Você está na página 1de 13

A PRESENTATION ON CISCO BASED NETWORKING & SECURITY

SUBMITTED TO DEPT. OF ELECTRONICS AND TELECOMMUNICATION ENGINEERING IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE AWARD OF THE DEGREE OF BACHELOR OF ENGINEERING (B.E.)

UNDER SUPERVISION OF:


Mr. SAMEER KUMAR BURMAN (Asst. Prof. ET & T) Mr. CHINMAY CHANDRAKAR (HOD ET & T)

SUBMITTED BY:
SUMEET DEWANGAN SURYA PRAKASH SUMIT SINHA SHRIKANT CHAURASIA AKHILESH KUMAR

SHRI SHANKARACHARYA GROUP OF INSTITUTIONS JUNWANI BHILAI 490020

AGENDA
The topics to be discussed
1.
2.

NETWORK DESIGN
SECURITY IMPLEMENTATION

NETWORK DESIGN
Determining the need of the organization. Determining the hardware requirements.

IP Addressing scheme.

Routing implementataion.

NETWORK DESIGN
IP ADDRESSING SCHEME
Once the hardware requirement is met, its necessary to allot them a software address called as IP address. Its necessary to recognize end devices in the IP internetwork for communication. IP address is alotted according to the need of organization as how many network and user per networks are required. Five types of IP addresses are used for this namely CLASS A,CLASS B,CLASS C,CLASS D & CLASS E.

NETWORK DESIGN
ROUTING IMPLEMENTATION
After assigning Ip address to each and every host in a network they are not ready to send and receive packets. They are not able to do this because they dont know where the destination host is situated. Thats where a router comes in the work of the router is to determine the best possible way to the network of destination host. The Router finds the destination host network using the Routing Protocols like RIP, RIP Ver. 2, IGRP,EIGRP. Once the home network is found the routed protocol is used to the destination host.

SECURITY IMPLEMENTATION

Methods of Accessing the Router:

Security features provided by the Router:

SECURITY IMPLEMENTATION
Methods of Accessing the Router:
Console Port : This is the port situated at the back of the Router. To access the router through this port we have to use the Routers CLI(command line interface).

Auxiliary Port : This is also situated at the back of the router. To access Router through this port we have to use the modem.
Virtual Terminal(Remote Accessing) : 1. Telnet. 2. SSH(Secure shell).

SECURITY IMPLEMENTATION
TELNET:This is the method of accessing the router via
remote connection. Any end computer in the network can be used to access the router through this method.

SSH(SECURE SHELL ):This is also the method of


accessing the router via remote connection. But this is somewhat different from the TELNET as the tunnel established from the end user to the router is heavily encrypted.

SECURITY IMPLEMENTATION
SECURITY FEATURES PROVIDED BY ROUTER:

Password Protection Access List Privilege Level Syslog Server SSH Auto secure Banner (Warning)

SECURITY IMPLEMENTATION
The security features provided by Routers are:

Password Protection Every method of Accessing


the Router can be restricted by assigning the password. The password protection can be applied to all the accessing methods discussed earlier.

BANNER-Each when a user tries to login to the Router a warning message is displayed prior to login.

SECURITY IMPLEMENTATION
The security features provided by Routers are: Access List: This is the management tool used for packet
filtering. The packet can be filtered according to its source(standard access list) or source/destination(extended access list) address.

Privilege level: In a network each and every user can be assigned a privilege level. It is the hierarchical level of accessing the
network resources. A user with higher privilege level can access more resources than a user with a lower privilege level.

SECURITY IMPLEMENTATION
Security features provided by Router are.

Syslog Server: This is the server which is used for


saving the messages containing the details about successful and unsuccessful Login Attempts to every password protected stages.

Auto Secure: The purpose is to allow


administrators who may not be familiar with all the security features to use one simple command to lock down their router to a minimal level of security.

THANK YOU

Você também pode gostar