What will happen if we do not configure these management protocols not properly?We are using ssh or telnet to enter in cmd line.In this which one is more secure?
HTTP and https which one is secure?
Simply we can say Hypertext Transfer Protocol Secure (HTTPS) is secure than Hyper Text Transfer Protocol. Because all the things are in HTTPS is in an encrypted format.So if you are configuring a router with ccp (Cisco Configuration Professional) then using HTTPS is more secure.
How HTTPS works?
Suppose if are browsing Facebook, Gmail etc then all the URL comes with HTTPS.if our systems date and time are wrong then that web site is accessible to us or not?No, the websites are not accessable to us because their servers provide certificates to our machine with date and time. if that miss match with our machine then we can't access their websites.
2,Control Plane (control Function)
The hardware function of a router which is used to router discovery and inventory known as a control function.router discovery means to find out the neighbor routers and networks.inventory is for monitoring.hardware function is directly involved in a hardware.router CPU is involved in this function.
Routing protocols such as rip,eigrp .keepalives signals are working in the controle plane.
Keep alive
It is a signal used to check the status of a router interfaces up or down.the default time for keep alive is 10 seconds.example if we are configuring a router interface such as fa0/0 with IP address and give the cmd # show ip int brief, that time the cable may not be connected to that interface.Even though for 10 seconds that interface will show that protocol up status up after 10 sec keep alive check the interface then it will go down.If we need to know immediately that the interface is up or down very quickly after ip configured then give the command #nokeepalive.keepalive checks the interface status all the time continuously.
What are the threats in control plane if not configured it properly?
Consider we have two routers in our network and we configured eigrp in it.Then an intruder who is trying to connect and enter our networks may use the Bogus router (fake router).he is not an authorized user. then his router table entries will reach out and he becomes our neighbor.his eigrp will work faster than us.with in seconds he will get all the network information of that enterprise.By this way, he will get next hope and then he can access the networks.
To avoid this we should configure the authentication settings properly.means routing protocols authentication for rip,eigrp, OSPF like anything.We should authenticate our routing protocols for security.
Ping Of Death (POD)
It is the another threat in control plane.ICMP protocol is using for the ping.Its default size is 32 bytes.Ping of death means a hacker send continuous ping packets to our hardware in the bigger size.Due to the continuous ping packets and its Biggers size, our network will get hang. there is a chance of down the network.This is known as the ping of death.
Solution to prevent ping of death attack ie enable Control Plane Policy (CoPP) in the router.In this, we can set the packet size to allow and block.
1 comments so far
Very good write-up. I absolutely love this website. Keep it up! paypal login
EmoticonEmoticon