Showing posts with label Cisco. Show all posts
Showing posts with label Cisco. Show all posts

Monday, October 17, 2016

Color redesign

I decided to change the colors around this morning.  The old background was my dinner table from a few years ago, and is now sitting out on the back porch.  Not terribly impressive, but hey.  It's out there. 

The new one fits more with the manilla folder idea I've been obsessively using in the past few decades.  I remember a website I created back following the days of GeoCities where I had a manilla folder background.  Nothing terribly impressive, but it takes me back to those days.

This one was a little more professionally designed and actually tiles like it is supposed to. 

At work, I've recently been using TWiki a lot.  Seems like a good platform.   After my vacation a couple of weeks ago, I realized the catalyst for much change is documentation.  If you don't document, then you are going to keep repeating the same tasks over and over again, and wondering why no one ever gets around to changing. 

You can't shove a part of the job you don't want to do on someone if you do not document.  It's that simple. 

If you will not document, then you will do the same thing over and over again.

Once the documentation is complete, you must then hand the documentation off to someone else in order to test your documentation.  If your documentation is never examined or tested, it's not really documentation.  

You must also revise and expand on your documentation to the point where it is excessively long.  You have to realize the person you are handing your documentation off to has no clue what a native VLAN is or why it could affect communication between a router and a switch.  And why have a native VLAN in the first place.  I've probably heard that question before, but I don't remember the answer.   I know the difference between a native VLAN and a non-native VLAN.  Hell, I brought up ISL in the conversation in order to back up enough to provide a starting point.  

But in the end you must document to the point of excessive.  All you are going to do is take up disk space, and disk space is relatively free. 

Anyways.... 

Upgrades Tuesday, Wednesday, and Thursday this week.  At least the prep work is mostly done on them.  So they should go relatively quickly. 

Wednesday, July 27, 2016

CCNA

One last day before the CCNA.  

After a bit of testing, I'm pretty good on the LAN side.  It's WAN and routing protocols that I need to spend the most time on.  I can get the necessary points out of studying OSPF, EIGRP, PPP, and Frame Relay.

Still working on Mnemosyne on my studying.  I covered the LAN side way too deeply.  Basically means I can answer LAN side questions without a second thought.  But WAN and routing protocol side is weak.

On the practice tests, I've been getting about 65%.  So that means I only need to improve 20% or so.  Easy.

Back tomorrow afternoon with results.

Thursday, May 12, 2016

CCNA class

The final class of CCNA prep is done today.  I've got to take the final, and then the formalized class is over.   It has been kicking me up one side of the street and down the other.

It's not that material is hard.  It's just that there's a lot of material covered in an incredibly short time period.  What is normally a 16 week class has been reduced to 8.  And that's pretty crazy.  That's nothing for many classes.  But a bunch just turns college into some horrendous grind.

I guess colleges needed to find a new way to make money.  And grinding students through faster always seems like a good idea.   How much do I want to bet they are charging the same amount for the 8 week class as they were the 16 week class?  Nothing.

Anyways.   Once the class is finished, I need to start studying to take the CCNA.  I'm aiming for about one month out for that.  My goal is to have it done before July 1st.  Maybe June 12th, as the place I take the test schedules on Thursdays.

Seems like that is the next thing I need to do.  Schedule the CCNA, so I have a definite date in which I'm going to take the thing.  Definiteness adds a sense of urgency.  

Wednesday, December 2, 2015

Useful Cisco Commands

Here's a collection of Cisco commands I still haven't been taught by Cisco.  But I learned through various other methods.

terminal monitor
and
term no mon
Terminal monitor is the answer to all remote diagnostic issues.  So when you ssh or telnet into a client, you then get the output you would if you were on site.  The only problem is that output occasionally drives you mad as you try to figure out the solution to a problem.  How in the world do you turn it off?  That's where term no mon comes into play.  It turns off console connections for after they have been turned on with terminal monitor.  Terminal monitor is taught in class.  Term no mon is not.

term len 0
Another terminal command.  The terminal length command tells how many lines of output to display when you hit a key.  But term len 0 has a special use.  Let's say you want to do a quick examination of the entire running config of a site.  How do I do that?

Using Putty, turn on logging.  I'd actually recommend setting logging to default so it logs every piece of output forever. Might be useful when you have other issues.  Next, remote access the system via telnet or ssh.  Next.  term len 0.  You now just set the terminal length to 0, so it will display the entire output without having to press a single key.  Guess what?  No more parsing crud out of text files.  You now have a complete running config stored in the Putty log file that only needs minor parsing.  No more removing typing, input characters, or what not.  Just open the file and remove the login/logout sections.

Next, exit.  Do not save.  No not write.  That way, the next time you log in everything will be just as you found it before.  No weirdness or strangeness.  Otherwise you might have to use term len 10 or something to that effect to put it all back together again.

monitor session 1 source interface interface_name/number
monitor session 1 destination interface interface_name/number
The only pair of commands in my list.  I've only used these commands on switches.  They might work on routers as well.  Not sure.  But here's the great thing about these commands: along with Wireshark, you can kick back and examine all the traffic going through a device in order to try and troubleshoot communication issues.  It's kind of like a programmable hub, but better.  And, you can monitor as few or as many ports as you want.  I'm sure there's limitations to the commands, but like I said, these are things I've learned that classes have never taught me.

So, there you go.  A short collection of Cisco commands that seem to make life easier.  Or get rid of terminal monitor after you start it up.  Hope it helps.




Thursday, November 26, 2015

Last Projects for Cisco 3

So I just finished my last two packet tracers for my Cisco 3 class.  Presented, for all your wonderful glory, is a picture of my EIGRP capstone project.  

Which I have to admit is about as complicated as some things I've designed for work, and are actually in operation.  The fun thing about this one is I ended up setting up DHCP on every single one of those networks in there, so the end user connections are all DHCP assigned.  The EIGRP portion wasn't that difficult.  Mostly, it was just labor. 

The interesting thing was in creating the ISP connection.  Really, it's just a router with an assigned public IP.  From there, I added a default route back towards the network I designed.  It might have been more interesting to design the thing as a multiaccess network, but who cares.  The system wanted a multiple location EIGRP network.  So I used serial connections.  And funny thing is, I've never had to set up a serial connection in real life.  All Ethernet based.  One was PPPOE, and that was a bit annoying to set up.  

So now, all I have to do is study for the final and start working on the next book.  In the process of taking over four stores.  Isn't work fun?  


Friday, November 6, 2015

Back to SNMP and other things

I used to hate SNMP.  I’m not sure I still don’t.  It’s been annoying to set up.  I’m still fighting with SNMPWALK on SNMPv3 and getting data from a Cisco router and switch. Eh well. I’ll get into that at some other point.  


I have to admit Cacti was one of the better than I thought it could be.  I followed the right instructions and have started doing some SNMP polling and producing some decently relevant graphs on information someone in IT would think could be important.  Luckily, I happened to set it up on a site that had Internet issues later that day.  It worked out great because I ended up diagnosing the issue while trying to connect to my Cacti web page.  Turns out there was interference on the network in the area and the site was dropping about 18% of packets.  Which explains why they were having network connection issues. 

 The other thing I keep looking and thinking about is network security.  Which seems to be something everyone says they need, but no one does anything about.  I pissed off a networking vendor because I told the person I wanted three single purpose servers instead of one multipurpose server.  Everything I've ever read on servers says one purpose per server.  Don't end up with a multipurpose server. 

Eventually, the server needs replaced.  And then you have numerous tools that need replaced or fixed in order to solve all the problems you used with that server.  I mean sure, the RADIUS / print / file server / new thing part two server is great.  But wouldn't it be simpler to have a RADIUS server that does nothing but RADIUS authentication.  Or a print server that does nothing but handle printing.  And then, when you need to upgrade that server you take down one function.  Instead of the 25 different things running on one server.  

I guess the second part of that conversation is "don't turn on any service that you don't need" on a server.  Great.  That's a lot simpler with a single purpose server.  The print server doesn't need to do anything but print.  The file server needs fat bandwidth to reach it, and that's about it.  Virtualize it all.  It's not like you need a physical server for all that.  

But what do I know?  

Wednesday, July 1, 2015

As the world burns...

The world burns.  I study. 

I’m concerned with Dora (Discover, Offer, Request, ACK) the DHCP explorer and her friend Bubu  (broadcast, unicast, broadcast, unicast) and learn on source, forward on destination.    

Open suckiest path first:  Hello, dead beat dad.  Losers suck right?  Losers suck up.  Ack.  (link state packets for OSPF.)
Basic ACL near destination
Extended ACL near source
Deploy access class to limit access to console
Default information-orginate
Ip helper-address


I’ll know Thursday if I pass.  Wish me luck.




Wednesday, May 13, 2015

end of a semester

Routing and Switching is over.   Finished the final with an 85, closed book closed notes.

That should give me an A for the semester.  I need to prepare for the CCENT for the next 2-3 weeks, and then go take that.  Based on the Routing and Switching final, I need to study OSPF more.  I missed more than I would have liked on that.

Scaling Networks is next.   The book is on order.  I spent a few minutes looking through the chapter headings on the final book, and found the PPPOE section.   Yeah.  Book 4, right before the CCNA.

Moving on.   Back to site construction tomorrow, now that finals are complete.   Yay.

Friday, March 27, 2015

Pareto Principle in Action

My last experiment started as a practical examination of the Pareto principal, otherwise known as the 80/20 rule.  I had been making straight B’s on my Routing and Switching tests, and I wanted to consistently improve them to A’s.  In order to do that, I needed to know how much time I was spending getting that B. 

So I changed my study habits slightly, and decided to keep track of time spent studying.  I’d also read something about two competing South Pole expeditions.  One ran as much as they could every day.  Some days they didn’t go anywhere because the weather was bad.  The other went 15 miles a day, regardless.  They went 15 miles, and stopped for the day.  So I decided to try that principal with studying.  And the results were pretty remarkable.

I went from an average low B to a high A on the next test.  Hooray for me.   Anyway, this was the process. 
Read any previous notes I had made.
Grab a highlighter, and read 15 pages, highlighting what I thought was important.
Copy those highlighted notes into my printed notes.
Quit for the day.   Return tomorrow.

In doing this process, I found it only took about an hour a day, so I really had more time to work on other things.  Normally, I would have spent 3-4 hours straight on Saturday or Sunday reading and highlighting.  Granted, chapter 7 took me 387 minutes to complete, but that only averaged 64 minutes per day.  I have yet to take the test on that chapter, so I’m not yet sure how effective this process has been for that chapter.  But I do know the previous chapter resulted in huge positive results.

I think I missed a lot of the main part of this that makes it so effective.  The main effective part is that you study a little bit every single day.  It’s not a brain destroying group done once or twice per week.  It’s simply an hour per day, every single day.  In that way, your brain doesn’t have time to stop thinking about what you have studied.  On top of that, by the end you’ve read and reread your notes numerous times.  Then, the information is more likely to stick. 


We’ll see what happens with chapter 8.  Though I have to admit, single area OSPF just doesn’t interest me that much.

Tuesday, January 20, 2015

Network Baselines

Like I said, I’ve been working on network baseline analysis.  Beginning problem is that I don’t have a baseline to begin with, nor do I have any way to examine the current baseline of the network.  So, I’m at a loss of where to start. 

I read one book where a basic baseline can be created by pinging all available hosts.  It’s not the greatest baseline, but it is the beginning, and it’s better than nothing.  What I’ve got is nothing.  So what I did is wrote a batch file using a FOR loop to ping all devices and print the output to a file.  After that, I ran an arp –a and appended that to the end of the file. 

So it’s not the greatest baseline.  But it does give me an idea of what standard network performance should be, at least as far as PING goes.  I guess the next part is trying to dump the information into a webpage or a database so the information can be examined later and compared to what it has been at various points. 

I guess I should probably add the ITILv3 documentation to my reading list.  The only problem is I’m not definite the ITIL information actually provides information on how to baseline a network.  I understand the basics and the conceptual theory.  It’s a matter of going out and doing the work.  And sorry, SNMP is not the way to baseline.  Everyone has it turned off due to the insecurities in the system. 

Just a quick look at Cisco, and the only encrypted version they have only supports DES.  So the options are send the data as plaintext, or send it as an algorithm that has already been replaced due to inherent weakness.   15 years ago, DES was cracked in 22 hours.  15 years ago, I was happy with 400 MHz processor running 128 Mb of RAM. 

In comparison, I’m writing this on a laptop with an Intel Core i5 running at 2.5 GHz with 4 GB of RAM.  Shot in the dark, but I think a couple of these suckers could crack DES in a day.  And if someone breaches your network and doesn’t get caught, then what is a day?  What is 10 days? 


Thursday, December 11, 2014

Introduction to Networks ch 6


Quiz 
     How does the network layer use the MTU value?
     A) The MTU is passed to the network layer by the data link layer.

     What are 2 functions that are provided by the network layer?
     1) providing end devices with a unique network identifier
     2) directing data packets to destination hosts on other networks


     During the boot process, in what memory location will the router bootstrap program look for the IOS image if a TFTP server is not used?  
     A) flash
          

     When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation
     A) Flow Label

     Within a production network, what is the purpose of configuring a switch with a default gateway address?
     A) The default gateway address is used to forward packets originating from the switch to remote networks.


Chapter 6 Notes

routing - communication between networks

Network Layer
     Provides services to allow end devices to exchange data across the network
     -OSI Layer 3
     -4 basic processes
          -Addressing (end devices)
               end device with configured IP is called a host
          -Encapsulation
               Receives PDU from transport layer.  Adds header.   Now called a Packet
          -Routing - services to direct packets to a destination host on another network
               -each route the packet takes to reach the destination is called a hop
          -Deencapsulation - process of removing headers from lower layers
               

     Operates without knowing/caring of the data being carried
     Media/Path is irrelevant.  Satelite, wireless, cable modem, serial.. doesn't matter

Network Layer protocols
     IPv4
     IPv6

 Characteristics of IP protocols    
     -low overhead
     -connectionless
     -best effort (unreliable) 
     -media independant

     Connectionless - no dedicated end to end connection created before sending.  Kind of like mail.
          -send at any time
          -unaware of the state of the recipient
          -unaware if the receiver can understand the data 
          -no error correction
          -no guarantee packets will arrive in order

Best Effort Delivery
     can't recover from failed/corrupt packets
     bad packets are dropped
     trouble with transmission handled by upper layers if the layer desires
     

Media Independent
     Data link layer responsible for transmitting over media.
     maximum size packet that can be sent is the MTU (maxium transmission unit)
          -data link layer passes the MTU value up to the network layer
          -network layer uses information to determine packet size
          -breaks packets to  fit the MTU.   
          -Fragmentation is necessary to split packet size so it will fit on a device with a smaller MTU


IPv4 Packet
     -In use since 1983
     Packet has 2 parts
          1) IP header
               Significant portions of the header
               -Version - packet version.  Constant at 0100
               -Differentiated services (formerly Type of Service) - used for QoS.   1st 6 bits used by QoS.  last 2 bits used to prevent dropping
               -TTL (Time to Live) 8 bit value to limit the lifetime of the packet.  Reduced at each hop.   If hits 0, router discards packet and returns ICMP Time Exceeded message to the source IP address
               -Protocol - indicates data payload
               -Source IP address
               -Destination IP address
               
          2) Payload



          Remaining fields of the IPv4 header
          -Internet Header Length (IHL) - 4 bit value identifying the number of 32 bit words in the header
          -total length - defines entire packet size, including header and data
          -header checksum - used for error checking IP header.  If values do not match, packet is discarded

          If the packet is fragmented, other fields are used to keep track of the data
          -Identification - unique identifier of a fragment
          -flags - identifies how a packet is fragmented
          -fragment offset - identifies the order in which to place the packet when it arrives at the destination

          
IPv6 packet
     Limitations of IPv4
     -IP address depletion   - only 4 billion available IP addresses.  Quickly running out due to always-on connections
     -Internet Routing Table Expansion - more networks, more routes, more waiting
     -Lack of end-to-end connectivity - Troublesome when NAT and PAT are used.  

     Encapsulating
          -simplification of the IPv6 header
          IPv4 had 20 octets and 12 basic header fields
          IPv6 has 40 octets and 8 basic header fields

          advantages over IPv4
               -better routing efficiency for performance and forwarding rate
               -no requirement for processing checksums
               -simplified and more efficient extension header mechanisms
               -flow label field for per-flow processing with no need to dencapsulate to identify various traffic flows

          IPv6 packet header
               -Version- 4 bit binary.  Constantly set to 0110
               -Traffic Class - equivelant of the differentiaed services field
               -flow label     - used to inform routers and switches to maintain the same path for packet flow so that packets are not reordered
               -payload length
               -next header - equivelent of the IPv4 protocol field.  indicates data being carried
               -hop limit
               -source address
               -destination address

          IPv6 addresses
          -128 bit address
          -colons separate entries into a series of 16-bit hexadecimal blocks

          

Routing
     How a host routes
          Host forwarding decision
               hosts can send a packet to ...
               -itself
               -local host
               -remote host

               local host vs remote host is based on IP address and subnet mask comparison between sender and receiver

               devices beyond the local network segment referred to as remote hosts
     
         
          Default Gateway
               the device that routes traffic from the local network to devices on remote networks
               
               if a host is sending to remote network, it sends to default gateway

               default gateway maintains a routing table 
                    -data file in RAM that stores route information from directly connected networks
                    -also knows remote networks the device has learned

                    
               host must maintain a local routing table to ensure proper delivery
               hosts routing table typically contains of...
               -direct connection
               -local network route
               -local default route

               default route only used to connect outside of the local network


IPv4 routing
               
          If a host wants to send a packet inside the local network
          1) consult the IPv4 route table
          2) match the destination IP address and identify it as being in the same network
          3) send the packet using the local interface

          If a host wants to send a packet outside the local network
          1) consult the IPv4 route table
          2) find there is no exact match for the destination IP address
          3) choose the local default route to pick the forwarding location
          4)  send the packet to the gateway using the local interface
          

IPv6 routing
          
          View routing table in Windows with netstat -r or route print

          If - lists the interface numbers from the interface list
          metric - lists the cost of each route to a destination.  Lower numbers are preferred routes
          network destination - lists the reachable networks
          gateway  - lits the address used by local host to forward outside the network

     ::/0 - IPv6 equivalent of the local default route
     ::1/128  - IPv6 equivalent of the loop back address
     200::/32 - global unicast network prefix
      fe80::/64 local link network route address;  represents all computers in the local network
      ff00::/8     multicast address

     no broadcast addresses in IPv6


Router Routing Tables

     routers store information about 
          directly connected routes
          -known from interfaces physically plugged into the router
          
          remote routes
          -routes that come from other routers.  
          -manually configured  or dynamically configured through the device learning from other routers

          routing table of a router
          -destination network
          -metric associated with the destination
          -gateway to get to the destination

          show ip route

          when a packet arrives at the router, the router examines the routing table.  if the destination network matches a route in the routing table, the router forwards the packet to that route
          if multiple paths to the same location, then lowest metric wins

     directly connected routing table entries
          routers have 2 rotus after IP address is assigned
          
          route source: - how the route was learned
               C: directly connected
               L - local route

          Destination network and how reached
               identifies the address of the network and how a packet can reach the destination
          outgoing interface
               what interface is used to connect to that network

          routers generally have multiple interfaces configured
               common codes for remote networks
               -S: route was manually created by an admin.  Static route
               -D: learned dynamically using EIGRP
               -O: learned dynamically using OSPF

          remote network routing table entries
               route source- how the route was learned
               destination network - the address of the remote network
               administrative distance - trustworthiness of the route source
               metric - value assigned to reach the remote network.  Lower wins
               next hop - ip address of the next router to forward packets to
               route timestamp - when the route was last heard from
               outgoing interface - physical interface to forward a packet

          next hop address
               address of the device that will process the packet next.

          packets can not be forwarded by the router without a route for the destination network.

          if no route, packet is dropped

          router can be configured with a gateway of last resort if the destination is unknown

          

Routers - 
     a router is a computer
     
     branch - small business, medium business, teleworkes
     WAN - large business
     Service provider - large service providers

     router CPU and OS
     
     Router memory 
          RAM  -  store applications and process including
                    -IOS - copied during bootup
                    -running config
                    -ip routing table
                    -ARP cache
                    -packet buffer
                    routers use DRAM
                    volatile memory and requires continual power to maintain information
                    all content lost when powered down
          ROM
               used to store:
               -bootup instruction
               -basic diagnostic software
               -limited IOS
               firmware embedded on an integrated circuit inside the router
               doesn't lose contents when powered down 
          NVRAM
               used as permanent storage for the startup config file
               doesn't lose contents when powered off
          flash 
               used as permanent storage for IOS and system related fields

          router backplane
               has the following connections
               -console ports
               -aux port
               -LAN interfaces
               -Enhanced high-speed WAN interface card (EHWIC) slot
                    modular enhancement slot.  Different interface, different card

          connecting to a router
               routers interconnect many devices
               connections grouped into two categories
               
               management ports - used to configure/manage/troubleshoot.  not used for packet forwarding
               in-band router interfaces - LAN and WAN interfaces configured with IP addressing to carry traffic

               two interfaces can't belong to the same network

          

router bootup

     bootset files - loaded into RAM when booted
          -IOS image file
          -start config file
     
     router bootup process
          1) perform POST and load the bootstrap program
          2) locate and load the Cisco IOS software
          3) locate and load the startup config file or enter setup mode


          locating/loading config file

               can be saved in NVRAM. 
               if not, can be loaded from a TFTP server
               

         show version 
               CPU and amount of RAM
                    some versions write the amount of ram with XXXX/YYYY.   add those two numbers together
               has config register as 0x2102.    changing to other used for password recovery

          

        general config steps
             1)give hostname
             2) set passwords 
                    -enable
                    -console
                    -VTY
                    -use service password-encryption to encrypt password
               3) setup a banner motd
               4) exit config
               5) save configuration

        configuring interfaces
               1) conf t
               2) interface whatever
               3) ip address xxx.xxx.xxx.xxx yyy.yyy.yyy.yyy   where x is IP address, y is subnet mask
               4) description blah
               5) no shutdown
               6) exit config
               7) save

        verify interface configuration
               show ip interface brief
               show ip route
               show interfaces
               show ip interface

default gateway on a switch
     1) interface blah
     2) ip address xxx yyy  (x is IP, y is subnet)
     3) no shutdown

     4) ip default-gateway xxx.xxx.xxx.xxx   (x is IP address)
     
     IP address on a switch is only used to mange the switch
     if you want it accessible from anywhere, it needs a default gateway

Tuesday, December 2, 2014

Changing passwords... and Eclipse


Want to figure out how much you know about a system? Change a password.  Sounds stupid, but automation is often setup under a single user account.  In a large company (I’m hoping) you find that only one password affects one process.  In a small company you will run into craziness.  But I would encourage you to change passwords, even ones where you don’t have a great deal of information on what happens when the password changes.

If anything, it becomes a good time to write documentation.  Let’s face it, you are supposed to have documentation on everything you do anyways.  Password changes are no different.  If you have built the infrastructure properly, then a password change should only effect one device or service.  That may seem like a lot of passwords.  It is.  But if you aren’t willing to put effort into security, you won’t have any.  

Moving on…

And Eclipsing we will go…  I took my final today, and I don’t have any site upgrades planned until January, so I think it’s time to get the mobile apps I have built in head tested and running.  That means breaking several things I would normally use at work.  But I suppose that will have to work.


Wednesday, November 26, 2014

Introduction to Networks (non-technical)

Rather than post my typical notes from a CCNA course, I figured I'd post a non-technical description of how networks "work".  I'm going to preface this by saying this is "allegory" of TCI/IP layer 3.  This is not intended to be definitive.  

So...

You have built a company.  It's a great company.  But no one can ever find your physical location.  You live on a drab, grey, boring street.  Did I mention grey? I meant every single building is nothing but grey concrete, and the streets are bleached grey.  It is grey as far as the eye can see.

So, being the great business leader you are, you go out and buy a bucket of purple paint.  Now, purple paint is the greatest thing since sliced bread.  And because it's the greatest thing since sliced bread, it costs an arm and a leg.  To get the shade of purple you want, you buy one can of paint.  It covers the outside of the door well, but nothing else.

So, from the outside your door looks purple.  But that paint is so darn expensive, you only paint the outside.  The inside of the door is still brown.

So, a customer comes to visit.

You tell him to drive down the grey street until you see a purple door.  He find your location in minutes.  It's easy.

Back in your office, you have a discussion, and he thinks he is going to buy from you.  But he needs to talk to a few people to determine how much he wants to buy.  And he forgot how to get out of the building.

"Oh, just go out the purple door", you tell your customer.

The man spends 45 minutes wandering your halls, and finally finds you.   He curses you out, cancelling all potential business.  You are at a complete loss.  The customer can't find the purple door.

The one thing you forgot is that doors have two sides.  One side that is visible from the street, and one side that is only visible from the inside of the building.  You painted your street door purple.  It's easy to find.  But your exit door on your building?  Still just as brown as it ever was.  So telling someone to go find a purple door is an exercise in futility.

You have to name the door based off which side  you happen to be looking at.

Even though both talk about the same thing, it's a matter of which side of the door you are on.  And you have to have your discussion based on which side of the door you can see.

Tuesday, November 18, 2014

Security

Something I’m questioning quite a bit is network security.  Network security is a nebulous thing that is never really clearly defined.  I’ve read through most of a Security+ book, but that doesn’t really cover the broad scope of what needs to be done to cover the subject.

I’ve looked at the SANS website, and they might be great but SANS is too busy selling things.  Looking at Cisco, it’s one part of the subject, but it doesn’t cover the entire subject. 

Here’s the real problem: network security is so spread out, ambiguous, and poorly documented that truly learning network security has to be a personal topic.  The individual has to wander through the various resources, hoping to find some piece of information that will secure the network.  So many different possibilities of areas to cover without any real dedication.  It is no wonder that networks are broken into all the time.

I guess that’s my rant for the day.  Lots of work today, so little time to spend at home and do…  anything else.

And I’m pissed at Evernote right now.  It lost about 2-3 hours of my note taking.  There was a lot of interesting information.   And somehow, I’m back to where I was before all my Saturday/Sunday studying.


Wednesday, November 12, 2014

Introduction to Network chapter 5: Ethernet



Ethernet operates at datalink and physical layer

Ethernet most widely used LAN technology

defined by IEEE 802.2 and 802.3

speeds between 10 and 100,000 Mb/s

802.2 - LLC
802.3 - MAC and Physical layers

LLC sublayer 
     handles communication between upper and lower layers
     between networking software and device hardware
     implemented in software
     considered driver software

MAC sublayer
     lower sublayer of data link layer    
     2 responsiblities
          data encapsulation
          media access control

          data encapsulation
               frame assembly before trasnmission
               frame dissassembly upon reception
               adds header and trailer to network layer pdu

          data encapsultion has 3 primary functions
               frame delimiting     
                    used to identify groups of bits that make up a frame
                    provides syncronization between transmitting and receiving
               addressing     
                    contains physical address 

               Error detection
                    contains a CRC value used to determine if the contents have changed

     media access control
          responsible for placement of frames on the media (wire)
          removal of frames from the media

          underlying logical topology is a multiaccess bus
           all nodes in a network segment share the medium
                uses CSMA

understanding CSMA
     1) detect if there is a signal on the media
               a) if busy, wait
     2) if no signal, transmit

     if there is a collision, all data is bad and must be resent

     contention-based methods have less overhead than controlled access systems
     do not scale well with heavy media use

     CSMA/CD
     widespread use of switched networks makes CSMA/CD largely unneeded
     CSMA/CA in wireless still needed



     Every device receives every frame
     To prevent mass processing of frames not intended for that device, MAC was created.
     
     MAC used to identify which device should process a frame

     MAC address structure
     1st 24 bits/ 6 hex digits - Organizationally Unique Identifer
     Last 24 bits/ 6 hex digits - Vendor assigned

     1) Source computer sends
     2) each NIC in the network views the information
          a) if the destination MAC matches, then the frame is processed further
          b) if not, the frame is dropped

Ethernet Frame Attributes

     created in 1973

     2 primary versions
     -802.3 Ethernet Standard
     -DIX Ethernet, or Ethernet II         Used in TCP/IP networks
     framing style differences are minimal

     
both define minimum frame size as 64 bytes
     max 1518

     preamble/Start Frame Delimiter not included when describing frame size

     any frame less that 64 bytes discarded as a "runt"

     VLAN technology increased maximum frame size to 1522 

frame too big or too small, frame is dropped


Ethernet Frame
     -preamble and SFD - synchronization between sender and receiver
     -Destination MAC -
     -Source MAC
     -Length Field - exact length of the frame's data field;  can indicate which higher-layer protocol is used;
          if size greater than 1536, frame is ethertype protocol indicated.
          -if 1500 or less, then use of 802.3 frame format

     -data field - contains encapsulated layer 3 pdu

     -frame check sequence - used to detect errors


In Ethernet, different MAC addresses used for layer 2 unicast, broadcast, and multicast communications

Unicast -destination MAC of receiver
broacast - destination MAC of FFFF.FFFF.FFFF
Multicast - destination MAC is 01-00-5E 

MAC and IP
2 primary addresses assigned to a host
     Physical Address - MAC
     Logical Address - IP


Source device sends based on IP address 

DNS used to identify remote network

ARP protocol has 2 basic functions
     -resolving IPv4 addresses to MAC addresses
     -maintaining a table of mappings

Frame must have destination address to be placed on the media (wire)
refers to ARP table or ARP cache.  Stored in RAM on all devices

Each entry binds a MAC with an IP

table maintained dynamically
-adds information by
     -monitoring network
     -ARP request - L2 broadcast to all devices on the LAN

 -entries are time stamped;  if the system doesn't get a message by the time stamp expires, the entry is removed
-also capable of static entries

ARP to remote network
     -when host creates a packet for a destination, it compares destination IP address to its own IP address to determine if they are both on the same network.

     -if not the same network, then ARP to router interface serving as the gateway


ARP issues
     overhead on the media
          -could initially flood the network
     security - ARP spoofing or ARP poisoning 
          -broadcast adn security issues can be mitigated with modern switches
          -switches segment LAN into independent collision domains
          -switches send to only sender and receiver, reducing traffic flows

Switching
     devices usually connected by a layer 2 switch
     switch builds MAC table to make forwarding decisions

     if destination MAC is not known, switch sends the frame out all port except receiving port
     when destination responds, switch adds MAC to its MAC table
     -capable of multiple MACs per port (switch connected to a switch)

     switch MAC table sometimes referred to as CAM (content addressable memory)

     -transparent to network protocols and user applications
     -can operate in different modes that affect the end user
          -duplex settings
               -half duplex - one talks ata time
               -full duplex - send and receive at the same time;  CSMA/CD shut off in this case
          
     -Cisco Catalyst supports 3 duplex settings
          -half
          -full
          -auto


     -proper cabling also required (or used to be)     
          -MDIX auto function
          autmatic medium dependent interface crossover (auto-mdix)

     switches use following forwarding methods
          -store and forward
               get the entire frame before forwarding
               use CRC to determine if it needs to dump frame
               analyzes destination for where to forward
               required for QoS analysis
          -cut-through
               holds frame until it gets destination address, then forwards
               no error checking
               faster than store and forward, but can send broken frames

               2 variations to cut-through
                    -fast-forwards
                         offers lowest level of latency
                         typical of cut-through switching
                    -fragment free
                         reads first 64 bytes before forwarding (most errors occur in first 64 bytes)
                    
               switches use buffering techniques
                    port-based memory buffering
                         frames are stored in queues that are linked to specific incoming and outgoing ports
                         delay occurs if there is nothing transmitting on other ports and buffer is full
                    shared memory buffer
                         frame stores in common buffer used for all ports
                         useful for asymmetric switching

    Fixed or Modular switches
          PoE allows power to be sent to devices

          forwarding rate defines how many frames the switch can process in a second
          stackable vs non-stackable
          modular configurations - add more cards

          Small form-factor pluggable (ports that can be purchased and easily changed out on each switch)

     Layer 3 switch
          capable of performing layer 3 routing as opposed to the standard switch that just handles layer 2

          support Cisco Express Forwarding (CEF)
          complex, but based on 
               Forwarding Information Base
                    conceptionally similiar to routing table
               Adjacency table
                     maintains layer 2 next-hop addresses for all FIB entries

               separation provides benefits
                    -adjacency table can be built separately from the FIB table
                    -MAC header rewrite used to forward a packet is not stored in cache entries

          layer 3 switch variants

               Switch virtual interface (SVI) 
                    logical interface on a switch associated with a VLAN
               Routed port
                    physical port on an L3 switch configured to act as a router port
                    allow L3 switch to act as a router
                    not associated with a  particular vlan
                    L3 interface only and does not support L2 protocol
                    no switchport interface configuration command
               Layer 3 EtherChannel
                    logical itnerface on a Cisco device associated with a bundle of routed ports