SlideShare a Scribd company logo
2
Most read
3
Most read
7
Most read
S.Nandhini
II- MSc(CS&IT)
Nadar Saraswathi college of Arts And Science
Theni
 Router and Switches to increase the security of the
network .
 As well as provide appropriate configuration steps for
protecting the devices themselves against attacks.
 Internet working protocol in use today is the
Transmission control protocol/Internet protocol.
 TCP/IP provides all the necessary components and
mechanisms to transmit data between two computers
over a network.
 A layer two address known as the Media Access
Control(MAC)address.
 A layer Three address known as an IP Address
 Switches are layer two devices and routers are layer
three devices
 Switch are the evolving descendents of the network
Hub
 Hub were dumb devices used to transmit packet
between devices connected to them
 And they functioned by retransmitting each and every
packet received on one port out through all of its
other ports.
 Router operate at layer three the network layer of
the OSI model and the dominant layer three
protocol in use today is Internet protocol(IP).
 Router are primarily used to move traffic between
different networks as well as between different
sections of the same network.
 Number of routing protocols such as Routing
Information protocol ,Open Shortest Path
First(OSPF)and the Border Gateway Protocol(BGP).
 Car perform authentication a common Method is to
disable or filter routing protocol updates on
necessary router interfaces.
 Issue following command
 Router(config-router)#passive-interface ethernet 0
Two main of routing protocols Distance-vector and
link-state protocols.
The main different between the two types is in the way
they calculate the most efficient path to the ultimate
destination network
 Distance-vector protocol maintain tables of distance
to other networks.
 Distance is measured in terms of hops with each
additional router that a packet must pass through
being considered a hop
 The most popular distance-vector protocol is RIP
 Link stage protocol were developed to address the
specific needs of larger networks
 Link state protocol use link-speed metrics to
determine the best route to another network.
 OSPF and BGP are examples of link-state protocol.
 Number of configuration steps that can be taken to
ensure the proper operation of your routers and
switches.
 These steps will include applying patches as well as
taking the time to configure the device for increased
security.
Patches and updates released by the product vendor
should be applied in a timely manner.
The following are links to some popular lists
 BugTraqwww.securityfocus.com/popups/forums/bugt
raq /intro.shtml
 CERT www.cert.org
 Ciscowww.cisco.com/warp/public/707/advisory.html
THANK YOU

More Related Content

PPT
Communication Protocol - Arindam Samanta
PDF
Routed Protocol
PDF
Week10
PPTX
Network Protocol Analysis
PPTX
Network switch
PDF
Difference between Routing & Routed Protocol
PDF
Week 10 Group C
PPT
Lecture6
Communication Protocol - Arindam Samanta
Routed Protocol
Week10
Network Protocol Analysis
Network switch
Difference between Routing & Routed Protocol
Week 10 Group C
Lecture6

What's hot (20)

PPT
02 protocol architecture
PPTX
Assingment 2
PPTX
CCNA 1 Routing and Switching v5.0 Chapter 3
PPTX
Switches on Networking
PPTX
IEEE 80211 ah
PPTX
Tcp ip protocols
PPTX
Network protocals
PDF
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
PPTX
communication-protocols
PDF
ip versions.pdf
PPTX
Network protocols
PPTX
Communication protocols
PPTX
Network Protocol
PPTX
Computer network and networking peripherals (ITM)
PPT
Lecture6(Wireless La Ns)
PPTX
TCP/IP-Protocol Suite-Simple Explanation
PPT
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
PPT
PDF
Executive Summary Jul 2015 - 1st Week
PPTX
Serial Data Communication
02 protocol architecture
Assingment 2
CCNA 1 Routing and Switching v5.0 Chapter 3
Switches on Networking
IEEE 80211 ah
Tcp ip protocols
Network protocals
Chapter 2 - Protocol Architecture, TCP/IP, and Internet-Based Applications 9e
communication-protocols
ip versions.pdf
Network protocols
Communication protocols
Network Protocol
Computer network and networking peripherals (ITM)
Lecture6(Wireless La Ns)
TCP/IP-Protocol Suite-Simple Explanation
INTRODUCTION TO INTERNET PROTOCOL BY SAIKIRAN PANJALA
Executive Summary Jul 2015 - 1st Week
Serial Data Communication
Ad

Similar to NETWORK DEVICE SECURITY NETWORK HARDENING (20)

PDF
Netw204 Quiz Answers Essay
PPT
ConfigureTwo networks principle
PPT
Network architecture
PDF
Basic ccna interview questions and answers ~ sysnet notes
PDF
OSPF (Open Shortest Path First) Case Study: Anil Nembang
PDF
A NOVEL ROBUST ROUTER ARCHITECTURE
PDF
C0343015019
PDF
Unit 3 Assignment 1 Osi Model
PPTX
Network architecture - part-I
PDF
Computer networks - CBSE New Syllabus (083) Class - XII
PPTX
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
PPTX
Network protocol
PPTX
PPTX
Networking fundamentals
PDF
COC to-manage-and-monitor-the-network.pdf
PPT
nv.ppt
PDF
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIP
Netw204 Quiz Answers Essay
ConfigureTwo networks principle
Network architecture
Basic ccna interview questions and answers ~ sysnet notes
OSPF (Open Shortest Path First) Case Study: Anil Nembang
A NOVEL ROBUST ROUTER ARCHITECTURE
C0343015019
Unit 3 Assignment 1 Osi Model
Network architecture - part-I
Computer networks - CBSE New Syllabus (083) Class - XII
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
Network protocol
Networking fundamentals
COC to-manage-and-monitor-the-network.pdf
nv.ppt
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIP
Ad

More from ramya marichamy (19)

PPTX
DIGITAL VIDEO DATA SIZING AND OBJECT BASED ANIMATION
PPTX
Image processing
PPTX
Classical encryption techniques
PPTX
Servlets api overview
PPTX
Divide and conquer
PPTX
Region based segmentation
PPTX
Design notation
PPTX
Mining single dimensional boolean association rules from transactional
PPTX
Architecture of data mining system
PPTX
segmentation
PPTX
File Management
PPTX
Arithmetic & Logic Unit
PPTX
SHADOW PAGING and BUFFER MANAGEMENT
PPTX
PPTX
pointer, virtual function and polymorphism
PPTX
Managing console i/o operation,working with files
PPTX
Operator overloading
PPTX
microcomputer architecture - Arithmetic instruction
PPTX
High speed lan
DIGITAL VIDEO DATA SIZING AND OBJECT BASED ANIMATION
Image processing
Classical encryption techniques
Servlets api overview
Divide and conquer
Region based segmentation
Design notation
Mining single dimensional boolean association rules from transactional
Architecture of data mining system
segmentation
File Management
Arithmetic & Logic Unit
SHADOW PAGING and BUFFER MANAGEMENT
pointer, virtual function and polymorphism
Managing console i/o operation,working with files
Operator overloading
microcomputer architecture - Arithmetic instruction
High speed lan

Recently uploaded (20)

PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Institutional Correction lecture only . . .
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Cell Structure & Organelles in detailed.
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Lesson notes of climatology university.
PDF
Sports Quiz easy sports quiz sports quiz
PDF
RMMM.pdf make it easy to upload and study
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Supply Chain Operations Speaking Notes -ICLT Program
VCE English Exam - Section C Student Revision Booklet
Anesthesia in Laparoscopic Surgery in India
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Institutional Correction lecture only . . .
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Cell Structure & Organelles in detailed.
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Module 4: Burden of Disease Tutorial Slides S2 2025
Lesson notes of climatology university.
Sports Quiz easy sports quiz sports quiz
RMMM.pdf make it easy to upload and study
STATICS OF THE RIGID BODIES Hibbelers.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Insiders guide to clinical Medicine.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Supply Chain Operations Speaking Notes -ICLT Program

NETWORK DEVICE SECURITY NETWORK HARDENING

  • 1. S.Nandhini II- MSc(CS&IT) Nadar Saraswathi college of Arts And Science Theni
  • 2.  Router and Switches to increase the security of the network .  As well as provide appropriate configuration steps for protecting the devices themselves against attacks.
  • 3.  Internet working protocol in use today is the Transmission control protocol/Internet protocol.  TCP/IP provides all the necessary components and mechanisms to transmit data between two computers over a network.  A layer two address known as the Media Access Control(MAC)address.  A layer Three address known as an IP Address
  • 4.  Switches are layer two devices and routers are layer three devices  Switch are the evolving descendents of the network Hub  Hub were dumb devices used to transmit packet between devices connected to them  And they functioned by retransmitting each and every packet received on one port out through all of its other ports.
  • 5.  Router operate at layer three the network layer of the OSI model and the dominant layer three protocol in use today is Internet protocol(IP).  Router are primarily used to move traffic between different networks as well as between different sections of the same network.
  • 6.  Number of routing protocols such as Routing Information protocol ,Open Shortest Path First(OSPF)and the Border Gateway Protocol(BGP).  Car perform authentication a common Method is to disable or filter routing protocol updates on necessary router interfaces.  Issue following command  Router(config-router)#passive-interface ethernet 0
  • 7. Two main of routing protocols Distance-vector and link-state protocols. The main different between the two types is in the way they calculate the most efficient path to the ultimate destination network
  • 8.  Distance-vector protocol maintain tables of distance to other networks.  Distance is measured in terms of hops with each additional router that a packet must pass through being considered a hop  The most popular distance-vector protocol is RIP
  • 9.  Link stage protocol were developed to address the specific needs of larger networks  Link state protocol use link-speed metrics to determine the best route to another network.  OSPF and BGP are examples of link-state protocol.
  • 10.  Number of configuration steps that can be taken to ensure the proper operation of your routers and switches.  These steps will include applying patches as well as taking the time to configure the device for increased security.
  • 11. Patches and updates released by the product vendor should be applied in a timely manner. The following are links to some popular lists  BugTraqwww.securityfocus.com/popups/forums/bugt raq /intro.shtml  CERT www.cert.org  Ciscowww.cisco.com/warp/public/707/advisory.html