Switches: CCNA Exploration Semester 3 Warning - Horribly Long!
Switches: CCNA Exploration Semester 3 Warning - Horribly Long!
Switches: CCNA Exploration Semester 3 Warning - Horribly Long!
Topics
Operation of 100/1000 Mbps Ethernet Switches and how they forward frames Configure a switch Basic security on a switch
Recordando CSMA/CD
Shared medium Physical shared cable or hub. Ethernet was designed to work with collisions. Uses carrier sense multiple access collision detection.
Recordando CSMA/CD
Device needs to transmit. It listens for signals on the medium. If finds signals it waits. If clear it sends. Carry on listening. If it receives while sending the first 64 bytes of the frame then collision. Stop sending frame, send jam signal. Wait for random time (backoff) Try again listen for signals etc.
No collisions
Fully switched network with full duplex operation = no collisions. Higher bandwidth Ethernet does not define collisions must be fully switched. Cable length limited if CSMA/CD needed. Fiber optic always fully switched, full duplex. (Shared medium must use half duplex in order to detect collisions.)
Preamble Start of Destination Source Length 802.2 Frame frame address address /type header check delimiter and data sequence
Frame header data trailer
MAC address
48-bits written as 12 hexadecimal digits. Format varies: 00-05-9A-3C-78-00, 00:05:9A:3C:78:00, or 0005.9A3C.7800. MAC address can be permanently encoded into a ROM chip on a NIC burned in address (BIA). Some manufacturers allow the MAC address to be modified locally.
Collision domain
Shared medium same collision domain. Collisions reduce throughput The more devices the more collisions Hub maybe 60% of bandwidth available Switch (+ full duplex) dedicated link each way 100% bandwidth in each direction Link regarded as an individual collision domain if you are asked to count them.
Broadcast domains
Layer 2 switches flood broadcasts. Devices linked by switches are in the same broadcast domain. (We ignore VLANs here they come later.) A layer 3 device (router) splits up broadcast domains, does not forward broadcasts Destination MAC address for broadcast is all 1s, that is FF:FF:FF:FF:FF:FF
No VLANs
Network Latency
NIC delay time taken to put signal on medium and to interpret it on receipt. Propagation delay time spent travelling on medium Latency from intermediate devices e.g. switch or router. Depends on number and type of devices. Routers add more latency than switches.
Network Latency
Network Latency
Cisco switches now all use Store and Forward Some older switches used Cut Through It had two variants:
1. 2.
Almacena la totalidad de la trama en el buffer Discard any frames that are too short/long Perform cyclic redundancy check (CRC) and discard any frames with errors Find correct port and forward frame. Allows QoS checks Allows entry and exit at different bandwidths
Read start of frame as it comes in, as far as end of byte 64 Look up port and start forwarding while remainder of frame (if any) is still coming in. Discards collision fragments (too short) but other bad frames are forwarded Entry and exit must be same bandwidth Compromise between low latency and checks
Symmetric All ports operate at same bandwidth Asymmetric Different bandwidths used, e.g. server or uplink has greater bandwidth Requires store and forward operation with buffering. Most switches now are asymmetric to allow flexibility.
Each incoming port has its own queue. Frames stay in buffer until outgoing port is free. Frame destined for busy outgoing port can hold up all the others even if their outgoing ports are free. Each incoming port has a fixed and limited amount of memory.
All incoming frames go in a common buffer. Switch maps frame to destination port and forwards it when port is free. Frames do not hold each other up. Flexible use of memory allows larger frames. Important for asymmetric switching where some ports work faster than others.
They use MAC addresses to make forwarding decisions. They do not look at layer 3 information.
Switch>enable Switch#config t Switch(config)#int fa 0/1 Switch(config-if)#exit Switch(config)#line con 0 Switch(config-line)#end Switch#disable Switch>
Built in web based GUI for managing switch. Access via browser on PC.
Other GUI options available but need to be downloaded/bought.
Hold down mode switch during start-up flash_init load_helper dir flash: rename flash:config.text flash:config.old boot Continue with the configuration dialog? [yes/no] : N rename flash:config.old flash:config.text copy flash:config.text system:running-config Configure new passwords
IP address
A switch works without an IP address or any other configuration that you give it. IP address lets you access the switch remotely by Telnet, SSH or browser. Switch needs only one IP address. It goes on a virtual (VLAN) interface. VLAN 1 is the default but is not very secure for management.
IP address
S1(config)#int vlan 99 ( or another VLAN) S1(config-if)#ip address 192.168.1.2 255.255.255.0 S1(config-if)#no shutdown S1(config-if)#exit All very well, but by default all the ports are associated with VLAN 1. VLAN 99 needs to have a port to use.
IP address
S1(config)#int fa 0/18 (or other interface) S1(config-if)#switchport mode access S1(config-if)#switchport access vlan 99 S1(config-if)#exit S1(config)# Messages to and from the switch IP address can pass via port fa 0/18. Other ports could be added if necessary.
Default gateway
Save configuration
Copy run start Copy running-config startup-config This assumes that running-config is coming from RAM and startup-config is going in NVRAM (file is actually in flash). Full version gives path. Copy system:running-config flash:startup-config
Back up
copy startup-config flash:backupJan08 You could go back to this version later if necessary. copy system:running-config tftp://192.168.1.8/sw1config copy nvram:startup-config tftp://192.168.1.8/sw1config (or try copy run tftp and wait for prompts)
Login Passwords
Line con 0 Password cisco Login Line vty 0 15 Password cisco Login
Service passwordencryption Line con 0 Password 7 030752180500 Login Line vty 0 15 Password 7 1511021f0725 Login
Banners
banner motd Shut down 5pm Friday banner login No unauthorised access Motd will show first. Delimiter can be or # or any character not in message.
Similar interface to Telnet. Encrypts data for transmission. SW1(config)#line vty 0 15 SW1(config-line)#transport input SSH Use SSH or telnet or all if you want both. Default is telnet. For SSH you must configure host domain and generate RSA key pair.
MAC Address Flooding: send huge numbers of frames with fake source MAC addresses and fill up MAC address table. Switch then floods all frames. DHCP spoofing: rogue server allocates fake IP address and default gateway, all remote traffic sent to attacker. (Use DHCP snooping feature to mark ports as trustworthy or not.)
More security
Use strong passwords. Even these can be found in time so change them regularly. Using access control lists (semester 4) you can control which devices are able to access vty lines. Network security tools for audits and penetration testing.
Port security
Frames from other MAC addresses are not forwarded. By default, the port will shut down if the wrong device connects. It has to be brought up again manually.
Static secure MAC addresses: Manually configured in interface config mode switchport port-security mac-address 000c.7259.0a63 interface fa 0/4 Stored in MAC address table In running configuration Can be saved with the rest of the configuration.
Learned dynamically Default learn one address. Put in MAC address table Not in running configuration Not saved, not there when switch restarts. SW1(config-if)#switchport mode access SW1(config-if)#switchport port-security
Dynamically learned Choose how many can be learned, default 1. Put in running configuration Saved if you save running configuration and still there when switch restarts. Existing dynamic address(es) will convert to sticky if you enable sticky learning.
SW1(config-if)#switchport mode access SW1(config-if)#switchport port-security SW1(config-if)#switchport port-security maximum 4 SW1(config-if)#switchport port-security macaddress sticky
Violation modes
Violation occurs if a device with the wrong MAC address attempts to connect. Shutdown mode is default. Protect mode just prevents traffic. Restrict mode sends error message to network management software. (I think these last two are the right way round)
Interface range
Switch(config)#interface range fa0/1 - 20 Switch(config-if-range)# A useful command if you want to put the same configuration on several interfaces.
The End