2013年3月18日 星期一

Main Network Hardware’s Difference--- Integrated Devices, Router, Network Switch & Firewall



If you are used to working with home networking gear, you will beused to an integrated device that “does it all”. On a home network, you may have one box that is a cable/DSL modem, router, firewall, switch, and wireless access point all in one. It is amazing all the functions they can fit into one box.

If you are studying Cisco networking and learning about how businesses use these devices, you may be wondering why there is so much importance on the differences between a switch, router, firewall, and other network devices. If the home user can have all these devices combined into one, why doesn’t the business user do this as well? So, now, here we try to find out what the main differences between these network devices.

Integrated devices
Just like home devices, business devices have become more and more consolidated over time but not to the extent that the home devices have. Network administrators in a business network are more comfortable having separate devices and even like the idea. This is because network administrators like to be able to isolate problems down to a certain device and they like to be able to know the performance capabilities of every device. If you use an integrated router, switch, and firewall all into one device, troubleshooting, managing, and understanding the performance capabilities of that device gets complicated. I’m not saying that this isn’t done. You can buy a big & expensive, chassis-based, Cisco 6500 series switch and have almost all these functions on different blades of the switch. This may be fine for a larger business with a group of administrators but to a medium size business and a single network administrator, many times, this is a scary thought.

Keep in mind that for a medium or large size business, these integrated home devices won’t work because they don’t offer all the features required. The standalone routers, switches, and firewalls have many more features than these integrated devices do.

But what is the difference between these devices anyway? Let’s cover the three most popular devices. 

Router
A router is a hardware device and has the function of routing packets between networks. A router works at Layer 3 of the OSI model – the Network Layer. This is the layer that the IP protocol works at. Most routers today are IP routers that examine the source and destination IP addresses of each packet, look up the destination of the packet in the router’s IP routing table, and route that packet on its way. In the event that the destination is not listed in the routing table, the router will either send the packet to a default router (if it has one) or drop the packet. Routers are usually used to connect a local area network to a wide-area network (a LAN to a WAN) but can also be used to segment large local area networks (LAN’s).

Routers prevent broadcasts. Another way of saying this is that routers form a broadcast domain. So, if your network is being deluged by IP broadcasts, you need to subnet your network into two or more smaller networks. Those networks would be connected by a router and that router wouldn’t allow broadcast traffic to flow between subnets.

Routers use routing dynamic protocols like OSPF, RIP, or BGP to learn routes from other routers. Router can also use static routes that are entered by the administrator.

Routers replace the Ethernet MAC address of the source device with their own MAC address when they send a packet out an interface. When the response to that packet comes back, the new source of the packet is sending the response to the destination of the router. The router receives this, replaces the source address, changes the destination address to the original address, and sends the packet back to the original sender. This is a complex topic that we could spend a whole article covering so this is only meant to provide the most basic understanding of how this works.

To show the routing table on the router, use the show ip route command. Here is an example of what a routing table looks like on a router:


Switch
A switch is a hardware device that works at Layer 2 of the OSI model – data link. The data link layer is where the Ethernet protocol works.

A switch switches Ethernet frames by keeping a table of what MAC addresses have been seen on what switch port. The switch uses this table to determine where to send all future frames that it receives. In Cisco terminology, this table is called the CAM table (content addressable memory). In general, the proper term for this table is the bridge forwarding table. If a switch receives a frame with a destination MAC address that it does not have in its table, it floods that frame to all switch ports. When it receives a response, it puts that MAC address in the table so that it won’t have to flood next time.

A switch is a high-speed multiport bridge. This is why bridges are no longer needed or manufactured. Switches do what bridges did faster and cheaper. Most routers can also function as bridges.

You might be asking how a hub fits into this mix of devices. A hub is a multiport repeater. In other words, anything that comes in one port of a hub is duplicated and sent out all other ports of the hub that have devices attached. There is no intelligence to how a hub functions. A switch is a vast improvement over a hub in terms of intelligence, for many reasons. The most important of those reasons is how the bridge forwarding table works. Intelligent (smart) switches have made hubs obsolete because they can do more at the same cost of a dumb hub. For this reason, hubs are rarely used or sold any longer.

To see this bridge forwarding table (CAM table) on a Cisco switch just type: show mac-address-table

Here is an example:


Firewall
A firewall is used to protect more secure network from a less secure network. Generally, firewalls are used to protect your internal/private LAN from the Internet.

A firewall generally works at layer 3 and 4 of the OSI model. Layer 3 is the Network Layer where IP works and Layer 4 is the Transport Layer, where TCP and UDP function. Many firewalls today have advanced up the OSI layers and can even understand Layer 7 – the Application Layer.

There are a variety of different types of firewalls and we won’t go into that in this article so let’s just talk about the most popular type of firewall – a stateful packet inspection (SPI) hardware firewall. An example of a SPI hardware firewall is a Cisco PIX firewall. This is a dedicated appliance and it looks a lot like a Cisco router.

A SPI firewall is stateful because it understands the different states of the TCP (transmission control protocol) protocol. It knows what is coming and what it going and keeps track of it all. Thus, if a packet tried to come in but it wasn’t requested, the firewall knows that and drops it.

What we have learned about the Network Hardware’s Difference: Integrated Devices, Router, Network Switch & Firewall:
  • Routers work at Layer 3 and route IP packets between networks.
  • Routers are used to connect a LAN to a WAN (such as your small network to the Internet) but they can also be used to connect segments of a large LAN that has been subnetted into smaller segments.
  • Routers route packets based on information in the IP routing table. You can see this table with the show ip route command on a Cisco router.
  • Switches work at Layer 2 and switch Ethernet frames. Switches connect multiple devices on a local area network (LAN).
  • Switches keep a table of Ethernet MAC addresses called a CAM Table or a Bridge forwarding table. You can see this table with the show mac-address-table command on a Cisco switch.
  • Firewalls work at Layers 3 and 4 but some can also work at higher layers.
  • Most firewalls can keep track of the states of TCP to prevent unwanted traffic from the Internet from entering your private LAN.
---Original tip resources from petri.co.il

More Network Hardware Tips:

2013年3月15日 星期五

Five Ways to Secure Your Wireless Network




Many administrators and managers will likely read this article title and say to themselves: “We don’t have wireless networking here. I don’t need to read this.”

But those same administrators often discover that wireless networking happens,even when “they don’t have any.”That’s because wireless networks exist – even when a particular company hasn’t installed them.For example,your company may not have wireless networking,but maybe the company on the floor above you does.

Windows,by default,will attempt to connect to any wireless network it finds.Could your laptop users inadvertently be connecting to another company’s network,exposing your company’s information?

And if you happen to be in the kind of business where your company’s information includes any kind of confidential client or patient data that’s protected under federal law,you’ll not only have lost data,you may face civil penalties and lawsuits.

Consider this:laptop sales far exceed desktop sales,and ninety percent of laptops sold today have built-in wireless networking.Often,end users who want to make things easier for themselves will hook up their own wireless access points. Why? The cost of wireless access points has dropped so low that many users will simply purchase and install their own onto the corporate network … without telling anybody. Ask them why and you’ll hear “so that I can do my job better.

List of Five Ways to Secure Your Wireless Network:
  • Starting With a Practical Wireless Security Policy
  • Securing Your Wireless LAN
  • Securing Your Wired LAN
  • Securing Your Wireless Clients
  • Training Your Users

#1: Start With a Practical Wireless Security Policy
The first step is a good wireless security policy – it’s much more than just paperwork.It’s a critical component that spells out what’s allowed and what’s not allowed,and who is responsible for making sure the policy is followed.That’s why it’s vital for companies to have a wireless security policy in place even if the policy simply states “wireless networking will not be used.”

The reason is logical enough:employees need to know what is and isn’t permitted.Your policy should spell out the specific conditions under which wireless networking can be used,as well as spell out the encryption, authentication and protection mechanisms that must be employed.In addition,your policy should clearly prohibit the connection of unauthorized access points to your corporate network.

Remember that the best security policy isn’t worth the paper it’s printed on if it only sits on the shelf. Make sure the details of the policy are a part of your end-user training.

#2: Secure Your Wireless LAN
If you are using wireless,hopefully you are aware that WEP encryption and MAC address filtering are no longer considered adequate security.They are both easily circumvented.You should be using WPA or WPA2 (also called 802.11i) which provides strong encryption and authentication on your wireless LAN.If you are using VPNs,ensure that split tunneling is disabled.

If you allow wireless guest access,make sure you restrict their access to your corporate resources.The best way to do this is with wireless controllers and lightweight access points that segregate and tunnel guest traffic without having to build large guest VLANs throughout your enterprise.Some of these products also provide rogue detection and limited intrusion detection as well.

If possible,use SSH or access lists on the access point management interface to prevent unauthorized modifications to your configurations. And make sure your access points are physically secured out of sight and out of reach.

#3:Secure Your Wired LAN
Whether or not you deploy wireless networking,it’s an unconditional requirement to make detection and prevention of rogue access points a key part of your company’s security plan.The presence of a rogue (i.e., an unauthorized) access point indicates that your network security is being compromised–either unintentionally by a well-meaning employee,or by someone who is actively eavesdropping on your network.Periodic checks for rogue access points need to be part of your regular maintenance or auditing.(Tip:be sure to check at different times of the day.)

A simple check can be performed with a laptop and any number of commercial and freeware applications.In essence,you record the MAC address of every access point you can detect,then looto see if that MAC address exists on any of your switches.If it does, and you didn’t put it there,then you have a rouge access point on your network. It is usually not necessary to physically locate the access point (although that would be a good idea). Instead,simply disable the switch port that the access point is plugged into.

#4: Secure Your Wireless Clients
A wireless laptop is vulnerable to a whole host of attacks from anyone within range. So it’s an absolute necessity to be sure your laptops are all properly configured with personal firewall sand antivirus software.When connecting from a remote location,use VPNs to connect to your corporate network,and configure them so that all traffic from the laptop uses the VPN tunnel.

In other words, do not allow split tunneling where corporate data uses the VPN tunnel,but Internet traffic goes directly via the wireless provider.If you do,you open up your corporate network to attacks via your remote users.

Consider limiting the ability of your users to associate with the access point of their choosing (especially ad-hoc networks) by applying an appropriate Windows policy.Think what would happen if their home network uses the default SSID “Linksys”and so does that company on the floor above you.

#5:Train Your Users
The best defense against wireless attacks is a well-trained user.
Training is an essential element of your corporate network security.Every company needs to train users on the importance of encryption and strong passwords.Make your users aware of“social engineering”techniques and all the e-mail scams used to trick them out of passwords or other information.Remind them that using a public hotspot has all the safety and appeal of a public restroom.Educate them to notice suspicious people with laptops or antennas near your workplace.And make sure they understand the dangers of connecting their own access points to your corporate network.

As a network administrator or IT manager,you need to be aware of wireless vulnerabilities.Remember that just because you haven’t deployed wireless networking in your enterprise,it doesn’t mean that wireless doesn’t exist.Take steps to secure your enterprise and you will be rewarded with increased security,reliability and user satisfaction.