Professional Documents
Culture Documents
Ch-2 NDC
Ch-2 NDC
Figure 2. 1 Routers
Cont’d…
Both Router and Switch are the connecting
devices in networking. The main objective of
router is to connect various networks
simultaneously and it works in network layer,
whereas the main objective of switch is to
connect various devices simultaneously and it
works in data link layer.
The main objective of router is to connect While the main objective of switch is to
1
various networks simultaneously. connect various devices simultaneously.
Figure 2. 3 Switch
Cont’d…
How Routers Work
• Static
• Default
• Dynamic
Cont’d…
• Default
address.
address.
Cont’d…
• 2.55.255.255.0
• – ———————-
• 0. 0. 0. 255
Cont’d…
Cont’d…
2.4. Access Control Lists
• Access control lists are also installed in routers
or switches, where they act as filters, managing
which traffic can access the network.
• It is a table that tells a computer operating
system which access rights each user has to a
particular system object, such as a file directory
or individual file. Each object has a security
attribute that identifies its access control list.
The list has an entry for each system user with
access privileges. The most common privileges
include the ability to read a file (or all the files
in a directory).
Cont’d…
• Access control lists are used throughout many IT
security policies, procedures, & technologies.
• Technologies like firewalls, routers, and any border
technical access device are dependent upon access
control lists in order to properly function. One
thing to consider when implementing an access
control list is to plan for and implement a routine
update procedure for those access control lists.
Cont’d…
• Access Lists perform several functions within a router,
including:
• Implement security / access procedures
• Act as a protocol “firewall”
• Use Access Lists:
• Deny traffic you do not want based on packet tests (for
example, addressing or traffic type)
• Identify packets for priority or custom queuing
• Restrict or reduce the contents of routing updates
• Provide IP traffic dynamic access control with enhanced user
authentication using the lock-and-key feature
• Identify packets for encryption
• Identify Telnet access allowed to the router virtual terminals
Specify packet traffic for dial-in remote sites using dial-on-
demand routing (DDR)
Cont’d…
• The previous sections describe the purpose of ACLs as well as guidelines for
ACL creation. This section covers standard and extended ACLs and named
• Standard ACLs: These ACLs permit or deny packets based only on the
• Extended ACLs: These ACLs permit or deny packets based on the source
IPv4 address and destination IPv4 address, protocol type, source and
major companies.
Cont’d…
• For example, in the case of data breaches suffered by Home
• Desktop Sharing
Remote Desktop
Advantages
Remote work is not all bad, of course. If it were, remote
working would not be as popular as it is becoming
among workers and employers alike. Here are some
advantages of remote working to keep in mind:
Cont’d…
1. Flexibility
2. Less-costly
Working at home part or full- time means less or no
commuting, which means less money spent on transport
costs. Many remote workers will also make their lunch
and coffee at home. Another way remote workers save
money is on their wardrobe! After all, unless you do
video conferencing, no one says you cannot wear
informal clothes all day – no need for a work wardrobe.
Cont’d…
Disadvantages
1. Lack of routine
Not all-remote work is the same; some people do
have to follow a schedule and check in with their
employer at key times. For those in results-based
areas like freelancing though, there are no rules
about when, for example, you have to get out of
bed.
Cont’d…
4. Distractions
Then again, while some struggle with “switching off” from
work, others have trouble switching on. Working at home
means all the distractions of your personal life, good and
bad. If you have small children around, they may demand
your attention. On the other hand, the TV may just beg you
to watch it for an hour or two. Without the filters that
many workplaces put up, remote workers have constant
access to time- wasting websites, personal emails and
social networks – which can be deadly for productivity.
Cont’d…
• Syslog-Daemon
A Syslog Daemon or Server is an entity that would listen to
the Syslog messages that are sent to it. You cannot configure a
Syslog Daemon to ask a specific device to send it Syslog
Messages. If a specific device has no ability to generate
Syslog Messages, then a Syslog Daemon cannot do anything
about it. To make this thing clear, you can consider a Syslog
Server or Syslog Daemon as a TV, which can only display you
the program that is currently running on a specific channel.
Cont’d…
• HEADER
• MSG.
Cont’d…
• Header
The HEADER part contains the following things:
a) Timestamp — The Time stamp is the date and
time at which the message was generated. Be
warned, that this timestamp is picked up from the
system time and if the system time is not correct,
you might get a packet with totally incorrect time
stamp
b) Hostname or IP address of the device.
Cont’d…
• MSG
The MSG part will fill the remainder of the Syslog packet.
This will usually contain some additional information of the
process that generated the message, and then the text of the
message. The MSG part has two fields:
a) TAG field
b) CONTENT field
The value in the TAG field will be the name of the program
or process that generated the message. The CONTENT
contains the details of the message.
Cont’d…