CCNA Exploration: Accessing the WAN Chapter 7 Case Study
|
|
|
- Theodora Blake
- 9 years ago
- Views:
Transcription
1 Objectives: Mitigate attacks based on DHCP rogue servers. Intro: ChurchBells Inc. is having connectivity issues and needs your help. The Scenario: According to the reports, some user PCs within the company are having connectivity issues. What has puzzled ChurchBells Helpdesk staff is that the PCs having trouble are not always the same, they seem to be randomly affected According to the reports, the affected PCs are not able to communicate with parts of the network. As shown in the topology below, ChurchBells Inc. has a very simple network. It relies on a router (CBR1) to route traffic between the internal devices and the outside world (the Internet) by performing NAT before sending packets out to the Internet as RFC 1918 IP addresses are used within ChurchBells network. CBR1 also plays an important role as the DHCP server of the network and thus, it is CBR1 s responsibility to hand out IP addresses and IP configurations. The user PCs and network devices connect to CBR1 via Cisco switch. Topology:
2 Step 1 Verifying users PCs Once you get to ChurchBells office, you decide first to take a look at the user PCs. You ask for a PC which is currently experiencing the problem and a Helpdesk representative shows it to you. A quick inspection reveals that the PC has the wrong IP configuration. More specifically, the PC is connected to /24 but has IP information belonging to a different network. Just to be sure, you try to release and renew the IP configuration via DHCP on the affected PC. Since that specific PC is running a version of MS Windows XP, you issue the following commands from a MS Windows command shell window: C:\>ipconfig /release Windows IP Configuration Ethernet adapter Local Area Connection: C:\> Connection-specific DNS Suffix. : IP Address : Subnet Mask : Default Gateway : C:\>ipconfig /renew Windows IP Configuration Ethernet adapter Local Area Connection: C:\> Connection-specific DNS Suffix. : IP Address : Subnet Mask : Default Gateway : As shown above, even after a release and renew the PC still acquires the wrong IP information. This explains why it is not able to communicate properly. Since it was configured to learn IP information from a DHCP server (CBR1) you decide to go check CBR s configuration.
3 Step 2 Verifying CBR1 You connect your laptop to CBR1 s console port and check the router configuration. Everything looks good. Below is the relevant portion of CBR1 s configuration: ip dhcp pool CB_POOL network default-router dns-server domain-name cbr-inc.com interface Serial0/1 ip address dhcp ip nat outside ip virtual-reassembly no cdp enable interface FastEthernet0/1 ip address ip nat inside ip virtual-reassembly ip nat inside source list INTERNS interface Serial0/1 overload ip access-list standard INTERNS permit Surprisingly, CBR1 has no flaws in its configuration. The only DHCP pool defined was properly configured and CBR1 s interfaces have correct IP addresses configured. You check the cables and the switch configuration without finding any problem. Since nothing wrong was found either in CBR1, in the switch or the cabling and some PCs are still learning wrong information via DHCP, chances are a second DHCP server is running within ChurchBells network.
4 Step 3 Searching for a rogue DHCP Server You suspect there is a rogue DHCP server active within ChurchBells network and you decide to investigate to be sure. A rogue DHCP server on a network is a DHCP server which is not under the administrative control of the network staff. It is usually a network device such as a modem or a router connected to the network by a user who is unaware of the consequences, though it can also be knowingly used for network attacks. A rogue DHCP server can be very dangerous. The DHCP protocol, as many other network protocols, was written with no security concerns. No authentication or authorization takes place during an exchange between a DHCP server and a DHCP client, so the server has no way of knowing if the client requesting the address is a legitimate client on the network, and the client has no way of knowing if the server that assigned the address is a legitimate DHCP server. The presence of rogue clients and servers on your network can create all kinds of problems. For example, a rogue DHCP server could provide legitimate clients with bogus TCP/IP information that prevents the clients from communicating on the network. A denial of service (DoS) condition then results, and users are unable to connect to network resources to perform their work. A rogue DHCP server could simply be set up by gaining physical access to your network through social engineering and plugging in a laptop configured as a DHCP server. Another scenario might involve an attacker compromising a client computer on your network and installing software that repeatedly requests new IP addresses using spoofed MAC addresses until the entire pool of addresses in your DHCP server's scope is leased. When this happens, legitimate clients that boot onto the network cannot acquire an address and again users are unable to access the network and cannot do their work. A more serious attack takes place when an attacker modifies the server to assign incorrect DNS settings to clients. While the client would still be able to access the network (making it hard for the user to detect a problem) all DNS queries would be redirected to rogue or hijacked DNS servers. This bogus DNS server could then redirect clients to hostile websites, designed to imitate financial institutions websites as banks or credit cards. The user, led to believe such websites were authentic, would end up exposing very sensitive information. As a last example, an attacker could modify the server to assign the address of the attacker's own machine as the default gateway, which results in outbound client traffic being redirected to the attacker's machine, which captures and reads the traffic and forwards it to the real default gateway. The result is exposure of sensitive business information without users even being aware of what is happening.
5 Question If a client receives more than one DCHPOFFER packet, which one does it take? Answer: The client will most likely take the first offer presented to it, with a few exceptions. Usually, in situations like that, the rogue DHCP server located among the DHCP clients (one of the user PCs running a DHCP server) is picked by the clients because it is closer than the valid DHCP server. You explain your suspicions to the Helpdesk staff and learn from them that a new computer was added to the network. It has Linux running on it and according to them the problems started more or less at the same time they added that computer to the network. Upon your request, you are taken to that specific computer by the Helpdesk team. You plug your own laptop into ChurchBells network and start Wireshark, a traffic analyzer software. With Wireshark running on your laptop, you release/renew the IP address information once more in the affected PC. On the traffic analyzer output window you can see that two DHCP servers responded to the request: CBR1 and an unidentified server. You login to the Linux box and find DHCP running on it. To quickly ensure whether or not the new installed Linux box is the source of the problem, you unplug its network cable and release/renew the IP configuration in the same user PC used before. Once more the traffic analyzer running on your laptop shows DHCP responses but only from CBR1 this time. You repeat the test a few times to ensure no rogue DHCP servers are answering clients requests and ask the helpdesk team to clean up the Linux machine before reconnecting it to the network. Even though the problem is solved, you decide to take some security measures to prevent rogue DHCP servers to connect to the network in the future. You decide to configure a Cisco proprietary protocol in the switch called DHCP Snooping. DHCP Snooping is a Cisco proprietary feature that provides a higher level of DHCP security by defining trusted and untrusted ports and looking into DHCP packets while they cross the switch. Ports where legal DCHP servers are not expected (as ports connected to hosts, printers, etc) are tagged as untrusted while switch ports connected to legal DHCP servers are tagged as trusted. Since there is no reason for a host to send DHCPOFFER and/or DHCPACK messages, DHCP Snooping watches every DHCP message crossing the switch. If a DHCPOFFER or a DHCPACK is detected coming from a host (untrusted port), the switch will discard the message. Such messages are only forwarded if they come from trusted ports. DHCP snooping acts like a firewall between untrusted hosts and DHCP servers. It also gives you a way to differentiate between untrusted interfaces connected to the end-user and trusted interfaces connected to the DHCP server or another switch.
6 Note: DHCP Snooping has more features than mentioned here. For instance, it is able to check the frame source MAC address to ensure it is the same MAC address listed within the DHCP packet field to avoid DHCP DoS. For more information about DHCP Snooping, check: You connect to the switch s console port and configure DHCP snooping in VLAN 10 the only VLAN used by ChurchBells network. The commands are listed below for future reference. Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Sw1(config)# ip dhcp snooping Sw1(config)# ip dhcp snooping vlan 10 Sw1(config)# ip dhcp snooping information option Sw1(config-if)# ip dhcp snooping trust Sw1(config-if)# ip dhcp snooping limit rate 100 Sw1(config)# end Sw1# show ip dhcp snooping DHCP Snooping is configured on the following VLANs: 10 Insertion of option 82 information is enabled. Interface Trusted Rate limit (pps) FastEthernet2/1 yes 10 FastEthernet2/2 yes none FastEthernet3/1 no 20 Sw1#
Configuring DHCP Snooping
CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration examples.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
Topic 7 DHCP and NAT. Networking BAsics.
Topic 7 DHCP and NAT Networking BAsics. 1 Dynamic Host Configuration Protocol (DHCP) IP address assignment Default Gateway assignment Network services discovery I just booted. What network is this? What
Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server
Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server Objective Scenario Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, students will learn the
Security Considerations in IP Telephony Network Configuration
Security Considerations in IP Telephony Network Configuration Abstract This Technical Report deals with fundamental security settings in networks to provide secure VoIP services. Example configurations
Skills Assessment Student Training Exam
Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
Session Title: Exploring Packet Tracer v5.3 IP Telephony & CME. Scenario
Session Title: Exploring Packet Tracer v5.3 IP Telephony & CME Scenario With the scheduled release of Packet Tracer v5.3 in the near future, this case study is designed to provide you with an insight into
Configuring WAN Failover with a Cisco 881 Router and an AirLink ES440
Configuring WAN Failover with a Cisco 881 Router and an AirLink ES440 When the AirLink ES440 is combined with a third-party router, the combined solution supports business continuity by providing primary
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
Investigation of DHCP Packets using Wireshark
Investigation of DHCP Packets using Wireshark Mohsin khan Faculty of Telecommunication Engineering and Environment Birmingham City University England Saleh Alshomrani Faculty of Computing and IT King Abdulaziz
How to Set Up a Wireless Network. How to configure a wireless network for a computer science programming contest using PC 2
How to Set Up a Wireless Network How to configure a wireless network for a computer science programming contest using PC 2 Checklist: The procedure to set up a wireless network is not difficult at all.
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
LAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
Evaluation guide. Vyatta Quick Evaluation Guide
VYATTA, INC. Evaluation guide Vyatta Quick Evaluation Guide A simple step-by-step guide to configuring network services with Vyatta Open Source Networking http://www.vyatta.com Overview...1 Booting Up
The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series
Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
Using Cisco UC320W with Windows Small Business Server
Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following
Lab 4.5.2 Diagramming Intranet Traffic Flows
Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
Router Lab Reference Guide
Router Lab Reference Guide 1 PURPOSE AND GOALS The routing lab allows testing different IP-related protocols and solutions in a close to live environment. You can learn how to configure Cisco routers and
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)
100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.
VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port
1. VLAN Overview 2. VLAN Trunk 3. Why use VLANs? 4. LAN to LAN communication 5. Management port 6. Applications 6.1. Application 1 6.2. Application 2 6.3. Application 3 6.4. Application 4 6.5. Application
Lab 5.3.7 Configuring DHCP with SDM and the Cisco IOS CLI
Lab 5.3.7 Configuring DHCP with SDM and the Cisco IOS CLI Device Host Name Interface IP Address Subnet Mask R1 Customer Serial 0/0/1 (DTE) 209.165.200.225 255.255.255.224 Fast Ethernet 0/0 192.168.1.1
Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes
Dynamic Host Configuration Protocol (DHCP) 1 1 Dynamic Assignment of IP addresses Dynamic assignment of IP addresses is desirable for several reasons: IP addresses are assigned on-demand Avoid manual IP
Digi Connect WAN Application Guide Using the Digi Connect WAN and Digi Connect VPN with a Wireless Router/Access Point
Scenario Digi Connect WAN Application Guide Using the Digi Connect WAN and Digi Connect VPN with a Wireless Router/Access Point Digi Connect WAN and Digi Connect VPN are used for primary remote site connectivity.
Chapter 5 Customizing Your Network Settings
Chapter 5 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the RangeMax NEXT Wireless Router WNR834B, including LAN, WAN, and routing settings.
Lab 5-5 Configuring the Cisco IOS DHCP Server
Lab 5-5 Configuring the Cisco IOS DHCP Server Learning Objectives Configure and verify the operation of the Cisco IOS DHCP server Configure an IP Helper address Review the EIGRP configuration Topology
Configuring the Switch IP Address and Default Gateway
CHAPTER 3 Configuring the Switch IP Address and Default Gateway This chapter describes how to configure the IP address, subnet mask, and default gateway on the Catalyst enterprise LAN switches. Note For
ON HOLD ANNOUNCER. Once you receive your audio announcer, check the packaging to ensure that all of the following items are enclosed:
ON HOLD ANNOUNCER The is a high quality digital on-hold announcer. It is designed to be attached to a 100BASE-T Ethernet network to receive audio production updates via the Internet. These instructions
FSM73xx GSM73xx GMS72xxR Shared access to the Internet across Multiple routing VLANs using a Prosafe Firewall
FSM73xx GSM73xx GMS72xxR Shared access to the Internet across Multiple routing VLANs using a Prosafe Firewall This document describes how to: - Create multiple routing VLANs - Obtain Internet access on
Configuring Static and Dynamic NAT Simultaneously
Configuring Static and Dynamic NAT Simultaneously Document ID: 13778 Contents Introduction Prerequisites Requirements Components Used Conventions Configuring NAT Related Information Introduction In some
CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual
4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial
Application Note Startup Tool - Getting Started Guide
Application Note Startup Tool - Getting Started Guide 1 April 2012 Startup Tool Table of Contents 1 INGATE STARTUP TOOL... 1 2 STARTUP TOOL INSTALLATION... 2 3 CONNECTING THE INGATE FIREWALL/SIPARATOR...
Lab - Using IOS CLI with Switch MAC Address Tables
Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A S1 VLAN 1 192.168.1.11 255.255.255.0 192.168.1.1 S2 VLAN 1 192.168.1.12
ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo
ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo A typical set up for a router PCs can be connected to the router via USB or Ethernet. If you wish to use a telephone with the
Chapter 2 Reading Organizer
Chapter 2 Reading Organizer After completion of this chapter, you should be able to: Explain the advantages and disadvantages of static routing Configure initial settings on a Cisco switch Configure switch
UNIVERSIDADE DA BEIRA INTERIOR Faculdade de Engenharia Departamento de Informática
1 1. This is a frequency evaluation test. 2. Read the questions carefully before answering. 3. Write your answers in the answer sheet provided. 4. Return only the answer sheet with your name, number and
Configuring DHCP. DHCP Server Overview
Configuring DHCP This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP). For a complete description of the DHCP commands listed in this chapter, refer to the DHCP s chapter
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners
LAN TCP/IP and DHCP Setup
CHAPTER 2 LAN TCP/IP and DHCP Setup 2.1 Introduction In this chapter, we will explain in more detail the LAN TCP/IP and DHCP Setup. 2.2 LAN IP Network Configuration In the Vigor 2900 router, there are
Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0)
for connecting to a BIM Server GRAPHISOFT 2009 (version 1.0) Basic Vocabulary...3 Local Area Networks...5 Examples of Local Area Networks...5 Example 1: LAN of two computers without any other network devices...5
1 PC to WX64 direction connection with crossover cable or hub/switch
1 PC to WX64 direction connection with crossover cable or hub/switch If a network is not available, or if it is desired to keep the WX64 and PC(s) completely separated from other computers, a simple network
Technical White Paper
Instant APN Technical White Paper Introduction AccessMyLan Instant APN is a hosted service that provides access to a company network via an Access Point Name (APN) on the AT&T mobile network. Any device
ICS 351: Today's plan. IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration
ICS 351: Today's plan IP addresses Network Address Translation Dynamic Host Configuration Protocol Small Office / Home Office configuration IP address exhaustion IPv4 addresses are 32 bits long so there
Chapter 4 Customizing Your Network Settings
. Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It
Chapter 8 Advanced Configuration
Chapter 8 Advanced Configuration This chapter describes how to configure the advanced features of your ProSafe 802.11g Wireless VPN Firewall FVG318. Configuring Dynamic DNS If your network has a permanently
Using a VPN with Niagara Systems. v0.3 6, July 2013
v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel
Prestige 202H Plus. Quick Start Guide. ISDN Internet Access Router. Version 3.40 12/2004
Prestige 202H Plus ISDN Internet Access Router Quick Start Guide Version 3.40 12/2004 Table of Contents 1 Introducing the Prestige...3 2 Hardware Installation...4 2.1 Rear Panel...4 2.2 The Front Panel
< Introduction > This technical note explains how to connect New SVR Series to DSL Modem or DSL Router. Samsung Techwin Co., Ltd.
< Introduction > This technical note explains how to connect New to DSL Modem or DSL Router. Samsung Techwin Co., Ltd. 1 Contents 1. General... 4 1.1. DSL (xdsl)... 4 1.2. Modem... 5 1.2.1. Modem... 5
Overview. Firewall Security. Perimeter Security Devices. Routers
Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security
Savvius Insight Initial Configuration
The configuration utility on Savvius Insight lets you configure device, network, and time settings. Additionally, if you are forwarding your data from Savvius Insight to a Splunk server, You can configure
IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.
IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address
- Basic Router Security -
1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password
Optimum Business SIP Trunk Set-up Guide
Optimum Business SIP Trunk Set-up Guide For use with IP PBX only. SIPSetup 07.13 FOR USE WITH IP PBX ONLY Important: If your PBX is configured to use a PRI connection, do not use this guide. If you need
DHCP Server. Heng Sovannarith [email protected]
DHCP Server Heng Sovannarith [email protected] Introduction Dynamic Host Configuration Protocol (DHCP) automatically assigns IP addresses and other network configuration information to computers
VDSL Hospitality Setup Guide. For 100+ Rooms
VDSL Hospitality Setup Guide For 100+ Rooms Table of Contents Table of Contents...2 Getting Started...3 What is the network topology in the hotel?... 3 How to integrate the VSG-1200, ES-3024 and VLC1124L...
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
BRI to PRI Connection Using Data Over Voice
BRI to PRI Connection Using Data Over Voice Document ID: 14962 Contents Introduction Prerequisites Requirements Conventions Background Information Configure Network Diagram Configurations Verify Troubleshoot
User Manual. Sipura SPA-2100 ATA with PC Router. January 2005 v1. Linhagratuita grupo csdata www.linhagratuita.com.br
User Manual Sipura SPA-2100 ATA with PC Router January 2005 v1 Linhagratuita grupo csdata www.linhagratuita.com.br Disclaimer Please Read: This document contains implementation examples and techniques
Juniper Networks EX Series Ethernet Switches/ Cisco VoIP Interoperability Test Results. September 25, 2009
Juniper Networks EX Series Ethernet Switches/ Cisco VoIP Interoperability Test Results September 25, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between
A typical router setup between WebSAMS and ITEd network is shown below for reference. DSU. Router
1. Installation and configuration guidelines for the router replacement This guideline served as a reference for schools which plan to replace the existing WebSAMS router by the recommended router, and
Lab 4.1.2 Characterizing Network Applications
Lab 4.1.2 Characterizing Network Applications Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Internet Connectivity Test for AlarmNet
Internet Connectivity Test for AlarmNet Updated for 2016 Total Connect IP Architecture Enhancements The TELNET tool at the DOS Command Prompt can be a useful tool to confirm network connectivity to a server
BROADBAND INTERNET ROUTER USER S MANUAL. Version 1.0. - Page 1 of 13 -
Version 1.0 - Page 1 of 13 - 10/100M Broadband Router GETTING TO KNOW 2 3 4 1 5 7 6 - Page 2 of 13 - LED Indicator S/N Indicator Function 1 Power LED (Green) LED lights up steadily indicate that the power
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
This Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same.
This Lecture The Internet and Sockets Computer Security Tom Chothia How the Internet works. Some History TCP/IP Some useful network tools: Nmap, WireShark Some common attacks: The attacker controls the
KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10
KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10 Sincan 06935 Ankara, Turkey Version Table Manual Version/Date AAA/22.03.2011
Lab 2 - Basic Router Configuration
CS326 Fall 2001 Room: PAI 5.48 Name: Lab 2 - Basic Router Configuration In this lab you will learn: the various configuration modes of Cisco 2621 routers how to set up IP addresses for such routers how
ProCurve Networking. Hardening ProCurve Switches. Technical White Paper
ProCurve Networking Hardening ProCurve Switches Technical White Paper Executive Summary and Purpose... 3 Insecure Protocols and Secure Alternatives... 3 Telnet vs. Secure Shell... 3 HTTP vs. HTTPS... 3
IOS NAT Load Balancing for Two ISP Connections
IOS NAT Load Balancing for Two ISP Connections Document ID: 100658 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify Troubleshoot
Chapter 3 LAN Configuration
Chapter 3 LAN Configuration This chapter describes how to configure the advanced LAN features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. This chapter contains the following sections
Computer Networks I Laboratory Exercise 1
Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a
EDGE FX Network configuration
Page 1 of 16 TITLE: Category: EDGE FX Network configuration GERBER EDGE Document Number: 4280 Supplied by: Gerber Service Last Modified: April 14, 2011 Summary: In order to connect an EDGE FX to your PC
How To Block On A Network With A Group Control On A Router On A Linux Box On A Pc Or Ip Access Group On A Pnet 2 On A 2G Router On An Ip Access-Group On A Ip Ip-Control On A Net
Using Access-groups to Block/Allow Traffic in AOS When setting up an AOS unit, it is important to control which traffic is allowed in and out. In many cases, the built-in AOS firewall is the most efficient
Multi-Homing Security Gateway
Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000
Configure ISDN Backup and VPN Connection
Case Study 2 Configure ISDN Backup and VPN Connection Cisco Networking Academy Program CCNP 2: Remote Access v3.1 Objectives In this case study, the following concepts are covered: AAA authentication Multipoint
TotalCloud Phone System
TotalCloud Phone System Cisco SF 302-08P PoE VLAN Configuration Guide Note: The below information and configuration is for deployment of the Cbeyond managed switch solution using the Cisco 302 8 port Power
Linksys Gateway SPA2100-SU Manual
Linksys Gateway SPA2100-SU Manual Manuel de l'utilisateur Table of Contents Looking for Basic Setup Instructions?... 3 Most Recent Version of this Manual... 3 Advanced Setup Instructions... 4 Wiring Your
Enabling NAT and Routing in DGW v2.0 June 6, 2012
Enabling NAT and Routing in DGW v2.0 June 6, 2012 Proprietary 2012 Media5 Corporation Table of Contents Introduction... 3 Starting Services... 4 Distinguishing your WAN and LAN interfaces... 5 Configuring
Network Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
Cisco Configuration Professional Quick Start Guide
Cisco Configuration Professional Quick Start Guide April 29, 2011 This document explains how to start using Cisco Configuration Professional Express (Cisco CP Express) and Cisco Configuration Professional
(606) 785-3450 Knott County (606) 439-3167 Perry County (606) 633-0778 Letcher County. [email protected]
TVS CableNet Technical Support Guide Effective August 15, 2006 All materials 2006 TV Service, Inc. This material may not be reproduced in any form except for personal private use by TV Service Cable Internet
Meraki MX50 Hardware Installation Guide
Meraki MX50 Hardware Installation Guide January 2011 Copyright 2010, Meraki, Inc. www.meraki.com 660 Alabama St. San Francisco, California 94110 Phone: +1 415 632 5800 Fax: +1 415 632 5899 Copyright: 2010
Implementing Secure Converged Wide Area Networks (ISCW)
Implementing Secure Converged Wide Area Networks (ISCW) 1 Mitigating Threats and Attacks with Access Lists Lesson 7 Module 5 Cisco Device Hardening 2 Module Introduction The open nature of the Internet
PFSENSE Load Balance with Fail Over From Version Beta3
PFSENSE Load Balance with Fail Over From Version Beta3 Following are the Installation instructions of PFSense beginning at first Login to setup Load Balance and Fail over procedures for outbound Internet
Virtual Fragmentation Reassembly
Virtual Fragmentation Reassembly Currently, the Cisco IOS Firewall specifically context-based access control (CBAC) and the intrusion detection system (IDS) cannot identify the contents of the IP fragments
Pre-lab and In-class Laboratory Exercise 10 (L10)
ECE/CS 4984: Wireless Networks and Mobile Systems Pre-lab and In-class Laboratory Exercise 10 (L10) Part I Objectives and Lab Materials Objective The objectives of this lab are to: Familiarize students
Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
Barracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
Domain 3.0 Networking... 1
Table of Contents Domain 3.0 Networking... 1 DOMAIN 3.0 NETWORKING 1. You are installing a cable modem in a client s home. How should you select where to put the cable modem? A. Placing the modem right
BASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
Chapter 12 Supporting Network Address Translation (NAT)
[Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information
Chapter 4 Customizing Your Network Settings
Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the RangeMax Dual Band Wireless-N Router WNDR3300, including LAN, WAN, and routing settings.
Easy Setup Guide for the Sony Network Camera
-878-191-11 (1) Easy Setup Guide for the Sony Network Camera For setup, a computer running the Microsoft Windows Operating System is required. For monitoring camera images, Microsoft Internet Explorer
Broadband Router ALL1294B
Broadband Router ALL1294B Broadband Internet Access 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband Router Features... 1 Package Contents... 3 Physical Details...
Configuring DHCP Snooping and IP Source Guard
CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping and IP Source Guard on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration
