RA Chapter 2 Donnelly Basic Switch Configuration Lan switches are responsible for directing and controlling the data flow at the access layer to networked resources and switches are used to connect multiple devices together. The cisco switches are self-configuring and cisco switches run cisco IOS and can be manually configured to your expectations. Cisco switches can be managed bother remotely and locally. Switches operate at the access payer where client network devices connect directly to the network and IT departments want uncomplicated network access for the users. The cisco switch goes through post once it is turned on, this process test the CPU, DRAM and the portion of the flash device that makes up the flash file system. The second thing that the switch goes through is the boot loader software, this is a small program stored in the ROM and is running immediately after the post is successful. The third thing is the boot loader performs low-level CPU initialization and It initializes the CPU registers, which control where physical memory is mapped, the quantity of memory, and its speed. The second last thing is the boot loader initializes the flash file. The last thing it goes through is loads the default IOS operating system software image into memory and hands control to the IOS. The IOS operating system then initializes the interfaces using the cisco ios commands found in the configuration. Boot loader command line supports commands ot format the flash file system and reinstall the operating system software. The cisco switches have many different led lights on them and just some of them are the system led that shows whether the system is receiving power and it is functioning correctly. Another kind of light that is on the switch is the Redundant Power system led, this shows the RPS status if the light is off it is not connected correctly, if it is green that means it is ready to provide back-up power. If it is blinking it is connected but is unable because it is providing power to another device. Another type of light is the port speed light this indicates the port speed mode is selected. When the port displays different colors they all mean different things like green is the port is operating at 100 mb/s. Preparing a switch for remote management access is a big thing. You must configure the switch with an IP address and a subnet mask. The switch also must need a default gateway to keep manage of the switch. A switch is configured to have management of the switch controlled though vlan 1 by default. Configure Switch Ports Switch ports can be configured with specific duplex and speed settings. Use the duplex interface configuration mode command to manually specify the duplex mode for switch port. Full duplex is communication that improves performance of a switched LAN, it also increases effective bandwidth by allowing both ends of a connection to transmit and receive data simultaneously. Half duplex is when the communication creates performance issues because data can flow in only one direction at a time, often resulting in collisions and this is typically seen in older hardware such as hubs. Full duplex offers 100 percent in both directions and while half-duplex offers 100percent one-way only. When connecting to switches without the auto MDIX feature, the straight through cables must be used to connect to devices such as servers, workstations, or routers and crossover cables, they must be used to connect to other switched or repeaters. With auto-MDIX enabled, either type of cable can be used to connect to other devices, and the interface automatically corrects for any incorrect cabling. However, on newer Cisco routers and switches, the mdix auto interface configuration mode command enables the feature. The show interfaces command is to show the interfaces and this is commonly used when configuring and monitoring network devices such as computers and other devices connected to the switch. You can shut off the ports that you do not use and only have the ones open that you want open and that you use. You can set it up if someone plugs in a computer to a port that is not supposed to be active it will shut the switch off if you plug it in. If the interface is, up and up that means it is working without any problems but if it says up and down that means you have a problem and it is not working the right way. Switching Security: Management and Implementation SSH is called Secure Shell this is a protocol that provides a secure management connection to a remote device. SSH provides security for remote connections by providing strong encryption when a device is authenticated with a username and some sort of password. The main thing to know is how to enable SSH on a switch and especially on a cisco switch, in order to do so you need to make sure that it is using the right version of IOS. To find out what the version is you need to issue the command show version and it will display the version that the switch is. In order to configure SSH your switch needs a hostname and have the correct network connection. First you need to verify SSH support, than Configure the Ip domain, then you need to Generate RSA key pairs. The fourth step is to configure user authentication than you go on to step five and that is to configure the vty lines. The very last step is to enable SSH version 2. If you issue the command show ip SSH shows the data configured and the version on that device you configured. But if you issue the command show SSH this checks the connections to the device. SSH should replace Telnet for management connections, but telnet uses insecure plaintext communications. SSH provides security for remote connections by providing strong encryption of all transmitted data between devices. The MAC address table in a switch contains the MAC addresses associated with each physical port and the associated VLAN for each port. When a Layer 2 switch receives a frame, the switch looks in the MAC address table for the destination MAC address. In DHCP spoofing attacks, an attacker configures a fake DHCP server on the network to issue IP addresses to clients. DHCP starvation is often used before a DHCP spoofing attack to deny service to the legitimate DHCP server, making it easier to introduce a fake DHCP server into the network. The Telnet protocol is insecure and can be used by an attacker to gain remote access to a Cisco network device. There are tools available that allow an attacker to launch a brute force password-cracking attack against the vty lines on the switch. Some of the best security practices are, control physical access to devices, perform backups and test the backed up files on a regular basis and one last one is to shut down unused services and ports. Network security tools help a network administrator test a network for weaknesses. Using one of these tools, an administrator can launch an attack against the network and audit the results to determine how to adjust security policies to mitigate those types of attacks. Different switches support varying numbers of MAC addresses in their MAC table. It can be difficult to determine the ideal amount of spoofed MAC addresses to send to the switch. A network administrator also has to contend with the age-out period of the MAC address table. If the spoofed MAC addresses start to age out while performing a network audit, valid MAC addresses start to populate the MAC address table, and limiting the data that could be monitored with a network-auditing tool. Port security can be configured to allow one or more MAC addresses. If the number of MAC addresses allowed on the port is limited to one, then only the device with that specific MAC address can successfully connect to the port. Static secure MAC addresses and Dynamic secure MAC addresses are just some types of secure MAC address types. Sticky MAC addresses are added to the MAC address table and to the running configuration. When a port is configured with port security, a violation can cause the port to become error disabled. Network Time Protocol is a protocol that is used to synchronize the clocks of computer systems over packet-switched, variable-latency data networks. A secure method of providing clocking for the network is for network administrators to implement their own private network master clocks, synchronized to UTC.