Uploaded by Pablo Escobar

Network Notes

advertisement
Network topologies:
Point to point:
- A connection between two computers, networks or other devices. If the connection fails the
communication is disrupted
Star:
-
Devices are connected to a central intermediate device. Easy to setup and maintain but
it highly scalable
Mesh:
- In mesh topology, each end device can have multiple connections to other end devices. This
configuration is highly resilient due to its allowance of multiples connection but is expensive
Hybrid:
- A combination of the other topologies
3 tier architecture:
- Consists of 3 layers that provide isolation between devices, more security options and
resilience. The separated layers are:
Core: Routing layer connecting to servers and the internet
Distribution: Separation between core and access layers and boundary control
Access: Communication between and devices
Collapsed architecture:
- Similar to 3 tier, but has a different number of layers
- Core and distribution layers are collapsed together to form a single layer
- Advantages of the 3 tier architecture but a smaller network scale
-
-
A mac address is the unique identity of a computer within a network while IP addresses
are used to identify machines operating in different networks
MAC: Media access control
A MAC address is a unique hardware identifier attached to each network card
A MAC address includes 2 parts:
- A first three nodes represent the manufacturer’s identifier
- The last three nodes represent a serial identifier
- Can be written in different ways
IPv4 consists of four octets
IPv6 consists of six hexadecimal octets
Subnet mask for class A,B and C:
- /24 is class C, subnet mask is 255.255.255.0
- /16 is class B, subnet mask is 255.255.0.0
- /8 is Class A, subnet mask is 255.0.0.0
-
The first IP address of each subnet is the network address and can’t be used for host or
devices
The last address of each subnet is the broadcast address
Protocols
- Protocols can be considered language of data transfer, to communicate two or more
computers need to have the same protocol
- Protocols are predefined sets of rules describing how something should work or behave
- Protocols help maintain order among different technologies
Types of protocols:
- IP
- DNS
- DHCP
- HTTP (Hypertext transfer protocol)
- HTTPS (Hypertext transfer protocol secure)
Wireless LAN components
- AP (Access point): The component that allows end devices to connect to a network
wirelessly
- Wireless NIC adapter: Sends and receives information to the computer
-
IP that starts with 169.254 means you didn’t reach your dhcp server
Common Network Protocols
- DHCP
- SMTP
- SSH
- ICMP
-
OSI is an educational model while TCP/IP is used as a practical model
-
TCP/IP and DOD are interchangeable
OSI: Open system Interconnection
- Defines a networking framework to implement protocols in layers
- Was developed by the International Organization for Standardization (ISO) in 1974
- Divided into 7 layers: Application, presentation, session, transport, network,
datalink, physical. Goes from the bottom up.
- Upper layers
- Application
- Presentation
- Session
-
Routers are layer 3
Switches are layer 2
Hubs are layer 1
Firewalls can be from layer 3 to layer 7
Network layer is the transport
-
Layers in the TCP/IP: Application, transport, internet, network access
Application layer in TCP/IP is the first top 3 layers in OSI
Transport layer is layer 3 in TCP/IP
The transport layer is responsible for setting the port number and the communication
type (TCP or UDP)
UDP53 is port DNS
TCP22 is port SSH
-
Half Duplex
- Only one party can send or receive data at a moment, like a walkie talkie
Full Duplex
- Both parties can send and receive data at the same time, like cell phones
-
-
-
To connect network devices such as computers and switches, you can use media
components such as an ethernet cable with an RJ-45 connector
To transmit information over a distance that is greater 300m via a single cable without
data loss you must use an optic fiber cable
When connecting two networks of the same type you must use a crossover cable. This
connection prevents collision between the transmitting and receiving points of the
connected devices
Which Wi-Fi standard used by AP devices supports both 2.4 GHz and 5 GHz wireless
frequencies? 802.11n
TCP is a 4 layer protocol used to establish a Telnet connection
The TCP protocol uses the three way handshake process to establish a trusted
connection between a server and a client
Registered ports: Describes all ports between 1024 and 49151
The two common states of a network port are listening and established. Ports in both
states can be identified when executing netstat -atb on windows computer
-
Switches are layer 2 by default
-
To see the MAC address table use the command “show mac address-table”
-
Fa = fast ethernet
Switches have different methods of receiving and transmitting frames on the LAN
- Store and forward: Buffers the entire frame upon receipt which enables the switch to
support various port speeds. Provides error checking
- Cut through switching: Faster than store and forward, only the first 6 bytes of the
incoming frame are buffered. The switch forwards the frame immediately even before
the frame is received and no error checking is done
- Fragment Free switching: Buffers the first 64 bytes of the frame, including the MAC
address data and the frame’s payload.
-
IOS uses a command line interface (CLI) to enable administrators and technicians to
interact with the system
Terminal software:
- PuTTY
- Tera Term
- SecureCRT
Cisco packet tracer allows a user to map a network
Enables the testing of network configurations, trains users to work with network
configuration
-
-
Access Methods
- Out of band: This method uses a dedicated management console cable that must be
physically connected to the device
Out of band management requires two items:
1. PC with terminal software
2. Console Cable
-
In band: Uses management protocols, such as SSH or Telnet which assess the devices
remotely over the network
IOS Modes
- User EXEC Mode: Low level capabilities but is useful for basic operations.
- Privileged EXEC Mode: Large number of monitoring commands and device
configuration
- Global configuration mode: The only mode that allows admins to change device
configuration. Only accessible from the privileged EXEC mode.
- Interface configuration mode: Allows you to change specific parameters within a switch
or router
-
Enable command moves the user from user mode to privileged mode
Cisco Device Components
Volatile memory: When computer is rebooted, this memory is wiped out
- RAM: Volatile memory that stores the system config
- ROM: Non volatile memory responsible for the power on self test process and bootstrap
which is the initial program responsible for booting the IOS
- FLASH: Non volatile memory that stores the OS itself
- NVRAM: Non volatile memory that stores the startup config file
- TFTP: Trivial File Transfer Protocol, a simple file transfer protocol that allows clients to
retrieve files from a remote host
- FTP has username and password and TFTP doesn’t
- ROMmon: Read only memory monitor, the purpose of this is to change the router’s
behavior:
- Determine how the router will boot
- Apply option while booting
- Set the console speed and band rate for terminal emulation session
- MAC spoofing: When attackers change their physical PC address to conceal their true
identity and be someone else
- CAM table overflow: An attack that targets a switch’s MAC table. The goal is to flood the
table with fake addresses which causes the switch to initiate fallback mode and act as a
hub
- Port security feature is used to restrict the number of MAC addresses that each board
can learn
- Port security feature has 3 protection modes:
- Shutdown
- Restrict
- Protect
- MAC address learning can be done in two ways, manual or sticky
- Manual: Requires static configuration of each allowed MAC address and its assignment
to an interface. Most secure method but is time consuming
- Sticky: Allowed MAC addresses are learned dynamically and limited to the max number
configured for the interface
- Max allowed MAC addresses: Number can be changed
- Err-Disabled: When a switch port is in this more, the port may have been disabled
automatically by the switch OS due to a port security shutdown mode violation
- Common triggers for Err-Disabled:
- Duplex mismatch: This state occurs when two parties set for point to point
communication are configured to use different duplex modes
- Bad NIC: A faulty network interface card (NIC)
- Broadcast storms: When a broadcast volume is too large for processing, the switches
may become overwhelmed and trigger Err-Disabled mode
Remote Access
- Two common remote access protocols are used in switches: SSH and Telnet
-
-
-
SSH encrypts all data transferred between the user and end device, SSH uses RSA
encryption and operates on TCP port 22
Telnet, usernames and passwords are sent in plain text on TCP port 23
RSA Encryption: Has two keys, public and private. Public is shared with everyone and
the private is given only to specific persons. RSA ensures the confidentiality in the CIA
triad
Virtual Teletype (VTY): A CLI in network devices used to create remote access
connections. VTY is virtual and doesn’t require hardware. Switches have 16 VTY lines
(0-15) and routers have 5 VTY lines (0-4)
Router is layer 3, switch is layer 2
Number systems:
- Decimal: The most common numbering system goes from 0-9
- Known as base-10 numeral system
- Binary: Uses 0 and 1
- Known as base-2 numeral system
- Hexadecimal: Consists of 16 characters, uses number 0-9 and letter A-F
- Known as base-16 numeral system
-
-
-
-
Internet protocol (IP): A numerical label assigned to devices connected to a network
used for host identification and communication
IPv4 addresses consist of 32 bits and are divided into 4 octets each containing 8 bits
IPv4 address consists of 2 parts, network and host defined by the subnet mask
IPv4 communication types
Unicast: One on one communication; A packet is sent directly from one device on the
network to another device on the network. A single source communicates with a single
destination
Multicast: A single source communicates with multiple destinations
Broadcast: When a packet is sent from one device on the network to all other devices on
the network with the use of a generic broadcast address (255.255.255.255 or
FF:FF:FF:FF:FF:FF)
IPv4 link-local also known as an APIPA address: Used if the DHCP is not available or an
IP is not statically configured, the OS will randomly generate a link local address
Private IPs are non-unique addresses that can belong to one of three IP address ranges.
They are used to create networks that do not communicate over the internet
Public IPs are used for communication over the internet. These addresses must be
unique, require a fee and be purchased from service providers
-
Private IP ranges:
-
IPv6 device communication types:
- Unicast:
3 types of unicast:
- Global Unicast: IPv6 global unicast addresses are similar to IPv4 public addresses, they are
unique and can be routed via the internet
-Link-Local: Addresses that enable communication between devices in the same local link
(LAN)
-Unique-Local: Similar to IPv4 private addresses with minor differences
-
Multicast: Addresses used to send IPv6 packets from a single host to multiple
destinations
Anycast: Refers to IPv6 unicast addresses that can be assigned to multiple devices
IPv4 and IPv6 can coexist using protocols and tools created by IEFT which are known
for dual stack, tunneling and translation
Dual stack: Means that a devices runs both IPv4 and IPv6 protocols simultaneously,
allowing both IP versions to coexist
Tunneling: Used when IPv6 addresses are to be sent over IPv6 networks or vice versa.
In this method the IPv6 is encapsulated within an IPv4 packet
Translation: Allows IPv6 to communicated IPv5 enabled devices using techniques
similar to those utilized by NAT
IPv6 is 128 bits
Download