CCNA Security Day 1

  • What is Data?
    • Data is a Piece of information.
      • Example:
        • cisco   : Data
        • 1234    : Data
  • Types of Data?
    • There are two types of data:
      • Data in Motion
        • When the information is moving from one location to another location.
      • Data at Rest
        • When the information is not moving from one location to another location.
  • How to secure Data at Rest?
    • Physical security – put the pen drive / hard disk in locker.
    • Logical security – put a password to pen drive.
  • Here we learn one thing from CCNA to CCIE Security.
    • How to secure Data in Motion?
      • To secure DIM (Data in motion)
      • We follow a model called CIA model.
        • C – Confidentiality
        • I – Integrity
        • A – Availability
  • Confidentiality: Only authorized users can read the information.
  • Integrity: Only authorized users can change the data.
    • ( When the information is moving from one location to another location it should not be tampered or change )
    • For that there is CRC ( Cyclic Redundancy Check ) in IP packet
  • Availability: The information should be available to only authorized users.
    • ( When a user login with his credentials, he should not be provided by other users data )
  • Protecting the Infrastructure:
    • NFP – Network Foundation Protection
      • ( Idea of categorizing specific network functions and then implementing the correct security measures to build the best security for our networks )
      • Broken the Basic network Infrastructure into four basic elements.
  • How many types of Traffic?
    • There are three types of traffic:
      • Host Type: Traffic that is destined to the device.
        • Ex: If we telnet to the device then the traffic is called host traffic (TELNET, SSH, HTTP, HTTPS…etc.)
      • Transit Type: The traffic that is going through the device.
        • Ex: Any traffic forwarded by FIB ( Forward information base ) table
      • CEF exception traffic Type: Where TTL is 1 or Less than 1 or non IP packets.
        • Ex: ARP, BPDU…etc.
  • Note: Cisco says that.
    • You cannot implement security in traffic types.
    • But we can only implement the security in traffic plane ( means Functionality )   
    • Rather than categorizing the traffic types it’s better to categorize the traffic based on functionality.
  • How many types of traffic planes:
    • Ans. There are four types of traffic planes:
      1. Management Plane: The traffic that is generated by the user to the device for the management perspective.
        • Ex: TELNET, SSH, HTTP, HTTPS, SNMP, SYSLOG, CCP, etc.
      2. Data Plane: The traffic that is generated by the user for the user.
        • Ex: PING, FTP…etc.
      3. Control Plane: The traffic that is generated by the device for the device.
        • Ex: Routing Protocols Data.
      4. Service Plane: The traffic that going through the device but it requires special attention from the CPU.
        • Ex: NAT on the router / VPN.
        • If you want to perform NAT then the router want to inspect the transit data.

Design a site like this with WordPress.com
Get started