Viruses, worms, Trojan horse, keyloggers, rootkits, spyware and other malicious programs are all part of a
class of software called malware.There are many different classes of malware that have varying ways of infecting systems and propagating themselves. Let divide these malwares into groups according to their threats and the way they operates.
Friday, 29 March 2013
Thursday, 28 March 2013
what is malware
Malware is short for "malicious software" its a computer programs designed to infiltrate and damage computers without the users consent. Malware is general term covering all the different types of threats to your computer safety such as viruses, spyware, worm, Trojan rootkits and other malicious programs. the majority of active malware threats are usually worms or Trojan rather than viruses. Some malware is disguised as genuine software, and may come from an official company website.
what is a computer worm
A computer worms are malicious programs that replicate, execute, and spread across the network connections independently with human interaction. Most of the worms are created only to replicate and spread across a network, consuming available computer resources; however, some worms carry a payload to damage the host system.
Attackers use worm payload to install backdoors in infected computers, which turns them into zombies and creates botnet; these botnets can be used to carry further cyber attacks.
Attackers use worm payload to install backdoors in infected computers, which turns them into zombies and creates botnet; these botnets can be used to carry further cyber attacks.
what is a computer virus
A computer virus is another type of malware that can replicate itself and spread from one computer to another. It attached itself to a legitimate program, executive piece of software, and then reproduces itself when that program is run. Viruses spread by reproducing and inserting themselves into programs, documents, or e-mail attachments. They can be transmitted through e-mail or downloaded files and they can be presented on DVDs, CD's, USB-drivers and any other sort of digital media.
what is spyware
What is rootkit
Rootkits are programs created to allow other malware programs to hide in plain sight. Rootkit are designed to hide from detection by users and computer security programs. Therefore they don't show up in windows Explorer, the running processes don't display in the windows Task manager, and many anti-virus programs can't find rootkit - hidden malware.
types of Trojan horse
Types of Trojan horse
Email Trojan.
This is a type of Trojan an attacker use to gain remote control of a victim computer by sending e-mail messages. Attacker can then retrieve files or folders by sending commands through email.
Trojan horses are broken down in classification based on how they breach systems and the damage they cause. The seven main types of Trojan horses are:
Email Trojan.
This is a type of Trojan an attacker use to gain remote control of a victim computer by sending e-mail messages. Attacker can then retrieve files or folders by sending commands through email.
What is Trojan horse
Wednesday, 27 March 2013
What is a Keylogger
Keyloggers or keystroke loggers are programs or hardware devices that monitor each keystroke a computer user types on a keyboard, it logs on to a file or transmits them to a remote location Keyloggers are placed between the keyboard hardware and the operating system. Although keyloggers are promoted for benign purposes like allowing parents to monitor their children's whereabouts on the Internet, they can be used to spy on anyone. They are a form of spyware used by cyber criminals to covertly watch and record everything you type on your PC in order to harvest your log-in names, passwords, and other sensitive information, and send it on to the hackers. This may include any passwords you have asked your computer to remember for you to speed up logging in, as these are held as cookies on your machine.
Tuesday, 19 March 2013
What is Network Interface Card
Network interface cards is a computer hardware component that connects a computer to a computer network. To connect to a network, a PC must have a NIC. NICs can be built into the motherboard of the computer; can be connected through a USB, PC Card, CompactFlash or FireWire port; or can be an internal adaptor card that is installed into one of the computer's expansion slots. NICs are available that can connect to either wired or wireless networks.
Every Ethernet network controller has a unique 48-bit serial number called a MAC address, which is stored in read-only memory. Every computer on an Ethernet network must have at least one controller. No two NICs will share the same address. Because NIC vendors purchase blocks of address from Institute of Electrical and Electronics Engineers (IEEE) and assign a unique address to each NIC at the time of manufacture.
The NIC allows computers to communicate over a computer network. It is both an OSI layer 1 (physical layer) and layer 2 (data link layer) device, as it provides physical access to a networking medium and provides a low-level addressing system through the use of MAC addresses. It allows users to connect to each other either by using cables or wirelessly.
Every Ethernet network controller has a unique 48-bit serial number called a MAC address, which is stored in read-only memory. Every computer on an Ethernet network must have at least one controller. No two NICs will share the same address. Because NIC vendors purchase blocks of address from Institute of Electrical and Electronics Engineers (IEEE) and assign a unique address to each NIC at the time of manufacture.
The NIC allows computers to communicate over a computer network. It is both an OSI layer 1 (physical layer) and layer 2 (data link layer) device, as it provides physical access to a networking medium and provides a low-level addressing system through the use of MAC addresses. It allows users to connect to each other either by using cables or wirelessly.
Wednesday, 13 March 2013
Cisco IP Communicator
Cisco IP
Communicator is a Microsoft Windows-based application that delivers enhanced
telephony support through personal computers. It is easy to deploy and features
some of the latest technology and advancements available with IP communications
today. This application endows computers with the functions of IP phones,
providing high-quality voice calls on the road, in the office, or from wherever
you can access the corporate network. Cisco IP Communicator supports Session
Initiation Protocol (SIP) as well as the Cisco Unified Communications Manager
Skinny Client Control Protocol (SCCP).
Cisco IP
Communicator is designed for users who require a supplemental telephone when
away from their desk or traveling or telecommuting. When using Cisco IP
Communicator remotely, you are not just taking your office phone extension with
you - you still have access to the same familiar phone and video telephony
services you have in the office. This advantage boosts business collaboration
and responsiveness, and helps organizations keep pace with today’s mobile
business environment.
Cisco IP Communicator works with Cisco Unified Video Advantage to bring video telephony to the communications experience. Now, telecommuters and mobile employees using Cisco IP Communicator can enhance their communications with video. When calls are made through Cisco IP Communicator, available video is automatically displayed through Cisco Unified Video Advantage. It is as easy as making a telephone call.
Cisco IP Communicator uses the Cisco Unified Communications Manager call-processing system to provide advanced telephony features and voice-over-IP (VoIP) capabilities. Access to eight telephone lines (or a combination of lines and direct access to telephony features) is included. When registered to the Cisco Unified Communications Manager system, Cisco IP Communicator has the capabilities of a full-featured Cisco Unified IP phone, including the ability to transfer calls, forward calls, and add participants to an existing conference call. As a result, system administrators can provision Cisco IP Communicator as they would any other Cisco Unified IP phone, greatly simplifying IP phone management. This solution also can help customers and developers deliver more innovative and productivity-enhancing Extensible Markup Language (XML)-based applications to the display.
Cisco IP Communicator works with Cisco Unified Video Advantage to bring video telephony to the communications experience. Now, telecommuters and mobile employees using Cisco IP Communicator can enhance their communications with video. When calls are made through Cisco IP Communicator, available video is automatically displayed through Cisco Unified Video Advantage. It is as easy as making a telephone call.
Cisco IP Communicator uses the Cisco Unified Communications Manager call-processing system to provide advanced telephony features and voice-over-IP (VoIP) capabilities. Access to eight telephone lines (or a combination of lines and direct access to telephony features) is included. When registered to the Cisco Unified Communications Manager system, Cisco IP Communicator has the capabilities of a full-featured Cisco Unified IP phone, including the ability to transfer calls, forward calls, and add participants to an existing conference call. As a result, system administrators can provision Cisco IP Communicator as they would any other Cisco Unified IP phone, greatly simplifying IP phone management. This solution also can help customers and developers deliver more innovative and productivity-enhancing Extensible Markup Language (XML)-based applications to the display.
Cisco debug command
Debug is a troubleshooting command that’s available from the
privileged exec mode of Cisco IOS. It’s used to display information about
various router operations and the related traffic generated or received by the
router, plus any error messages.
It’s a useful and informative tool, but you really need to understand some important facts about its use. Debug is regarded as a very high-priority task because it can consume a huge amount of resources and the router forced to process-switch the packets being debugged. So you don’t just use debug as a monitoring tool – it’s meant to be used for short period of time and only as a troubleshooting tool. By using it, you can really find out some truly significant facts about both working and faulty software and/or hardware components.
It’s a useful and informative tool, but you really need to understand some important facts about its use. Debug is regarded as a very high-priority task because it can consume a huge amount of resources and the router forced to process-switch the packets being debugged. So you don’t just use debug as a monitoring tool – it’s meant to be used for short period of time and only as a troubleshooting tool. By using it, you can really find out some truly significant facts about both working and faulty software and/or hardware components.
Because debugging output takes priority over other network
traffic, and because the debug all command
generates more output than any other debug
command, it can severely diminish the router’s performance – even render it
unusable. So in virtually all cases, it’s best to use more-specific debug commands.
Backing Up and Restoring the Cisco Configuration
Any changes you make to the router configuration are stored
in the running-config file. And if you don’t enter a copy run start command after you make a change to running-config,
that change will go poof if the router reboots or gets powered down. So you
probably want to make another backup of the configuration information just in
case the router or switch completely dies on you. Even if your machine is
healthy and happy, it’s good to have for reference and documentation reasons.
Restoring the Cisco Router Configuration
If you’ve changed your router’s running-config file and want to restore the configuration to the version in the startup-config file, the easiest way to do this is to use the copy startup-config running-config command (copy start run for short). You can also use the Cisco command config mem to restore a configuration. Of course, this will work only if you copied running-config into NVRAM before making any changes!
If you did copy the router’s configuration to a TFTP server as a second backup, you can restore the configuration using the copy tftp running-config command (copy tftp run for short) or the copy tftp startup-config command (copy tftp start for short).
Backing up the Cisco Router
Configuration
To copy the router’s configuration from a router to a
TFTP server, you can use either the copy
running-config tftp or the copy
startup-config tftp command. Either one will back up the router
configuration that’s currently running in DRAM or that’s stored in NVRAM.Restoring the Cisco Router Configuration
If you’ve changed your router’s running-config file and want to restore the configuration to the version in the startup-config file, the easiest way to do this is to use the copy startup-config running-config command (copy start run for short). You can also use the Cisco command config mem to restore a configuration. Of course, this will work only if you copied running-config into NVRAM before making any changes!
If you did copy the router’s configuration to a TFTP server as a second backup, you can restore the configuration using the copy tftp running-config command (copy tftp run for short) or the copy tftp startup-config command (copy tftp start for short).
APIPA
Windows clients support a feature known as automatic private IP
addressing (APIPA), which is a feature that provides that, when a Windows
client boots up and cannot contact a DHCP server, it will configure itself
automatically with a 169.254.x.y address. If there is something
wrong with the DHCP server and all the systems on the network cannot obtain an
address from the DHCP server, the clients will all assign themselves an address
within the 169.254 address range and then be able to communicate with one another.
APIPA does not assign a default gateway, so you will be unable to access resources on a remote network and the Internet—but you can still communicate with systems on your network. When troubleshooting to find out why a machine cannot communicate on the network, watch for systems that have the 169.254.x.y address range because it means they could not find a DHCP server
APIPA does not assign a default gateway, so you will be unable to access resources on a remote network and the Internet—but you can still communicate with systems on your network. When troubleshooting to find out why a machine cannot communicate on the network, watch for systems that have the 169.254.x.y address range because it means they could not find a DHCP server
Disaster recovery
The disaster recovery plan should contain detailed steps for recovering from any kind of data loss or physical disaster. The step-by-step plan should contain the location of backup tapes, specify which tapes to restore in different scenarios, and list the steps for rebuilding servers, including detailed information on what to do when a disk fails and how to replace and rebuild the data.
A number of disaster recovery documents overlook key elements such as location of software and CD keys needed to rebuild the system. Be sure that contact information for hardware and software vendors is included in the plan so that if you need to replace an item such as a disk you can contact the vendor.
Along with detailed recovery steps, a disaster recovery plan should contain detailed information on backup and restore strategies, offsite storage, hot and cold spares, and hot and cold sites.
What is fault tolerance
Fault tolerance is the concept of ensuring that
systems will continue to function because you have created a solution that
involves having backup copies of power supplies, hard drives, and network
links. If one of the links goes down, there would be another link ready to kick
in at any time, reducing downtime and ensuring an available solution to clients
on the network. The following is a list of widely used fault-tolerant
components found on the network.
·
RAID
solutions Redundant
Array of Independent Disks (RAID) is the concept of storing redundant data on
additional drives in case one drive in the RAID solution should fail. RAID
solutions can apply to hardware or software. The hardware solution involves
having a RAID controller that controls the RAID array, whereas in a software
solution the RAID solution is managed by software such as the network operating
system. The software solutions are cheaper, but the hardware solutions offer
better performance and are more flexible
·
Power
A number of network devices
such as servers support a fault-tolerant power source such as a power supply in
case the original power supply fails.
·
Network
link In a
number of networking environments a fault-tolerant network link is created to
ensure that one network location can communicate with another location at all
times or that there is a constant connection to the WAN environment or
Internet. A number of business applications require a network link at all
times; therefore, when you design the network infrastructure, you should decide
whether the organization requires a fault tolerant network link.
How to back up your Cisco Router IOS
Follow the steps below on how to back up your Cisco
Router IOS:
1.
Log into your router and go into privileged mode
by typing en or enable.
2.
Make sure you can connect to the TFTP server
that is on your network by pinging the IP address from the router console.
3.
Type show
flash to see the contents of flash memory.
4.
Type show
version at the router privileged-mode prompt to get the name of the IOS
currently running on the router. If there is only one file in flash memory, the
show flash and show version commands show the same file. Remember that the show version command shows you the file
that is currently running and the show
flash command shows you all of the files in flash memory.
5.
Once you know you have good Ethernet
connectivity to the TFTP server and you also know the IOS filename, back up
your IOS by typing copy flash tftp. This
command tells the router to copy the content of flash memory (this is where the
IOS is stored by default) to a tftp server.
6.
Enter the IP address of the TFTP server and the
source IOS filename. The file is now copied and stored in the TFTP server’s
default directory.
Internet Protocol Security (IPsec)
Internet Protocol Security (IPsec) is a fairly new
security protocol that can be used to encrypt all IP traffic as well as take
part in authentication services and ensure data integrity of information sent
across an IP network. One of the things that are so exciting about IPsec is
that if you enable IPsec, by means of an IPsec policy, you will not need to
configure different encryption methods for each type of application you run on
the computer—all IP traffic is encrypted by IPsec once the IPsec policy is
implemented. For example, because IPsec encrypts all traffic you do not need to
configure a separate encryption technology for your web server, FTP server, and
Telnet server. They all run on top of TCP/IP, so IPsec can be used to secure
traffic presented by each application.
When you enable IPsec, you can use one of the default
IPsec policies built-in. The IPsec policy is used to determine the type of
traffic to be encrypted and the method to be used to encrypt the traffic. The
three default IPsec policies are as follows:
·
Client
(respond only) If
asked to communicate securely, this system will respond by using IPsec, but it
will never request or initiate secure communication.
·
Server
(request security) When
enabled, this system will request to use IPsec to secure traffic; if the remote
system does not support IPsec, the system will communicate insecurely.
·
Secure
Server (require security) This
system will communicate with a remote system only if the remote system supports
and uses IPsec.
types of computer Network attack
Most types of attacks are considered network-based
attacks where the hacker performs the attack from a remote system. There are a
number of different types of network attacks:
·
Eavesdropping
attack this
widely used type of attack typically involves the use of network monitoring
tools to analyze and read communications on the network.
·
Spoof
attack in a
spoof attack, the hacker modifies the source address of the packets he or she
is sending so that they appear to be coming from someone else. This may be an
attempt to bypass your firewall rules.
·
Hijack
attack in a
hijack attack, a hacker takes over a session between you and another individual
and disconnects the other individual from the communication. You still believe
that you are talking to the original party and may send private information to
the hacker unintentionally.
·
Denial
of service: A
denial of service (DOS) is a type of attack that causes the system or its
services to crash. As a result, the system cannot perform its purpose and
provide those services.
·
Distributed
denial of service (DDOS) The
hacker uses multiple systems to attack a single target system. A good example
is the SMURF attack, in which the hacker pings a number of computers but
modifies the source address of those packets so that they appear to come from
another system (the victim in this case). When all of these systems receive the
ping request, all systems will reply to the same address, essentially
overburdening that system with data.
·
Buffer
overflow: A
buffer overflow attack is when the attacker sends more data to an application
than is expected. A buffer overflow attack usually results in the attacker
gaining administrative access to the system in a command prompt or shell.
·
Exploit
attack: In
this type of attack, the attacker knows of a security problem within an
operating system or a piece of software and leverages that knowledge by
exploiting the vulnerability.
·
Password
attack: An
attacker tries to crack the passwords stored in a network account database or a
password-protected file. There are three major types of password attacks: a
dictionary attack, a brute-force attack, and a hybrid attack. A dictionary
attack uses a word list file, which is a list of potential passwords. A brute-force
attack is when the attacker tries every possible combination of characters.
With brute force a file is not read. A hybrid attack is similar to a
dictionary attack in that it uses a word list file, but it also places numbers
at the end of the word to catch passwords that are not dictionary words because
the user placed a number at the end. For example, a dictionary attack would not
find the password “pass1,” but a hybrid attack would.
Social engineering attacks
The key to protecting yourself and fellow employees from social engineering attacks is education! Keeping all personnel aware of the popularity of social engineering attacks and the different scenarios that could be examples of social engineering attacks will help raise the security level of the organization.
There are a number of different examples of social engineering attacks. The following are some of the most popular scenarios:
·
Hacker
impersonates administrator in
this example, the hacker may call the employee and impersonate the network
administrator. The hacker will try to convince the employee to change their
password or divulge password information.
·
Hacker
impersonates user in
this example, the hacker calls an unsuspecting network administrator and plays
the role of a frustrated user who cannot log on to the network. The network
administrator naturally helps the “user” by resetting the password and helping
them log on—problem being it is actually the hacker!
·
Hacker
impersonates vendor in
this example, the hacker may e-mail a customer pretending to be the vendor of a
piece of software. In this example, the hacker tries to get the user to install
an update, but the user doesn’t realize the update is really a Trojan virus
that gives the hacker access to the system.
Universal Serial Bus (USB)
Add caption |
·
USB
1.0 USB 1
has a transfer rate of 12 Mbps, which is an amazing speed, considering that
serial ports and parallel ports offer only a speed up to 2 Mbps.
·
USB
2.0 USB
2.0 has a transfer rate of 480 Mbps! This difference in transfer rate
dramatically reduces the time it takes to transfer data from one network
component to another. For example, last week I was transferring a 3GB file from
my USB 2.0 drive to the hard drive on the computer, but because there was not a
USB 2.0 driver loaded, the system was treating the device as a USB 1.1 device.
As a result, the file copy operation was going to take 67 minutes! I chose
Cancel and then updated the driver to USB 2.0 and attempted the file copy a
second time; this time it took 3 minutes. Gotta love USB 2.0!
Most systems today have USB ports on both the front
and the back of the computer. You can also purchase a USB hub device that will
connect to your system and allow additional devices to be connected to it.
Link state routing protocols
Link state routing protocols,
also called shortest-path-first-protocols,
are a little more advanced than distance-vector routing protocols in the sense
that a link state routing protocol knows about the entire network topology. A
link state protocol is responsible for monitoring the state of the link between
the routers. This link state information is then used to determine the optimal
route to a destination network. Although protocols such as RIP have knowledge
of neighboring routers, link state protocols have knowledge of the entire
network topology and multicast the routing table information to the entire
network.
One of the benefits
of the link state routing protocols is that if a link is down, that information
is stored in the routing table and that pathway will not be used. Because a
distance vector routing protocol does not store link state information, it is
possible that it will not know of a link that is unavailable for some time and
it could still send traffic through that pathway.
In link-state protocols
the routers each create three separate tables. One of these tables keeps track
of directly attached neighbors, one determines the topology of the entire
internetwork, and one is used as the routing table. Link-state routers know
more about the internetwork than any distance-vector routing protocol. OSPF is
an IP routing protocol that is completely link state. Link-state protocols send
updates containing the state of their own links to all other routers on the
network.distance vector routing protocol
Distance vector routing protocols measure the best route to
use based on the lowest hop count. The hop count is increased by one for every
router between the source and the destination. With distance vector routing
protocols, the route with the lowest hop count is typically selected as the
destination path for the data.
The
distance-vector routing protocol algorithm passes complete routing table
contents to neighboring routers, which then combine the received routing table
entries with their own routing tables to complete the router’s router table.
This is called routing by rumor, because a router receiving an update from a
neighbor router believes the information about remote networks without actually
finding out for itself.
It’s
possible to have a network that has multiple links to the same remote network,
and if that’s the case, the administrative distance of each received update is
checked first. If the AD is the same, the protocol will have to use other
metrics to determine the best path to use to that remote network. Example of
distance-vector routing protocol is RIP and IGRP.
Assigning IP address to a Cisco Router
To assign an IP address to the Ethernet interface on ROUTER, you
will need to type the following
Commands (excluding what appears before > or #—those are the prompts):
ROUTER> enable
ROUTER# configure terminal
ROUTER(config)# interface ethernet0
ROUTER(config-if)# ip address 192.168.1.1 255.255.255.0
ROUTER(config-if)# no shutdown
Let’s take a look at what each of these commands do. The first command, enable, is used to move from user exec mode of the router to privilege exec mode. In user exec mode you are unable to make changes, so you had to go to privilege exec mode. In order to change the settings of the Ethernet interface, you need to go to the interface prompt, which is in global configuration, where most changes are made. To move to global configuration, you typed configure terminal, and to move to the interface prompt, you typed interface ethernet0. Ethernet0 is the first Ethernet interface on the router; the second Ethernet interface would be Ethernet1 (if you had a second Ethernet interface).
Once at the Ethernet interface prompt, you then assigned the IP address with the ip address command. The last command, no shutdown, is used to enable the interface. To disable the interface at any time, you could use the shutdown command. To assign the IP address to the Serial 0 port on ROUTER, you would type the following commands:
ROUTER> enable
ROUTER# configure terminal
ROUTER(config)# interface serial0
ROUTER(config-if)# ip address 192.168.2.1 255.255.255.0
ROUTER(config-if)# no shutdown
Commands (excluding what appears before > or #—those are the prompts):
ROUTER> enable
ROUTER# configure terminal
ROUTER(config)# interface ethernet0
ROUTER(config-if)# ip address 192.168.1.1 255.255.255.0
ROUTER(config-if)# no shutdown
Let’s take a look at what each of these commands do. The first command, enable, is used to move from user exec mode of the router to privilege exec mode. In user exec mode you are unable to make changes, so you had to go to privilege exec mode. In order to change the settings of the Ethernet interface, you need to go to the interface prompt, which is in global configuration, where most changes are made. To move to global configuration, you typed configure terminal, and to move to the interface prompt, you typed interface ethernet0. Ethernet0 is the first Ethernet interface on the router; the second Ethernet interface would be Ethernet1 (if you had a second Ethernet interface).
Once at the Ethernet interface prompt, you then assigned the IP address with the ip address command. The last command, no shutdown, is used to enable the interface. To disable the interface at any time, you could use the shutdown command. To assign the IP address to the Serial 0 port on ROUTER, you would type the following commands:
ROUTER> enable
ROUTER# configure terminal
ROUTER(config)# interface serial0
ROUTER(config-if)# ip address 192.168.2.1 255.255.255.0
ROUTER(config-if)# no shutdown
types of Network address Translation (NAT)
1.
Static NAT: This type of NAT is designed to allow
one-to-one mapping between local and global addresses. Keep in mind that the
static version requires you to have one real Internet IP address for every host
on your network.
2.
Dynamic NAT: This version gives you the ability to map an
unregistered IP address to registered IP address from out of a pool of
registered IP addresses. You don’t have to statically configure your router to
map an inside to an outside address as you would use static NAT, but you do
have to have enough real, bona-fide IP addresses for everyone who’s going to be
sending packets to and receiving them from the internet.
3.
Overloading: This is the most popular type of NAT
configuration. Understand that overloading really is a form of dynamic NAT that
maps multiple unregistered IP addresses to a single registered IP address –
many-to-one – by using different ports. Now, why is this so special? Well,
because it’s also known as Port Address Translation (PAT). And by using PAT
(NAT overload), you get to have thousands of users connect to the internet
using only real global IP address – cool right, yeah? Seriously, NAT Overload
is the real reason we haven’t run out of valid IP address on the internet,
Dial-up connections
Dial-up lines are
local loop public Switched Telephone
Network (PSTN) connections that use modems, existing phone lines, and
existing long-distance carrier services to provide low-cost, low-bandwidth WAN
connectivity and remote network access. Dial-up lines are generally limited to
56Kbps, and are sometimes used for backups for higher-bandwidth WAN services.
Dial-up HardwareYou can keep hardware requirements simple and use a modem attached to a serial port on a PC, or you can use a specialized modem card installed in the server to support multiple phone connections.
RJ-11 Connectors
RJ-11 connectors are four- or six – wire connectors that
are used to connect telephones and modems to telephone outlets. The RJ-11
connector looks much like the RJ-45 connector that is used to connect network
cards to LANs. When you are looking at an RJ-11 and RJ-45 connector, the RJ-11
connector is smaller.
Benefits and Drawbacks of
Dial-up
Dial-up lines have two major drawbacks: they are slow and
they can have considerable connection wait time (because the modem has to dial
and establish a connection before data can be sent across the network). Despite
those limitations, dial-ups are popular because they provide enough bandwidth
to get the job done at a very low cost, and because the telephone infrastructure
is already in place and is universally available.
Voice over IP (VoIP)
Voice over IP (VoIP) is a voice over Data implementation in
which voice signals are transmitted over IP networks. The phone instrument is
the addressed device. It can be an IP telephone unit or a VoIP interface at a
private Branch Exchange (PBX), which enables the phone system to access the IP
network at a single point. A dial-plan map translates between PBX dial numbers
and IP addresses; if a dialed phone number is found in the map, VoIP route the
call to an IP host.
Advantages and Limitations
of VoIP
VoIP is being rapidly adopted because it relies on the
existing, robust router infrastructure of IP networks and the near-universal
implementation of the IP protocol. It also eliminates per-call costs because it
uses the existing internet connectivity channel. It does have some drawbacks.
The major problem is that IPv4 does not provide for time-sensitive data. On a
busy network, voice data is packet switched with other network data and
delivery can slow down or become unreliable.
VoIP Protocols
A VoIP session may use one or more protocols, depending
on the session parameters.
·
Secure
Initiation Protocol (SIP): A signaling protocol for multimedia
communication sessions. Used to initiate, modify, and terminate a session. SIP
must work with other protocols because it is only responsible for the signaling
portion of a communication session.
·
Session
Description Protocol (SDP): The format for describing the content of a
multimedia communication session.
·
Real-time
Transport Protocol (RTP): Transmits audio or video content and defines the
packet for delivery including the type of content, sequence numbering, time
stamping, and delivery monitory. Has no specific UDP or TCP port number; rather
a dynamic range of port numbers, which makes traversing firewalls difficult.
·
Real-time
Transport Control Protocol (RTCP): Used primarily to monitor QoS in RTP
transmissions. Acts as a partner to RTP to package and deliver data but does
not transport data.
Secure Shell (SSH)
Secure Shell (SSH) is a program that enables a user or
application to log on to another computer over a network, execute commands, and
manage files. It provides strong authentication methods and secure
communications over insecure channels. With the SSH slogin command, the entire login
session, including the password, is encrypted and protected against attack.
SSH encrypts all traffic (including passwords) to
effectively eliminate eavesdropping, connection hijacking, and other
network-level attacks, such as IP spoofing, IP source routing, and DNS
spoofing. When you implement SSH with encryption, any attacker who has managed
to gain access to your network can only force SSH to disconnect. They cannot
play back the traffic or hijack the connection.
Secure Shell works with many different operating systems,
including Windows, UNIX, and Macintosh systems.
SSH1 and
SSH2
There are two versions of Secure Shell available: SSH1 and
SSH2.SSH1 and SSH2 are two different protocols and encrypt different parts of
the data packet. SSH2 is more secure. To authenticate systems, SSH1 employs
user keys, to identify users; host keys, to identify systems; session keys, to encrypt
communication in a single session; and server keys, which are temporary keys
that protect the session key. SSH2 does not use server keys. SSH2 includes a secure
replacement for FTP called secure file
transfer protocol (SFTP). Because of the different protocol
implementations, SSH1 and SSH2 are not compatible with each other.
NOTE: that the SFTP acronym is used both for Secure File
Transfer Protocol as well as for the obsolete Simple File Transfer Protocol.
Monday, 4 March 2013
How to configure RIPv1 and RIP v2
To configure RIP routing, just turn on the protocol with the router rip command and tell the RIP routing protocol which networks to advertise. The network command tells the routing protocol which classful network to advertise. RIP has an administrative distance of 120. static routes has an administrative distance of 1 by default. look at the example below:
router#
router#config t
router(config)#router rip
router(config-router)#network 10.0.0.0
That's it for RIP version 1, however, keep in mind the extra router CPU process and bandwidth that you're consuming.
Notice I didn't type in subnets, only the classful address network address (all subnet bits and host bits off). It is the job of the routing protocol to find the subnets and populate the routing tables. Remember that RIP uses the classful address when configuring the network address. Because of this, all subnet masks must be the same on all devices in the network (this is called classful routing). Let's say you're using a Class B network address of 172.16.0.0/24 with subnets 172.16.10.0, 172.16.20.0, and 172.16.0.0 and let RIP find the subnets and place them in the routing table.
Configuring RIPv2
RIPv2, unlike RIPv1, is a classless routing protocol (even though it is configured as classful like RIPv1), which means that it sends subnet mask information along with the route updates. by sending the subnet mask information with the updates, RIPv2 can support Variable Length Subnet Masks (VLSMs) as well as the summarization of network boundaries. RIPv2 can support discontiguous networking, here is an example on RIPv2 configuration:
router#
router#config t
router(config)#router rip
router(config-router)#network 192.168.30.0
router(config-router)#network 192.168.40.0
router(config-router)#version 2
That's it; just add the comman Version 2 under the (config-router)# prompt and you are now running RIPv2.
router#
router#config t
router(config)#router rip
router(config-router)#network 10.0.0.0
That's it for RIP version 1, however, keep in mind the extra router CPU process and bandwidth that you're consuming.
Notice I didn't type in subnets, only the classful address network address (all subnet bits and host bits off). It is the job of the routing protocol to find the subnets and populate the routing tables. Remember that RIP uses the classful address when configuring the network address. Because of this, all subnet masks must be the same on all devices in the network (this is called classful routing). Let's say you're using a Class B network address of 172.16.0.0/24 with subnets 172.16.10.0, 172.16.20.0, and 172.16.0.0 and let RIP find the subnets and place them in the routing table.
Configuring RIPv2
RIPv2, unlike RIPv1, is a classless routing protocol (even though it is configured as classful like RIPv1), which means that it sends subnet mask information along with the route updates. by sending the subnet mask information with the updates, RIPv2 can support Variable Length Subnet Masks (VLSMs) as well as the summarization of network boundaries. RIPv2 can support discontiguous networking, here is an example on RIPv2 configuration:
router#
router#config t
router(config)#router rip
router(config-router)#network 192.168.30.0
router(config-router)#network 192.168.40.0
router(config-router)#version 2
That's it; just add the comman Version 2 under the (config-router)# prompt and you are now running RIPv2.
RIP (Routing Information Protocol)
Routing Information Protocol (RIP) is a true distance-vector
routing protocol. RIP sends the complete routing table out to all active
interfaces every 30 seconds. RIP only uses hop count to determine the best way
to a remote network, but it has a maximum allowable hop count of 15 by default,
meaning that 16 is deemed unreachable. RIP works well in small networks, but
it’s inefficient on large networks with slow WAN links or on networks with a
large number of routers installed.
RIP
version 1 uses only classful routing, which means that all devices in the
network must use the same subnet mask. This is because RIP version 1 doesn’t
send updates with subnet mask information in tow. RIP version 2 provides
something called prefix routing and does send subnet mask information with the
route updates. This is called classless routing. RIP uses four kinds of timers
to regulate its performances:
Route update timer: Sets the interval (typically 30 seconds)
between periodic routing updates in which the router sends a complete copy of
its routing table out to all neighbors.
Route invalid timer: Determines the length of time that must elapse
(180 seconds) before a router determine that a route has become invalid. It
will come to this conclusion if it hasn’t heard any update about a particular
route for that period. When that happens, the router will send out updates to
all its neighbors letting them know that the route is invalid.
Holddown timer:
This sets the amount of time during which routing information is suppressed.
Routes will enter into the Holddown state when an update packet is received
that indicated the route is unreachable. This continues either until an update
packet is received with a better metric or until the holddown timer expires.
The default is 180 seconds.
Route flush timer: Sets the time between a route becoming
invalid and its removal from the routing table (120 seconds). Before it’s
removed from the table, the router notifies its neighbors of that route’s
impending demise. This gives the router enough time to tell its neighbors about
the invalid route before the local routing table is updated. See how to configure RIP
How to configure EIGRP
EIGRP can be configured for IP, IPv6, IPX and AppleTalk.
There are two modes from which EIGRP command are entered: router configuration
mode and interface configuration mode. Router configuration mode enables the
protocol, determines which networks will run EIGRP, and sets global
characteristics. Interface configuration mode allows customization of
summaries, metrics, timers and bandwidth.
NOTE: Understand that the AS number is irrelevant – that is, as long as all routers use the same number! You can use any number from 1 to 65,535.
To start an EIGRP session on a router, use the router eigrp command
followed by the autonomous system number of your network. You then enter the
network numbers connected to the router using the network command followed by the network
number. Example below:
Router#config
t
Router(config)#router
eigrp 90
Router(config-router)#network
192.168.10.0
Router(config-router)#network
172.16.0.0.
NOTE: Understand that the AS number is irrelevant – that is, as long as all routers use the same number! You can use any number from 1 to 65,535.
EIGRP Enhance Interior Gateway Routing Protocol
Enhanced Interior Gateway Routing Protocol (EIGRP) is a
cisco proprietary Cisco protocol that runs on Cisco routers. Understanding
EIGRP is very important because it is probably one of the two most popular
routing protocols in used today. EIGRP is a classless, enhanced-vector protocol
that gives us a real edge over another Cisco proprietary protocol, Interior
Gateway Routing Protocol (IGRP). That’s basically why it’s call Enhanced IGRP,
like IGRP, EIGRP uses the concept of an autonomous system to describe the set
of contiguous routers that run the same routing protocol and share routing
information. But unlike IGRP, EIGRP includes the subnet mask in its route
updates. The advertisement of subnet information allows us to use Variable
Length Subnet Mask (VLSM) and summarization when designing our networks!
EIGRP is
sometimes referred to as a hybrid routing protocol because it has
characteristics of both distance-vector and link-state protocols. For example,
EIGRP doesn’t send link-state packets as OSPF does; instead, it sends
traditional distance-vector updates containing information about networks plus
the cost of reaching them from the perspective of the advertising router. And
EIGRP has link-state characteristics as well – it synchronizes routing tables
between neighbors at startup and then sends specific updates only when topology
changes occur. This makes EIGRP suitable for very large networks. EIGRP has a
maximum hop count of 255 (the default is set to 100).
There are a number of powerful features that make EIGRP a
real standout from IGRP and other protocols. The main features are:
·
Support for IP and IPv6 (and some other useless
routed protocols) via protocol dependent modules.
·
Considered classless (same as RIPv2 and OSPF).
·
Support for VLSM/CIDR.
·
Best path selection via Diffusion Update
Algorithm (DUAL).
·
Support for summaries and discontiguous
networks.
·
Efficient neighbor discovery.
·
Communication via Reliable Transport Protocol
(RTP).
Subscribe to:
Posts (Atom)