Professional Documents
Culture Documents
ch1.RS instructorPPT Chapter2 Final Mycisco PDF
ch1.RS instructorPPT Chapter2 Final Mycisco PDF
Chapter 2: Introduction
to Switched Networks
Presentation_ID
Cisco Confidential
Chapter 2
Presentation_ID
Cisco Confidential
Chapter 2: Objectives
Upon completion of this chapter, you will be able to:
2.0 Introduction
2.1 Basic Switch Configuration
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
Step 3. The IOS software then initializes the interfaces using the
Cisco IOS commands found in the configuration file and
startup configuration, which is stored in NVRAM.
Note: The boot system command can be used to set the BOOT
environment variable.
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
The boot loader can also be used to manage the switch if the IOS
cannot be loaded.
By default, these LED lights reflect port activity, but they can also
provide other information about the switch through the Mode
button.
2. Reconnecting the power cord to the switch and press and hold
the Mode button.
System LED
3. The System LED turns briefly amber and then solid green.
Release the Mode button.
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
11
Presentation_ID
Cisco Confidential
10
12
Duplex Communication
Presentation_ID
Cisco Confidential
13
Presentation_ID
Auto-MDIX Feature
Cisco Confidential
14
Cisco Confidential
16
Presentation_ID
Cisco Confidential
15
Presentation_ID
Presentation_ID
Cisco Confidential
17
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
19
Presentation_ID
Cisco Confidential
18
20
SSH Operation
Secure Shell (SSH) is a protocol that provides a secure
(encrypted), command-line based connection to a remote device.
SSH is commonly used in UNIX-based systems.
The Cisco IOS software also supports SSH.
A version of the IOS software, including cryptographic (encrypted)
features and capabilities, is required to enable SSH on Catalyst
2960 switches.
Because its strong encryption features, SSH should replace Telnet
for management connections.
SSH uses TCP port 22, by default. Telnet uses TCP port 23.
Presentation_ID
Cisco Confidential
21
Presentation_ID
Configuring SSH
Presentation_ID
Cisco Confidential
23
Presentation_ID
Cisco Confidential
22
Cisco Confidential
24
Verifying SSH
Presentation_ID
Cisco Confidential
25
Presentation_ID
Cisco Confidential
26
Eventually the CAM table fills out with bogus MAC addresses.
The CAM table now has no room for legit devices present in the
network and, therefore, never finds their MAC addresses in the
CAM table.
All frames are now forwarded to all ports, allowing the attacker to
access traffic to other hosts.
Presentation_ID
Cisco Confidential
27
Presentation_ID
Cisco Confidential
28
DHCP Spoofing
Presentation_ID
Cisco Confidential
29
Presentation_ID
Cisco Confidential
30
Presentation_ID
Cisco Confidential
31
Presentation_ID
Cisco Confidential
32
Leveraging Telnet
Telnet can be used to test the guessed password against the system.
Presentation_ID
Cisco Confidential
33
Presentation_ID
10 Best Practices
Cisco Confidential
34
Presentation_ID
Cisco Confidential
35
Presentation_ID
Cisco Confidential
36
Cisco Confidential
37
Presentation_ID
DHCP Snooping
Cisco Confidential
38
Presentation_ID
Cisco Confidential
39
Presentation_ID
Cisco Confidential
40
Presentation_ID
Cisco Confidential
41
Presentation_ID
Presentation_ID
Cisco Confidential
43
Presentation_ID
Cisco Confidential
42
Cisco Confidential
44
Presentation_ID
Cisco Confidential
45
Presentation_ID
Cisco Confidential
46
Presentation_ID
Cisco Confidential
47
Presentation_ID
Cisco Confidential
48
Presentation_ID
Cisco Confidential
49
Presentation_ID
Configuring NTP
Cisco Confidential
50
Cisco Confidential
52
Presentation_ID
Cisco Confidential
51
Presentation_ID
Chapter 2: Summary
Verifying NTP
Presentation_ID
Cisco Confidential
53
Presentation_ID
Cisco Confidential
55
Presentation_ID
Cisco Confidential
54