Início
Conheça mais
Enviar pesquisa
Carregar
Entrar
Cadastre-se
Anúncio
Check these out next
CCNP Switching Chapter 7
Chaing Ravuth
CCNP Switching Chapter 3
Chaing Ravuth
CCNA2 Verson6 Chapter4
Chaing Ravuth
CCNA3 Verson6 Chapter7
Chaing Ravuth
CCNP ROUTE V7 CH8
Chaing Ravuth
CCNA2 Verson6 Chapter6
Chaing Ravuth
CCNP Switching Chapter 9
Chaing Ravuth
CCNA (R & S) Module 02 - Connecting Networks - Chapter 5
Waqas Ahmed Nawaz
1
de
24
Top clipped slide
CCNA4 Verson6 Chapter5
16 de Nov de 2017
•
0 gostou
2 gostaram
×
Seja o primeiro a gostar disto
mostrar mais
•
1,401 visualizações
visualizações
×
Vistos totais
0
No Slideshare
0
De incorporações
0
Número de incorporações
0
Baixar agora
Baixar para ler offline
Denunciar
Educação
CCNA4 Verson6 Chapter5
Chaing Ravuth
Seguir
Network Infrastructure em CooTel
Anúncio
Anúncio
Anúncio
Recomendados
CCNP Switching Chapter 10
Chaing Ravuth
852 visualizações
•
94 slides
CCNA4 Verson6 Chapter1
Chaing Ravuth
3.5K visualizações
•
30 slides
CCNA2 Verson6 Chapter5
Chaing Ravuth
1.7K visualizações
•
41 slides
CCNA4 Verson6 Chapter2
Chaing Ravuth
2K visualizações
•
26 slides
CCNP Switching Chapter 2
Chaing Ravuth
1K visualizações
•
41 slides
CCNA4 Verson6 Chapter6
Chaing Ravuth
1.2K visualizações
•
27 slides
Mais conteúdo relacionado
Apresentações para você
(20)
CCNP Switching Chapter 7
Chaing Ravuth
•
764 visualizações
CCNP Switching Chapter 3
Chaing Ravuth
•
1.9K visualizações
CCNA2 Verson6 Chapter4
Chaing Ravuth
•
2.1K visualizações
CCNA3 Verson6 Chapter7
Chaing Ravuth
•
531 visualizações
CCNP ROUTE V7 CH8
Chaing Ravuth
•
1.2K visualizações
CCNA2 Verson6 Chapter6
Chaing Ravuth
•
3.1K visualizações
CCNP Switching Chapter 9
Chaing Ravuth
•
450 visualizações
CCNA (R & S) Module 02 - Connecting Networks - Chapter 5
Waqas Ahmed Nawaz
•
96 visualizações
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
Waqas Ahmed Nawaz
•
103 visualizações
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 6
Waqas Ahmed Nawaz
•
95 visualizações
CCNP ROUTE V7 CH2
Chaing Ravuth
•
512 visualizações
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
Waqas Ahmed Nawaz
•
61 visualizações
Exploration_Routing_Chapter_7
dinuk123
•
504 visualizações
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 5
Waqas Ahmed Nawaz
•
94 visualizações
CCNP Switching Chapter 5
Chaing Ravuth
•
618 visualizações
CCNA2 Verson6 Chapter10
Chaing Ravuth
•
969 visualizações
CCNA (R & S) Module 04 - Scaling Networks - Chapter 3
Waqas Ahmed Nawaz
•
39 visualizações
CCNA2 Verson6 Chapter8
Chaing Ravuth
•
1.6K visualizações
CCNA2 Verson6 Chapter1
Chaing Ravuth
•
3.5K visualizações
CCNA2 Verson6 Chapter9
Chaing Ravuth
•
1.7K visualizações
Similar a CCNA4 Verson6 Chapter5
(20)
CCNAv5 - S4: Chapter8 monitoring the network
Vuz Dở Hơi
•
5.3K visualizações
Chapter 6 overview
ali raza
•
1.1K visualizações
L2 Attacks.pdf
vinaykumar947680
•
7 visualizações
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
Vuz Dở Hơi
•
8.3K visualizações
KPUCC-Rs instructor ppt_chapter2_final
Fisal Anwari
•
70 visualizações
Chapter 02 - Introduction to Switched Networks
Yaser Rahmati
•
386 visualizações
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
Vuz Dở Hơi
•
7.5K visualizações
CCNAv5 - S4: Chapter3 Point to-point Connections
Vuz Dở Hơi
•
9.1K visualizações
Chapter 13 : Introduction to switched networks
teknetir
•
245 visualizações
CCNA 2 Routing and Switching v5.0 Chapter 2
Nil Menon
•
21.1K visualizações
Chapter 14 : vlan
teknetir
•
1.1K visualizações
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
Waqas Ahmed Nawaz
•
93 visualizações
KPUCC-Rs instructor ppt_chapter3_final
Fisal Anwari
•
355 visualizações
CCNAv5 - S2: Chapter3 Vlans
Vuz Dở Hơi
•
4.7K visualizações
Chapter 03 - VLANs
Yaser Rahmati
•
605 visualizações
CCNA 2 Routing and Switching v5.0 Chapter 3
Nil Menon
•
15K visualizações
CCNA4 Verson6 Chapter8
Chaing Ravuth
•
1.1K visualizações
Sca n instructorppt_chapter1_final
CamTESOL2015
•
552 visualizações
CCNAv5 - S3: Chapter1 Introduction to Scaling Networks
Vuz Dở Hơi
•
11.7K visualizações
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
SDNRG ITB
•
5.3K visualizações
Anúncio
Mais de Chaing Ravuth
(14)
CCNP ROUTE V7 CH7
Chaing Ravuth
•
684 visualizações
CCNP ROUTE V7 CH6
Chaing Ravuth
•
398 visualizações
CCNP ROUTE V7 CH5
Chaing Ravuth
•
690 visualizações
CCNP ROUTE V7 CH4
Chaing Ravuth
•
610 visualizações
CCNP ROUTE V7 CH3
Chaing Ravuth
•
398 visualizações
CCNP ROUTE V7 CH1
Chaing Ravuth
•
711 visualizações
CCNP Switching Chapter 1
Chaing Ravuth
•
1.6K visualizações
CCNP Switching Chapter 8
Chaing Ravuth
•
449 visualizações
CCNP Switching Chapter 6
Chaing Ravuth
•
726 visualizações
CCNP Switching Chapter 4
Chaing Ravuth
•
747 visualizações
CCNA4 Verson6 Chapter7
Chaing Ravuth
•
1.5K visualizações
CCNA4 Verson6 Chapter3
Chaing Ravuth
•
2.2K visualizações
CCNA2 Verson6 Chapter3
Chaing Ravuth
•
1.7K visualizações
CCNA2 Verson6 Chapter2
Chaing Ravuth
•
2.4K visualizações
Último
(20)
Two dimensional analytical geometry 11.pptx
PUJA335848
•
0 visão
13-miller-chap-3-lecture.ppt
augostogado
•
0 visão
Artificial intelligence and machine learning for the analysis and enrichment ...
Museums Computer Group
•
0 visão
Florence Nightingale
MohammadYaseen97
•
0 visão
Road Map for Field Hockey.pdf
AzharAbbas66
•
0 visão
Surveillance and Demographic Transition Theory-1.pptx
MohammadYaseen97
•
0 visão
Understanding Digital Marketing Analytics How to Measure and Optimize Your Ca...
Digital Aacharya
•
0 visão
congruent triangle.pptx
PUJA335848
•
0 visão
how online collections could potentially impact the actual art system
Museums Computer Group
•
0 visão
Paragraph Writing (1).ppt
MohammadYaseen97
•
0 visão
PPT_Machine learning approach to Renewable Energy systems.pptx
ssuser1eba67
•
0 visão
A shot in the arm for QR Codes in museums
Museums Computer Group
•
0 visão
Unit 15 Power and Energy in Rwanda.pptx
DUSABIMANA Jean D Amour
•
0 visão
Role play game.pptx
JonathanMax4
•
0 visão
SS LEVEL 2(1) PROPERTIES OF SET OPERATIONS.pptx
GAYATHRISURESH62
•
0 visão
EDUCATION,INSTRUCTION_AND_MOTIVATION_FOR_PERIODONTAL_PATIENTS.pptx
malti19
•
0 visão
Learn English to Hindi Word Meaning
englishtohindiwordme
•
0 visão
Balancing enhancement, innovation and invention
Museums Computer Group
•
0 visão
Getting the message across silos: exploring the difficult art of involving mu...
Frederic Fovet
•
0 visão
Revision Summary Sheet! .pdf
cnpmetabolic
•
0 visão
Anúncio
CCNA4 Verson6 Chapter5
© 2008 Cisco
Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Instructor Materials Chapter 5: Network Security and Monitoring CCNA Routing and Switching Connecting Networks
Presentation_ID 6© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5: Best Practices Prior to teaching Chapter 5, the instructor should: Complete Chapter 5 Assessment. Ensure all activities are completed. This is a very important concept and hands-on time is vital. Provide the students many network security and network monitoring activities. Encourage students to login with their cisco.com login and download http://docwiki.cisco.com/wiki/Internetworking_Technology_H andbook • Review the Security Technologies and the Network Management chapters.
© 2008 Cisco
Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 9 Chapter 5: Network Security and Monitoring Connecting Networks
Presentation_ID 10© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5 - Sections & Objectives 5.1 LAN Security • Explain how to mitigate common LAN security. 5.2 SNMP • Configure SNMP to monitor network operations in a small to medium- sized business network. 5.3 Cisco Switch Port Analyzer (SPAN) • Troubleshoot a network problem using SPAN.
© 2008 Cisco
Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 11 5.1 LAN Security
Presentation_ID 12© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential LAN Security LAN Security Attacks Common attacks against the Layer 2 LAN infrastructure include: • CDP Reconnaissance Attacks • Telnet Attacks • MAC Address Table Flooding Attacks • VLAN Attacks • DHCP Attacks
Presentation_ID 13© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential This topic covers several Layer 2 security solutions: • Mitigating MAC address table flooding attacks using port security • Mitigating VLAN attacks • Mitigating DHCP attacks using DHCP snooping • Securing administrative access using AAA • Securing device access using 802.1X port authentication LAN Security LAN Security Best Practices
Presentation_ID 14© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential There are several strategies to help secure Layer 2 of a network: • Always use secure variants of these protocols such as SSH, SCP, SSL, SNMPv3, and SFTP. • Always use strong passwords and change them often. • Enable CDP on select ports only. • Secure Telnet access. • Use a dedicated management VLAN where nothing but management traffic resides. • Use ACLs to filter unwanted access. LAN Security LAN Security Best Practices
© 2008 Cisco
Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15 5.2 SNMP
Presentation_ID 16© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential SNMP SNMP Operation SNMP allows administrators to manage and monitor devices on an IP network. SNMP Elements • SNMP Manager • SNMP Agent • MIB SNMP Operation • Trap • Get • Set
Presentation_ID 17© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential SNMP SNMP Operation SNMP Security Model and Levels
Presentation_ID 18© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential SNMP Configuring SNMP Configuration steps • Configure community string • Document location of device • Document system contact • Restrict SNMP Access • Specify recipient of SNMP Traps • Enable traps on SNMP agent
Presentation_ID 19© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential SNMP Configuring SNMP Securing SNMPv3
© 2008 Cisco
Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 20 5.3 Cisco Switch Port Analyzer (SPAN)
Presentation_ID 21© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Switch Port Analyzer SPAN Overview Port mirroring • The port mirroring feature allows a switch to copy and send Ethernet frames from specific ports to the destination port connected to a packet analyzer. The original frame is still forwarded in the usual manner.
Presentation_ID 22© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Switch Port Analyzer SPAN Overview SPAN terminology
Presentation_ID 23© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Switch Port Analyzer SPAN Overview RSPAN terminology
Presentation_ID 24© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Switch Port Analyzer SPAN Configuration Use monitor session global configuration command
Presentation_ID 25© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco Switch Port Analyzer SPAN as a Troubleshooting Tool SPAN allows administrators to troubleshoot network issues Administrator can use SPAN to duplicate and redirect traffic to a packet analyzer Administrator can analyze traffic from all devices to troubleshoot sub-optimal operation of network applications
© 2008 Cisco
Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 26 5.4 Chapter Summary
Presentation_ID 27© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter Summary Summary At Layer 2, a number of vulnerabilities exist that require specialized mitigation techniques: • MAC address table flooding attacks are addressed with port security. • VLAN attacks are controlled by disabling DTP and following basic guidelines for configuring trunk ports. • DHCP attacks are addressed with DHCP snooping. The SNMP protocol has three elements: the Manager, the Agent, and the MIB. The SNMP manager resides on the NMS, while the Agent and the MIB are on the client devices. • The SNMP Manager can poll the client devices for information, or it can use a TRAP message that tells a client to report immediately if the client reaches a particular threshold. SNMP can also be used to change the configuration of a device.
Presentation_ID 28© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential Summary Continued SNMPv3 is the recommended version because it provides security. SNMP is a comprehensive and powerful remote management tool. Nearly every item available in a show command is available through SNMP. Switched Port Analyzer (SPAN) is used to mirror the traffic going to and/or coming from the host. It is commonly implemented to support traffic analyzers or IPS devices.
Presentation_ID 29© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential
Presentation_ID 30© 2008
Cisco Systems, Inc. All rights reserved. Cisco Confidential
Anúncio