Build A Small Network
Build A Small Network
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
Perkenalan :
Hamdan Hibatullah
+62 8970030957
@HamdanH48
Hamdangt48@gmail.com
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
1. Devices in a small Network
2. Small Network Application and Protocols
3. Scale to Lager Networks
4. Security Threats and Vulnerabilities
Agenda 5.
6.
Network Attack
Network Attack Mitigation
7. Device Security
8. Basic Network Performance
9. Troubleshooting Methologies
10. Troubleshooting Cables and Interfaces
12. Q&A
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Devices in a small Network
• Cost
• Speed and Types of port/Interfaces
• Expandalbiity
• Operating System Featutures amd Services
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Small Network Application and Protocols
Sumber : http://blog.systoolsgroup.com/wp-content/uploads/2013/12/network.png
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Scale to Lager Networks
• Network Documentation
• Device inventory
• Buget
• Traffic analysis
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Security Threats and Vulnerabilities
• Information Theft
• Identity Theft
• Disruption of Service
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Security Threats and Vulnerabilities
• Hardware threats
• Evironment threats
• Electrical threats
• Maintanance threats
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Network Attacks
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Example Network Attack Use Malware
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Network Attack Mitigation
• Backup
• Upgrade
• Update
• Patch
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Network Attack Mitigation Cons.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Network Attack Mitigation Cons.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Network Attack Mitigation Cons.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Device Security
When a new operating system is installed on a
device, the security settings are set to the default
values. In most cases, this level of security is
inadequate. For Cisco routers, the Cisco
AutoSecure feature can be used to assist securing
the system, as shown in the figure. In addition, there
are some simple steps that should be taken that
apply to most operating systems:
• Default usernames and passwords should be
changed immediately.
• Access to system resources should be restricted
to only the individuals that are authorized to use
those resources.
• Any unnecessary services and applications
should be turned off and uninstalled when
possible.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Device Security
Here are standard guidelines to follow:
• Use a password length of at least 8 characters, preferably
10 or more characters. A longer password is a better
password.
• Make passwords complex. Include a mix of uppercase and
lowercase letters, numbers, symbols, and spaces, if
allowed.
• Avoid passwords based on repetition, common dictionary
words, letter or number sequences, usernames, relative or
pet names, biographical information, such as birthdates, ID
numbers, ancestor names, or other easily identifiable
pieces of information.
• Deliberately misspell a password. For example, Smith =
Smyth = 5mYth or Security = 5ecur1ty.
• Change passwords often. If a password is unknowingly
compromised, the window of opportunity for the attacker to
use the password is limited.
• Do not write passwords down and leave them in obvious
places such as on the desk or monitor.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Device Security
• Strong passwords are only as useful as they are
secret. There are several steps that can be taken
to help ensure that passwords remain secret.
• Another way hackers learn passwords is simply
by brute-force attacks, trying multiple passwords
until one works. It is possible to prevent this type
of attack by blocking login attempts to the device
if a set number of failures occur within a specific
amount of time.
• Another recommendation is setting executive
timeouts. By setting the exec timeout, you are
telling the Cisco device to automatically
disconnect users on a line after they have been
idle for the duration of the exec timeout value.
Exec timeouts can be configured on console, VTY,
and aux ports using the exec-timeout command
in line configuration mode.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Basic Network Performance
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Basic Network Performance
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Basic Network Performance
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Basic Network Performance
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Basic Network Performance
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Basic Network Performance
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Basic Network Performance
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Basic Network Performance
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Basic Network Performance
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Basic Network Performance
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Troubleshooting Methologies
Basic Troubleshooting Approaches
• Network problems can be simple or complex, and can
result from a combination of hardware, software, and
connectivity issues. Technicians must be able to analyze
the problem and determine the cause of the error before
they can resolve the network issue. This process is called
troubleshooting.
• A common and efficient troubleshooting methodology is
based on the scientific method and can be broken into
the six main steps shown in the figure.
• To assess the problem, determine how many devices on
the network are experiencing the problem. If there is a
problem with one device on the network, start the
troubleshooting process at that device. If there is a
problem with all devices on the network, start the
troubleshooting process at the device where all other
devices are connected. You should develop a logical and
consistent method for diagnosing network problems by
eliminating one problem at a time.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Troubleshooting Methologies
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Troubleshooting Methologies
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Troubleshooting Methologies
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Troubleshooting Cables And Interfaces
Duplex Operation
In data communications, duplex refers to the
direction of data transmission between two devices.
If the communications are restricted to the exchange
of data in one direction at a time, this connection is
called half-duplex. Full-duplex allows the sending
and receiving of data to happen simultaneously.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Troubleshooting Cables And Interfaces
Duplex Mismatch
Duplex mismatches may be difficult to troubleshoot
as the communication between devices still occurs.
A duplex mismatch may not become apparent even
when using tools such as ping. Single small packets
may fail to reveal a duplex mismatch problem. A
terminal session which sends data slowly (in very
short bursts) could also communicate successfully
through a duplex mismatch. Even when either end
of the connection attempts to send any significant
amount of data and the link performance drops
considerably, the cause may not be readily apparent
because the network is otherwise operational.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Troubleshooting Scenarios
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Troubleshooting Scenarios
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Troubleshooting Scenarios
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Troubleshooting Scenarios
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Thank you.