CCNA Kevin Wallace
CCNA Kevin Wallace
CCNA Kevin Wallace
1.Infraesctruture Components
Firewall – Network Device or Software can help prevent malicious traffic from spreading into secured
area network, using rules sets
Types
Filter Packets can permit or deny traffic based o information such as source and/or destination IP
addresses and port numbers.
EX:
Source Destination Action
192.0.2.0/24 Any Permit
203.0.113.0/24 192.0.2.0/24 Permit
Any Any Deny
Status Firewall can permitting or denying based on IP address and/or port number information, can
inspect sessions and recognize return traffic for a session that was initiated from a trusted network
EX:
Source Destination Action
192.0.2.0/24 Any – TCP Port 80 Permit
Any Any Any
Source 192.0.2.1 Destination 198.51.100.1 – HTTP can inspect the traffic and permit or deny and
recognize that traffic was initiate in my network and can permit to get the session initiated deny if the
traffic came like Source 198.51.100.1 – HTTP Destination 192.0.2.1 the firewall reject the sessions
initiated by outside network(Untrusted)
Application Layer Firewall can be inspecting sessions and permitting or denying traffic based on IP
address and/or port number information, understand the nature of an application
EX:
Source Destination Action
192.0.2.0/24 Any – VOIP Permit
Any Any Any
Source:192.0.2.1 Destination 198.51.100.1 – VOIP permit
Source:198.51.100.1 Destination 192.0.2.1 – VOIP drop
WIRELESS ACCESS POINT (Aps)
Wireless Ad Hoc Network Allow wireless devices to communicate with one another without using a
network infrastructure
Lightweight APs wireless access point that are managed by a wireless LAN controller
Lightweight Access Point Protocol (LWAPP) a protocol used by a wireless LAN controller to communicate
with the lightweight AP; s ip manages. Note that many LWPP deployments are being replaced with newr
Control and Provisioning of Wireless Access Point (CAPWAP) protocol, which perform a similar function
2. Cloud Computing
A network environment where computing resources (storage, compute, database, and email) are
physically located at a service provider’s location (in the cloud).
Public Cloud Services Services that interact with public-accessible networks (the INTERNET) or with
other public clouds
Private Cloud Services Services that only interact with members of the private cloud (devices within a
company)
Hybrid Cloud Services A collections of Services, some interact with public and private
Infrastructure as a Service (IaaS) Allows companies to rent virtualized that run specific application
Software as a Service (SaaS) Allow companies to access software which is typically licensed by and
hosted by a service provider, and made available to end users through a web browser
Platform as a Service (PaaS) Provides a development environment (severs and infrastructure) for
application programmers
Network as a Service (NaaS) Makes a network features (VPNs, elastic bandwidth, and internet
connectivity) available from a service provider
VPN
Private WAN
Private WAN
MPLS
Metro Ethernet
Exchange
Cloud Provider 2
Cloud Provider 3
Virtual Services
VMs
Enterprise
Cloud Provider’s Cloud Provider’s
Router Virtual SLB
ASAV
CSR 1000V
Cloud Provider
Network Architecture
Star Topology
- If one link fails, other links continue to function
- Centralized device is a potential single point of failure
Laptop Access
Point
Ethernet Switch
Printer IP Phone
MESH TOPOLOGY
Full Mesh
Office A
Office B Office C
Office D Office E
Partial Mesh
- Might Suboptimal
Office A
Office B Office C
Office D Office V