Security design considerations/issues for routers and switches
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#1
07-01-2011, 04:11 PM





.ppt   routers and switches .ppt (Size: 373.5 KB / Downloads: 44)

By
Aditya Varakantam

Professor
Dr.Ravi Mukkamala

Overview
Definition
Motivation for providing Router Security
Router security considerations
Router Security Policy
Switch security considerations
Conclusion
References

Definition
Router
Router is a device which extracts the destination address from the incoming packet and sends it to the destination through the optimal path. Directing data between portions of a network is the purpose of a router.

Routers operate at the Network layer of the OSI model. They pass traffic between two different IP networks which may be either LANs or WANs

Switch

Switches listen to the traffic on each Ethernet port and discover to which port each attached device is connected. The switch then sends traffic directly to the destination port

By using a switch we can ensure that most of the network traffic only goes where it needs to rather than to every port. Thus increasing the network performance

Possible Attacks on Routers

Session Hijacking
Session Replay Attack
Rerouting Attack
Masquerade Attacks

Motivation for providing Router security
Compromise of a router can lead to various security problems on the network served by that router, or even other networks with which that router communicates.

Compromise of a router’s route tables can result in reduced performance, denial of network communication services, and exposure of sensitive data.

Compromise of a router’s access control can result in exposure of network configuration details or denial of service, and can facilitate attacks against other network components.

A poor router filtering configuration can reduce the overall security of an entire enclave, expose internal network components to scans and attacks, and make it easier for attackers to avoid detection.

Proper use of router cryptographic security features can help protect sensitive data, ensure data integrity, and facilitate secure cooperation between independent enclaves.

Router Security Policy
The innermost layer is the physical security of the router

The next innermost layer is the stored software and configuration state of the router

The next outermost layer has the dynamic configuration (Routing Tables)

The outer zone of the diagram represents the intra-network and inter-network traffic that the router manages.











Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DESIGN ATM CONTROLLER pdf seminar flower 1 988 22-07-2016, 02:13 PM
Last Post: mkaasees
  laser security system wikipedia jaseelati 0 983 01-01-2015, 04:22 PM
Last Post: jaseelati
  air force security using thumb checker jaseelati 0 344 27-12-2014, 04:01 PM
Last Post: jaseelati
  security using colors and armstrong numbers ppt jaseelati 0 270 27-12-2014, 03:33 PM
Last Post: jaseelati
  DESIGN AND IMPLEMENTATION OF FASTER AND LOW POWER MULTIPLIERS seminar flower 1 750 26-07-2014, 01:00 AM
Last Post: Guest
  Design and implementation of a test tool for the GSM traffic channel uploader 1 973 14-01-2014, 08:53 PM
Last Post: Guest
  ADVANCED VEHICLE SECURITY SYSTEM WITH THEFT CONTROL AND ACCIDENT NOTIFICATION seminar ideas 2 2,490 10-01-2014, 02:07 PM
Last Post: seminar project topic
  DESIGN AND CONSTRUCTION OF NON CONTACT DIGITAL TACHOMETER REPORT seminar projects maker 0 798 24-09-2013, 03:11 PM
Last Post: seminar projects maker
  DESIGN AND DEVELOPMENT OF OVER SPEED AND DRUNKEN DRIVE INDICATOR seminar class 3 2,936 04-09-2013, 01:35 PM
Last Post: Guest
  Physical Layer Security over Wireless Channels seminar flower 2 857 31-08-2013, 09:22 AM
Last Post: study tips