Skip to main content

Posts

Showing posts from March, 2024

Types Of Attack in Network

Common Network Attacks Explained. 1. Overwhelming a Network (DoS/DDoS): Imagine a restaurant that's flooded with too many customers. In a DoS/DDoS attack: A website is overwhelmed with too much traffic. 2. Eavesdropping on Conversations (MitM): Imagine someone listening in on your phone call. In a MitM attack: An attacker listens to your online conversations. 3. Tricking You (Phishing): Imagine receiving a fake email from your bank. In phishing: Attackers try to trick you into giving them your personal information. 4. Finding a Weakness in a Website (SQL Injection): Imagine finding a hole in a fence. In an SQL injection attack: An attacker finds a weakness in a website to steal or change data. 5. Planting a Hidden Camera (XSS): Imagine someone hiding a camera in a party. In an XSS attack: An attacker hides harmful code on a website to spy on you. 6. Guessing Your Password (Password Attck): Imagine trying to guess a friend's password. In a pas

DFD ( Data Flow Diagram) Working

  Problem: Private traces can fail, but network gadgets may not detect it. This can result in statistics getting stuck because it can't be rerouted. Reason: Traditional routing protocols rely on timers, which may be sluggish to come across disasters. Solution: BFD protocol acts like a quick heartbeat test between routers. If one router would not respond fast sufficient, the issue is detected, and site visitors can be rerouted to the backup line. Benefit: BFD allows avoid "facts forwarding black holes" by way of quickly switching to backup paths, improving community balance. __________ CONFIGURATION Configured Loopback And Assign Ip Address on Router 1 R1(config)#inter lo 0 R1(config-if-Loopback 0) #ip add 1.1.1.1 32   R1(config-if-Loopback 0) #inter g0/0 R1(config-if-GigabitEthernet 0/0)#ip add 12.0.0.1 30 Configured Loopback And Assign Ip Address on Router 2   R2(config)#inter lo 0 R2(config-if-Loopback 0)#ip add 2.2.2.2 32   R2(config-if-Loopba

IGMP VS MULTICAST

  Multicasting is like shouting an ad for a particular group at a party, like fans of a sports team. It sends one message to many interested audiences. IGMP is like raising your hand to tell the broadcaster you want to hear. It allows devices to say they are interested in multicast transmissions.

AAA SERVER (Tacscs+ , Radius)

  In High-Security Networks, RADIUS And TACACS+ (AAA Protocols) Help To Manage User Access And Password: • Centralized Control: Manage Everything From A Single Server, Reducing Complexity. • Strong Password: Enforce Unique Strong Passwords And Routine Changes. • Consolidated Accounts : One Credentials For All Devices. RADIUS: Great For User Authentication (Web Access Control). TACACS+: Provides Greater Control Over Business Tasks On Devices (Such As Routers). AAA (Authentication, Authorization, Accounting) Is Your Network Security Triangle: 1. Authentication: Displays User Ids (Such As Ids Viewed At The Building Entrance). 2. Authorization: Provides Access To Specific Features Based On ID (Such As Access To A Floor). 3. Statistics: Controls User Activity (Such As Keeping Track Of Which Floor They Went To). Those In Charge: • Remote Server (RADIUS/TACACS+): A Central Security Checkpoint For Your Network. • Local Servers: Security Agents At Each Gateway (No

Global Security Address Binding

  IMAGINE A CONSTRUCTING (NETWORK): Port Protection : Like A Locked Door (Only Authorized Devices with Keys Can Enter). Global Protection Cope with Binding: Like Checking Ids (Best the Ones on The Listing with Matching Id and Face Are Allowed In). KEY DIFFERENCES: Port Security: Controls Who Enters (Gadgets). Address Binding:   Controls What Enters (Particular Packets Primarily Based on Pre-Accredited Addresses). THINK OF IT LIKE THIS: Port Safety Stops Strangers on The Door. Address Binding Checks Ids to Make Sure Best Authorized People With Matching Data Can Enter.                                           __________ CONFIGURATION TOPOLOGY CREAT IN GNS3 IP ADDRESS ASSIGN PC’S PC1> ip 192.168.1.1 255.255.255.0 192.168.1.254 PC2> ip 192.168.1.100 255.255.255.0 192.168.1.254 SWITCH 1 CONFIGURATION SW1(config)#vlan 10 SW1(config-vlan)#inter g0/0 SW1(config-if-GigabitEthernet 0/0)#switch mode trunk SW1(config-if-GigabitEthernet 0/0)#switc