Enterprise Computing (part 2.2) Network Devices

Video Activity

This lesson covers network devices and how they have evolved as well as their value on the network. This lesson discusses the following devices: Hubs: sends all data out all ports Switches: isolate collision domains and use MAC addresses to contain traffic Routers: isolates broadcasts; uses IP addresses VLAN: isolates broadcast domains on a switch

Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
10 hours 28 minutes
Difficulty
Advanced
CEU/CPE
15
Video Description

This lesson covers network devices and how they have evolved as well as their value on the network. This lesson discusses the following devices:

  • Hubs: sends all data out all ports
  • Switches: isolate collision domains and use MAC addresses to contain traffic
  • Routers: isolates broadcasts; uses IP addresses
  • VLAN: isolates broadcast domains on a switch
Video Transcription
00:04
So let's talk a little bit about network devices and how they've evolved. And I really do think this is relevant for the exam. I would be able to discern between the different types of devices in their value in the network. Now, I'm gonna go back a few years toe hubs Just because I think it helps us understand
00:22
what devices do if we start with the basics. And if you start with the origins,
00:27
um,
00:28
you know, if you go back to the nine, needs to go back to the early two thousands. If I had a couple of computers to connect together quick, I wanted it to be easy. The device I'd bring in this a home,
00:39
so, um
00:41
ah. Hab sends all data out all ports,
00:53
and that's not a good idea. You know, if I'm an attacker and I plug a sniffer into any port on the hub, what am I gonna see? I'm gonna see all the traffic and his network's grew auras. I had more computers connect together if I went hub hub.
01:08
You know, I'm seeing much more traffic, more systems, air plugged in the hubs. So now if a has traffic to send to be.
01:18
It goes out to every system on the network. That's how Hub works.
01:22
The only reason we ever wanted to hump. The only reason we ever said, Oh, let's bring in a hub is Ah, Hobb did one thing better than any other device.
01:30
It did cheap, better than any other device. I've always been able to get a hub for 25 30 bucks. Set it down, plug into the hub computers, communicate quick and easy. No configuration, not much money. So a hub was our guy for a long time, just for a quick, easy way to connect computers. Okay,
01:51
but
01:52
has its problems. Doesn't do any sort of addressing all data out all ports all the time. So from a security perspective, that's a problem.
02:00
Another thing that hubs did not do is they didn't provide any sort of isolation of traffic and one of the things about Ethernet network. So we're not gonna go into a really deep network. Discussion is Ethernet. Networks are contention based, and when I say contention based, what I mean by that is
02:19
the more systems on the network. The Maur competing for time on the cable
02:23
So if I've got two or three systems on a hub connected, it's not a big deal, because that's not a lot of traffic. But if I have Hub, hub, network or hub to Hub to Hub and as my network grows all of a sudden I have Maureen Maureen, Maureen Morse systems competing for time on the cable.
02:40
And that's when we have problems with collisions because,
02:44
uh, on Lee to only one system can send data on the wire at the time in an Ethernet network. So if multiple systems try to do that, we get the collision. So when you're getting poor performance, you look at the back of your computer. If you see that green light flashing, everything is good, it's all right with the universe.
03:01
But once you start to see that orange light flashing with, that's generally an indication off.
03:07
We're having collisions and a hub won't help with that.
03:09
So what did we do? Well, one of the things that we used to do was we used to bring in a switch, and rather than going hub hub, I bring in my switch.
03:21
I gather up traffic on a hub, and then I'd go hub to switch. Okay, Switches were a lot more expensive than Hub. Several $100 but they provided me collision Domain isolation
03:34
That's very helpful.
03:36
Switches isolate collision domains.
03:42
So what that means is you could also call that contention domains. That means every port on a switch is its own collision domains. So the only two computers that can collide A and B again, that's not months. It's not a lot of traffic, so this is going to drastically reduce collisions.
04:00
And what I've done in this drawing is I've created three separate little independent collision domains,
04:05
so I've reduced collisions drastically. Another thing that switches do in addition to isolating collision domains,
04:15
is they use Mac addresses
04:17
to direct traffic. And please know that a switch uses Mac addresses by default. Some of you may have worked on other higher level switches, and we're not gonna get into a big, lengthy discussion discussion of the O S I model. But for those of you that are networking people
04:33
by default, switch is a layer to device, and it uses Mac addresses.
04:38
So what that means is the switch learns the network based on Max, all the switch understands is Mac addresses, which are address is bound to the network card. So when Computer A picks up traffic on this port, that switch learns the Mac address of computer, eh?
04:55
And the next time it has traffic for that particular Mac address, it only sends it out the appropriate port.
05:00
So was switch over time sort of acts like a traffic cop directing traffic out the appropriate port. That gives me a speed boost in speed improvement.
05:11
But what a switch does not natively do is it does not isolate broadcast traffic. And let me tell you what. That's a problem.
05:19
Let's say these guys are my sales team.
05:24
Let's say these guys are my production team.
05:28
Um, actually, before I get into broadcast domain, So let me just mention one other thing. Uh, I mentioned that hubs were cheap historically, and they are, you know, they've always been cheap
05:40
switches, as I mentioned, used to cost hundreds of dollars. But with the advent of links ISS and Netgear switches, now we have switches that are chief. I go out by switch for 20 or 30 bucks. Well, if I could buy a switch for 20 or 30 bucks. Why use a hub? And the answer is I don't.
05:59
So what we do now is we plug computers directly into switches.
06:03
There we go. Switch to switch.
06:06
And, uh, you know, we're gonna configure in redundancy. This isn't necessarily a literal drawing. It's just conceptual. Logical, strong. But the idea is, with each system plugged into its own port, each system has its own collision domain.
06:24
That's a good thing.
06:26
So what that means is I've virtually eliminated, uh, collisions on my network.
06:31
Also, from an attacker standpoint, if we were all connected together with hubs and I plugged into a port on the Hub, I see all the traffic on the network. But if I have my sniffer and I plug it into a port on a switch,
06:46
what does my sniffer gonna be able to access? Nothing.
06:49
So this is a much more secure environment as well, because with sniffers directing traffic out on Lee, the appropriate port,
06:59
nothing is gonna come out that port other than perhaps art broadcasts which you know are not going to really help an attacker. So switches air more secure configurations, certainly than a hub.
07:11
All right, but let's go back to the idea I was gonna talk about before. Let's say these are the sales people. Let's say this is my production network and let's say these are my human resource is servers.
07:21
Ah, that contains sensitive information
07:24
would have switched. Does not do for me
07:28
is it doesn't isolate networks. For instance, let's say the sales people have an application, and that application generates a lot of broadcast because some applications due.
07:39
So I've got an application for sales,
07:43
and that broadcast is actually going everywhere on my network
07:47
Now. It's not that broadcasts are evil, because sometimes a computer needs to learn something in broadcast the only way it can learn.
07:54
But when I've got a broadcast that only two systems need to see, and that broadcast is hitting every system on the network, that's a waste that's gonna cause additional traffic. It's gonna decrease performance. So what I'd like to do is I'd like the segment out the sales, and it's broadcasting application from the rest of the network.
08:15
Okay,
08:16
Another consideration. I have the HR department and I have some very sensitive information over here.
08:24
I've got payroll information, salary information, stuff that I don't want the general public have access to. I don't really want this on the same network as my production network. I think we mentioned Target. We talked about how target made the mistake of not isolating out networks appropriately.
08:41
You want to keep trusted information secret information
08:43
away from untrusted. Okay, maybe I have a guest network where I allow vendors and contractors and the general public I don't want them on the same network is my HR network. And a switch isn't gonna do that for me. That's not what a switch is designed to do. A switch is designed to use Mac addresses
09:03
and isolate collision traffic.
09:05
Would I want to do is I want to take my great big network and break it up into lots of little networks. We refer to that as sub netting and the device that historically we've brought in to do that
09:16
is a router. Okay,
09:18
so what we do is we plug each network into its home port in the router and the router did a couple of things that a switch doesn't do. A router isolates
09:33
rob cast traffic. So now, because these guys are on their own port on the router. This application that creates a lot of broadcast is stuck on this port on the router. Sometimes you'll hear people say routers don't forward broadcast so that routers and allow that broadcast to hit other ports. So I've isolated the broadcast traffic, too.
09:52
The particular poor,
09:54
Um, and because broadcasting is an I p concept. And by that I mean there's a particular I P address that is used to broadcast.
10:03
I have to have a device that understands I p addresses switches, don't switches, use Mac addresses I p addresses or logical a Mac addresses burn into the network card. Okay, that's bound to the nick. Where's an I? P? Address changes based on logical considerations like broadcast.
10:22
So I need a mechanism that understands I p addresses. So what I can do is with this sub net that I've just created over here. Each network will get its own sub net I D. So this might be the 10.8 dot 0.0, network. This might be the 10.16 00 network.
10:43
And this might be the 10.24
10:45
oh network. And because a router is able to understand, I P addresses when traffic goes is destined for 10.16 dot 0.1.
10:56
A router understands that's out this board,
11:00
and it sends traffic out the appropriate port. So what I have is I have broadcast domain isolation, and I have the ability for all these different networks to communicate, which is good.
11:11
I I probably want sales to be able to access the production network. Given the appropriate circumstance, it doesn't mean they have free access, but it does mean that I can communicate across the boundaries. A. So the router uses I p address. It's able to segment traffic for broadcast purposes,
11:31
and it uses I P addresses to do so
11:33
great.
11:35
But the problem once again a router is expensive.
11:39
Like I said, you're gonna get to land ports on a router, most likely when you go to buy one and again, not talking links us a net here. We're talking about production rounders on, and I've already used three ports on the router, and I haven't even addressed the other networks.
11:54
So what I'd like to do is, I'd like to be able to get this isolation on a device with more ports than a router.
12:03
And what is that? That's a switch. Okay, but please understand this. A switch does not natively isolate broadcast traffic.
12:13
However, some switches and honestly, many switches today, but that has not always been the case. And please, no. This is not an inherent switch capability,
12:24
But many switches today have a function of the operating system
12:28
that you can create install called a virtual land of villain. And what does that do that allows me to take this switch
12:37
with all these beautiful ports?
12:41
Obviously, it's a lot more ports in my router had,
12:43
and I can assign ports on the router to the sales villain
12:48
and that sales villainous associated with 10.800 Network
12:54
in this ports associated with the production villain. And this is a configuration I have to do on the switch. And again, not all switches support this. So that's the production network with 10.16. And we'll make this the HR
13:11
villain. And what I've done is I've created three separate sub nets or virtual lands, and I've done it on the switch.
13:20
Why? Because of switches. Cheaper
13:24
V land isolates
13:26
broadcast remains on a switch.
13:31
Why?
13:33
Because of switches cheaper and switches. Also easier to configure.
13:39
I'll tell you what. If somebody that's been in networking for 20 years, we love to words when they come together. We like cheap and we like easy. And so what a villain does is it gives us a cheap, easy way to segment or sub net our network into broadcast domains.
13:56
Great. I've got a switch. I've done what a switch does, and it's saved me money.
14:01
But here's the problem.
14:03
A switch on Lee understands Mac addresses
14:09
a switch, does not understand what to do with an I P address.
14:13
So, for instance, on this port, anything plugged into this port
14:18
the 10.80 network, that's all this port understands. So if this, uh if a systems trying to send something to the 10.16 network, that switch doesn't know how to get it there. That switch doesn't know how to send 10.16 traffic to this particular pork
14:35
or to send 10.24 traffic to this port.
14:39
A switch doesn't see. I p addresses a switch. Doesn't understand. I p addresses a switch doesn't use I P addresses. Why? Because of switch uses Mac addresses and again going back to the S I reference model. And if you don't know Os I, that's okay.
14:54
But for those of you that do a switch is a layer to device
15:00
layer to is about hardware dressing. Layer three, which a router is
15:05
is about I p addresses.
15:09
Okay, so I've created my villain on a layer to switch was just what switches are by default, and I have separated them out by broadcast domains. But the problem is, I have no inter veal in communication,
15:22
meaning guys here can't communicate with guys here, can't communicate with guys there.
15:26
That might be what I want. Maybe I want true isolation of those networks. And from a security standpoint, that might be a good thing.
15:35
But in reality, I probably do want that interview in communication.
15:39
So what do I do?
15:41
Well,
15:43
one of the things that I could do is I could bring in a router,
15:46
and I could plug a router here, and we could use a tagging protocol to allow those villains to communicate.
15:54
But I need a layer three device to allow isolation of traffic based on I P addresses. So if I set up my veal in on a layer to switch, which which is our by default. They use Mac addresses. I don't get the interviewing communication, so I bring in a router, and that's certainly one way to do it.
16:14
But
16:15
routers are expensive, right? We've already said that. So what's a better solution? What's the way it's done? Most of the time, If any of you have ever been on a layer three switch,
16:26
okay. And even if you haven't, if you had to take a guess at what a layer three switch does that a traditional switch does not do What is it?
16:34
Understanding V I P addresses a layer three switch now can not only isolate villains, but it has capability of reading I P addresses and directing traffic out the appropriate port based on I p.
16:49
So what we've done is we've taken the switch and almost made it a router.
16:55
Okay, so a villain on a switch remember the points I want to make here,
17:02
uh, v lin
17:04
switching.
17:08
So if you create a villain on the switch
17:11
standard
17:15
switches, many of them can create the lands. It don't.
17:22
I understand.
17:26
I p addresses
17:27
So what does that mean?
17:30
No.
17:33
Enter
17:34
the land
17:37
communication.
17:38
If my desire is to have inner villian communication,
17:45
I would need a particular type of switch called a layer three switch.
17:52
Now layer three switch still is not gonna replace routers. Even though we get very similar functionality, we get similar functionality on the inside. So in many instances, in our server room, we've gotten rid of a lot of routers and we've moved in layer three switches. But I'm still gonna need to get off my network
18:11
and connect to my Internet service provider,
18:14
connect my VPN connect my branch office using mpls or some other technology. So the bottom line is, routers will still be on the network. They air more considered when connective ity devices than land connectivity devices. Meaning I'm going to use routers for
18:33
connection off my network.
18:34
Layer three switches are gonna be to allow efficient routing of traffic internally.
18:40
Hey, so I would certainly have thes concepts. I would know the benefit of a virtual land from a security perspective. If I were an attacker, if I wanted to compromise the company's network, I would much rather have to access one network than three. So every time I sub net my network
19:00
un creating little, many domains,
19:02
and that's one more network security functions I have to get through. So rather than being able to break into one network now, I'd have to break into this network than this network in this network, as opposed to if we hadn't brought in the sub nets just having one giant network. So V lands bring security to the environment.
19:19
They improve performance
19:22
and isolation as well. So I would certainly know Hub switch, router, villain, villain switching Layer three switch If there were any, you could kind of disregard hubs because, like I said, we're not using hubs anymore. But I do think it helps to go back and understand the original collectivity devices. So this is an idea that's very testable and certainly has
19:41
a tremendous real world value
19:44
as well as a test value
Up Next
CompTIA CASP

In our online CompTIA CASP training, you will learn how to integrate advanced authentication, how to manage risk in the enterprise, how to conduct vulnerability assessments and how to analyze network security concepts and components.

Instructed By