Posts

Showing posts from January, 2025

OSI Model and Network Layer

The OSI model is a conceptual model, also known as the seven-layer model, which was established by the International Organization for Standardization (ISO) and the International Telecommunication Union Telecommunication Standardization Sector (ITU-T) to develop commonality in function and interface between communication protocols.        In Computer network we uses OSI Model used to define how the communication take place between two devices. This model is very popular to understand communication of two computer and troubleshoot the problem if any issue occurs. OSI model uses 7 layer to define the Network communication and its stages to transmit data successfully from Application layer (Data generated) to Physical layer (Data in bits) .  Seven layers of OSI models. Physical Layer Data link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer.  Each Layer in OSI model defines its own purpose to facilitate successful Network ...

Tier architecture

Image
Tier architecture refers to the way network components are organized and connected. In the video, two main types are discussed Three-Tier Architecture: Access Layer: Connects to end devices like PCs, laptops, and printers. Distribution Layer: Interconnects access layer switches and provides a pathway to the core layer. Core Layer: Ensures high-speed connectivity between distribution layers in different buildings or to the Internet. Three Tier Architecture Network design Two-Tier Architecture: Collapsed Core: Combines the core and distribution layers into one, used in smaller environments. Collapse Network Architecture Design Spine-Leaf Design:  Common in data centres, where leaf switches connect to servers and spine  switches interconnect leaf switches for optimal traffic flow and redundancy. Spine Leaf Network design

Port Security on Cisco Switches

Port Security :  Port security is a security feature on Cisco switches that restricts access to Ethernet ports based on the Media Access Control (MAC) addresses of connected devices. By default, all interfaces on a Cisco switch are in an enabled state, allowing any device to connect. Port security enhances network security by controlling which devices can access specific ports. How Does Port Security Work? MAC Address Learning: When a device connects to a port, the switch learns its MAC address.   MAC Address Filtering: The switch compares the MAC address of incoming frames with the allowed MAC addresses configured for the port.   Violation Mode: If an unauthorized device attempts to access the port (i.e., its MAC address is not in the allowed list), the switch triggers a violation mode. Violation Modes: Restrict: Drops the unauthorized frames, but the port remains operational. Shutdown: Shuts down the port, blocking all traffic.   Protect: Drops the un...

Enabling SSH on a Cisco Catalyst Switch

Image
Enabling SSH on a Cisco Catalyst Switch Here's a step-by-step guide on how to enable SSH on a Cisco Catalyst switch: 1. Access the Switch Console Connect to the console port of the switch using a console cable and a terminal emulation program like PuTTY or Tera Term.   2. Enter Privileged EXEC Mode Enter your username and password when prompted. Type enable and press Enter. Enter the enable password when prompted. 3. Enter Global Configuration Mode Type configure terminal and press Enter. 4. Configure Hostname and Domain Name Set a hostname for your switch: hostname <hostname> For example: hostname SW1 Configure the domain name: ip domain-name <domain_name> For example: ip domain-name your_domain.com 5. Generate RSA Keys Generate an RSA key pair: crypto key generate rsa You will be prompted for the modulus size. A common value is 1024 or 2048 bits.   6. Enable SSH on VTY Lines Configure the VTY lines to allow SSH connections: line vty 0 1...

Switch - A Layer 2 Network device

Image
In computer network, Switch is a layer two device. This layer 2 is taken from OSI model where layer two represented as Data link layer. We will talk about OSI Model in another blogs. In old bridges software is used to create and manage a Content Addressable Memory filter table while new switches use application-specific integrated circuits ( ASICs ) to build and maintain their MAC filter tables. Layer 2 Switches and bridges are faster than routers because they don't take up time looking at the Network layer header information. Instead, they look at the frame's header before deciding to forward, flood, or drop the frame. Advantages of having Layer 2 Switch - Hardware-based bridging (ASICs) Wire Speed Low Latency Low cost Switch Function at Layer 2 MAC address Learning : Layer 2 Switch remember source hardware address of each frame received on an interface and enter this information into a MAC database called a forward/filter or CAM table. Forwarding/Filtering : When a frame is ...

Proxy server

Image
Proxy Server is the server that helps users to connect the internet. It is another way to connect the internet. In an organisation it is the easiest way to provide the safe and filtered internet connection by using the Proxy Server. This helps users surf the internet on their machine. This is one of the popular way as well because in this we just need to configure the proxy server IP address on user machine. This will automatically redirect all the web browser http and https traffic to the internet.  This proxy server act as a mediator in between internet and users machine like in above picture. All http and https traffic generated by the user machine is first redirect to the configured proxy server IP and then Proxy server let this initiate new connection to its end to the internet with having proxy server IP address in its source.  Advantages of Proxy Server Proxy server has multiple benefits like  Security : Proxy Server provides security between internet and system....

SSL secure sockets layer

Image
An SSL certificate, or Secure Sockets Layer certificate, is a digital file that verifies a website's identity and encrypts data sent between a website and a browser. The primary function of SSL is to ensure secure and reliable data transfer between communicating systems. It is the standard security technology used for encrypting and decrypting data during request transmissions. SSL serves two main purposes: 1. Ensuring that the browser communicates directly with the intended server. 2. Ensuring that only the communicating systems have access to the messages they exchange. HTTPS is essentially the same as HTTP but with the added security of SSL. To establish a secure communication link between devices, SSL uses a digital certificate known as an SSL certificate. Encryption in HTTPS HTTP transfers data in a hypertext format between the browser and the web server, while HTTPS transfers data in an encrypted format. Consequently, HTTPS prevents websites from broadcasting their informatio...