I decided to change the colors around this morning. The old background was my dinner table from a few years ago, and is now sitting out on the back porch. Not terribly impressive, but hey. It's out there.
The new one fits more with the manilla folder idea I've been obsessively using in the past few decades. I remember a website I created back following the days of GeoCities where I had a manilla folder background. Nothing terribly impressive, but it takes me back to those days.
This one was a little more professionally designed and actually tiles like it is supposed to.
At work, I've recently been using TWiki a lot. Seems like a good platform. After my vacation a couple of weeks ago, I realized the catalyst for much change is documentation. If you don't document, then you are going to keep repeating the same tasks over and over again, and wondering why no one ever gets around to changing.
You can't shove a part of the job you don't want to do on someone if you do not document. It's that simple.
If you will not document, then you will do the same thing over and over again.
Once the documentation is complete, you must then hand the documentation off to someone else in order to test your documentation. If your documentation is never examined or tested, it's not really documentation.
You must also revise and expand on your documentation to the point where it is excessively long. You have to realize the person you are handing your documentation off to has no clue what a native VLAN is or why it could affect communication between a router and a switch. And why have a native VLAN in the first place. I've probably heard that question before, but I don't remember the answer. I know the difference between a native VLAN and a non-native VLAN. Hell, I brought up ISL in the conversation in order to back up enough to provide a starting point.
But in the end you must document to the point of excessive. All you are going to do is take up disk space, and disk space is relatively free.
Anyways....
Upgrades Tuesday, Wednesday, and Thursday this week. At least the prep work is mostly done on them. So they should go relatively quickly.
A blog about the things that interest me. Includes random thoughts, Cisco, programming, and business related stuff from convenience store world.
Showing posts with label Cisco. Show all posts
Showing posts with label Cisco. Show all posts
Monday, October 17, 2016
Wednesday, July 27, 2016
CCNA
One last day before the CCNA.
After a bit of testing, I'm pretty good on the LAN side. It's WAN and routing protocols that I need to spend the most time on. I can get the necessary points out of studying OSPF, EIGRP, PPP, and Frame Relay.
Still working on Mnemosyne on my studying. I covered the LAN side way too deeply. Basically means I can answer LAN side questions without a second thought. But WAN and routing protocol side is weak.
On the practice tests, I've been getting about 65%. So that means I only need to improve 20% or so. Easy.
Back tomorrow afternoon with results.
After a bit of testing, I'm pretty good on the LAN side. It's WAN and routing protocols that I need to spend the most time on. I can get the necessary points out of studying OSPF, EIGRP, PPP, and Frame Relay.
Still working on Mnemosyne on my studying. I covered the LAN side way too deeply. Basically means I can answer LAN side questions without a second thought. But WAN and routing protocol side is weak.
On the practice tests, I've been getting about 65%. So that means I only need to improve 20% or so. Easy.
Back tomorrow afternoon with results.
Thursday, May 12, 2016
CCNA class
The final class of CCNA prep is done today. I've got to take the final, and then the formalized class is over. It has been kicking me up one side of the street and down the other.
It's not that material is hard. It's just that there's a lot of material covered in an incredibly short time period. What is normally a 16 week class has been reduced to 8. And that's pretty crazy. That's nothing for many classes. But a bunch just turns college into some horrendous grind.
I guess colleges needed to find a new way to make money. And grinding students through faster always seems like a good idea. How much do I want to bet they are charging the same amount for the 8 week class as they were the 16 week class? Nothing.
Anyways. Once the class is finished, I need to start studying to take the CCNA. I'm aiming for about one month out for that. My goal is to have it done before July 1st. Maybe June 12th, as the place I take the test schedules on Thursdays.
Seems like that is the next thing I need to do. Schedule the CCNA, so I have a definite date in which I'm going to take the thing. Definiteness adds a sense of urgency.
It's not that material is hard. It's just that there's a lot of material covered in an incredibly short time period. What is normally a 16 week class has been reduced to 8. And that's pretty crazy. That's nothing for many classes. But a bunch just turns college into some horrendous grind.
I guess colleges needed to find a new way to make money. And grinding students through faster always seems like a good idea. How much do I want to bet they are charging the same amount for the 8 week class as they were the 16 week class? Nothing.
Anyways. Once the class is finished, I need to start studying to take the CCNA. I'm aiming for about one month out for that. My goal is to have it done before July 1st. Maybe June 12th, as the place I take the test schedules on Thursdays.
Seems like that is the next thing I need to do. Schedule the CCNA, so I have a definite date in which I'm going to take the thing. Definiteness adds a sense of urgency.
Wednesday, December 2, 2015
Useful Cisco Commands
Here's a collection of Cisco commands I still haven't been taught by Cisco. But I learned through various other methods.
terminal monitor
and
term no mon
Terminal monitor is the answer to all remote diagnostic issues. So when you ssh or telnet into a client, you then get the output you would if you were on site. The only problem is that output occasionally drives you mad as you try to figure out the solution to a problem. How in the world do you turn it off? That's where term no mon comes into play. It turns off console connections for after they have been turned on with terminal monitor. Terminal monitor is taught in class. Term no mon is not.
term len 0
Another terminal command. The terminal length command tells how many lines of output to display when you hit a key. But term len 0 has a special use. Let's say you want to do a quick examination of the entire running config of a site. How do I do that?
Using Putty, turn on logging. I'd actually recommend setting logging to default so it logs every piece of output forever. Might be useful when you have other issues. Next, remote access the system via telnet or ssh. Next. term len 0. You now just set the terminal length to 0, so it will display the entire output without having to press a single key. Guess what? No more parsing crud out of text files. You now have a complete running config stored in the Putty log file that only needs minor parsing. No more removing typing, input characters, or what not. Just open the file and remove the login/logout sections.
Next, exit. Do not save. No not write. That way, the next time you log in everything will be just as you found it before. No weirdness or strangeness. Otherwise you might have to use term len 10 or something to that effect to put it all back together again.
monitor session 1 source interface interface_name/number
monitor session 1 destination interface interface_name/number
The only pair of commands in my list. I've only used these commands on switches. They might work on routers as well. Not sure. But here's the great thing about these commands: along with Wireshark, you can kick back and examine all the traffic going through a device in order to try and troubleshoot communication issues. It's kind of like a programmable hub, but better. And, you can monitor as few or as many ports as you want. I'm sure there's limitations to the commands, but like I said, these are things I've learned that classes have never taught me.
So, there you go. A short collection of Cisco commands that seem to make life easier. Or get rid of terminal monitor after you start it up. Hope it helps.
terminal monitor
and
term no mon
Terminal monitor is the answer to all remote diagnostic issues. So when you ssh or telnet into a client, you then get the output you would if you were on site. The only problem is that output occasionally drives you mad as you try to figure out the solution to a problem. How in the world do you turn it off? That's where term no mon comes into play. It turns off console connections for after they have been turned on with terminal monitor. Terminal monitor is taught in class. Term no mon is not.
term len 0
Another terminal command. The terminal length command tells how many lines of output to display when you hit a key. But term len 0 has a special use. Let's say you want to do a quick examination of the entire running config of a site. How do I do that?
Using Putty, turn on logging. I'd actually recommend setting logging to default so it logs every piece of output forever. Might be useful when you have other issues. Next, remote access the system via telnet or ssh. Next. term len 0. You now just set the terminal length to 0, so it will display the entire output without having to press a single key. Guess what? No more parsing crud out of text files. You now have a complete running config stored in the Putty log file that only needs minor parsing. No more removing typing, input characters, or what not. Just open the file and remove the login/logout sections.
Next, exit. Do not save. No not write. That way, the next time you log in everything will be just as you found it before. No weirdness or strangeness. Otherwise you might have to use term len 10 or something to that effect to put it all back together again.
monitor session 1 source interface interface_name/number
monitor session 1 destination interface interface_name/number
The only pair of commands in my list. I've only used these commands on switches. They might work on routers as well. Not sure. But here's the great thing about these commands: along with Wireshark, you can kick back and examine all the traffic going through a device in order to try and troubleshoot communication issues. It's kind of like a programmable hub, but better. And, you can monitor as few or as many ports as you want. I'm sure there's limitations to the commands, but like I said, these are things I've learned that classes have never taught me.
So, there you go. A short collection of Cisco commands that seem to make life easier. Or get rid of terminal monitor after you start it up. Hope it helps.
Thursday, November 26, 2015
Last Projects for Cisco 3
So I just finished my last two packet tracers for my Cisco 3 class. Presented, for all your wonderful glory, is a picture of my EIGRP capstone project.
Which I have to admit is about as complicated as some things I've designed for work, and are actually in operation. The fun thing about this one is I ended up setting up DHCP on every single one of those networks in there, so the end user connections are all DHCP assigned. The EIGRP portion wasn't that difficult. Mostly, it was just labor.
The interesting thing was in creating the ISP connection. Really, it's just a router with an assigned public IP. From there, I added a default route back towards the network I designed. It might have been more interesting to design the thing as a multiaccess network, but who cares. The system wanted a multiple location EIGRP network. So I used serial connections. And funny thing is, I've never had to set up a serial connection in real life. All Ethernet based. One was PPPOE, and that was a bit annoying to set up.
So now, all I have to do is study for the final and start working on the next book. In the process of taking over four stores. Isn't work fun?
Friday, November 6, 2015
Back to SNMP and other things
I used to hate SNMP.
I’m not sure I still don’t. It’s
been annoying to set up. I’m still
fighting with SNMPWALK on SNMPv3 and getting data from a Cisco router and
switch. Eh well. I’ll get into that at some other point.
I have to admit Cacti was one of the better than I thought
it could be. I followed the right
instructions and have started doing some SNMP polling and producing some
decently relevant graphs on information someone in IT would think could be
important. Luckily, I happened to set it
up on a site that had Internet issues later that day. It worked out great because I ended up
diagnosing the issue while trying to connect to my Cacti web page. Turns out there was interference on the
network in the area and the site was dropping about 18% of packets. Which explains why they were having network
connection issues.
The other thing I keep looking and thinking about is network security. Which seems to be something everyone says they need, but no one does anything about. I pissed off a networking vendor because I told the person I wanted three single purpose servers instead of one multipurpose server. Everything I've ever read on servers says one purpose per server. Don't end up with a multipurpose server.
Eventually, the server needs replaced. And then you have numerous tools that need replaced or fixed in order to solve all the problems you used with that server. I mean sure, the RADIUS / print / file server / new thing part two server is great. But wouldn't it be simpler to have a RADIUS server that does nothing but RADIUS authentication. Or a print server that does nothing but handle printing. And then, when you need to upgrade that server you take down one function. Instead of the 25 different things running on one server.
I guess the second part of that conversation is "don't turn on any service that you don't need" on a server. Great. That's a lot simpler with a single purpose server. The print server doesn't need to do anything but print. The file server needs fat bandwidth to reach it, and that's about it. Virtualize it all. It's not like you need a physical server for all that.
But what do I know?
Wednesday, July 1, 2015
As the world burns...
The world burns. I
study.
I’m concerned with Dora (Discover, Offer, Request, ACK) the
DHCP explorer and her friend Bubu (broadcast,
unicast, broadcast, unicast) and learn on source, forward on destination.
Open suckiest path first:
Hello, dead beat dad. Losers suck
right? Losers suck up. Ack.
(link state packets for OSPF.)
Basic ACL near destination
Extended ACL near source
Deploy access class to limit access to console
Default information-orginate
Ip helper-address
I’ll know Thursday if I pass. Wish me luck.
Wednesday, May 13, 2015
end of a semester
Routing and Switching is over. Finished the final with an 85, closed book closed notes.
That should give me an A for the semester. I need to prepare for the CCENT for the next 2-3 weeks, and then go take that. Based on the Routing and Switching final, I need to study OSPF more. I missed more than I would have liked on that.
Scaling Networks is next. The book is on order. I spent a few minutes looking through the chapter headings on the final book, and found the PPPOE section. Yeah. Book 4, right before the CCNA.
Moving on. Back to site construction tomorrow, now that finals are complete. Yay.
That should give me an A for the semester. I need to prepare for the CCENT for the next 2-3 weeks, and then go take that. Based on the Routing and Switching final, I need to study OSPF more. I missed more than I would have liked on that.
Scaling Networks is next. The book is on order. I spent a few minutes looking through the chapter headings on the final book, and found the PPPOE section. Yeah. Book 4, right before the CCNA.
Moving on. Back to site construction tomorrow, now that finals are complete. Yay.
Friday, March 27, 2015
Pareto Principle in Action
My last experiment started as a practical examination of the
Pareto principal, otherwise known as the 80/20 rule. I had been making straight B’s on my Routing
and Switching tests, and I wanted to consistently improve them to A’s. In order to do that, I needed to know how much
time I was spending getting that B.
So I changed my study habits slightly, and decided to keep
track of time spent studying. I’d also
read something about two competing South Pole expeditions. One ran as much as they could every day. Some days they didn’t go anywhere because the
weather was bad. The other went 15 miles
a day, regardless. They went 15 miles,
and stopped for the day. So I decided to
try that principal with studying. And
the results were pretty remarkable.
I went from an average low B to a high A on the next
test. Hooray for me. Anyway, this was the process.
Read any previous notes I had made.
Grab a highlighter, and read 15 pages, highlighting what I
thought was important.
Copy those highlighted notes into my printed notes.
Quit for the day.
Return tomorrow.
In doing this process, I found it only took about an hour a
day, so I really had more time to work on other things. Normally, I would have spent 3-4 hours
straight on Saturday or Sunday reading and highlighting. Granted, chapter 7 took me 387 minutes to
complete, but that only averaged 64 minutes per day. I have yet to take the test on that chapter,
so I’m not yet sure how effective this process has been for that chapter. But I do know the previous chapter resulted
in huge positive results.
I think I missed a lot of the main part of this that makes
it so effective. The main effective part
is that you study a little bit every single day. It’s not a brain destroying group done once
or twice per week. It’s simply an hour
per day, every single day. In that way,
your brain doesn’t have time to stop thinking about what you have studied. On top of that, by the end you’ve read and
reread your notes numerous times. Then,
the information is more likely to stick.
We’ll see what happens with chapter 8. Though I have to admit, single area OSPF just
doesn’t interest me that much.
Tuesday, January 20, 2015
Network Baselines
Like I said, I’ve been working on network baseline
analysis. Beginning problem is that I
don’t have a baseline to begin with, nor do I have any way to examine the
current baseline of the network. So, I’m
at a loss of where to start.
I read one book where a basic baseline can be created by
pinging all available hosts. It’s not
the greatest baseline, but it is the beginning, and it’s better than
nothing. What I’ve got is nothing. So what I did is wrote a batch file using a
FOR loop to ping all devices and print the output to a file. After that, I ran an arp –a and appended that
to the end of the file.
So it’s not the greatest baseline. But it does give me an idea of what standard
network performance should be, at least as far as PING goes. I guess the next part is trying to dump the
information into a webpage or a database so the information can be examined
later and compared to what it has been at various points.
I guess I should probably add the ITILv3 documentation to my
reading list. The only problem is I’m not
definite the ITIL information actually provides information on how to baseline
a network. I understand the basics and
the conceptual theory. It’s a matter of
going out and doing the work. And sorry,
SNMP is not the way to baseline.
Everyone has it turned off due to the insecurities in the system.
Just a quick look at Cisco, and the only encrypted version
they have only supports DES. So the
options are send the data as plaintext, or send it as an algorithm that has
already been replaced due to inherent weakness. 15 years ago, DES was cracked in 22 hours. 15 years ago, I was happy with 400 MHz
processor running 128 Mb of RAM.
In comparison, I’m writing this on a laptop with an Intel Core
i5 running at 2.5 GHz with 4 GB of RAM.
Shot in the dark, but I think a couple of these suckers could crack DES
in a day. And if someone breaches your
network and doesn’t get caught, then what is a day? What is 10 days?
Thursday, December 11, 2014
Introduction to Networks ch 6
Quiz
How does the network layer use the MTU value?
A) The MTU is passed to the network layer by the data link layer.
What are 2 functions that are provided by the network layer?
1) providing end devices with a unique network identifier
2) directing data packets to destination hosts on other networks
During the boot process, in what memory location will the router bootstrap program look for the IOS image if a TFTP server is not used?
A) flash
When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation
A) Flow Label
Within a production network, what is the purpose of configuring a switch with a default gateway address?
A) The default gateway address is used to forward packets originating from the switch to remote networks.
Chapter 6 Notes
routing - communication between networks
Network Layer
Provides services to allow end devices to exchange data across the network
-OSI Layer 3
-4 basic processes
-Addressing (end devices)
end device with configured IP is called a host
-Encapsulation
Receives PDU from transport layer. Adds header. Now called a Packet
-Routing - services to direct packets to a destination host on another network
-each route the packet takes to reach the destination is called a hop
-Deencapsulation - process of removing headers from lower layers
Operates without knowing/caring of the data being carried
Media/Path is irrelevant. Satelite, wireless, cable modem, serial.. doesn't matter
Network Layer protocols
IPv4
IPv6
Characteristics of IP protocols
-low overhead
-connectionless
-best effort (unreliable)
-media independant
Connectionless - no dedicated end to end connection created before sending. Kind of like mail.
-send at any time
-unaware of the state of the recipient
-unaware if the receiver can understand the data
-no error correction
-no guarantee packets will arrive in order
Best Effort Delivery
can't recover from failed/corrupt packets
bad packets are dropped
trouble with transmission handled by upper layers if the layer desires
Media Independent
Data link layer responsible for transmitting over media.
maximum size packet that can be sent is the MTU (maxium transmission unit)
-data link layer passes the MTU value up to the network layer
-network layer uses information to determine packet size
-breaks packets to fit the MTU.
-Fragmentation is necessary to split packet size so it will fit on a device with a smaller MTU
IPv4 Packet
-In use since 1983
Packet has 2 parts
1) IP header
Significant portions of the header
-Version - packet version. Constant at 0100
-Differentiated services (formerly Type of Service) - used for QoS. 1st 6 bits used by QoS. last 2 bits used to prevent dropping
-TTL (Time to Live) 8 bit value to limit the lifetime of the packet. Reduced at each hop. If hits 0, router discards packet and returns ICMP Time Exceeded message to the source IP address
-Protocol - indicates data payload
-Source IP address
-Destination IP address
2) Payload
Remaining fields of the IPv4 header
-Internet Header Length (IHL) - 4 bit value identifying the number of 32 bit words in the header
-total length - defines entire packet size, including header and data
-header checksum - used for error checking IP header. If values do not match, packet is discarded
If the packet is fragmented, other fields are used to keep track of the data
-Identification - unique identifier of a fragment
-flags - identifies how a packet is fragmented
-fragment offset - identifies the order in which to place the packet when it arrives at the destination
IPv6 packet
Limitations of IPv4
-IP address depletion - only 4 billion available IP addresses. Quickly running out due to always-on connections
-Internet Routing Table Expansion - more networks, more routes, more waiting
-Lack of end-to-end connectivity - Troublesome when NAT and PAT are used.
Encapsulating
-simplification of the IPv6 header
IPv4 had 20 octets and 12 basic header fields
IPv6 has 40 octets and 8 basic header fields
advantages over IPv4
-better routing efficiency for performance and forwarding rate
-no requirement for processing checksums
-simplified and more efficient extension header mechanisms
-flow label field for per-flow processing with no need to dencapsulate to identify various traffic flows
IPv6 packet header
-Version- 4 bit binary. Constantly set to 0110
-Traffic Class - equivelant of the differentiaed services field
-flow label - used to inform routers and switches to maintain the same path for packet flow so that packets are not reordered
-payload length
-next header - equivelent of the IPv4 protocol field. indicates data being carried
-hop limit
-source address
-destination address
IPv6 addresses
-128 bit address
-colons separate entries into a series of 16-bit hexadecimal blocks
Routing
How a host routes
Host forwarding decision
hosts can send a packet to ...
-itself
-local host
-remote host
local host vs remote host is based on IP address and subnet mask comparison between sender and receiver
devices beyond the local network segment referred to as remote hosts
Default Gateway
the device that routes traffic from the local network to devices on remote networks
if a host is sending to remote network, it sends to default gateway
default gateway maintains a routing table
-data file in RAM that stores route information from directly connected networks
-also knows remote networks the device has learned
host must maintain a local routing table to ensure proper delivery
hosts routing table typically contains of...
-direct connection
-local network route
-local default route
default route only used to connect outside of the local network
IPv4 routing
If a host wants to send a packet inside the local network
1) consult the IPv4 route table
2) match the destination IP address and identify it as being in the same network
3) send the packet using the local interface
If a host wants to send a packet outside the local network
1) consult the IPv4 route table
2) find there is no exact match for the destination IP address
3) choose the local default route to pick the forwarding location
4) send the packet to the gateway using the local interface
IPv6 routing
View routing table in Windows with netstat -r or route print
If - lists the interface numbers from the interface list
metric - lists the cost of each route to a destination. Lower numbers are preferred routes
network destination - lists the reachable networks
gateway - lits the address used by local host to forward outside the network
::/0 - IPv6 equivalent of the local default route
::1/128 - IPv6 equivalent of the loop back address
200::/32 - global unicast network prefix
fe80::/64 local link network route address; represents all computers in the local network
ff00::/8 multicast address
no broadcast addresses in IPv6
Router Routing Tables
routers store information about
directly connected routes
-known from interfaces physically plugged into the router
remote routes
-routes that come from other routers.
-manually configured or dynamically configured through the device learning from other routers
routing table of a router
-destination network
-metric associated with the destination
-gateway to get to the destination
show ip route
when a packet arrives at the router, the router examines the routing table. if the destination network matches a route in the routing table, the router forwards the packet to that route
if multiple paths to the same location, then lowest metric wins
directly connected routing table entries
routers have 2 rotus after IP address is assigned
route source: - how the route was learned
C: directly connected
L - local route
Destination network and how reached
identifies the address of the network and how a packet can reach the destination
outgoing interface
what interface is used to connect to that network
routers generally have multiple interfaces configured
common codes for remote networks
-S: route was manually created by an admin. Static route
-D: learned dynamically using EIGRP
-O: learned dynamically using OSPF
remote network routing table entries
route source- how the route was learned
destination network - the address of the remote network
administrative distance - trustworthiness of the route source
metric - value assigned to reach the remote network. Lower wins
next hop - ip address of the next router to forward packets to
route timestamp - when the route was last heard from
outgoing interface - physical interface to forward a packet
next hop address
address of the device that will process the packet next.
packets can not be forwarded by the router without a route for the destination network.
if no route, packet is dropped
router can be configured with a gateway of last resort if the destination is unknown
Routers -
a router is a computer
branch - small business, medium business, teleworkes
WAN - large business
Service provider - large service providers
router CPU and OS
Router memory
RAM - store applications and process including
-IOS - copied during bootup
-running config
-ip routing table
-ARP cache
-packet buffer
routers use DRAM
volatile memory and requires continual power to maintain information
all content lost when powered down
ROM
used to store:
-bootup instruction
-basic diagnostic software
-limited IOS
firmware embedded on an integrated circuit inside the router
doesn't lose contents when powered down
NVRAM
used as permanent storage for the startup config file
doesn't lose contents when powered off
flash
used as permanent storage for IOS and system related fields
router backplane
has the following connections
-console ports
-aux port
-LAN interfaces
-Enhanced high-speed WAN interface card (EHWIC) slot
modular enhancement slot. Different interface, different card
connecting to a router
routers interconnect many devices
connections grouped into two categories
management ports - used to configure/manage/troubleshoot. not used for packet forwarding
in-band router interfaces - LAN and WAN interfaces configured with IP addressing to carry traffic
two interfaces can't belong to the same network
router bootup
bootset files - loaded into RAM when booted
-IOS image file
-start config file
router bootup process
1) perform POST and load the bootstrap program
2) locate and load the Cisco IOS software
3) locate and load the startup config file or enter setup mode
locating/loading config file
can be saved in NVRAM.
if not, can be loaded from a TFTP server
show version
CPU and amount of RAM
some versions write the amount of ram with XXXX/YYYY. add those two numbers together
has config register as 0x2102. changing to other used for password recovery
general config steps
1)give hostname
2) set passwords
-enable
-console
-VTY
-use service password-encryption to encrypt password
3) setup a banner motd
4) exit config
5) save configuration
configuring interfaces
1) conf t
2) interface whatever
3) ip address xxx.xxx.xxx.xxx yyy.yyy.yyy.yyy where x is IP address, y is subnet mask
4) description blah
5) no shutdown
6) exit config
7) save
verify interface configuration
show ip interface brief
show ip route
show interfaces
show ip interface
default gateway on a switch
1) interface blah
2) ip address xxx yyy (x is IP, y is subnet)
3) no shutdown
4) ip default-gateway xxx.xxx.xxx.xxx (x is IP address)
IP address on a switch is only used to mange the switch
if you want it accessible from anywhere, it needs a default gateway
Tuesday, December 2, 2014
Changing passwords... and Eclipse
Want to figure out how much you know about a system? Change
a password. Sounds stupid, but
automation is often setup under a single user account. In a large company (I’m hoping) you find that
only one password affects one process.
In a small company you will run into craziness. But I would encourage you to change
passwords, even ones where you don’t have a great deal of information on what
happens when the password changes.
If anything, it becomes a good time to write
documentation. Let’s face it, you are
supposed to have documentation on everything you do anyways. Password changes are no different. If you have built the infrastructure
properly, then a password change should only effect one device or service. That may seem like a lot of passwords. It is.
But if you aren’t willing to put effort into security, you won’t have any.
Moving on…
And Eclipsing we will go…
I took my final today, and I don’t have any site upgrades planned until
January, so I think it’s time to get the mobile apps I have built in head
tested and running. That means breaking
several things I would normally use at work.
But I suppose that will have to work.
Wednesday, November 26, 2014
Introduction to Networks (non-technical)
Rather than post my typical notes from a CCNA course, I figured I'd post a non-technical description of how networks "work". I'm going to preface this by saying this is "allegory" of TCI/IP layer 3. This is not intended to be definitive.
So...
You have built a company. It's a great company. But no one can ever find your physical location. You live on a drab, grey, boring street. Did I mention grey? I meant every single building is nothing but grey concrete, and the streets are bleached grey. It is grey as far as the eye can see.
So, being the great business leader you are, you go out and buy a bucket of purple paint. Now, purple paint is the greatest thing since sliced bread. And because it's the greatest thing since sliced bread, it costs an arm and a leg. To get the shade of purple you want, you buy one can of paint. It covers the outside of the door well, but nothing else.
So, from the outside your door looks purple. But that paint is so darn expensive, you only paint the outside. The inside of the door is still brown.
So, a customer comes to visit.
You tell him to drive down the grey street until you see a purple door. He find your location in minutes. It's easy.
Back in your office, you have a discussion, and he thinks he is going to buy from you. But he needs to talk to a few people to determine how much he wants to buy. And he forgot how to get out of the building.
"Oh, just go out the purple door", you tell your customer.
The man spends 45 minutes wandering your halls, and finally finds you. He curses you out, cancelling all potential business. You are at a complete loss. The customer can't find the purple door.
The one thing you forgot is that doors have two sides. One side that is visible from the street, and one side that is only visible from the inside of the building. You painted your street door purple. It's easy to find. But your exit door on your building? Still just as brown as it ever was. So telling someone to go find a purple door is an exercise in futility.
You have to name the door based off which side you happen to be looking at.
Even though both talk about the same thing, it's a matter of which side of the door you are on. And you have to have your discussion based on which side of the door you can see.
So...
You have built a company. It's a great company. But no one can ever find your physical location. You live on a drab, grey, boring street. Did I mention grey? I meant every single building is nothing but grey concrete, and the streets are bleached grey. It is grey as far as the eye can see.
So, being the great business leader you are, you go out and buy a bucket of purple paint. Now, purple paint is the greatest thing since sliced bread. And because it's the greatest thing since sliced bread, it costs an arm and a leg. To get the shade of purple you want, you buy one can of paint. It covers the outside of the door well, but nothing else.
So, from the outside your door looks purple. But that paint is so darn expensive, you only paint the outside. The inside of the door is still brown.
So, a customer comes to visit.
You tell him to drive down the grey street until you see a purple door. He find your location in minutes. It's easy.
Back in your office, you have a discussion, and he thinks he is going to buy from you. But he needs to talk to a few people to determine how much he wants to buy. And he forgot how to get out of the building.
"Oh, just go out the purple door", you tell your customer.
The man spends 45 minutes wandering your halls, and finally finds you. He curses you out, cancelling all potential business. You are at a complete loss. The customer can't find the purple door.
The one thing you forgot is that doors have two sides. One side that is visible from the street, and one side that is only visible from the inside of the building. You painted your street door purple. It's easy to find. But your exit door on your building? Still just as brown as it ever was. So telling someone to go find a purple door is an exercise in futility.
You have to name the door based off which side you happen to be looking at.
Even though both talk about the same thing, it's a matter of which side of the door you are on. And you have to have your discussion based on which side of the door you can see.
Tuesday, November 18, 2014
Security
Something I’m questioning quite a bit is network
security. Network security is a nebulous
thing that is never really clearly defined.
I’ve read through most of a Security+ book, but that doesn’t really
cover the broad scope of what needs to be done to cover the subject.
I’ve looked at the SANS website, and they might be great but
SANS is too busy selling things. Looking
at Cisco, it’s one part of the subject, but it doesn’t cover the entire
subject.
Here’s the real problem: network security is so spread out,
ambiguous, and poorly documented that truly learning network security has to be
a personal topic. The individual has to
wander through the various resources, hoping to find some piece of information
that will secure the network. So many
different possibilities of areas to cover without any real dedication. It is no wonder that networks are broken into
all the time.
I guess that’s my rant for the day. Lots of work today, so little time to spend
at home and do… anything else.
And I’m pissed at Evernote right now. It lost about 2-3 hours of my note
taking. There was a lot of interesting
information. And somehow, I’m back to
where I was before all my Saturday/Sunday studying.
Wednesday, November 12, 2014
Introduction to Network chapter 5: Ethernet
Ethernet operates at datalink and physical layer
Ethernet most widely used LAN technology
defined by IEEE 802.2 and 802.3
speeds between 10 and 100,000 Mb/s
802.2 - LLC
802.3 - MAC and Physical layers
LLC sublayer
handles communication between upper and lower layers
between networking software and device hardware
implemented in software
considered driver software
MAC sublayer
lower sublayer of data link layer
2 responsiblities
data encapsulation
media access control
data encapsulation
frame assembly before trasnmission
frame dissassembly upon reception
adds header and trailer to network layer pdu
data encapsultion has 3 primary functions
frame delimiting
used to identify groups of bits that make up a frame
provides syncronization between transmitting and receiving
addressing
contains physical address
Error detection
contains a CRC value used to determine if the contents have changed
media access control
responsible for placement of frames on the media (wire)
removal of frames from the media
underlying logical topology is a multiaccess bus
all nodes in a network segment share the medium
uses CSMA
understanding CSMA
1) detect if there is a signal on the media
a) if busy, wait
2) if no signal, transmit
if there is a collision, all data is bad and must be resent
contention-based methods have less overhead than controlled access systems
do not scale well with heavy media use
CSMA/CD
widespread use of switched networks makes CSMA/CD largely unneeded
CSMA/CA in wireless still needed
Every device receives every frame
To prevent mass processing of frames not intended for that device, MAC was created.
MAC used to identify which device should process a frame
MAC address structure
1st 24 bits/ 6 hex digits - Organizationally Unique Identifer
Last 24 bits/ 6 hex digits - Vendor assigned
1) Source computer sends
2) each NIC in the network views the information
a) if the destination MAC matches, then the frame is processed further
b) if not, the frame is dropped
Ethernet Frame Attributes
created in 1973
2 primary versions
-802.3 Ethernet Standard
-DIX Ethernet, or Ethernet II Used in TCP/IP networks
framing style differences are minimal
both define minimum frame size as 64 bytes
max 1518
preamble/Start Frame Delimiter not included when describing frame size
any frame less that 64 bytes discarded as a "runt"
VLAN technology increased maximum frame size to 1522
frame too big or too small, frame is dropped
Ethernet Frame
-preamble and SFD - synchronization between sender and receiver
-Destination MAC -
-Source MAC
-Length Field - exact length of the frame's data field; can indicate which higher-layer protocol is used;
if size greater than 1536, frame is ethertype protocol indicated.
-if 1500 or less, then use of 802.3 frame format
-data field - contains encapsulated layer 3 pdu
-frame check sequence - used to detect errors
In Ethernet, different MAC addresses used for layer 2 unicast, broadcast, and multicast communications
Unicast -destination MAC of receiver
broacast - destination MAC of FFFF.FFFF.FFFF
Multicast - destination MAC is 01-00-5E
MAC and IP
2 primary addresses assigned to a host
Physical Address - MAC
Logical Address - IP
Source device sends based on IP address
DNS used to identify remote network
ARP protocol has 2 basic functions
-resolving IPv4 addresses to MAC addresses
-maintaining a table of mappings
Frame must have destination address to be placed on the media (wire)
refers to ARP table or ARP cache. Stored in RAM on all devices
Each entry binds a MAC with an IP
table maintained dynamically
-adds information by
-monitoring network
-ARP request - L2 broadcast to all devices on the LAN
-entries are time stamped; if the system doesn't get a message by the time stamp expires, the entry is removed
-also capable of static entries
ARP to remote network
-when host creates a packet for a destination, it compares destination IP address to its own IP address to determine if they are both on the same network.
-if not the same network, then ARP to router interface serving as the gateway
ARP issues
overhead on the media
-could initially flood the network
security - ARP spoofing or ARP poisoning
-broadcast adn security issues can be mitigated with modern switches
-switches segment LAN into independent collision domains
-switches send to only sender and receiver, reducing traffic flows
Switching
devices usually connected by a layer 2 switch
switch builds MAC table to make forwarding decisions
if destination MAC is not known, switch sends the frame out all port except receiving port
when destination responds, switch adds MAC to its MAC table
-capable of multiple MACs per port (switch connected to a switch)
switch MAC table sometimes referred to as CAM (content addressable memory)
-transparent to network protocols and user applications
-can operate in different modes that affect the end user
-duplex settings
-half duplex - one talks ata time
-full duplex - send and receive at the same time; CSMA/CD shut off in this case
-Cisco Catalyst supports 3 duplex settings
-half
-full
-auto
-proper cabling also required (or used to be)
-MDIX auto function
autmatic medium dependent interface crossover (auto-mdix)
switches use following forwarding methods
-store and forward
get the entire frame before forwarding
use CRC to determine if it needs to dump frame
analyzes destination for where to forward
required for QoS analysis
-cut-through
holds frame until it gets destination address, then forwards
no error checking
faster than store and forward, but can send broken frames
2 variations to cut-through
-fast-forwards
offers lowest level of latency
typical of cut-through switching
-fragment free
reads first 64 bytes before forwarding (most errors occur in first 64 bytes)
switches use buffering techniques
port-based memory buffering
frames are stored in queues that are linked to specific incoming and outgoing ports
delay occurs if there is nothing transmitting on other ports and buffer is full
shared memory buffer
frame stores in common buffer used for all ports
useful for asymmetric switching
Fixed or Modular switches
PoE allows power to be sent to devices
forwarding rate defines how many frames the switch can process in a second
stackable vs non-stackable
modular configurations - add more cards
Small form-factor pluggable (ports that can be purchased and easily changed out on each switch)
Layer 3 switch
capable of performing layer 3 routing as opposed to the standard switch that just handles layer 2
support Cisco Express Forwarding (CEF)
complex, but based on
Forwarding Information Base
conceptionally similiar to routing table
Adjacency table
maintains layer 2 next-hop addresses for all FIB entries
separation provides benefits
-adjacency table can be built separately from the FIB table
-MAC header rewrite used to forward a packet is not stored in cache entries
layer 3 switch variants
Switch virtual interface (SVI)
logical interface on a switch associated with a VLAN
Routed port
physical port on an L3 switch configured to act as a router port
allow L3 switch to act as a router
not associated with a particular vlan
L3 interface only and does not support L2 protocol
no switchport interface configuration command
Layer 3 EtherChannel
logical itnerface on a Cisco device associated with a bundle of routed ports
Subscribe to:
Posts (Atom)