be used to test the guessed password against the system.
Security Concerns in LANs
DHCP Snooping
DHCP Snooping specifies which switch ports can respond to DHCP requests
Switch Port Security
Configuring NTP
Switch Port Security
Verifying NTP
Lecture 10: Summary
In this lecture, you learned:
• Cisco LAN switch boot sequence.
• Cisco LAN switch LED modes.
• How to remotely access and manage a Cisco LAN switch through a secure
connection.
• Cisco LAN switch port duplex modes.
• Cisco LAN switch port security, violation modes, and actions.
• Best practices for switched networks.
References
Routing and Switching Essentials v6 Companion Guide
Published Dec 7, 2016 by Cisco Press