1. Trang chủ
  2. » Nghệ sĩ và thiết kế

Chapter 2: Basic Switch Concepts and Configuration

80 7 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 80
Dung lượng 2,12 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

• The switch provides dynamic addressing by learning the source MAC address of each frame that it receives on each port, and then adding the source MAC address and its associated port[r]

Trang 1

CCNA – Semester3

Chapter 2: Basic Switch Concepts

and Configuration

CCNA Exploration 4.0

Trang 2

• Summarize the operation of Ethernet as defined for

100/1000 Mbps LANs in the IEEE 802.3 standard

• Explain the functions that enable a switch to forward

Ethernet frames in a LAN

• Configure a switch for operation in a network

designed to support voice, video, and data transmissions

• Configure basic security on a switch that will operate

in a network designed to support voice, video, and data transmissions

Trang 3

Introduction to Ethernet/802.3 LANs

Trang 5

CSMA/CD

Trang 7

CSMA/CD

Trang 10

• Ethernet Frame:

• Ethernet Address

Trang 11

Duplex Settings

Trang 12

• The Cisco Catalyst switches have three settings:

The auto option sets autonegotiation of duplex mode

With autonegotiation enabled, the two ports communicate

to decide the best mode of operation

The full option sets full-duplex mode.

The half option sets half-duplex mode.

Trang 13

MAC Addressing and Switch MAC Address

Tables

Trang 15

MAC Addressing and Switch MAC Address

Tables

Trang 17

MAC Addressing and Switch MAC Address

Tables

Trang 19

Design Considerations for Ethernet/802.3

Networks

• Bandwidth and Throughput

– A major disadvantage of Ethernet 802.3 networks is

collisions

• Collision domains:

Trang 20

Broadcast Domains:

• Although switches filter most

frames based on MAC addresses, they do not filter

broadcast frames For other switches on the LAN to get

broadcasted frames, broadcast frames must be forwarded by switches A collection of interconnected switches forms a

single broadcast domain Only a Layer 3 entity, such as a

router, or a virtual LAN (VLAN), can stop a Layer 2

broadcast domain Routers and VLANs are used to segment both collision and broadcast domains The use of VLANs to segment broadcast domains will be discussed in the next

chapter

Trang 21

Design Considerations for Ethernet/802.3

Networks

Network Latency

• The time source NIC place voltage pulses on the wire and

the time the receiving NIC interpret these pulses

• The actual propagation delay as the signal takes time to

travel along the cable

• Latency is added according to which networking devices

Trang 22

Network Congestion

• The primary reason for segmenting a LAN into smaller parts

is to isolate traffic and to achieve better use of bandwidth per user Without segmentation, a LAN quickly becomes clogged with traffic and collisions

• The most common causes of network congestion:

– Increasingly powerful computer and network

technologies

– Increasing volume of network traffic

– High-bandwidth applications

Trang 23

rarely seen in a modern switched LAN.

Trang 24

LAN Segmentation

Trang 25

LAN Design Considerations

Controlling Network Latency

• Consider the latency caused by each device on the network

– A core level switch supporting 48 ports, running at 1000 Mb/s full duplex requires 96 Gb/s internal throughput if it

is to maintain full wire-speed across all ports

simultaneously

• Higher OSI layer devices can also increase latency on a

network

– A router must strip away the Layer 2 fields in a frame in

order to interpret layer 3 addressing information The

extra processing time causes latency

– Balance the use of higher layer devices to reduce network latency with the need to prevent contention from

broadcast traffic or the high collision rates

Trang 26

Removing Bottlenecks

Activity 2.1.3.2

Trang 27

Forwarding Frames using a Switch

Trang 28

Store-and-forward – The entire frame is received before

any forwarding takes place

Cut-through – The frame is forwarded through the switch

before the entire frame is received

Trang 29

There are two variants of cut-through switching:

Fast-forward – switching immediately forwards a packet

after reading the destination address

Fragment-free – Fragment-free switching filters out collision fragments ( < 64 bytes ) before forwarding begins

Switch Forwarding Methods

Trang 31

• In port-based memory buffering frames are stored in

queues that are linked to specific incoming ports

• Shared memory buffering deposits all frames into a

common memory buffer which all the ports on the switch

share

Memory buffering

Trang 33

Layer 3 Switch and Router Comparison

Activity 2.2.4.3

Trang 35

Navigating CLI Modes

Trang 37

GUI-based Alternatives to the CLI

Cisco Network Assistant Cisco Device Manager

Cisco View SNMP Network Manager

Trang 39

Console Error Messages

Trang 41

The Switch Boot Sequence

The boot sequence of a Cisco switch:

• The switch loads the boot loader software from NVRAM

• The boot loader:

– Performs low-level CPU initialization

– Performs POST for the CPU subsystem

– Initializes the flash file system on the system board

– Loads a default operating system software image into memory and

boots the switch

• The operating system runs using the config.text file, stored in the switch flash storage.

The boot loader can help you recover from an operating system crash:

• Provides access into the switch if the operating system has problems

serious enough that it cannot be used.

• Provides access to the files stored on flash before the operating system

is loaded.

• Use the boot loader command line to perform recovery operations.

Trang 42

• PC or terminal is connected to the console port

• Terminal emulator application, such as HyperTerminal, is

running and configured correctly

SYST LED rapidly blinks green If the switch fails POST, the SYST LED turns amber When a switch fails the POST test,

it is necessary to repair the switch

Trang 43

Basic Switch Configuration

• Management Interface Considerations

Trang 44

• Configure Management Interface

Trang 45

Basic Switch Configuration

• Configure Default Gateway

Trang 46

• Verity Configuration

Trang 47

Basic Switch Configuration

• Configure Duplex and Speed

Trang 48

• Configure a Web Interface

Trang 49

Basic Switch Configuration

Managing the MAC Address Table

• Dynamic addresses are source MAC addresses that the

switch learns and then ages when they are not in use You can change the aging time setting for MAC addresses The default time is 300 seconds

• The switch provides dynamic addressing by learning the

source MAC address of each frame that it receives on

each port, and then adding the source MAC address and

its associated port number to the MAC address table

• To create a static mapping in the MAC address table, use

the mac-address-table static <MAC address> vlan

{1-4096, ALL} interfaceinterface-id command.

Trang 51

Basic Switch Management

• Back up and Restore Switch Configurations

Trang 52

• Clearing Configuration Information

Use erase nvram: or erase startup-config command

• Deleting a Stored Configuration File

Use delete flash:filename command

Trang 53

Basic Switch Management

• 2.3.8.4

Trang 55

Sw(config)#enalbe password cisco

Sw(config)#enalbe secret class

Trang 56

• Configure Encrypted Passwords

Trang 57

Configure Password Options

Enable Password Recovery

• Step 1 Connect a terminal or PC with terminal-emulation software to the switch console port.

• Step 2 Set the line speed on the emulation software to 9600 baud.

• Step 3 Power off the switch Reconnect the power cord to the switch and within 15 seconds, press the Mode button while the System LED is still flashing green Continue pressing the Mode button until the System LED turns briefly amber and then solid green Then release the Mode button.

Step 4 Initialize the Flash file system using the flash_init command.

Step 5 Load any helper files using the load_helper command.

• Step 6 Display the contents of Flash memory using the dir flash

command.

• Step 7 Rename the configuration file to config.text.old, which contains

the password definition, using the rename flash:config.text

flash:config.text.old command.

Trang 58

Enable Password Recovery

• Step 8 Boot the system with the boot command

• Step 9 You are prompted to start the setup program Enter

N at the prompt, and then when the system prompts whether

to continue with the configuration dialog, enter N

• Step 10 At the switch prompt, enter privileged EXEC mode using the enable command

• Step 11 Rename the configuration file to its original name

using the rename flash:config.text.old flash:config.text

command

• Step 12 Copy the configuration file into memory using the

copy flash:config.text system:running-config command

Trang 59

Configure Password Options

Enable Password Recovery

• Step 13 Enter global configuration mode using the configure terminal command

• Step 14 Change the password using the enable

secretpassword command

• Step 15 Return to privileged EXEC mode using the exit

command

• Step 16 Write the running configuration to the startup

configuration file using the copy running-config startup-config command

• Step 17 Reload the switch using the reload command

Trang 60

• The Cisco IOS command set includes a feature that allows you to configure messages that anyone logging onto the

switch sees These messages are called login banners and message of the day (MOTD) banners

Sw(config)#banner motd “string”

Trang 61

Configure Telnet and SSH

Trang 62

the switch acts like a hub and forwards the frame out every port on the switch.

Trang 63

Common Security Attacks

• MAC Address Flooding (cont.)

Trang 65

Common Security Attacks

• MAC Address Flooding (cont.)

Trang 67

Common Security Attacks

Spoofing Attacks

Trang 69

Common Security Attacks

• CDP attacks: CDP contains information about the device,

such as the IP address, software version, platform,

capabilities, and the native VLAN When this information is available to an attacker, they can use it to find exploits to

attack your network, typically in the form of a Denial of

Service (DoS) attack

Trang 71

Security Tools

• Network Security Tools perform these functions:

• Network Security Audits help you to:

– Reveal what sort of information an attacker can gather

simply by monitoring network traffic

– Determine the ideal amount of spoofed MAC addresses

to remove

– Determine the age-out period of the MAC address table

• Network Penetration Testing helps you to

– Identify weaknesses within the configuration of your

networking devices

– Launch numerous attacks to test your network

– Caution: Plan penetration tests to avoid network

performance impacts

Trang 73

Configuring Port Security

Trang 75

Configuring Port Security

Trang 77

Configuring Port Security

Trang 79

Configuring Port Security

Activity 2.4.7.2

Ngày đăng: 16/12/2020, 13:55

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w