Академический Документы
Профессиональный Документы
Культура Документы
Version 4.0
Cisco Public
Objectives
Summarize the operation of Ethernet as defined for 100/1000 Mbps LANs in the IEEE 802.3 standard. Explain the functions that enable a switch to forward Ethernet frames in a LAN. Configure a switch for operation in a network designed to support voice, video, and data transmissions. Configure basic security on a switch that will operate in a network designed to support voice, video, and data transmissions.
Cisco Public
Summarize the operation of Ethernet as defined for 100/1000 Mbps LANs in the IEEE 802.3 standard
Describe the key elements of Ethernet/802.3 networks Remember CSMA/CD?
Ex. HTTP, FTP, SMTP, Telnet
Ex. ARP
Cisco Public
How do Switches learn of MAC addresses? What if the MAC table is empty? What if the switch receives an unknown source MAC? What if multiple devices are connected to a switch one device sends a unicast packet to another device? Does it matter if the CAM/MAC table is empty or not?
2006 Cisco Systems, Inc. All rights reserved. Cisco Public
How do broadcast domains work with switches? What happens to broadcasts when connecting multiple switches and what segments broadcasts?
2006 Cisco Systems, Inc. All rights reserved. Cisco Public
Summarize the operation of Ethernet as defined for 100/1000 Mbps LANs in the IEEE 802.3 standard Describe the design considerations for Ethernet/802.3 networks
Latency = time a frame/packet takes to reach destination Latency has 3 sources of delay = NIC, propagation, network devices in path
2006 Cisco Systems, Inc. All rights reserved. Cisco Public
Network Congestion
Reason for segmentation = isolate traffic, better use of BW per user Common causes for network congestion = more powerful and better technologies, i.e., faster/better hardware, increase of network traffic, high bandwidth applications
2006 Cisco Systems, Inc. All rights reserved. Cisco Public
Summarize the operation of Ethernet as defined for 100/1000 Mbps LANs in the IEEE 802.3 standard
Controlling Latency and understanding collision domains/broadcast domains
Cisco Public
Store and forward required for QoS Current method on current switch models
Cisco Public
10
Faster than store and forward Does not buffer frame and no CRC checking, so corrupt frames can pass through Two variants exist: -fast-forward switching = lowest latency by forwarding frame as soon as destination addr is read - fragment free = stores first 64 bytes before forwarding
2006 Cisco Systems, Inc. All rights reserved. Cisco Public
11
Explain the Functions that Enable a Switch to Forward Ethernet Frames in a LAN
So basically.
Cisco Public
12
Explain the Functions that Enable a Switch to Forward Ethernet Frames in a LAN Explain symmetric and asymmetric Switching
13
Explain the Functions that Enable a Switch to Forward Ethernet Frames in a LAN
Describe how memory buffering works
Cisco Public
14
Remember.
Cisco Public
15
Remember.
Cisco Public
16
Explain the Functions that Enable a Switch to Forward Ethernet Frames in a LAN
Compare Layer 2 with Layer 3 switching
What about layer 2 switches? -forward traffic based on destination MAC - have multiple collision domains - Extend broadcasts, not segment or prevent them
Cisco Public
17
18
Cisco Public
19
Switch Operation
20
Cisco Public
21
Cisco Public
22
Cisco Public
23
24
Cisco Public
25
Cisco Public
26
Cisco Public
27
Cisco Public
28
Which password option provides better security? Why is it important to configure an exec password? Whats the difference if we use service password-encryption?
2006 Cisco Systems, Inc. All rights reserved. Cisco Public
29
Cisco Public
30
Displays on all connected terminals at login and can be used to send messages to users; displayed before banner login if configured
31
Cisco Public
Cisco Public
32
If intruder can flood switch with bogus MACs, thus switch MAC table is full, forces switch to broadcast all frames
33
Another type of attack is DHCP starvation attack, where attack continually changes MAC and consumes all IPs from DHCP server. So whats one way to address this?
2006 Cisco Systems, Inc. All rights reserved. Cisco Public
34
Basically, trusted ports can source all DHCP messages. Untrusted ports can source DHCP requests only, so if a response is seen, then the port is shutdown.
2006 Cisco Systems, Inc. All rights reserved. Cisco Public
35
Attacker can use this information to exploit network and perform DoS attack.
2006 Cisco Systems, Inc. All rights reserved. Cisco Public
36
Cisco Public
37
Cisco Public
38
Cisco Public
39
Cisco Public
40
Cisco Public
41
What if we configure max number of MACs to a higher value, say 4, and 2 are statically learned? What happens to other two empty entries?
Cisco Public
42
Cisco Public
43
Summary
LAN Design Process that explains how a LAN is to be implemented Factors to consider in LAN design include Collision domains Broadcast domains Network latency LAN segmentation
Cisco Public
44
Summary
Switch forwarding methods Store & forward used by Cisco Catalyst switches Cut through 2 types Cut through Fast forwarding
Cisco Public
45
Summary
Symmetric switching Switching is conducted between ports that have the same bandwidth Asymmetric switching Switching is conducted between ports that have unlike bandwidth
Cisco Public
46
Summary
CISCO IOS CLI includes the following features Built in help Command history/options Switch security Password protection Use of SSH for remote access Port security
Cisco Public
47
Labs
Packet Tracer Configure Switch Security Basic Switch Configuration
Cisco Public
48
Cisco Public
49