1
1
1
GRADUATION PROJECT
Supervised by:
Dr-Hamdy Hassan El-Sayed
The phd degree in computer science department sohag university 2015.
His research interests are in the areas of ad hoc routing protocols
And sensor networks, cloud computing and mobile robotics
PREPARED BY
First of all, we would like to express our gratitude to Allah before everyone that
supports our ideas.
This team would have never come this far without everyone, a special thanks to
our supervisor Dr-Hamdy Hassan El-Sayed we couldn’t have started or
finished this project without her support.
We would like to thank and appreciate those who cheered for us knowing that our
goals are somewhat farfetched.
We would also like to thank our Rivals for the moral support and rivalry, we
appreciate a challenge anytime.
.
Table of Content
Title Page
CHAPTER 1: SUMMARY 1
1.1 Problem Definition 1
1.2 Motivation 1
1.3 Method 1
1.4 Restrictions 1
1.5 Structure of report 2
CHAPTER 2: NETWORK INFRASTRUCTURE 3
2.Theory 3
2.1 Company computer network with branches 3
2.1.1 Network Infrastructure and Architecture 3
2.1.2 Services 19
2.1.3 Communication and integration 19
2.2 Methodological 44
2.2.1 Modular design 44
2.2.2 Prepare, Plan, Design, Implement, Operate, Optimize
47
(PPDIOO) Network Lifecycle Approach
2.3 Conclusion, Aims and Purposes 49
CHAPTER 3: NETWORK DESIGN 50
Company network with remote branch offices architecture,
services and communication 59
Architecture 72
Services 76
Branch office connectivity, communication, and integration 78
CHAPTER 4: NETWORK SECURITY 80
Configuring Secure Administrative Access 83
Configuration on ACS 89
L2 Security 101
CHAPTER 5: VOICE OVER NETWORK 113
how does VOIP work 116
Pros and cons of Voice over IP 125
CHAPTER 6: DATA CENTER 132
Chapter 7 (Features) 158
Results 174
References 175
Tables of figures
Figure 2.1 Access/Distribution/Core model ........................................................ 5
Figure 2.2 Sample network based on Access/Distribution/Core model .............. 5
Figure 2.3 Different size branch offices............................................................... 6
Figure 2.4 Typical Enterprise topology ............................................................... 6
Figure 2.5 Detailed Typical Enterprise Architecture ............................................7
Figure 2.6 WAN Connectivity Options ............................................................... 9
Figure 2.7 WAN aggregation topology ............................................................... 9
Figure 2.8 Performance metrics associated with the ISR series routers .............13
Figure 2.9 VPN device placed parallel to a firewall ...........................................13
Figure 2.10 VPN device placed in the DMZ zone .............................................. 14
Figure 2.11 Integrated VPN and firewall device ............................................... 14
Figure 2.12 IPsec Phases in Cisco Devices ....................................................... 15
Figure 2.13 SSL VPN Connection ...................................................................... 16
Figure 2.14 L2TP over IPsec Negotiations ......................................................... 17
Figure 2.15 PPTP Connection Negotiations ...................................................... 18
Figure 2.16 Access management in an enterprise using RADIUS .................... 19
Figure 2.17 Configuration Mechanisms for Network Management ...................20
Figure 2.18 Traffic Flows for In-Band Management ........................................ 20
Figure 2.19 Traffic Flows for Out-of-Band Management ................................. 21
Figure 2.23 Dual firewall DMZ Architecture .....................................................24
Figure 2.24 ISR Small Branch Office Deployment ............................................25
Figure 2.25 Corporate branch offices ................................................................ 26
Figure 2.26 New York branch office ................................................................. 27
Figure 2.27 PPDIOO Network Lifecycle Approach .......................................... 30
Figure 2.28 Identifying Customer Requirements .............................................. 31
Figure 3.1 Remote Access Infrastructure........................................................... 34
Figure 3.2 Placing the Remote Access Firewalls............................................... 34
Figure 3.3 Border routers’ Internet connectivity ............................................... 35
Figure 3.4 Cisco ASR 1000 Services .................................................................. 36
Figure 3.5 Cisco ASR routing positioning.......................................................... 36
Figure 3.6 Campus network ................................................................................43
Figure 3.7 Campus network - DMZ and Internet edge .......................................44
Figure 3.8 Campus network - Remote access VPN cluster ................................45
Figure 3.9 Branch Office Architecture .............................................................. 46
Figure 5.1 voip system components................................................................. 116
Figure 5.2 how voip work .................................................................................117
Figure 5.3 two phase approach......................................................................... 122
figure 6. 1 in data center .................................................................................. 143
figure 6. 2 in data center .................................................................................. 143
figure 6. 3 in data center .................................................................................. 146
figure 6. 4 in data centet ................................................................................... 146
figure 6. 5 in data centet ................................................................................... 147
figure 6. 6 in data centet ................................................................................... 147
figure 6. 7 in data center................................................................................... 148
figure 6. 8 in data center................................................................................... 149
figure 6. 9 in data center................................................................................... 139
figure 6. 10 in data center................................................................................. 141
figure 6. 11 in data centet ................................................................................. 152
figure 6. 12 in data centet ................................................................................ 152
figure 6. 13 in data center................................................................................. 145
Figure Face Mask Detection 7.1.2 ………………………………………….. 157
Figure Face Mask Detection 7.1.2 1…………………………………………. 158
Figure 7.1.9.1 ( Results) 1………………………………………………….. 160
Figure 7.1.9.1 ( Results) 2 …………………………………………………..161
Figure 7.1.11 Images 1 …………………………………………………… 162
Figure 7.1.11 Images 2 ……………………………………………………162
Figure Change Ubuntu Boot and Login Screen 1 …………………………….165
Figure Change Ubuntu Boot and Login Screen 2 …………………………….165
Figure Change Ubuntu Boot and Login Screen 3 …………………………….168
Figure Change Ubuntu Boot and Login Screen 4 …………………………….168
Figure Change Ubuntu Boot and Login Screen 5 …………………………….168
Figure Change Ubuntu Boot and Login Screen 6 …………………………….168
Figure ChatGPT 1 ……………………………………………………………..171
Figure ChatGPT 2 …………………………………………………………….172
Figure ChatGPT 3 ……………………………………………………………..172
List of abbreviations
LAN – Local Area Network
MAN – Metropolitan Area Network
WAN – Wide Area Network
PSTN – Public Switched Telephone Network
DHCP – Dynamic Host Configuration Protocol
DNS – Domain Name System
AMANDA - Advanced Maryland Automatic Network Disk Archiver
VPN – Virtual Private Network
IPsec – Internet Protocol Security
SSL – Secure Sockets Layer
L2TP – Layer 2 Tunneling Protocol
PPTP – Point to Point Tunneling Protocol
OSI – Open System Interconnection
TCP – Transmission Control Protocol
UDP – User Datagram Protocol
POP – Post Office Protocol
SSH – Secure Shell
PAP – Password Authentication Protocol
CHAP – Challenge-Handshake Authentication Protocol
MS-CHAP – Microsoft CHAP
MPPE – Microsoft Point-to-Point Encryption
NAT – Network Address Translation
GRE – Generic Routing Encapsulation
RADIUS – Remote Authentication Dial In User Service
AAA – Authentication, Authorization and Accounting
SNMP – Simple Network Management Protocol
DoS – Denial of service
DMZ – Demilitarized Zone
VoIP – Voice over IP
ISP – Internet Service Provider
PPPoE – Point to Point Protocol over Ethernet
PSTN – Public Switched Telephone Network
QoS – Quality of Service
PPDIOO – Prepare, Plan, Design, Implement, Operate, and Optimize
I. Executive Summary
In this project we design and implement a secure network for design and
implementation of system and network security for an enterprise with worldwide
branches in which we maintain the security, quality, and safety of systems. The
project has been provided with different utilities to introduce a network with a
high security level for the airport. These utilities are s/w firewalls, an IP access
control list, Mac address port security, a domain server and s proxy server. All of
these utilities have been configured to provide a secure environment for the entire
network and to prevent hackers from entering sensitive departments like the
service providers departments.
II. Introduction
Enterprise Network for worldwide Branches are the sensitive places around
the world. Technology plays many different roles to protect and represent a high
quality of services for these places. Computer networking is the most crucial part
of modern airports because this new technology takes the most important
responsibilities, rather than people doing the tasks as in previous decades. We
installed and configure the network devices such as switches, routers, computers,
IP Phones, & APs. We made topology and created IP address with minimum
wastage of IP addresses. This project also consists of hardware-based firewalls,
an IP access control list, MAC address control, a domain server and a proxy server
are the tools that applied to prevent the hackers accessing the data center
department, which is the important department for any campus.
The network is designed to be scalable based upon requirements because
scalability has been the most important consideration during the planning phase.
Further security appliances such as IPS, IDS, NGFW etc. can be added to improve
security and make the network bullet proof.
1.2 Motivation
The motivation behind this project is based on some previous knowledge and
experience in networking, network protocols, and configuration of Cisco network
devices. What we hope to achieve at the end of the project is to improve our
network design skills by doing research in that area and use the gathered
knowledge for designing a network that will solve the problem
1.3 Method
We used comparative method in this project. In Chapter 2 we collect
information about enterprises with remote branches network architectures and
present different approaches. In Chapter 3 we analyze the collected solutions,
compare them and decide which one to use for the goal of this project.
1.4 Restrictions
Because of the background knowledge and experience we have with Cisco,
and because Cisco is one of the biggest solution providers in networking (for
example Juniper is another big network solution provider) and offers wide area
of network solutions (from small/home office to complex corporate solutions) the
project is based on Cisco strategies, advices, and equipment. Network design by
general is a very wide area and designing a corporate network with branches is
complex task to accomplish. For this project it would be practically not feasible
to analyze every single aspect of the network design for large scale company in
details. The project focuses on the remote networks as branch offices with details
for the functions, services, communication, integration, structure etc., on the
background of a 2-corporate network. From the side of the corporate network will
be discussed only the network elements needed for the remote access networks
to operate.
Topological models
Access/Distribution/Core and LAN/MAN/WAN models are most
commonly used. We can also use them because they are simple and intuitive,
and they are based on geographical or/and topological separation of networks.
They also indicate the degree of hierarchy planned for the network (shown in
Figure 2.1). If we need we can also not use all of the levels of the models or if
we need more we can expand them to show as many as we need. For example
we can use the only LAN/WAN from the model as we assign campus,
buildings, or even floors to the LAN. However, the Access/Distribution/Core
model focuses on function instead of location. Both the LAN/MAN/WAN and
Access/Distribution/Core models are used as starting points in the network
architecture, as both are intuitive and easy to apply.
Figure 2.2 shows a sample corporate network based on this topological model.
On the figure the different layers can be clearly seen.
6
Figure 2.4 Client-server architectural model [9]
✔ Distributed-computing: in this model the data sources and sinks are obvious
locations for architectural features. Flow-based models, like the topological
models, are intuitive and can be easy to apply. Since they are associated with
flows, they should map well to any flow maps we created as part of the
requirements analysis process. These models are fairly general, and they have
to be modified to fit the specific requirements of a network.
Functional models
These models focus on supporting particular function in the network, like
service- provider, intranet/extranet, single-/multi-tiered performance, and end-
to-end models.
The service-provider architectural model is based on service-provider
functions, focusing on privacy and security, service delivery to customers
(users), and billing. Many enterprise networks are evolving to this model,
applying it across organizations, departments, and buildings.
7
Figure 2.7 Service-provider architectural model [9]
The intranet/extranet architectural model focuses on security and privacy,
including the separation of users, devices, and applications based on secure
access.
8
Figure 2.9 end-to-end architectural model [9]
Functional models are the most difficult to apply to a network, because we must
understand where each function will be located. For example, to apply the end-to
end model we first have to define where end-to-end is for each set of users,
applications, or devices that will be a part of end-to-end.
9
technicians who are on the road need office connectivity to get assignments, order
parts, and send billing information. Small branch offices need access to the
information from the corporate systems and may not need their own processor.
For many organizations, remote access is a cost-effective replacement for
additional hardware. Busy executives need connectivity to work from home or on
the road. Successful telecommuting programs require reliable connectivity to the
corporate network. Coupled with reliable access is the ability to remotely
troubleshoot and fix applications and system problems. An effective
telecommuting program incorporates all elements found in the workplace and
moves them out to the remote access user.
10
PAM (Privileged Access Management) - tools monitor access to privileged
accounts in an organization; necessary for secure file transfers and, sensitive
data access.
VPAM (Vendor Privileged Access Management) - secure network sharing
with vendors or contractors; can grant access to only parts of a server.
11
RDP (Remote Desktop Protocol) - for Windows users only; grants access with
Windows Terminal Services.
TACACS (Terminal Access Control System) - forwards password to an
authentication server to grant remote access.
The wide area network (WAN) enables the user to access the corporate network.
The WAN covers a large geographical area and can be a public switched
telephone network (PSTN), the Internet, or a private data network. It provides the
switching and/or routing function required to get a remote connection from the
user’s network to the corporate network.
12
Figure 2.10 Different size branch offices
We have labeled them as small, medium and large but this is a bit
subjective. As the size of a branch increases, the number of routers (connections)
increases, and also the issues number we have to consider are also increased. But
anyhow, the figure gives us a clue of the two main implementation challenges we
are facing for the branch design. First, we must to provide features that would be
needed for interaction with host in the public Internet, and second, we must
provide secure communication with the enterprise hosts. For the first category we
should consider details for Internet access. For example, we should make DSL,
or cable, or any other type of connection work. In the second category we must
focus on options that allow an enterprise to prevent packets being read by
attackers when they traverse the Internet. Such option is VPN as it allows the
enterprise to trust packets coming from legitimate branch office.
13
From the side of the enterprise the architecture may look like the one shown in
Figure 2.11. However we could evolve this topology by dividing it into modules
– data centers, campus, and WAN (MAN) as part of the enterprise edge. Below
we will discuss in more details these modules which are interesting for this
project.
14
Figure 2.12 remote access over internet [21]
15
Protecting the network against unauthorized or unwanted access. Firewalls
are commonly used to authenticate legitimate Internet users. A strong
authentication mechanism should be used in this case. Traditional passwords
can be easily sniffed off the Internet and used to penetrate the corporate
network. Address filtering is not effective, because most ISP assign dynamic
addresses to their subscribers. Even with static IP addresses, IP spoofing is a
scheme that is commonly used by hackers to attack and penetrate networks
protected by a packet filtering routers or firewalls.
Guaranteeing the integrity and confidentiality of the information being sent
over the Internet. Encryption is the only means available today that enables
information to be securely transmitted from one computer to another over a
public network. Encryption of data over public networks is implemented
through a mechanism called tunneling. Tunneling works as follows: packets
are encrypted, wrapped with another IP header, and then sent over the Internet.
The receiving end unwraps and decrypts the packets to yield the original IP
packet and sends it to its final destination. Many firewall vendors are offering
firewall-to-firewall or a client-to-firewall encryption (or tunneling) solution.
Most firewall vendors are using encryption methods that are Internet Protocol
Security (IPSec) compliant, which enables their firewall to communicate with
any other firewall that is IPSec compliant. There are other tunneling solutions
that use tunnel end-point servers (sometimes referred to as crypto servers),
which create Virtual Private Tunnels between remote location and the
enterprise network, protecting data transmitted across the public Internet (see
fig 2.14). These solutions also offer clients that can be installed on home
workstations or a laptop and allow users to securely access the corporate
network from remote locations.
16
Figure 2.14 Private Tunnels or Sleeves [21]
18
used and the destination addresses that can be accessed from the node can be
19
included. Application-level firewalls provide enhanced packet filtering and better
access control mechanism to servers and applications.
2.1.2 Services
Services are typically installed on one or more network servers to provide shared
resources to end users. In the section bellow we have pointed out the network
services that are applied in maybe every network implementation.
Standard system services
On a corporate network we usually use the following services:
✔ DHCP (Dynamic Host Configuration Protocol)
✔ DNS (Domain Name System)
✔ File sharing o Authentication
✔ E-mail o Printing E-mail, printing and file sharing services require users
to have permissions to access them – security and access right needs to
be configured. It is usually done easily by using directory service which
is also a network service. Also very important services of business
nowadays are voice and video. We have to make sure to build a network
that supports both voice and video with minimized jitter and delay
20
VPN Site-To-Site
A site-to-site virtual private network (VPN) is a connection between two
or more networks, such as a corporate network and a branch office network.
Many organizations use site-to-site VPNs to leverage an internet connection for
private traffic as an alternative to using private MPLS circuits.
Site-to-site VPNs are frequently used by companies with multiple offices in
different geographic locations that need to access and use the corporate network
on an ongoing basis. With a site-to-site VPN, a company can securely connect its
corporate network with its remote offices to communicate and share resources
with them as a single network.
Several years ago, the most common way to connect computers between multiple
offices was by using a leased line. Leased lines, such as ISDN (integrated services
digital network, 128 Kbps), are private network connections that a
telecommunications company can lease to its customers. Leased lines provide a
company with a way to expand its private network beyond its immediate
geographic area. These connections form a single wide-area network (WAN) for
the business. Though leased lines are reliable and secure, the leases are expensive,
with costs rising as the distance between offices increases.
21
Today, the internet is more accessible than ever before, and internet service
providers (ISPs) continue to develop faster and more reliable services at lower
costs than leased lines. To take advantage of this, most businesses have replaced
leased lines with new technologies that use internet connections without
sacrificing performance and security. Businesses started by establishing intranets,
private internal networks designed for use only by company employees. Intranets
enabled distant colleagues to work together through technologies such as desktop
sharing. By adding a VPN, a business can extend all its intranet's resources to
employees working from remote offices or their homes.
However, these days, VPNs can do much more and they're not just for businesses
anymore. Individuals interested in securing their communications over unsecured
public WiFi networks and remaining anonymous during their online transactions
have begun subscribing to paid VPN services. These services function very much
like business VPNs but go through a VPN provider to reach the internet, rather
than via a private business.
In other words, a VPN can keep your computer, smartphone, and any other device
you connect to the internet safe from hackers and malware, while keeping all your
personal data and communications safe from prying eyes. With cybercrime on
the rise, it's easy to see why so many people have started using them.
Any organization might not require all these benefits from its business VPN, but
it should demand the following essential VPN features:
✔ Security The VPN should protect data while it's traveling on the public
network. If intruders attempt to capture the data, they should be unable to
read or use it.
22
should provide the same quality of connection for each user even when it is
handling its maximum number of simultaneous connections.
✔ Scalability As a business grows, it should be able to extend its VPN services
to handle that growth without replacing the VPN technology altogether.
✔ Intranet-based If a company has one or more remote locations that they wish
to join in a single private network, they can create an intranet VPN to
connect each separate LAN to a single WAN.
✔ Extranet-based When a company has a close relationship with another
company (such as a partner, supplier or customer), it can build an extranet
VPN that connects those companies' LANs. This extranet VPN allows the
companies to work together in a secure, shared network environment while
preventing access to their separate intranets. Even though the purpose of a
site-to-site VPN is different from that of a remote-access VPN, it could use
some of the same software and equipment. Ideally, though, a site-to-site
VPN should eliminate the need for each computer to run VPN client
software as if it were on a remote-access VPN. Dedicated VPN client
equipment, described later in this article, can accomplish this goal in a site-
to-site VPN.
There are several strategies for placing the VPN devices among which we can
choose. We will go through them with details for advantages and
disadvantages:
23
We can place VPN device parallel to a firewall
The advantages in placing the VPN device parallel to the firewall are:
Deployment is simplified because we do not need to change
firewall addressing
High scalability because we can deploy multiple VPN devices
parallel to the firewall
The drawbacks in placing the VPN device parallel to the firewall are:
IPsec decrypted traffic is not inspected by the firewall. This is
a major concern if the passing traffic is not subject to a
stateful inspection.
we can place a VPN device in the demilitarized zone (DMZ)
24
The advantages for this design scenario are:
The firewall can stateful inspect the decrypted VPN traffic.
This design offers moderate-to-high scalability by adding additional VPN
devices. We can migrate to this design relatively easy by adding a LAN
interface to firewall.
The disadvantages here are:
The configuration has increased complexity because we will need
additional configuration on the firewall to support the additional
interfaces. The firewall must support policy routing to differentiate VPN
versus non-VPN traffic.
Figure 2.11 shows the scenario if we use an integrated VPN and firewall device.
25
method of key exchange to ensure data protection. Internet Key Exchange (IKE)
ISAKMP/Oakley protocols provide this capability. This solution requires a
standards-based way to secure data from eavesdropping and modification. IPsec
provides such a method. IPsec provides a choice of transform sets so that a user
can choose the strength of their data protection. IPsec also has several Hashed
Message Authentication Codes (HMAC) from which to choose, each giving
different levels of protection for attacks such as man-in-the-middle, packet replay
(anti-replay), and data integrity attacks.
Tunneling Protocols
Tunneling protocols vary in the features they support, the problems they are
designed to solve, and the amount of security they provide to the data being
transported. The designs presented in this architecture focus on the use of IPsec
as a tunneling protocol alone, and IPsec used in conjunction with Generic Route
Encapsulation (GRE) and Virtual Tunnel Interfaces (VTI). When used alone,
IPsec provides a private, resilient network for IP unicast only, where support is
not required for IP multicast, dynamic IGP routing protocols, or non IP protocols.
When support for one or more of these features is required, IPsec should be used
in conjunction with either GRE or VTI. The p2p GRE over IPsec design allows
for all three features described in the preceding paragraph, while a DMVPN
design or a VTI design fulfills only the IP multicast and dynamic IGP routing
protocol requirements. Other possible tunneling protocols include the following:
• Secure Sockets Layer/Transport Layer Security (SSL/TLS) • VPN (WebVPN)
• Point-to-Point Tunneling Protocol (PPTP) • Layer Two Tunneling Protocol
(L2TP) These protocols are based on user- or client-to-gateway VPN
connections, commonly called remote access solutions, and are not implemented
in this solution
26
SSL VPN
That a VPN technology that acts at the Application layer of the OSI model and
proves secure connectivity to the corporate office resources through the use of
web browser or dedicated client. The great advantage of SSL VPN comes from
the fact that SSL is implemented and available in all web browsers. We can use
SSL VPN from a kiosk or public networks like cafes, airports and many others.
SSL VPN can also be customized so it can meet our company’s requirements. It
is also using a cost-effective and flexible method but still providing strong data
confidentiality.
27
IPsec Security Services
Confidentiality: Prevents third parties from reading the data. lPsec
ensures confidentiality by using encryption. To achieve confidentiality
we use encryption due to Encryption is a process of converting plain text
data into cipher text data using an algorithm. The receiver can decrypt
cipher text data only when it has the correct key. The encryption
mechanism ensures data confidentiality and prevents data from being
eavesdropped during transmission. IP Sec involves data encryption and
protocol message encryption.
31
sequence number allocated to each packet as it arrives at the VPN endpoint. When
a security association is established between two VPN endpoints, the sequence
counter is set to 0. The packets that are encrypted and transmitted over the VPN
are sequenced starting from 1. Each time a packet is sent, the receiver of the
packet verifies that the sequence number is not that of a previously sent packet.
If the receiver receives a packet with a duplicate sequence number, the packet is
discarded, and an error message is sent back to the transmitting VPN endpoint to
log this event.
Key management: Allows for an initial exchange of dynamically
generated keys across a non-trusted network and a periodic re-keying
process
ES, 3DES, AES, and also the two authentication algorithms, MD5 and SHA-1,
all require a symmetric shared secret key to perform encryption and decryption.
The question is, how do the encrypting and decrypting devices get the shared
secret key?
The keys can be sent by e-mail, courier, overnight express, or public key
exchange. The easiest method is DH public key exchange. The DH key agreement
is a public key exchange method that provides a way for two peers to establish a
shared secret key that only they know, although they are communicating over an
insecure channel.
Public key cryptosystems rely on a two-key system: a public key, which is
exchanged between end users, and a private key, which is kept secret by the
original owners. The DH public key algorithm states that if user A and user B
exchange public keys, and a calculation is performed on their individual private
key and one another's public key, the end result of the process is an identical
shared key. The shared key is used to derive encryption and authentication keys.
32
Figure 2.24 Key Exchange
With DH, each peer generates a public/private key pair. The private key generated
by each peer is kept secret and never shared. The public key is calculated from
the private key by each peer and is exchanged over the insecure channel. Each
peer combines the other's public key with its own private key and computes the
same shared secret number. The shared secret number is then converted into a
shared secret key. The shared secret key is never exchanged over the insecure
channel.
IP-sec Protocols
The following sections describe the two IP protocols used in the IPsec standard:
ESP and AH.
Encapsulating Security Protocol
The ESP header (IP protocol 50) forms the core of the IPsec protocol. This
protocol, in conjunction with an agreed-upon set of security parameters or
transform set, protects data by rendering it indecipherable. This protocol encrypts
the data portion of the packet only and uses other protections (HMAC) for other
protections (data integrity, anti-replay, man-in-the-middle). Optionally, it can
also provide for authentication of the protected data. Figure 2.25 illustrates how
ESP encapsulates an IP packet.
33
Figure 2.26 Authentication Header (AH)
IPsec Protocol Framework
The preceding section discussed encryption, authentication, and integrity. This
section explains how encryption, integrity, and authentication are applied to the
IPsec protocol suite. As mentioned, IPSec is a framework of open standards.
IPSec spells out the messaging to secure the communications but relies on
existing algorithms, such as DES and 3DES, to implement the encryption and
authentication. The two main IPSec framework protocols are as follows:
34
Figure 2.25 ip-sec framework
✔ AH-AH, shown in Figure, is the appropriate protocol when confidentiality is
not required or permitted. It provides data authentication and integrity for IP
packets passed between two systems. It is a means of verifying that any
message passed from Router A to Router B was not modified during transit.
It verifies that the data's origin was either Router A or Router B. AH does not
provide data confidentiality (encryption) of packets. It does the following:
Ensures data integrity
Provides origin authentication (ensures that packets definitely
came from the peer router)
Uses a keyed-hash mechanism
Does not provide confidentiality (no encryption)
Provides anti-replay protection
35
Figure 2.26 AH figure
✔ ESP A security protocol may be used to provide confidentiality (encryption)
and authentication. ESP, provides confidentiality by performing encryption at
the IP packet layer. IP packet encryption conceals the data payload and the
identities of the ultimate source and destination. ESP provides authentication
for the inner IP packet and ESP header. Authentication provides data origin
authentication and data integrity. Although both encryption and authentication
are optional in ESP, at a minimum, one of them must be selected. ESP
provides
Data confidentiality (encryption)
Data integrity
Data origin authentication
Anti-replay protection
ESP, shown in Figure, provides confidentiality by encrypting the payload. It
supports a variety of symmetric encryption algorithms. The default algorithm for
IPSec is 56-bit DES. Cisco products also support the use of 3DES and AES for
stronger encryption.
36
Figure 2.27 Esp. protocol
ESP can be used alone or in combination with AH. ESP with AH also provides
integrity and authentication of datagrams. First, the payload is encrypted. Next,
the encrypted payload is sent through a hash algorithm—HMAC-MD5 or
HMAC-SHA-1. The hash provides origin authentication and data integrity for the
data payload.
Alternatively, ESP may also enforce anti-replay protection by requiring that a
receiving host set the replay bit in the header to indicate that the packet has been
seen.
Between two security gateways, the original payload is well protected, because
the entire original IP datagram is encrypted. An ESP header and trailer are added
to the encrypted payload. With ESP authentication, the encrypted IP datagram
and the ESP header or trailer are included in the hashing process. Last, a new IP
header is appended to the front of the authenticated payload. The new IP address
is used to route the packet through the Internet.
When both ESP authentication and encryption are selected, encryption is
performed before authentication. One reason for this order of processing is that it
facilitates rapid detection and rejection of replayed or bogus packets by the
receiving node. Before decrypting the packet, the receiver can authenticate
37
inbound packets. By doing this, it can detect the problems and potentially reduce
the impact of DoS attacks.
To establish an IPsec tunnel, we use a protocol called IKE
(Internet Key Exchange).
There are two phases to build an IPsec tunnel:
IKE phase 1
IKE phase 2
In IKE phase 1, two peers will negotiate about the encryption, authentication,
hashing and other protocols that they want to use and some other parameters that
are required. In this phase, an ISAKMP (Internet Security Association and Key
Management Protocol) session is established. This is also called the ISAKMP
tunnel or IKE phase 1 tunnel. The collection of parameters that the two devices
will use is called a SA (Security Association). Here’s an example of two routers
that have established the IKE phase 1 tunnel:
The VPN gateways agree on Phase 1 Transform settings. The settings in the Phase
1 transform on each IPsec device must exactly match, or IKE negotiations fail.
The items you can set in the Phase 1 transform are:
38
✔ Encryption The type of encryption algorithm (DES, 3DES, or AES) and key
length
✔ SA Life The amount of time until the Phase 1 Security Association expires
The main purpose of IKE phase 1 is to establish a secure tunnel that we can use
for IKE phase 2.
We can break down phase 1 in three simple steps:
Step 1: Negotiation:
The peer that has traffic that should be protected will initiate the IKE phase 1
negotiation. The two peers will negotiate about the following items:
Authentication: each peer has to prove who he is. Two commonly used
options are a pre-shared key or digital certificates.
39
DH (Diffie Hellman) group: the DH group determines the strength of the key
that is used in the key exchange process. The higher group numbers are more
secure but take longer to compute.
Lifetime: how long does the IKE phase 1 tunnel stand up? the shorter the
lifetime, the more secure it is because rebuilding it means we will also use
new keying material. Each vendor uses a different lifetime, a common default
value is 86400 seconds (1 day).
Once the negotiation has succeeded, the two peers will know what policy to use.
They will now use the DH group that they negotiated to exchange keying
material. The end result will be that both peers will have a shared key.
Step 3: Authentication
The last step is that the two peers will authenticate each other using the
authentication method that they agreed upon on in the negotiation. When the
authentication is successful, we have completed IKE phase 1. The end result is a
IKE phase 1 tunnel (aka ISAKMP tunnel) which is bidirectional. This means that
both peers can send and receive on this tunnel.
40
Figure 2.28 Authentication step
IKE phase 2
The purpose of phase 2 negotiations is for the two peers to agree on a set of
parameters that define what traffic can go through the VPN, and how to encrypt
and authenticate the traffic. This agreement is called a Security Association.
Phase 2 Negotiations
After the two IPSec VPN gateways successfully complete Phase 1 negotiations,
Phase 2 negotiations begin. The purpose of Phase 2 negotiations is to establish
the Phase 2 SA (sometimes called the IPSec SA). The IPSec SA is a set of traffic
specifications that tell the device what traffic to send over the VPN, and how to
encrypt and authenticate that traffic.
Phase 2 negotiations include these steps:
The VPN gateways use the Phase 1 SA to secure Phase 2 negotiations. The VPN
gateways agree on whether to use Perfect Forward Secrecy (PFS).
VPN encryption keys are changed at the interval specified by the Force Key
Expiration setting. The interval is eight hours by default. To prevent SAs from
using Phase 1 keys for Phase 2, PFS forces the DH calculation to happen a second
time. This means that Phase 1 and Phase 2 always have different keys, which is
harder to break unless you select a DH group lower than 14.
41
We recommend that you use PFS to keep your data secure. If you want to use
PFS, it must be enabled on both VPN gateways, and both gateways must use the
same Diffie-Hellman key groups.
The VPN gateways agree on a Phase 2 proposal.
The Phase 2 proposal includes the algorithm to use to authenticate data, the
algorithm to use to encrypt data, and how often to make new Phase 2 encryption
keys.
The items you can set in a Phase 2 proposal include:
Type — For a manual BOVPN, you can select the type of protocol to use:
Authentication Header (AH) or Encapsulating Security Payload (ESP). Both AH
and ESP encrypt the data and protect against spoofing and packet manipulation
(replay detection). We recommend that you use ESP, because you can protect
against spoofing in other ways. Managed BOVPNs, Mobile VPN with IKEv2,
Mobile VPN with IPSec, and Mobile VPN with L2TP always use ESP.
Authentication — Authentication makes sure that the information received is
exactly the same as the information sent. You can use SHA-1, SHA-2, or MD5
as the algorithm the VPN gateways use to authenticate IKE messages from
each other. SHA-2 is the only secure option.
Encryption — Encryption keeps the data confidential. You can select DES,
3DES, or AES, or AES-GCM. AES and AES-GCM variants are the only
secure options.
Force Key Expiration — To make sure Phase 2 encryption keys change
periodically, specify a key expiration interval. The default setting is 8 hours.
The longer a Phase 2 encryption key is in use, the more data an attacker can
collect to use to mount an attack on the key. We recommend that you do not
select the Traffic option because it causes high Firebox load, throughput
issues, packet loss, and frequent, random outages. Lets Show How IKE Phase
2 Work
42
Apply Transform Set at Router A:
A transform set is a combination of individual IPSec transforms designed to enact
a specific security policy for traffic. During the ISAKMP IPSec security
association negotiation that occurs in IKE phase 2 quick mode, the peers agree to
use a particular transform set for protecting a particular data flow. Transform sets
combine the following IPSec factors:
Mechanism for payload authentication—AH transform
Mechanism for payload encryption—ESP transform
IPSec mode (transport versus tunnel)
Transform sets equal a combination of an AH transform, plus an ESP transform,
plus the IPSec mode (either tunnel or transport mode).
This brings us to the end of the second part of this five-part series of articles
covering IPSec. Be sure to catch the next installment.
48
phase can establish a financial justification for network strategy by assessing
the business case for the proposed architecture.
2. Plan: Involves identifying initial network requirements based on goals,
facilities, user needs, and so on. The plan phase involves characterizing sites
and assessing any existing networks and performing a gap analysis to
determine whether the existing system infrastructure, sites, and the
operational environment can support the proposed system. A project plan is
useful for helping manage the tasks, responsibilities, critical milestones, and
resources required to implement changes to the network. The project plan
should align with the scope, cost, and resource parameters established in the
original business requirements.
3. Design: The initial requirements that were derived in the planning phase
drive the activities of the network design specialists. The network design
specification is a comprehensive detailed design that meets current business
and technical requirements, and incorporates specifications to support
availability, reliability, security, scalability, and performance. The design
specification is the basis for the implementation activities.
4. Implement: The network is built or additional components are incorporated
according to the design specifications, with the goal of integrating devices
without disrupting the existing network or creating points of vulnerability.
5. Operate: Operation is the final test of the appropriateness of the design. The
operational phase involves maintaining network health through day-to-day
operations, including maintaining high availability and reducing expenses.
The fault detection, correction, and performance monitoring that occur in
daily operations provide the initial data for the optimization phase.
6. Optimize: Involves proactive management of the network. The goal of
proactive management is to identify and resolve issues before they affect the
organization. Reactive fault detection and correction (troubleshooting) is
49
needed when proactive management cannot predict and mitigate failures. In
the PPDIOO process, the optimization phase can prompt a network redesign
if too many network problems and errors arise, if performance does not meet
expectations, or if new applications are identified to support organizational
and technical requirements.
The benefits of PPDIOO approach are:
The total cost of network ownership is lowered
Network availability is increased
Business agility is improved
Speed to access applications and services is increased
2.3 Conclusion, Aims and Purposes
It would be useful if we consider implementing redundancy for the remote access
connections. We should implement main and backup AAA servers, main and
backup border routers and two VPN gateways so the remote users are able to
connect even in the event of failure of the main devices. Actually, redundancy is
useful for every aspect of the network but it is not good to add to much
redundancy because it increases complexity and costs by adding additional
elements to the network. We have reviewed some approaches for designing a
network and we can select either one of them to follow in the design process.
However, using a top-down approach is recommended over a bottom-up
approach. The top-down approach helps us to evaluate all the needed
requirements for services and applications and based on them to select particular
network equipment. This is economically effective solution because we will
choose equipment to suit our needs; we will not go blind shopping. Since we are
developing a solution for an enterprise network, it would be better if we select the
PPDIOO network design approach, because it is top-down and complex corporate
design approach.
50
CHAPTER 3: NETWORK DESIGN
Network Design Overview:
Computers and information networks are critical to the success of businesses,
both large and small. They connect people, support applications and services, and
provide access to the resources that keep the businesses running. To meet the
daily requirements of businesses, networks themselves are becoming quite
complex.
Network design is a category of systems design that deals with data transport
mechanisms. As with other systems' design disciplines, network design follows
an analysis stage, where requirements are generated, and precedes
implementation, where the system (or relevant system component) is constructed.
The objective of network design is to satisfy data communication requirements
while minimizing expense. Requirement scope can vary widely from one network
design project to another based on geographic particularities and the nature of the
data requiring transport.
Network Requirements
Today, the Internet-based economy often demands around-the-clock customer
service. This means that business networks must be available nearly 100 percent
of the time. They must be smart enough to automatically protect against
unexpected security incidents. These business networks must also be able to
adjust to changing traffic loads to maintain consistent application response times.
It is no longer practical to construct networks by connecting many standalone
components without careful planning and design.
Building a Good Network
Good networks do not happen by accident. They are the result of hard work by
network designers and technicians, who identify network requirements and select
the best solutions to meet the needs of a business.
51
The steps required to design a good network are as follows:
I. The network should stay up all the time, even in the event of failed links,
equipment failure, and overloaded conditions.
II. The network should reliably deliver applications and provide reasonable
response times from any host to any host.
III. The network should be secure. It should protect the data that is transmitted
over it and data stored on the devices that connect to it.
IV. The network should be easy to modify to adapt to network growth and
general business changes.
52
Fundamental Design Goals:
When examined carefully, these requirements translate into four fundamental
network design goals:
■ Scalability: Scalable network designs can grow to include new user groups and
remote sites and can support new applications without impacting the level of
service delivered to existing users.
■ Availability: A network designed for availability is one that delivers
consistent, reliable performance, 24 hours a day, 7 days a week. In addition, the
failure of a single link or piece of equipment should not significantly impact
network performance.
■ Security: Security is a feature that must be designed into the network, not
added on after the network is complete. Planning the location of security devices,
filters, and firewall features is critical to safeguarding network resources.
■ Manageability: No matter how good the initial network design is, the available
network staff must be able to manage and support the network. A network that is
too complex or difficult to maintain cannot function effectively and efficiently.
Hierarchical Network Design:
To meet the four fundamental design goals, a network must be built on an
architecture that allows for both flexibility and growth.
Hierarchical Network Design In networking, a hierarchical design is used to
group devices into multiple networks. The networks are organized in a layered
approach. The hierarchical design model has three basic layers:
Access layer: Provides connectivity for network hosts and end devices.
Hierarchical networks have advantages over flat network designs. The benefit of
dividing a flat network into smaller, more manageable hierarchical blocks is that
53
local traffic remains local. Only traffic destined for other networks is moved to a
higher layer.
Layer 2 devices in a flat network provide little opportunity to control broadcasts
or to filter undesirable traffic. As more devices and applications are added to a
flat network, response times degrade until the network becomes unusable.
Figures 1-1 and 1-2 show the advantages of a hierarchical network design versus
a flat network design.
Early networks were deployed in a flat topology as shown in Figure1-1
Hubs and switches were added as more devices needed to be connected. A flat
network design provided little opportunity to control broadcasts or to filter
undesirable traffic. As more devices and applications were added to a flat
network, response times degraded, making the network unusable.
Flat Network
A better network design approach was needed. For this reason, organizations now
use a hierarchical network design as shown in Figure 1-2.
54
A hierarchical network design involves dividing the network into discrete layers.
Each layer, or tier, in the hierarchy provides specific functions that define its role
within the overall network. This helps the network designer and architect to
optimize and select the right network hardware, software, and features to perform
specific roles for that network layer. Hierarchical models apply to both LAN and
WAN design.
Network Design Methodologies:
Large network design projects are normally divided into three distinct steps:
Step 1. Identify the network requirements.
Step 2. Characterize the existing network.
Step 3. Design the network topology and solutions.
55
Step 1: Identifying Network Requirements
The network designer works closely with the customer to document the goals of
the project. Figure 1-5 depicts a meeting between the designer and the business
owner. Goals are usually separated into two categories:
Business goals: Focus on how the network can make the business more
successful.
Technical requirements: Focus on how the technology is implemented
within the network.
Step 2: Characterizing the Existing Network
Information about the current network and services is gathered and analyzed. It
is necessary to compare the functionality of the existing network with the defined
goals of the new project. The designer determines whether any existing
equipment, infrastructure, and protocols can be reused, and what new equipment
and protocols are needed to complete the design.
Step 3: Designing the Network Topology
A common strategy for network design is to take a top-down approach. In this
approach, the network applications and service requirements are identified, and
then the network is designed to support them. When the design is complete, a
prototype or proof-of-concept test is performed. This approach ensures that the
new design functions as expected before it is implemented.
56
Client Interaction
d) Adding new network services, such as voice traffic, content networking, and
storage networking.
57
Impacting a Portion of the Network:
Requirements that may only affect a portion of the network include the following:
The access layer is used to control user access to the internetwork resources. The
network designer has to facilitate the traffic generated from the access layer as it
is bound for other segments or other layers within the network. Without an
appropriate design, the access layer could quickly become inundated with traffic,
resulting in less-than-acceptable performance for the end users.
What Happens at the Access Layer?
The access layer, as illustrated in Figure, represents the edge of the network
where end devices connect. Access layer services and devices reside inside each
building of a campus, each remote site and server farm, and at the enterprise edge.
58
Access Layer Physical Considerations
The access layer of the campus infrastructure uses Layer 2 switching technology
to provide access into the network. The access can be either through a permanent
wired infrastructure or through wireless access points. Ethernet over copper
wiring poses distance limitations. Therefore, one of the primary concerns when
designing the access layer of a campus infrastructure is the physical location of
the equipment.
Wiring Closets
Wiring closets can be actual closets or small telecommunication rooms
that act as the termination point for infrastructure cabling within
buildings or within floors of a building. The placement and physical
size of the wiring closets depends on network size and expansion plans.
The wiring closet equipment provides power to end devices such as IP
phones and wireless access points. Many access layer switches have
Power-over-Ethernet (PoE) functionality.
59
Unlike a typical wiring closet, inside a server farm or data center the
access layer devices are typically redundant multilayer switches that
combine the functionality of both routing and switching. Multilayer
switches can provide firewall and intrusion protection features and
Layer 3 functions.
The Impact of Converged Networking at the Access Layer The modern
computer network consists of more than just personal computers and
printers connecting to the access layer. Many different devices, as
shown in Figure, can connect to an IP network, including the following:
IP telephones
Video cameras
Videoconferencing systems
60
All of these services can be converged onto a single physical access layer
infrastructure. However, the logical network design to support them becomes
more complex because of considerations such as quality of service (QoS), traffic
segregation, and filtering. These new types of end devices, and the associated
applications and services, change the requirements for scalability, availability,
security, and manageability at the access layer.
The Need for Availability at the Access Layer
In early networks, high availability was usually present only at the network core,
enterprise edge, and data center networks. With IP telephony, there is now an
expectation that every individual telephone should be available 100 percent of the
time.
Redundant components and failover strategies can be implemented at the access
layer to improve reliability and increase availability for the end devices.
Access Layer Management
Improving the manageability of the access layer is a major concern for the
network designer. Access layer management is crucial because of the following:
The increase in the number and types of devices connecting at the access
layer.
The introduction of wireless access points into the LAN.
Designing for Manageability
In addition to providing basic connectivity at the access layer, the
designer needs to consider the following:
Naming structures
VLAN architecture
Traffic patterns
Prioritization strategies
61
Configuring and using network management systems for a large converged
network are very important. Figure shows an example of network management
software. It is also important to standardize configurations and equipment when
possible.
62
How VLANs Segregate and Control Network Traffic
Using VLANs and IP subnets is the most common method for segregating user
groups and traffic within the access layer network.
VLANs in the Past:
With the introduction of Layer 2 switching, VLANs were used to create end-to-
end workgroup networks. The networks connected across buildings or even
across the entire infrastructure. End-to-end VLANs are no longer used in this
way. The increased number of users and the volume of network traffic that these
users generate are too high to be supported.
VLANs Now:
Today, VLANs are used to separate and classify traffic streams and to control
broadcast traffic within a single wiring closet or building. Figure 1-20 shows
VLANs segregating traffic within a network. Although large VLANs that span
entire networks are no longer recommended, they may be required to support
special applications, such as wireless roaming and wireless IP phones.
63
Segregating VLAN Traffic
64
multilayer switches, located at the distribution layer, provide many functions
65
critical for meeting the goals of the network design, including the following:
Filtering and managing traffic flows
Enforcing access control policies 14 Designing and Supporting
Summarizing routes before advertising the routes to the Core
Isolating the core from access layer failures or disruptions
Routing between access layer VLANs
Distribution layer devices are also used to manage queues and prioritize traffic
before transmission through the campus core.
Distribution Layer
66
Trunks
Trunk links are often configured between access and distribution layer
networking devices. Trunks are used to carry traffic that belongs to multiple
VLANs between devices over the same link. The network designer considers the
overall VLAN strategy and network traffic patterns when designing the trunk
links.
Redundant Links
When redundant links exist between devices in the distribution layer, the devices
can be configured to load balance the traffic across the links. Figure shows the
redundant links at the distribution layer. Load balancing is another option that
increases the bandwidth available for applications.
67
Distribution Layer Topology
Distribution layer networks are usually wired in a partial-mesh topology. This
topology provides enough redundant paths to ensure that the network can survive
a link or device failure. When the distribution layer devices are located in the
same wiring closet or data center, they are interconnected using gigabit links.
When the devices are separated by longer distances, fiber cable is used. Switches
that support multiple high-speed fiber connections can be expensive, so careful
planning is necessary to ensure that enough fiber ports are available to provide
the desired bandwidth and redundancy.
Building a Redundant Network at the Distribution Layer
To reduce downtime, the network designer deploys redundancy in the network.
Devices at the distribution layer have redundant connections to switches at the
access layer and to devices at the core layer. If a link or device fails, these
connections provide alternate paths. Using an appropriate routing protocol at the
distribution layer, the Layer 3 devices react quickly to link failures so that they
do not impact network operations.
Providing multiple connections to Layer 2 switches can cause unstable behavior
in a network unless STP is enabled. Without STP (see Figure 1-13), redundant
links in a Layer 2 network can cause broadcast storms. Switches are unable to
correctly learn the ports, so traffic ends up being flooded throughout the switch.
By disabling one of the links, STP guarantees that only one path is active between
two devices (see Figure 1-14).
If one of the links fails, the switch recalculates the spanning tree topology and
automatically begins using the alternate link.
Rapid Spanning Tree Protocol (RSTP), as defined in IEEE 802.1w, builds upon
the IEEE 802.1d technology and provides rapid convergence of the spanning tree.
68
Figure 1-14 Traffic Patterns with STP
69
In a stable network, STP recalculations are infrequent. In an unstable network, it
is important to check the switches for stability and configuration changes. One of
the most common causes of frequent STP recalculations is a faulty power supply
or power feed to a switch. A faulty power supply causes the device to reboot
unexpectedly.
Investigating Core Layer Design Considerations
The Cisco three-layer hierarchal model is composed of the core layer, distribution
layer, and access layer. Of the three layers, the core layer is responsible for
transporting large amounts of data quickly and reliably. The designer must ensure
that the core layer is designed with fault tolerance, especially because all users in
the network can be affected by a failure. The ability to avoid unnecessary delays
in network traffic quickly becomes a top priority for the network designer.
The core layer is sometimes called the network backbone. Routers and switches
at the core layer provide high-speed connectivity. In an enterprise LAN, the core
layer, shown in Figure 1-7, may connect multiple buildings or multiple sites, and
may provide connectivity to the server farm. The core layer includes one or more
links to the devices at the enterprise edge to support Internet, virtual private
networks (VPN), extranet, and WAN access.
70
Core Layer
71
Core Layer Technologies:
Technologies used at the core layer include the following:
Routers or multilayer switches that combine routing and switching in the
same device.
Redundancy and load balancing.
High-speed and aggregate links.
Routing protocols that scale well and converge quickly, such as Enhanced
Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First
(OSPF) Protocol.
Routing Protocols on Routers
Another important function that occurs at the distribution layer is route
summarization, also called route aggregation or super netting.
Route Summarization:
Route summarization has several advantages for the network, such as the
following:
One route in the routing table that represents many other routes, creating
smaller routing tables
Less routing update traffic on the network
Lower overhead on the router
Summarization can be performed manually or automatically, depending on which
routing protocols are used in the network.
Classless routing protocols such as RIPv2, EIGRP, OSPF, and Intermediate
System-to-Intermediate System (IS-IS) Protocol support route summarization
based on subnet addresses on any boundary.
Classful routing protocols such as RIPv1 automatically summarize routes on the
classful network boundary, but do not support summarization on any other
boundaries.
72
Individual and Summarized Routes
Security Measures
The vulnerabilities previously identified show that, for the most part, a network
is an extremely unsecure environment. Network designers must place security as
a top priority in their designs. Antivirus software is one way to prevent an attack,
but software cannot prevent physical breaches of the network or its applications.
Consideration must be taken when designing any network to secure the facilities
and hardware from unauthorized access.
Providing Physical Security
Physical security of a network is important. Most network intruders gain physical
entry at the access layer. On some network devices, such as routers and switches,
physical access can provide the opportunity to change passwords and obtain full
access to devices.
Obvious measures, such as locking wiring closets and restricting access to
networking devices, are often the most effective ways to prevent security
breaches. In high-risk or easily accessible areas, it might be necessary to equip
73
wiring closets with additional security, such as cameras or motion detection
devices and alarms. Figure shows an area visibly marked to forbid unauthorized
personnel from entering the area. Some devices, such as keypad locks, can record
which codes are used to enter the secured areas.
Unauthorized Entry
75
Security
Because the users and services accessed through the edge routers are not always
known, security requirements at the enterprise edge are critical. Intrusion
detection and stateful firewall inspection must be implemented to protect the
internal campus network from potential threats.
Remote Access
In many cases, the campus LAN services must extend through the enterprise edge
to remote offices and workers. This type of access has different requirements than
the level of public access provided to users coming into the LAN from the
Internet.
Integrating Remote Sites into the Network Design
Designing a network to support branch locations and remote workers requires
the network designer to be familiar with the capabilities of the various WAN
technologies. Traditional WAN technologies include the following:
Leased lines
Circuit-switched networks
Packet-switched networks, such as Frame Relay networks
Cell-switched networks such as Asynchronous Transfer Mode (ATM)
networks
In many locations, newer WAN technologies are available, such as the
following:
Digital subscriber line (DSL)
Metro Ethernet
Cable modem
Long-range wireless
VPN site to site
76
Most WAN technologies are leased on a monthly basis from a
telecommunications service provider. Depending on the distances, this type of
connectivity can be quite expensive. WAN contracts often include service level
agreements (SLA). These agreements guarantee the service level offered by the
service provider.
SLAs support critical business applications, such as IP telephony and high-speed
transaction processing to remote locations. Figure 1-31 shows several WAN
technologies.
WAN Technologies
VPNs
One common connectivity option, especially for remote workers, is a VPN
through the Internet. A VPN is a private network that uses a public network to
connect remote sites or users together. Instead of using a dedicated, real-world
connection, such as leased lines, a VPN uses virtual connections routed through
the Internet from the company private network to the remote router or PC.
77
3.1.1 Services
The usual services an enterprise offers to its branch offices are access to data
centers, backup services, security services, and streaming voice and video.
Services performance over the WAN is affected by bandwidth and delay. We can
combine them both into a quantify value (called Bandwidth Delay Product
(BDP)) by which we can measure the maximum amount of data that can be
transferred over the WAN at a particular time.
BDP is calculated using the formula:
BDP [Kbytes] = (Bandwidth Link [Kbytes/sec] * Round-trip Latency [sec])
BDP can be used to verify if a TCP application is using optimally the WAN
link. In TCP communication, the maximum segment size (MSS) is sent between
both end points of the link. MSS determines the maximum amount of data that
can be sent and unacknowledged at a point of time.
If MSS > BDP, the TCP application can use the available bandwidth
If BDP > MSS, the TCP application cannot completely utilize bandwidth.
We can use these measures for a single TCP application bandwidth utilization.
Our branch office typically will have multiple simultaneous TCP application and
available bandwidth will be utilized efficiently.
Backup services
There are many strategies for backing up remote office/branch office (ROBO).
One is using centralized backup and recovery; another is using cloud backup
services. The centralized solution means that we place the backup and recovery
processes within the data center. There are two ways we can do that. We can
centralize all the storage to the main data center and thus eliminate the need for
remote backup and recovery because all the data is located in the data center and
utilizes data center backup. But this can have reduced productivity because of
TCP latency and WAN packet loss. To remove these side effects we can use
78
WAN optimization controllers/appliances or virtual equivalents but this add cost.
79
Backing up large number of ROBOs can be very expensive. The other option we
can use to centralize the storage is to utilize backup software that is capable of
centralizing and controlling all the backup procedures from the main data center.
Some software products that offer such services are Asigra Inc. Cloud,
CommVault Simpana, products from FalconStor Software, and Symantec Corp.
NetBackup[29].
The cloud backup uses an off-site server on which data is copied. This off-site
server is usually hosted by third-party service provider who charges based on
capacity, bandwidth, or number of users. This backup strategy is gaining
popularity in SOHO since no cost for additional hardware is required and backups
can be run automatically without manual intervention.
Security services
The goal of the security is to ensure that every aspect of the network is protected
by devices (and associated policies) connected to the network that secure and
protect against data theft. The key services we must apply are
Infrastructure protection;
Secure connectivity;
Threat defense detection and mitigation.
To protect the infrastructure, we must provide measures to protect our
infrastructure devices (Cisco IOS routers, switches, appliances) from direct
attacks. We can achieve that by using the following:
Disabling unnecessary services – we should disable all known, potentially
risky and unused services in our network. These services are (but not limited
to) – “directed broadcasts, IP redirects, IP proxy-ARP, finger, CDP, small
services, and the built-in global HTTP daemon in Cisco IOS Software :
Enabling device logs;
Using SSH instead of Telnet for Remote Administration;
80
Enabling HTTPS server built in Cisco IOS devices;
81
Restricting accepted connections on VTY and Console lines;
Managing passwords with AAA on all devices.
Devices configuration commands for all of the above security hardening are
shown in Appendix A.2.
Secure connectivity will help us protect the network against data theft and altered
end user data sent over untrusted connections. We can do that by applying data
encryption for data privacy. Mechanisms for data isolation will also help us
provide secure connection between the campus and the branch. We can use
tunneling protocol like GRE to for data isolation, and encryption protocol like
IPsec for data encryption.
To detect and mitigate defense threats we must use mechanisms to detect,
mitigate, and protect network devices from violations and unauthorized events.
We can apply these mechanisms to routers, switches, and security appliances as
stated in “Routers and security appliances use inline firewalls and intrusion
protection systems (IPS). Catalyst switches use Port Security, DHCP Snooping,
Dynamic ARP Inspection (DAI), and IP Source Guard.”
3.1.3 Branch office connectivity, communication, and integration
We describe the solution of three critical issues about the communication between
the branch offices and the headquarters. o Private WAN or site-to-site VPN
selection, and as we will motivate the choice of the second option, o Which type
of possible site-to-site VPN implementation to choose o Which Cisco ISR router
for which type of a branch to choose (comparison & recommendations) In Section
2.1.3 of chapter 1 we discussed possible enterprise WAN solutions – private
WAN and site-to-site VPNs. Table 3.3 shows a summary of the features of both
technologies based on the information in Section 2.1.3. In the table “xx” means
that flexibility of site-to-site VPN is greater than flexibility of private WAN.
“$$$” means that cost of private WAN is much greater than cost of site-to-site
VPN. For securing the WAN we must implement mechanisms as IPsec and/or
82
GRE while site-to-site VPN is usually based on IPsec and has strong security.
Both technologies support multiple protocols, scalability and high reliability and
by these criteria they do not differ from one another. They do differ in the QoS
support – the private WAN is under the management of the enterprise IT staff,
while the site-to site VPN depends on ISP’s QoS and the effective SLA.
83
Chapter 4: NETWORK SECURITY
84
Confidentiality Attacks
Attackers can use many methods to compromise confidentiality. Following are
some of the common methods:
Packet sniffing: Eavesdropping and logging traffic that passes over a digital
party.
Social engineering: Using social skills to manipulate people inside the
Salami attacks: A series of minor data security attacks that together result in a
85
larger attack.
86
Data diddling: Changing data before or as it is input into a computer.
network. Perhaps the trust relationship is between a system in the DMZ and a
system in the inside network.
Password attacks: Any attack that attempts to identify a user account,
password, or both.
Session hijacking: The exploitation of a valid computer session to gain
87
Making employees aware of their security-practice obligations
88
Identifying specific security solutions required to meet the goals of the
security policy
Acting as a baseline for ongoing security monitoring Components of the
Security Policy
Governing Policy
At a high level, a governing policy addresses security concepts deemed important
to an organization. Following are typical elements of this section:
Identification of the issue addressed by the policy
Discussion of the organization’s view of the issue
Examination of the relevance of the policy to the work environment
Explanation of how employees must comply with the policy
Enumeration of appropriate activities, actions, and processes
Explanation of the consequences of noncompliance Technical Policies
Technical policies
provide a more detailed treatment of an organization’s security policy, rather
than the governing policy. Elements of this section include the following:
E-mail
Wireless networks
Remote access
End-User Policies
End-user policies address security issues and procedures relevant to end users.
Configuring Secure Administrative Access
You need to secure administrative access for local access (console port) and
remote access, such as HTTP or Telnet/SSH. You must password-protect your
router. These commands can be used:
Console password line console 0 login password cisco
Virtual terminal password line vty 0 4 login password cisco
89
Enable password enable password cisco
Secret password enables secret cisco All these passwords are in clear text in
the configuration files with the exception of the enable secret command. To
encrypt the passwords that are clear text, use the command service password-
encryption. To configure idle timeouts for router lines, use the command exec-
timeout minutes [seconds]. You can also configure minimum password
lengths with the security passwords min-length length command. To create
username and password entries in the local accounts database, use the syntax
username name secret {[0] password | 5 encrypted-secret}. To disable the
ability to access ROMMON to disable password recovery on your router, use
no service password-recovery.
91
RADIUS Authentication Process
Local Authentication
The following are the general steps to configure a router to support local AAA
authentication:
✔ Add usernames and passwords to the local router database.
✔ Enable AAA globally on the router using the aaa new-model command.
and specified method lists. 6. Confirm and troubleshoot the AAA configuration.
Hence we apply AAA on local so router “R1” become AAA server that stores
92
inside database the username and password of client “pc” when the client login
at router which ask it about username and password so user must know own
password ,username then after this process the AAA server check it if it the same
information in it database that Authenticate will be succeed .
✔ Use the con figure terminal command to enter global con figuration mode.
93
Using AAA with Cisco Secure ACS
ACS is a more scalable solution than trying to create and maintain user accounts
on separate Cisco devices. To communicate with the external Cisco Secure ACS,
the Cisco device uses TACACS+ or RADIUS. Of the two, TACACS+ is more
secure, but RADIUS is an open standard. Also, many of the most modern security
features require the use of the open-standard RADIUS protocol.
Hence we apply AAA on Server ACS so router “R1” become AAA client that
when “pc” login at router which ask it about username and password so user
must know own password ,username then after this process the AAA client Take
it’s information and forward it to AAA server to check it if it the same information
in it database that Authenticate will be succeed .
94
Configuration on ACS
✔ We Browse ACS through ip add
95
✔ choose the “Network Resources”
96
✔ Click Create
Enter name of client and ip add and show the protocol which both
contact through it and enter password
Add users whose will be authenticate on Tacacs+ server and submit it
97
Configuration on AAA Client
✔ For check
SSH Commands
Connecting to Router
99
Optional SSH Commands
100
Connecting to the Router
there are two different ways to connect to an SSH-enabled router:
Connect using an SSH-enabled Cisco router
101
Configuring for privilege levels
By default:
User EXEC mode (privilege level 1)
Privileged EXEC mode (privilege level 15)
Sixteen privilege levels available
Methods of providing privileged level access infrastructure access:
Privilege Levels
Role-Based CLI Access
Privilege levels for users
102
IOS Resilient configuration
The configuration file in the primary boot set is a copy of the running
configuration that was in the router when the feature was first enabled.
The feature secures the smallest working set of files to preserve persistent
storage space. No extra space is required to secure the primary IOS image file.
CLI Commands
103
Preventing Password Recovery
Update source creates mac using shared key and update data.
Update receiver verifies mac using shared key and received data.
104
For EIGRP Authentication
✔ Creat a key chain
105
106
L2 Security
Mac Address Spoofing Attack
107
Mac Address Table Overflow Attack
108
STP Manipulation Attack
109
BPDU Guard
110
Root Guard
111
Vlan Attack
112
Mitigating VLAN Attack
113
Port Security Overview
114
DHCP Attack-DHCP Server Spoofing
115
DHCP Snooping
ARP Overview
116
ARP Cache Poisoning Attack
ARP Spoofing: Man, in the middle Attacks
117
118
CHAPTER 5: VOICE OVER NETWORK
Voice over Internet Protocol (VoIP) is a proven technology that lets anyone place
phone calls over an internet connection. With the rise of broadband, VoIP has
become the definitive choice for phone service for consumers and businesses
alike.
People enjoy using VoIP phone service over traditional phone lines. Because It
offers many more capabilities than analog phones. And it can do it all for less
than half the cost.
119
What is VOIP?
VoIP is an acronym for Voice over Internet Protocol that describes the method to
place and receive phone calls over the internet. Most people consider VoIP the
alternative to the local telephone company.
VoIP isn’t actually all that new. Telephony has relied on digital lines to carry
phone calls since the late 90s. VoIP converts your phone calls into data and is
sent over the internet. You can use the Ethernet cables or skip them if you have
a strong Wi-Fi signal.
It does so at a much lower cost than older telephone systems. Voice over IP has
many advantages over traditional phone service.
If you have an internet connection, you call anyone without the need for local
phone service. VoIP solutions work on any computer because it’s built upon
120
many years of open standards.
121
VoIP service providers do more than establishing calls. They perform routing of
outgoing and incoming calls through existing telephone networks. Landlines and
cell phones depend on the Public Switched Telephone Network (PSTN).
Traditional telephones use analog lines to carry voice signals. If you want to make
calls, you have to have extra wiring installed.
Many businesses rely on specialized hardware for phone service. This equipment
is known as a Private Branch Exchange (PBX). It connects internal phone
extensions to the public telephone network. PBXs are generally quite costly to set
up and maintain.
VoIP converts your phone calls into data and is sent over the internet. You can
use the Ethernet cables or skip them if you have a strong Wi-Fi signal. It does so
at a much lower cost than older telephone systems.
122
How does VoIP work?
Voice over IP uses Internet Protocol, an essential building block of the internet.
IP telephony is a massive innovation from the century-old telecommunications
system.
For phone calls, the conversation is exchanged using small data packets. The
internet can send these data packets around the world in less than a second. For
internet telephony, these packets travel between your phone and a VoIP
provider.
A VoIP phone system facilitates calls between other phones or over to another
telephone company. It also provides other useful functions like voicemail, call
forwarding, call recording, and more.
Based on this architecture, VoIP calls are delivered in three key phases:
1) CODEC : (Coder/Decoder), The analog voice signals are converted into digital
signal at sender’s side, after that these digital signals are compressed and then
encoded into a predetermined format using voice codec.
2) packetization process is performed by distributing fragmented encoded voice into
equal size of packets. Furthermore, in each packet, some protocol headers from
different layers are attached to the encoded voice. Protocols headers added to voice
packets are of Real-time Transport protocol (RTP), User Datagram Protocol
(UDP), and Internet Protocol (IP) as well as Data Network header. In addition,
RTP and Real-Time Control Protocol ( RTCP) were designed to support realtime
applications at the application layer
3)playout buffer: better balance between end-to-end delay and packet loss.
Experimental results show that the proposed playout buffer algorithm can achieve the
optimum perceived speech quality under various network conditions.
117
In four steps, here’s how VoIP works.
1) Your phone connects to your switch or router in your Local Area Network (LAN).
2) When you dial a telephone number, your IP phone tells your VoIP service
provider to call the other party.
3) Your VoIP service establishes the call and exchanges data packets from your IP
phone.
4) Your VoIP phone converts these digital signals back into the sound you can hear.
Common Types of VoIP Devices:
Cloud-based PBXs are responsible for features like voicemail, conferencing, and
call routing. When you think about it, they act as their own full-service phone
companies that you control.
The PSTN is what most of us know as the phone network. It was originally a
fixed-line analog network, but now the core of the PSTN is mostly digital. It
consists of a mix of copper telephone lines, fiber optic cables, cellular networks
and undersea cables.
Voice over Internet Protocol bypasses the telephone company entirely. Wherever
you have a broadband internet connection, you can use VoIP. It’s a significant
upgrade from an analog phone system.
Devices of Client
Device manufacturers, service providers, and enterprises develop and deploy many types
of Internet Protocol (IP) phones and other Voice over IP (VoIP)–enabled devices. As with
other computing devices, such as desktop phones, personal digital assistants (PDAs),
cellular phones, set-top-boxes, and gateways, users can choose from a broad variety of
form factors, feature sets, and user interfaces.
There are many different strategies to go about this. Some companies, if they
are a new, come in and just say that we are brand new company and we don’t
want to waste money on PBX system (figure below)
Why don’t we just get a VoIP system (figure below).
But for most companies, they will be running PBX system for years and for
them to move their entire system on VoIP is a shock. As they had invested 100s
of 1000s of dollars on PBX systems (depending on the size of the business) why
would they throw that all away to get free long distance? And when they will
put on cost on a spreadsheet, they will know that the cost savings would not be
realized for decades. So these types of companies might use a “two phased
approach”.
Phase 1 to move over VoIP system is ‘to keep all your PBX system’, so you
keep your PBX, your phones. Just re-equipped your routers or buy new routers
that allows you to connect the PBX system through WAN and PSTN.
It is very low cost to get some new routers or new Modules like VWIC (voice
and WAN interface card) that allows the router to connect with PBX system
through a T-1 line and also connect the router to the PSTN via a T-1 line. Now
we not only can connect our router with IP WAN, but we can also connect our
router with the voice world (PBX, PSTN).
It gives us the capability to choose one of two paths any time you communicate
to the offices. If your WAN link is up and has bandwidth, your calls between
the offices will go through WAN and if WAN is down then we can use PSTN as
a backup.
It gives us many of the benefits of VoIP like free long distance between the
offices, compressing the voice across WAN, we get rid of Tie Lines between
the offices with has high reoccurring monthly cost. So we get a lot of cost
saving by just buying some new routers or modules to connect our PBX through
WAN rather than just PSTN. This is phase 1 migration/upgrade. There are
companies that have this phase 1 type set up and they want to upgrade to phase
2 which is difficult to maintain as compared to phase 1 in which we have a back
up of PSTN.
In phase 2 we get rid of PBX system, it is the new voice system which has Call
Manager Express which is now known as Cisco Unified Communication
Manager Express as a standalone device OR we have a Communication
Manager Express running on Router (this is what we are going to deal with in
CCNA voice) and we will use new phones here that connect with switches and
your everything is end-to-end VoIP.
It is also possible to have a hybrid, we can have half of the network like phase 1
and half like phase 2. For example Intel, which is a big company and has a lot
of offices and all of their new Fabrication Plants will have phase 2 styled end-
to-ends VoIP and all of their existing fabrication plants still has PBX systems
and they want to keep them in that way until the maintenance expires on the
PBX systems then they will move them out. So it is totally possible to have
phase 2 connected through routers to phase 1 and convert back and forth
between those calls.
When we move over VoIP we should make sure that we take away the fear, Don’t
worry about it as PBX system will be around for years, very scary statistics that
2 million people in America still use rotary phones. People still use them as they
just works fine. So VoIP is not going to be one of those things that will take the
world by storm and everybody running it, it going to take the back end. As we
know rotary phones still exits and users send their audio to SP via these rotary
phones and the SP can be converted to VoIP.
Protocols of VoIP
Voice over IP has been implemented in various ways using both proprietary protocols
and protocols based on open standards. Examples of the VoIP protocols are:
• H.323
• Media Gateway Control Protocol (MGCP)
• Session Initiation Protocol (SIP)
• H.248 (also known as Media Gateway Control (Megaco))
• Real-time Transport Protocol (RTP)
• Real-time Transport Control Protocol (RTCP)
• Secure Real-time Transport Protocol (SRTP)
• Session Description Protocol (SDP)
• Inter-Asterisk eXchange (IAX)
• Jingle XMPP VoIP extensions
• Skype protocol
• Teamspeak
The H.323 protocol was one of the first VoIP protocols that found widespread
implementation for long-distance traffic, as well as local area network services.
However, since the development of newer, less complex protocols such as MGCP and
SIP, H.323 deployments are increasingly limited to carrying existing long-haul
network traffic. In particular, the Session Initiation Protocol (SIP) has gained
widespread VoIP market penetration.
These protocols can be used by special-purposesoftware, such as Jitsi, or integrated
into a web page (web-based VoIP), like Google Talk
There are pros and cons to consider when looking into VoIP for handling your
telephone calls to VoIP. Here’s the benefits and drawbacks of voice over IP.
Benefits of VoIP
Lower cost – Many consumers and businesses alike have realized substantial cost
savings and lowered their phone bills by over 60%.
High-quality sound – There’s a noticeable difference in the call quality, so the
audio isn’t muffled or fuzzy.
Advanced features – Leverage premium features to run your company such as
auto attendants, call recording, and call queues. They’re often included with
business phone service plans.
Remote-ready – Use your phone service wherever you work. No technical setup
is necessary if you work from home.
Call anyone worldwide – International long distance rates are as low as $0.04
per minute to call Mexico or $0.01 to reach the United Kingdom.
Downsides of VoIP
There are several differences between the two systems – from technological
contrasts pricing and scalability.
Here is a list of major differences that will help you better understand VoIP vs.
landlines.
How much does VoIP cost?
VoIP is surprisingly inexpensive when you consider all its capabilities. The
short answer is that you can expect to pay approximately $35 per user per
month for VoIP. The cost savings are quite dramatic compared to a traditional
phone system or on-premises PBX.
Traditional phone systems have hidden costs you might not expect:
Center equipment.
4-high quality of servers due to its operating all time and fast internet.
problems.
Types of Data Center
1. Proxy Server
A proxy server sits between a client program (typically a Web browser) and an
external server (typically another server on the Web) to filter requests, improve
performance, and share connections.
2. Mail Server
Almost as ubiquitous and crucial as Web servers, mail servers move and store
mail over corporate networks (via LANs and WANs) and across the Internet.
3. Web server
A web server serves static content to a web browser by loading a file from
a disk and serving it across the network to a user`s web browser, this entire
exchange is mediated by the browser and server talking to each Other using
HTTP.
There are two types of Web server:
1-Apache server
It is a web server , open source and free
Apache uses about 46% of websites around the world
Main name of Apache is "Apache HTTP Server" which is maintained by
Apache software foundation .
2-ISIS Server
Stands for Integrated Science Instrument Server
ISIS is a message passing server that uses connectionless UDP network
sockets and RS232
4. IRC server
5. DNS server
This server is used to translate domain names into IPs ,used with web server.
6. DHCP server
7. Virtual Server
Virtualization
History of virtualization:
1.1.2 A Brief History of Compute Virtualization
A. Partitioned
B. Isolated
C. Encapsulated
D. Independent
• Increases flexibility
Full virtualization
Para virtualization
Hardware-assisted virtualization
What is Hypervisor ?
It is a software program that manages multiple operating system for multiple instances of
the same operating system on a single computer system .
The hypervisor manages the system`s processor , memory and other resources to allocate
what each OS require.
Hypervisors are designed for a particular processor architecture and may also be
VMWare ESXi
Microsoft Hyper-v
Virtual Box
VMWare Workstation
Hypervisor Types
*type1 native(bare-metal)hypervisor :
The hypervisor runs directly on the host`s hardware to control the hardware and to
manage guest operating systems .
Examples:
Examples:
Popular hypervisors :
1-Xen
it is an open source virtualization technology built into linux , specially KVM lets you
turn linux into hypervisor that allows a host machine to run multiple , isolated virtual
environment called guests or virtual machine (VMs).
Storage
Latest Storage Technologies and Trends
Definition of Storage
What is Storage?
Such as hard disk and extena hard which are connected with IDE , SCSI , ISCSI .
1) Standalone (independent)
2) JBOD (Spanned)
3) RAID
It is a collection of hards .
A special , high speed network that stores and provides access to large amounts of data .
Features of SAN
Highly scalable .
PAAS
○ Customers can deploy supported applications onto the provider’s cloud infrastructure,
○ the customer does not manage or control, the underlying cloud infrastructure.
○ The customer is responsible for the security of those applications and data.
○ Developers build the software without worrying about operating systems, software
updates, storage, or infrastructure
○ PaaS Examples :Google App Engine , Microsoft Azure Platform.
SAAS
○ Customers are provided access to an application running on a cloud infrastructure,
○ the customer does not manage or control, the underlying cloud infrastructure.
○ Application is accessible from various client devices, for example, via a thin client
interface such as a Web browser
○ SaaS eliminates the need to have IT staff download and install applications on each
individual computer,Billing is based on the application usage
○ SaaS Examples : EMC Mozy ( Software-as-a-Service solution for on-line backup)
○Office 365 .
7.1.2Motivation
Amid the ongoing COVID-19 pandemic, there are no efficient face mask detection applications
which are now in high demand for transportation means, densely populated areas, residential
districts, large-scale manufacturers and other enterprises to ensure safety. The absence of large
datasets of ‘with_mask’ images has made this task cumbersome and challenging.
Our face mask detector doesn't use any morphed masked images dataset and the model is
accurate. Owing to the use of MobileNetV2 architecture, it is computationally efficient, thus
making it easier to deploy the model to embedded systems (Raspberry Pi, Google Coral, etc.).
This system can therefore be used in real-time applications which require face-mask detection
for safety purposes due to the outbreak of Covid-19. This project can be integrated with
embedded systems for application in airports, railway stations, offices, schools, and public
places to ensure that public safety guidelines are followed.
7.1.5Dataset
The dataset used can be downloaded here - Click to Download
This dataset consists of 4095 images belonging to two classes:
The images used were real images of faces wearing masks. The images were collected from the
following sources:
7.1.6Prerequisites
All the dependencies and required libraries are included in the file requirements.txt See
here
7.1.8 Installation
7.1.9 Results
Our model gave 98% accuracy for Face Mask Detection after training via tensorflow-
gpu==2.5.0
7.1.10Streamlit app
Results
And it's done!
7.2Howdy (login by face )
Howdy provides Windows Hello™ style authentication for Linux. Use your built-in IR emitters
and camera in combination with facial recognition to prove who you are.
Using the central authentication system (PAM), this works everywhere you would otherwise
need your password: Login, lock screen, sudo, su, etc.
7.2.1Installation
Howdy is currently available and packaged for Debian/Ubuntu, Arch Linux, Fedora and
openSUSE. If you’re interested in packaging Howdy for your distro, don’t hesitate to open an
issue.
Note: The build of dlib can hang on 100% for over a minute, give it time.
7.2.2Ubuntu or Linux Mint
Run the installer by pasting (ctrl+shift+V) the following commands into the terminal one
at a time:
sudo add-apt-repository ppa:boltgolt/howdy
sudo apt update
sudo apt install howdy
After installation, Howdy needs to learn what you look like so it can recognise you later. Run
sudo howdy add to add a face model.
If nothing went wrong we should be able to run sudo by just showing your face. Open a new
terminal and run sudo -i to see it in action. Please check this wiki page if you're experiencing
problems or search for similar issues.
If you're curious you can run sudo howdy config to open the central config file and see
the options Howdy has to offer. On most systems this will open the nano editor, where you
have to press ctrl+x to save your changes.
7.2.4 CLI
The installer adds a howdy command to manage face models for the current user. Use howdy
--help or man howdy to list the available options.
Usage:
howdy [-U user] [-y] command [argument]
Command Description
7.2.6 Troubleshooting
Any Python errors get logged directly into the console and should indicate what went wrong. If authentication still fails but
no errors are printed, you could take a look at the last lines in /var/log/auth.log to see if anything has been
reported there.
If you encounter an error that hasn't been reported yet, don't be afraid to open a new issue.
Fast cigarette smoking detection with ONNX, Linzaer's face detection model.
This script uses a small model that prioritizes inference speed over accuracy.
Follow through this tutorial to learn how to change Ubuntu 22.04 boot and login screen logo.
One of the customization you can do to your Ubuntu 22.04 instance is to change the desktop
background, the login screen background, and of course the default boot logo.
For Ubuntu 22.04, the default boot logo is as shown in the screen below;
So, how can you change Ubuntu 22.04 login screen logo?
Well, first of all you need to know where the default Ubuntu 22.04 logo images are stored.
The logo at the bottom of the login screen;
Is stored under /usr/share/plymouth as ubuntu-logo.png.
The same logo is also used on the boot screen, but stored in a different location. We will look
into that later.
So, if you want to change this login screen logo, then you have to copy your image to that
directory and name it as ubuntu-logo.png.
For example, I want to use our Kifarunix image as Ubuntu 22.04 bottom login screen logo, then
first of all backup the default image;
sudo cp /usr/share/plymouth/ubuntu-logo.png
Next, copy your image to /usr/share/plymouth directory naming it as ubuntu-logo.png.
sudo cp ~/Pictures/kifarunix.png /usr/share/plymouth/ubuntu-
logo.png
When you log out, you should see that the default login screen logo is now changed!
Figure 7.4 1
Now, let’s see how you can change Ubuntu 22.04 boot logo.
Ubuntu 22.04 uses BGRT as the default splash screen Plymouth theme;
update-alternatives --list default.plymouth
Sample output;
/usr/share/plymouth/themes/bgrt/bgrt.plymouth
/usr/share/plymouth/themes/spinner/watermark.png
Change Ubuntu Boot and Login Screen 3
our logo
7.5.1What is ChatGPT?
7.5.2ChatGPT Limitation
• Lack of Common Sense: ChatGPT lacks the common sense knowledge that a human
has,
which can lead to incorrect or nonsensical answers.
• Contextual Understanding: ChatGPT may have difficulty understanding the context of
a
question or conversation, leading to misunderstandings.
• Limited Domain Knowledge: ChatGPT is trained on a large dataset, but it still has
limitations in
terms of the particularly in niche or specialized subjects.
• Lack of Creativity: ChatGPT can provide answers based on the information it has been
trained
on, but it does not have the ability to come up with creative or original ideas.
How to access ChatGPT?
• Just Sign up – Chat.openai.com
Figure 7.5.2
ChatGPT 1
Example:-
ChatGPT 2
7.6 website server used Bitnami WordPress
Bitnami WordPress is a pre-packaged, ready-to-run version of the popular open source content
management system (CMS) WordPress. It includes all the software required to run WordPress,
including Apache, MySQL, and PHP. Bitnami WordPress is designed to be easy to install and use,
making it a great choice for users who want to get up and running quickly with a full-featured
WordPress installation.
Results
In the Theory chapter we reviewed two communication options between the
enterprise and the remote branch networks – private WAN and site-to-site VPN.
The possible types of private WAN were reviewed - Frame Relay, ATM, leased
lines and others. The possible types of VPN implementations we also reviewed.
These types include but are not limited to PPTP, IPsec, and SSL VPN. Security,
management, and services for the enterprise network with remote branch offices
were also discussed. In Theory chapter we reviewed possible types of
management – in-band and out of band management; centralized, distributed, and
hierarchical management. We also reviewed possible ways of keeping
management data – to a permanent (or semi-permanent) media or system. The
parts of the process for keeping data were also explained - primary storage,
secondary storage, and tertiary storage for the designing we chose site-to-site
VPN model as primary connection between the enterprise and the branch offices.
The solution of the problem we offered is based on that model. We discussed site-
to-site in more details and chose IPsec as possible implementation type. We also
reviewed carefully the types of equipment to be used in the network. For any
particular location we chose the most appropriate equipment. The solution was
analyzed, evaluated, and partly tested. The results show that the enterprise
network solution is appropriate for medium to large enterprises. It offers high
security, availability, redundancy, and high-speed links. The branch office
solution is appropriate for small to medium branch office implementations. It
offers high security, low availability, none redundancy, and high-speed links.
Discussion on results
This chapter contains discussion on the results of the designing. Here we will
make final conclusion, list recommendations and make advices for future work.
Each one of there will be covered in separate sections as follows conclusions in
Section 4.1, recommendations in Section 4.2, and future work in Section 4.3.
Conclusion
The project provides a solution to the problem. The designed enterprise computer
communication network with a branched network of affiliates (described in
Section 3.1.4) can support branch offices regionally-extended, international-
extended or worldwide-extended. The branch offices (explained in Section 3.2)
need Internet connection and equipment that supports site-to-site VPNs based on
IPsec.
Recommendations
The redundancy of the branch office network should be implemented. Without
redundancy if the ISR router is down, the entire branch office is lost. Another ISR
router could be deployed to provide redundant network. The designed branch
office network suits best the needs of a small to medium branch office. For other
sizes of branch offices other equipment should be used.
Future work
The used router models (7201) in the enterprise Internet edge have high
performance and wide range of supported features. However, if the enterprise
demands even higher performance in the future a migration to ASR 1000 series
should be considered. The enterprise communicates with the branch offices via
the site-to-site VPN connection based on IPsec. But if that connection is down,
the enterprise does not have any backup connectivity with the branch offices.
Secondary connection between both locations could be implemented in the future.
Implementing IPv6 should also be considered in the future. IPv6 has a lot benefits
over IPv4 - simplified header for routing efficiency and performance; deeper
hierarchy and policies for network architecture flexibility; efficient support for
routing and route aggregation; security with mandatory IP Security (IPSec)
support for all IPv6 devices and others. There also migration strategies than can
be deployed to facilitate the migration process. The project offers testing of the
HSRP functionality. In the future more features of the designed network could be
tested to support the theory statements with testing results. These features include,
but are not limited to servers’ accessibility from branch offices; the VPN cluster
operation; firewall packet filtering; and VPN link bandwidth utilization.
References
1) James McCabe (2007). Network Analysis, Architecture, and Design 3rd Edition
2) Jazib Frahim, Qiang Huang (2008). Cisco Press SSL Remote Access VPNs
3) http://en.wikipedia.org/wiki/RADIUS (visited 180410)
4) http://www.networkcomputing.com/netdesign/soho1.html (visited 030510)
5) http://www.pro-100.org/?oblast=0&sort=economy# (visited 060510)
6) Diane Teare, Catherine Paquet (2005). Campus Network Design Fundamentals
7) Richard Deal (2006). The Complete Cisco VPN Configuration Guide
8) http://www.ibm.com/developerworks/ru/library/l-
Backup_1/?S_TACT=105AGX99&S_CMP=GR01
(visited 110610)
9) Keith Hutton, Mark Schofield (2009). Designing Cisco Network Service
Architectures 2nd Edition
10) http://www.edrivium.com/ (visited 120610)
11) http://www.juniper.net/ (visited 120610)
12) http://en.wikipedia.org/wiki/DMZ_%28computing%29 (visited 130610)
13) http://campustechnology.com/Articles/2010/03/12/Machine-Hunt-User-
Forensics- at-Salt-Lake-Community-College.aspx?Page=2 (visited 220610)
14) http://www.etelemetry.com/ (visited 230610)
15) http://www.cisco.com/en/US/docs/ios/solutions_docs/ipv6/IPv6dswp.html
(visited 080710)
16) http://www.groupstudy.com/bookstore/samples/Oppenheimer/index.html
(visited 110710)
17) Priscilla Oppenheimer (2004). Cisco Press Top-Down Network Design Second
Edition
18) Mark Lewis (2006). Cisco Press Comparing, Designing, and Deploying VPNs
19) http://www.networkworld.com/subnets/cisco/092509-ch1-intro-to-wan-
architectures.html (visited 140710)
20) Wendell Odom (2010), CCNP ROUTE 642-902 Official Certification Guide
21) Bob Vachon, Rick Graziani (2008). Accessing the WAN CCNA Exploration
Companion
22) http://www.ciscoguard.com/CISCO892W.asp (visited 170710)
23) http://secret-epedemiology-statistic.org.ua/1587052091/ch22lev1sec1.html
(visited 180710)
24) http://iaoc.ietf.org/network_requirements.html (visited 240710)
25) http://www.archicadwiki.com/Teamwork/NetworkSpecification (visited
270710)
26) http://www.networkworld.com/newsletters/wireless/2009/052509wireless2.html
(visited 040810)
27) http://www.cisco.com/en/US/prod/collateral/routers/ps9343/white_paper_c11-
451583_ns592_Networking_Solutions_White_Paper.html (visited 050810)
28) http://www.cisco.com/en/US/docs/solutions/Enterprise/Branch/WAASBr11.htm
l (visited 260810)
29) http://searchdatabackup.techtarget.com/tip/0,289483,sid187_gci1516980,00.htm
l (visited 280810)
30) http://searchdatabackup.techtarget.com/sDefinition/0,,sid187_gci1378343,00.ht
ml (visited 280810) [31]
http://www.cisco.com/application/pdf/en/us/guest/netsol/ns171/c649/ccmigration_0
9186a00807593b6.pdf (visited 300810)
31) http://www.cisco.com/en/US/prod/collateral/routers/ps9343/at_a_glance_c45-
457081_v7.pdf (visited 010910)
32) http://www.cisco.com/en/US/prod/collateral/routers/ps341/product_data_sheet0918
6a008008872b.html (visited 020910)
33) http://www.cisco.com/en/US/docs/solutions/Enterprise/Security/IE_DG.html#w
p42019 (visited 020910)
34) https://github.com/chandrikadeb7/Face-Mask-Detection
35) https://github.com/Wikidepia/sebatnet-lite
36) https://kifarunix.com/change-ubuntu-22-04-boot-and-login-screen-logo/
37) https://github.com/boltgolt/howdy