Что такое findslide.org?

FindSlide.org - это сайт презентаций, докладов, шаблонов в формате PowerPoint.


Для правообладателей

Обратная связь

Email: Нажмите что бы посмотреть 

Яндекс.Метрика

Презентация на тему It’s a network. (Chapter 11)

Содержание

Chapter 1111.0 Introduction11.1 Create and Grow11.2 Keeping the Network Safe11.3 Basic Network Performance11.4 Managing IOS Configuration Files11.5 Summary
Chapter 11: It’s a Network Network Basics Chapter 1111.0 Introduction11.1 Create and Grow11.2 Keeping the Network Safe11.3 Basic Network Chapter 11: ObjectivesUpon completion of this chapter, you will be able to:Identify Chapter 11: Objectives (Cont.)Use the basic host commands to acquire information about 11.1 Create and Grow Devices in a Small Network Small Network TopologiesTypical, Small Network Topology Devices in a Small Network Device Selection for a Small NetworkFactors to Devices in a Small Network  Addressing for a Small NetworkIP addressing Devices in a Small Network  Redundancy in a Small NetworkRedundancy helps Devices in a Small Network  Design Considerations for a Small NetworkThe Protocols in a Small Network  Common Applications in a Small NetworkNetwork-Aware Protocols in a Small Network Common Protocols in a Small NetworkNetwork protocols Protocols in a Small Network Real-Time Applications for a Small NetworkInfrastructure – Growing to Larger Networks Scaling a Small NetworkImportant considerations when growing to Growing to Larger Networks Protocol Analysis of a Small NetworkInformation gathered by Growing to Larger Networks Evolving Protocol RequirementsNetwork administrator can obtain IT “snapshots” of 11.2 Keeping the Network Safe Network Device Security Measures Categories of Threats to Network SecurityCategories of Threats to Network Security Network Device Security Measures Physical SecurityFour classes of physical threats are:Hardware threats – Network Device Security Measures Types of Security VulnerabilitiesTypes of Security Weaknesses:TechnologicalConfigurationSecurity policyVulnerabilities - Technology Vulnerabilities and Network Attacks Viruses, Worms, and Trojan HorsesVirus – Malicious software Vulnerabilities and Network Attacks  Reconnaissance Attacks Vulnerabilities and Network Attacks  Access Attacks Vulnerabilities and Network Attacks  Access Attacks (Cont.) Vulnerabilities and Network Attacks  Denial of Service (DoS) Attacks Mitigating Network Attacks  Backup, Upgrade, Update, and PatchKeep current with the Mitigating Network Attacks  Authentication, Authorization, and AccountingAuthentication, Authorization, and Accounting (AAA, Mitigating Network Attacks  FirewallsA Firewall resides between two or more networks. Mitigating Network Attacks  Endpoint SecurityCommon endpoints are laptops, desktops, servers, smart Securing Devices  Introduction to Securing DevicesPart of network security is securing Securing Devices  PasswordsWeak and Strong Passwords Securing Devices  Basic Security PracticesEncrypt passwords.Require minimum length passwords.Block brute force Securing Devices  Enabling SSHEnabling SSH 11.3 Basic Network Performance Ping Interpreting ICMP Messages! – indicates receipt of an ICMP echo reply Ping Leveraging Extended PingThe Cisco IOS offers an Ping Network BaselineBaseline with ping Ping Network Baseline (Cont.) Tracert Interpreting Tracert Messages Show Commands Common Show Commands RevisitedThe status of nearly every process or Show Commands Viewing Router Settings With Show Version Cisco IOS VersionSystem Bootstrap Cisco Show Commands Viewing Switch Settings with Show Versionshow version Command Host and IOS Commands ipconfig Command Optionsipconfig – Displays ip address, subnet Host and IOS Commands arp Command Optionsarp Command Options Host and IOS Commands show cdp neighbors Command Optionsshow cdp neighbors command Host and IOS Commands Using the show ip interface brief CommandThe show 11.4 Managing IOS Configuration Files Router and Switch File Systems Router File Systemsshow file systems command – Lists Router and Switch File Systems Switch File SystemsThe show file systems command lists Backup and Restore Configuration Files  Backup and Restore Using Text Files Backup and Restore Configuration Files  Backup and Restore Using TFTPConfiguration files Backup and Restore Configuration Files  Using USB Interfaces on a Cisco Backup and Restore Configuration Files  Backup and Restore Using USBBackup to USB Drive 11.5 Summary Chapter 11: SummaryIn this chapter, you learned:Good network design incorporates reliability, scalability,
Слайды презентации

Слайд 2 Chapter 11
11.0 Introduction
11.1 Create and Grow
11.2 Keeping the

Chapter 1111.0 Introduction11.1 Create and Grow11.2 Keeping the Network Safe11.3 Basic

Network Safe
11.3 Basic Network Performance
11.4 Managing IOS Configuration Files
11.5

Summary

Слайд 3 Chapter 11: Objectives
Upon completion of this chapter, you

Chapter 11: ObjectivesUpon completion of this chapter, you will be able

will be able to:
Identify the devices and protocols used

in a small network.
Explain how a small network serves as the basis of larger networks.
Explain the need for basic security measures on network devices.
Identify security vulnerabilities and general mitigation techniques.
Use the output of ping and tracert commands to establish relative network performance.
Use basic show commands to verify the configuration and status of a device interface.

Слайд 4 Chapter 11: Objectives (Cont.)
Use the basic host commands

Chapter 11: Objectives (Cont.)Use the basic host commands to acquire information

to acquire information about the devices in a network.
Explain

the file systems on Routers and Switches.
Apply the commands to back up and restore an IOS configuration file.

Слайд 5 11.1 Create and Grow

11.1 Create and Grow

Слайд 6 Devices in a Small Network Small Network Topologies
Typical, Small

Devices in a Small Network Small Network TopologiesTypical, Small Network Topology

Network Topology


Слайд 7 Devices in a Small Network Device Selection for a

Devices in a Small Network Device Selection for a Small NetworkFactors

Small Network
Factors to be considered when selecting intermediate devices.


Слайд 8 Devices in a Small Network Addressing for a

Devices in a Small Network Addressing for a Small NetworkIP addressing

Small Network
IP addressing scheme should be planned, documented, and

maintained based on the type of devices receiving the address.
Examples of devices that should be part of the IP design:
End devices for users
Servers and peripherals
Hosts that are accessible from the Internet
Intermediary devices
Planned IP schemes help the administrator:
Track devices and troubleshoot
Control access to resources



Слайд 9 Devices in a Small Network Redundancy in a

Devices in a Small Network Redundancy in a Small NetworkRedundancy helps

Small Network
Redundancy helps to eliminate single points of failure.
Improves

the reliability of the network.

Слайд 10 Devices in a Small Network Design Considerations for

Devices in a Small Network Design Considerations for a Small NetworkThe

a Small Network
The following should be included in the

network design:
Secure file and mail servers in a centralized location.
Protect the location by physical and logical security measures.
Create redundancy in the server farm.
Configure redundant paths to the servers.



Слайд 11 Protocols in a Small Network Common Applications in

Protocols in a Small Network Common Applications in a Small NetworkNetwork-Aware

a Small Network
Network-Aware Applications – Software programs used to

communicate over the network. 
Application Layer Services –  Programs that interface with the network and prepare the data for transfer.

Слайд 12 Protocols in a Small Network Common Protocols in a

Protocols in a Small Network Common Protocols in a Small NetworkNetwork

Small Network
Network protocols define:
Processes on either end of a

communication session
Types of messages
Syntax of the messages
Meaning of informational fields
How messages are sent and the expected response
Interaction with the next lower layer


Слайд 13 Protocols in a Small Network Real-Time Applications for a

Protocols in a Small Network Real-Time Applications for a Small NetworkInfrastructure

Small Network
Infrastructure – Should be evaluated to ensure it

supports proposed real-time applications.
VoIP – Is implemented in organizations that still use traditional telephones.
IP telephony – The IP phone performs voice-to-IP conversions.
Real-time video protocols – Use the Time Transport Protocol (RTP) and the Real-Time Transport Control Protocol (RTCP).


Слайд 14 Growing to Larger Networks Scaling a Small Network
Important considerations

Growing to Larger Networks Scaling a Small NetworkImportant considerations when growing

when growing to a larger network:
Documentation – Physical and

logical topology.
Device inventory – List of devices that use or comprise the network.
Budget – Itemized IT budget, including fiscal year equipment purchasing budget.
Traffic Analysis – Protocols, applications, services, and their respective traffic requirements should be documented.



Слайд 15 Growing to Larger Networks Protocol Analysis of a Small

Growing to Larger Networks Protocol Analysis of a Small NetworkInformation gathered

Network
Information gathered by protocol analysis can be used to

make decisions on how to manage traffic more efficiently. 

Слайд 16 Growing to Larger Networks Evolving Protocol Requirements
Network administrator can obtain

Growing to Larger Networks Evolving Protocol RequirementsNetwork administrator can obtain IT “snapshots”

IT “snapshots” of employee application utilization.
Snapshots track network utilization

and traffic flow requirements.
Snapshots help inform network modifications needed to optimize employee productivity.


Слайд 17 11.2 Keeping the Network Safe

11.2 Keeping the Network Safe

Слайд 18 Network Device Security Measures Categories of Threats to Network

Network Device Security Measures Categories of Threats to Network SecurityCategories of Threats to Network Security

Security
Categories of Threats to Network Security


Слайд 19 Network Device Security Measures Physical Security
Four classes of physical

Network Device Security Measures Physical SecurityFour classes of physical threats are:Hardware

threats are:
Hardware threats – Physical damage to servers, routers, switches,

cabling plant, and workstations.
Environmental threats – Temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry).
Electrical threats – Voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss.
Maintenance threats – Poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling.


Слайд 20 Network Device Security Measures Types of Security Vulnerabilities
Types of

Network Device Security Measures Types of Security VulnerabilitiesTypes of Security Weaknesses:TechnologicalConfigurationSecurity policyVulnerabilities - Technology

Security Weaknesses:
Technological
Configuration
Security policy
Vulnerabilities - Technology


Слайд 21 Vulnerabilities and Network Attacks Viruses, Worms, and Trojan Horses
Virus

Vulnerabilities and Network Attacks Viruses, Worms, and Trojan HorsesVirus – Malicious

– Malicious software that is attached to another program

to execute a particular unwanted function on a workstation.
Trojan horse – An entire application written to look like something else, when in fact it is an attack tool.
Worms – Worms are self-contained programs that attack a system and try to exploit a specific vulnerability in the target. The worm copies its program from the attacking host to the newly exploited system to begin the cycle again.

Слайд 22 Vulnerabilities and Network Attacks Reconnaissance Attacks

Vulnerabilities and Network Attacks Reconnaissance Attacks

Слайд 23 Vulnerabilities and Network Attacks Access Attacks

Vulnerabilities and Network Attacks Access Attacks

Слайд 24 Vulnerabilities and Network Attacks Access Attacks (Cont.)

Vulnerabilities and Network Attacks Access Attacks (Cont.)

Слайд 25 Vulnerabilities and Network Attacks Denial of Service (DoS)

Vulnerabilities and Network Attacks Denial of Service (DoS) Attacks

Attacks


Слайд 26 Mitigating Network Attacks Backup, Upgrade, Update, and Patch
Keep

Mitigating Network Attacks Backup, Upgrade, Update, and PatchKeep current with the

current with the latest versions of antivirus software.
Install

updated security patches.

Antivirus software can detect most viruses and many Trojan horse applications and prevent them from spreading in the network.


Слайд 27 Mitigating Network Attacks Authentication, Authorization, and Accounting
Authentication, Authorization,

Mitigating Network Attacks Authentication, Authorization, and AccountingAuthentication, Authorization, and Accounting (AAA,

and Accounting (AAA, or “triple A”) 
Authentication – Users and

administrators must prove their identity. Authentication can be established using username and password combinations, challenge and response questions, token cards, and other methods.
Authorization – Determines which resources the user can access and the operations that the user is allowed to perform.
Accounting – Records what the user accessed, the amount of time the resource is accessed, and any changes made.


Слайд 28 Mitigating Network Attacks Firewalls
A Firewall resides between two

Mitigating Network Attacks FirewallsA Firewall resides between two or more networks.

or more networks. It controls traffic and helps prevent

unauthorized access. Methods used are:
Packet Filtering
Application Filtering
URL Filtering
Stateful Packet Inspection (SPI) – Incoming packets must be legitimate responses to requests from internal hosts.

Firewalls


Слайд 29 Mitigating Network Attacks Endpoint Security
Common endpoints are laptops,

Mitigating Network Attacks Endpoint SecurityCommon endpoints are laptops, desktops, servers, smart

desktops, servers, smart phones, and tablets.
Employees must follow the

companies documented security policies to secure their devices.
Policies often include the use of anti-virus software and host intrusion prevention.


Common Endpoint Devices


Слайд 30 Securing Devices Introduction to Securing Devices
Part of network

Securing Devices Introduction to Securing DevicesPart of network security is securing

security is securing devices, including end devices and intermediate

devices.
Default usernames and passwords should be changed immediately.
Access to system resources should be restricted to only the individuals that are authorized to use those resources.
Any unnecessary services and applications should be turned off and uninstalled, when possible.
Update with security patches as they become available.



Слайд 31 Securing Devices Passwords
Weak and Strong Passwords

Securing Devices PasswordsWeak and Strong Passwords

Слайд 32 Securing Devices Basic Security Practices
Encrypt passwords.
Require minimum length

Securing Devices Basic Security PracticesEncrypt passwords.Require minimum length passwords.Block brute force

passwords.
Block brute force attacks.
Use Banner Message.  
Set EXEC timeout.
Securing

Devices

Слайд 33 Securing Devices Enabling SSH
Enabling SSH

Securing Devices Enabling SSHEnabling SSH

Слайд 34 11.3 Basic Network Performance

11.3 Basic Network Performance

Слайд 35 Ping Interpreting ICMP Messages
! – indicates receipt of an

Ping Interpreting ICMP Messages! – indicates receipt of an ICMP echo

ICMP echo reply message
. – indicates a time expired

while waiting for an ICMP echo reply message
U – an ICMP unreachable message was received


Слайд 36 Ping Leveraging Extended Ping
The Cisco IOS offers an "extended"

Ping Leveraging Extended PingThe Cisco IOS offers an

mode of the ping command:
R2# ping
Protocol [ip]:
Target IP address: 192.168.10.1
Repeat count

[5]:
Datagram size [100]:
Timeout in seconds [2]:
Extended commands [n]: y
Source address or interface: 10.1.1.1
Type of service [0]:


Слайд 37 Ping Network Baseline
Baseline with ping


Ping Network BaselineBaseline with ping

Слайд 38 Ping Network Baseline (Cont.)

Ping Network Baseline (Cont.)

Слайд 39 Tracert Interpreting Tracert Messages

Tracert Interpreting Tracert Messages

Слайд 40 Show Commands Common Show Commands Revisited
The status of nearly

Show Commands Common Show Commands RevisitedThe status of nearly every process

every process or function of the router can be

displayed using a show command.

Frequently used show commands:
show running-config
show interfaces
show arp
show ip route
show protocols
show version


Слайд 41 Show Commands Viewing Router Settings With Show Version
Cisco

Show Commands Viewing Router Settings With Show Version Cisco IOS VersionSystem

IOS Version
System Bootstrap 
Cisco IOS Image
CPU and RAM
Configuration Register
Number and

Type of Physical Interfaces 

Amount of NVRAM

Amount of Flash


Слайд 42 Show Commands Viewing Switch Settings with Show Version
show version

Show Commands Viewing Switch Settings with Show Versionshow version Command

Command


Слайд 43 Host and IOS Commands ipconfig Command Options
ipconfig – Displays

Host and IOS Commands ipconfig Command Optionsipconfig – Displays ip address,

ip address, subnet mask, default gateway.
ipconfig /all – Also

displays MAC address.
ipconfig /displaydns – Displays all cached dns entries in a Windows system.

Слайд 44 Host and IOS Commands arp Command Options
arp Command Options

Host and IOS Commands arp Command Optionsarp Command Options

Слайд 45 Host and IOS Commands show cdp neighbors Command Options
show

Host and IOS Commands show cdp neighbors Command Optionsshow cdp neighbors

cdp neighbors command provides information about each directly connected

CDP neighbor device.

Слайд 46 Host and IOS Commands Using the show ip interface

Host and IOS Commands Using the show ip interface brief CommandThe

brief Command
The show ip interface brief command verifies the

status of all network interfaces on a router or a switch.

Слайд 47 11.4 Managing IOS Configuration Files

11.4 Managing IOS Configuration Files

Слайд 48 Router and Switch File Systems Router File Systems
show file

Router and Switch File Systems Router File Systemsshow file systems command –

systems command – Lists all of the available file systems

on a Cisco 1941 route.
The asterisk (*) indicates this is the current default file system.




Слайд 49 Router and Switch File Systems Switch File Systems
The show

Router and Switch File Systems Switch File SystemsThe show file systems command

file systems command lists all of the available file systems

on a Catalyst 2960 switch.









Слайд 50 Backup and Restore Configuration Files Backup and Restore

Backup and Restore Configuration Files Backup and Restore Using Text Files

Using Text Files









Слайд 51 Backup and Restore Configuration Files Backup and Restore

Backup and Restore Configuration Files Backup and Restore Using TFTPConfiguration files

Using TFTP
Configuration files can be stored on a Trivial

File Transfer Protocol (TFTP) server.
copy running-config tftp – Saves the running configuration to a TFTP server.
copy startup-config tftp – Saves the startup configuration to a TFTP server.

Слайд 52 Backup and Restore Configuration Files Using USB Interfaces

Backup and Restore Configuration Files Using USB Interfaces on a Cisco

on a Cisco Router
USB flash drive must be formatted

in a FAT16 format.
Can hold multiple copies of the Cisco IOS and multiple router configurations.
Allows administrator to easily move configurations from router to router.

Слайд 53 Backup and Restore Configuration Files Backup and Restore

Backup and Restore Configuration Files Backup and Restore Using USBBackup to USB Drive

Using USB
Backup to USB Drive


Слайд 54 11.5 Summary

11.5 Summary

Слайд 55 Chapter 11: Summary
In this chapter, you learned:
Good network

Chapter 11: SummaryIn this chapter, you learned:Good network design incorporates reliability,

design incorporates reliability, scalability, and availability.
Networks must be

secured from viruses, Trojan horses, worms and network attacks.
Document Basic Network Performance.
Test network connectivity using ping and traceroute.
Use IOS commands to monitor and view information about the network and network devices.
Back up configuration files using TFTP or USB.



  • Имя файла: its-a-network-chapter-11.pptx
  • Количество просмотров: 95
  • Количество скачиваний: 0
- Предыдущая VASIQA
Следующая - CAD/CAM Services and Cad Designs