Slide 3 15 2020
Slide 3 15 2020
Slide 3 15 2020
2
Next Generation Firewall
2
Cisco APs and Controllers
4
Twisted Pair Cables Categories
2
SM vs MM Fiber
2
SM vs MM Fiber
2
SM vs MM Fiber
8
Power Over Ethernet
9
Power Over Ethernet
18
Collapsed Core or Two-Tier
11
Three-tier Architectures
1
Spine and Leaf
• A Topic came from CCNA Design
• A Data Center Structure
• Same as Hierarchical Switching Design with Load Balancing capability, no STP and
Broadcast issues using routing facilities
• Best Way for Fast East-West Traffic Flow
• As well as North-South Flows
• For a 100% SLA at anytime
13
WAN Architecture
15
Small Office Home Office (SOHO)
7
Cloud Architecture
7
Identify interface
7
Introduction to Wireshark
7
Network Setting with different OS
19
Virtualization Fundamentals
20
Three Basic Concepts of Network Security:
• Confidentiality
Only the authorized individuals/systems can view sensitive or classified
information.
• Integrity
Changes made to data are done only by authorized individuals/systems.
• Availability
Data should be accessible whenever needed.
20
Security Terminology
21
Security Terminology
• Password Policy
• Management Policy
• Mitigation Techniques
• User awareness
• User training
22
Asset Classification
Classifying Vulnerabilities
• Policy flaws
• Design errors
• Protocol weaknesses
• Misconfiguration
• Software vulnerabilities
• Human factors
• Malicious software
• Hardware vulnerabilities
• Physical access to network resources
25
Introduction to an Attack
• An attack is the process of attempting to steal data, destroy data, gain
unauthorized access to a device, or even shut down/disable a system.
preventing legitimate users from accessing the resources.
• Types of Attack:
o Reconnaissance
o Social Engineering
o Privilege escalation
o Back door
o Code execution
o Trust exploitation
o Brute force
o Botnet
o DoS and DDoS
27
Man in the Middle attack
• When attackers place themselves in line between two devices that are
communicating, with the intent to perform reconnaissance or to manipulate the data
as it moves between them.
• Example: ARP Poisoning, DAI, Fake Root , Rogue Router, Rogue DHCP.
28
Fundamental Security Principles to Network Design
29
Motivation behind the attack
• Financial
• Disruption
• Geopolitical
36
Distributed Deny of Service Attack
• Directed
• Reflected
• Amplification
37
Social Engineering
• Phishing
• Malvertising
• Phone scams
38
Defense against
Defense socialsocial
against engineering
engineering
• Password management
• Two-factor authentication
• Antivirus/antiphishing defense
• Change management
• Information classification
• Document handling and destruction
• Physical security
39
DHCP Snooping
76
Dynamic ARP Inspection (DAI)
77
AAA Concept
40
AAA Server
42
AAA server …
• Network Access Server (NAS) & Network Access Device (NAD) the Switch or
WAP who wants authentication.
• Cisco implementation uses ACS and ISE
• Authentication methods:
Configuring locally on the switch
Use external RADIUS server
Use external TACACS server
43
Secure Access 802.1x Port Base authentication
41
Remote-Access VPN
44
Site to Site VPN
44
Simple Network Management Protocol
• UDP # 162
• Monitoring and troubleshooting the internal status of network devices
• SNMP Manager | SNMP Agent | OID | MIB | SNMP trap | SNMP request
• SNMP version 1 | 2 | 3 differences
• SNMPv3 (View, Group, User)
• noAuthNoPriv | authNoPriv | authPriv
• PRTG software and configuration
• Cisco SNMP object Navigator
83
SNMPv2 configuration
• Switch(config)# access-list 10 permit 192.168.3.99
• Switch(config)# access-list 10 permit 192.168.100.4
• Switch(config)# snmp-server community MonitorIt ro 10
• Switch(config)# snmp-server host 192.168.3.99 MonitorIt
SNMPv3 configuration
Switch(config)# access-list 10 permit 192.168.3.99
Switch(config)# access-list 10 permit 192.168.100.4
Switch(config)# snmp-server group NetOps v3 priv
Switch(config)# snmp-server user mymonitor NetOps v3 auth sha s3cr3tauth priv aes
128 s3cr3tpr1v 10
Switch(config)# snmp-server host 192.168.3.99 informs version 3 priv mymonitor
snmp-server view ALL iso included
snmp-server group Group1 v3 priv read/write ALL
snmp-server user AHMAD Group1 v3 auth sha P@SSW0rD priv des56 KEY@123
84
QoS introduction
43
Overview of QoS Tools
2
Comparing wired & wireless
2
WLAN Topology
43
WLAN Terms
2
Distribution System Multiple SSID
2
Scaling Wireless Coverage
2
IBSS & Repeater
2
Workgroup bridge
2
Outdoor Bridge
10
Mesh wireless network
50
Radio Frequency
51
Radio Frequency
43
Wifi Channel
51
Non Overlapping Channel 2.4
2
Non Overlapping Channel 5GHz
2
Wireless Bands and channels
• One of the two main frequency ranges used for wireless LAN communication lies
between 2.400 and 2.4835 GHz. This is usually called the 2.4-GHz band.
• The other wireless LAN range is usually called the 5-GHz band because it lies
between 5.150 and 5.825 GHz. (24 Non overlapping channel)
• The 5-GHz band consist of non-overlapping channels but 2.4 GHz band not.
• Use channel 1, 6, and 11 to avoid overlaps
• Wireless devices & Aps should all be capable of operating in same Band.
• Device support means: 802.11b/g/a/n/ac
• Cisco AP support dual radio {2.4 & 5 GHz} also multiple SSID.
• In open space, RF reach further on the 2.4-GHz band than on the 5-GHz band.
They also tend to penetrate indoor walls and objects easier at 2.4 GHz than 5 GHz.
52
IEEE 802.11 Amendments
53
Autonomous vs Light-weight mode
• Autonomous mode: each APs must be configured and maintain individually & do
not require a controller to control the AP for management.
• Light-weight mode: each APs require a WLC to configure, control and maintain all
of the AP and provide ease of management for the communication setting
between APs.
• An AP will operate in a combine mode, means when connected to Controller can be
controlled by WLC {Light-weight} mode and when it disconnected can operate
Autonomous mode
54
Wireless Network with Autonomous APs
2
Cloud-Based APs
56
Cloud-based AP {Meraki}
2
Comparing WLC deployment
2
Cloud-Based WLC
2
Embedded WLC
2
Mobility Express
2
Mobility Express
2
Summary of WLC Deployment Mode
67
WLC base AP & Split-MAC Arch.
58
WLC Based APs
2
Autonomous vs LWAP
2
WLC-Based APs
2
WLC Activities and APs
62
Authentication
• What is authentication ?
• Message integrity check (MIC) is a security tool that can protect against data tampering.
22
WEP
• The original 802.11 standard offered only two choices to authenticate a client: open
authentication and WEP.
• Wired Equivalent privacy: use RC4 cipher algorithm
• Symmetric encryption or shared-key security
• 40 to 104 bit longs, 10 to 26 hex digits.
• Consider weak encryption and not recommended at this time.
69
802.1x/EAP
22
LEAP
71
EAP-FAST
• EAP - Flexible Authentication by Secure Tunneling.
• Cisco developed a proprietary wireless authentication
• Authentication credentials are protected by passing a protected access credential
(PAC) between the AS and the supplicant.
• PAC is a form of shared secret that is generated by the AS and used for mutual
authentication
• EAP-FAST has three phases: Phase 0 | Phase 1 | Phase 2
• Notice that two separate authentication occur in EAP-FAST—one between the AS
and the supplicant and another with the end user. These occur in a nested fashion, as
an outer authentication (outside the TLS tunnel) and an inner authentication (inside
the TLS tunnel).
72
PEAP
• Protected EAP {PEAP}
• Auth. Server presents a digital certificate to authenticate itself with the supplicant in the
outer authentication.
• Auth. Server and client build a TLS tunnel to use for the inner authentication and encryption
key exchange.
• Certificates provided by third party Certification Authority (CA).
• certificate is also used to pass a public key, in plain view, which can be used to help decrypt
messages from the AS.
• The client does not have or use a certificate of its own, so it must be authenticated within the
TLS tunnel using one of the following two methods:
• MSCHAPv2: Microsoft Challenge Authentication Protocol version 2
• GTC: Generic Token Card; a hardware device that generates one-time passwords for the
user or a manually generated password
73
EAP-TLS
• EAP – Transport Layer security
• Auth. Server and Client both require digital certificate
• Auth. Server and Supplicant both exchange certificate and can authenticate each other.
• A TLS tunnel is built afterward so that encryption key material can be surely exchange.
• Implement a Public Key Infrastructure (PKI) that could supply certificates securely and
efficiently and revoke them when a client or user should no longer have access to the
network.
• Certification Authority (CA) will release digital certificate
• The most secure wireless authentication.
74
Wireless Privacy & Integrity
• Temporal Key Integrity Protocol (TKIP)
• TKIP adds the following security features using legacy hardware and the underlying
WEP encryption:
• MIC {Message Integrity Check} : Add hash to the frame
• Time stamp: a time stamp is added into the MIC to prevent replay attackers
• Sender’s MAC address
• TKIP sequence counter: add sequence # to the frame
• Key mixing algorithm: adds a unique 128-bit WEP key
• Longer initialization vector (IV): prevent from brute-force calculation
75
CCMP
• Counter/CBC-MAC Protocol {CCMP}
• More secure that TKIP, and consist of two algorithms:
1. Advanced Encryption Standard {AES} counter mode encryption
2. Cipher Block Chain Message Authentication Code {CBC-MAC} used as a MIC
• AES is open, publicly accessible, and represents the most secure encryption method
available today.
• The devices should checked to support AES before applying CCMP
76
GCMP
• Galois/Counter Mode Protocol {GCMP}
• The robust authenticated encryption suite that is more secure and more efficient than
CCMP.
• GCMP consist of two algorithms:
1. AES counter mode encryption
2. Galois Message Authentication Code used as a MIC
• GCMP is used in WPA3
77
Wi-Fi Protect Access (WPA)
• Wi-Fi Alliance, a nonprofit wireless industry association, has worked out
straightforward ways to do that through its Wi-Fi Protected Access (WPA) industry
certifications. To date, there are three different versions: WPA, WPA2, and WPA3.
• The Wi-Fi Alliance first generation WPA certification was based on parts of 802.11i and
included 802.1x authentication, TKIP, and a method for dynamic encryption key
management.
• Wi-Fi Alliance (WPA2) certification is based around the superior AES CCMP algorithms.
It should be obvious that WPA2 was meant as a replacement for WPA.
• In 2018, the Wi-Fi Alliance introduced (WPA3) as a future replacement for WPA2.
WPA3 leverages stronger encryption by AES with the (GCMP). It also uses Protected
Management Frames (PMF) to secure important 802.11 management frames between
APs and clients, to prevent malicious activity that might spoof or tamper with a BSS’s
operation. 78
WPA , WPA2 , WPA3 Summarization
• Each successive version is meant to replace prior versions by offering better
security features. You should avoid using WPA and use WPA2 instead—at least
until WPA3 becomes widely available on wireless client devices, APs, and WLCs.
79
Personal Mode and Enterprise mode
• WPA versions support two client authentication modes: a pre-shared key (PSK) or 802.1x, based on the
scale of the deployment.
• With personal mode, a key string must be shared or configured on every client and AP before the clients
can connect to the wireless network.
• clients and APs work through a four-way handshake procedure that uses the pre-shared key string to
construct and exchange encryption key material that can be openly exchanged. Once that process is
successful, the AP can authenticate the client and the two can secure data frames that are sent over the
air.
• With WPA-Personal and WPA2-Personal modes, a malicious user can eavesdrop and capture the four-
way handshake between a client and an AP. That user can then use a dictionary attack to automate
guessing the pre-shared key. If he is successful, he can then decrypt the wireless data or even join the
network posing as a legitimate user.
• WPA3-Personal avoids such an attack by strengthening the key exchange between clients and APs
through a method known as Simultaneous Authentication of Equals (SAE). Rather than a client
authenticating against a server or AP, the client and AP can initiate the authentication process equally
and even simultaneously.
• Even if a password or key is compromised, WPA3-Personal offers forward secrecy, which prevents
attackers from being able to use a key to unencrypt data that has already been transmitted over the air.
80
Using WLC Ports
• Service port: Used for out-of-band management, system recovery, and initial boot
functions; always connects to a switch port in access mode
• Distribution system port: Used for all normal AP and management traffic; usually
connects to a switch port in 802.1Q trunk mode
• Console port: Used for out-of-band management, system recovery, and initial boot
functions; asynchronous connection to a terminal emulator
• Redundancy port: Used to connect to a peer controller for high availability (HA)
operation
82
Using WLC Ports
82
Using WLC Ports
82
Using WLC Interfaces
• Management interface: Used for normal management traffic, such as RADIUS user
authentication, WLC-to-WLC communication, web-based and SSH sessions, SNMP,
(NTP), syslog, and so on. The management interface is also used to terminate CAPWAP
tunnels between the controller and its APs.
• Redundancy management: The management IP address of a redundant WLC that is part
of a high availability pair of controllers. The active WLC uses the management interface
address, while the standby WLC uses the redundancy management address.
• Virtual interface: IP address facing wireless clients when the controller is relaying client
DHCP requests, performing client web authentication, and supporting client mobility.
• Service port interface: Bound to the service port and used for out-of-band
management.
• Dynamic interface: Used to connect a VLAN to a WLAN.
83
Using WLC interfaces
22
Configuring WLC
85
Control, Data, Management Plan
85
Software Defined-Networking (SDN)
85
Software Defined-Networking (SDN)
85
Application Programming Interface
85
SDN SBI and NBI
85
Network Automation Tools & Pro
85
NBI Protocol and API
85
REST API
REST (Representational State Transfer) describes a type of API that allows applications
to sit on different hosts, using HTTP messages to transfer data over the API.
85
Network Programmability and SDN
Three different SDN and network programmability solutions available from Cisco.
Others exist as well. These three were chosen because they give a wide range of
comparison points:
■ OpenDaylight Controller
■ Cisco Application Centric Infrastructure (ACI)
■ Cisco APIC Enterprise Module (APIC-EM)
85
OpenFlow
85
OpenFlow
85
Cisco Application Centric Infrastructure (ACI)
Cisco took a research path, but Cisco’s work happened to arise from different
groups, each focused on different parts of the network: data center, campus, and
WAN. That research resulted in Cisco’s current SDN offerings of ACI in the data
center, Software-Defined Access (SDA) in the enterprise campus, and Software-
Defined WAN (SD-WAN) in the enterprise WAN.
Cisco made the network infrastructure become application centric, hence the name
of the Cisco data center SDN solution: Application Centric Infrastructure, or ACI.
Spine and Leaf network design use in ACI and datacenter.
85
Cisco Application Policy Infrastructure Controller (APIC)
The Cisco Application Policy Infrastructure Controller (Cisco APIC) is the unifying
point of automation and management for the (ACI) fabric. The Cisco APIC provides
centralized access to all fabric information, optimizes the application lifecycle for
scale and performance, and supports flexible application provisioning across physical
and virtual resources.
Designed for automation, programmability, and centralized management, the Cisco
APIC itself exposes northbound APIs through XML and JSON. It provides both a
command-line interface (CLI) and GUI which utilize the APIs to manage the fabric
holistically.
85
Cisco Application Policy Infrastructure Controller (APIC)
85
ACI and APIC
85
Cisco APIC Enterprise Module
• Topology map: The application discovers and displays the topology of the network.
• Path Trace: The user supplies a source and destination device, and the application
shows the path through the network, along with details about the forwarding
decision at each step.
• Plug and Play: This application provides Day 0 installation support so that you can
unbox a new device and make it IP reachable through automation in the controller.
• Easy QoS: With a few simple decisions at the controller, you can configure complex
QoS features at each device.
85
APIC-EM
https://developer.cisco.com
/site/apic-em/
85
Controllers Comparison
85
Cisco DNA and SDA
85