Posts with #cisco switches - cisco firewall tag
Why Cisco 6500 Series is here to stay?
Tried and true isn't a descriptor awarded lightly. It's earned only after emerging battle-hardened from the front lines. It doesn't matter if you're the only survivor of the super-soldier program, or the flagship switch in the armada that is Cisco - history speaks for itself. For just a moment let's take a quick look at that history.
The Cisco 6500 was debuted in 1999 at the end of a decade that brought us legends such as Pogs, Street Fighter 2, and the Macarena. Even the popularity of the internet was only beginning to catch on.
We began with the Supervisor 1 and its 32gb switch fabric. Next, we graduated to the Supervisor 2 still at 32gb but with the ability to go to 256gb with the switch fabric module. Then we got the Supervisor 720. The 720 introduced 720gb switch fabrics, and then eventually the VSS (virtual switching system) which expanded even further to an upwards of 1.4Tbps!
Now, Cisco has debuted the Supervisor 2T which grows the upwards limits to 2Tbps, and doubles the per slot bandwidth from 40gb to 80gb!
In addition to the newer supervisor engines, the chassis has also evolved. Now with the E series chassis, the Cisco Catalyst 6500 is capable of supporting the larger wattage power supplies and the newer supervisors and line cards. While it looks the same, these subtle differences help push the platform into the next generation.
What does that mean for the future of the Cisco 6500 platform?
Well with the announcement of new non-blocking 10gb cards and mention of 40gb support coming, it means that the Cisco 6500 series is here to stay. Some are saying it's here to stay for another 10 years. Bold words from an already aging platform. However, I'm reminded of the old adage "if it ain't broke, don't fix it." The Cisco 6500 switch was built around the idea of expandability, and dependability. It has proven itself time and again in both arenas.
So what does this mean for people who purchase pre-owned network hardware or are interested in the Catalyst 6500 switches? It means that purchasing a Cisco 6500 is an investment, and a wise one at that.
For people that already have the platform? They can continue to grow as needed, and as their companies and organizations grow. A recent Network World article mentioned that Cisco says it has 25,000 customers for the Catalyst 6500 and 700,000 chassis installed worldwide. That same article quoted John McCool, senior vice president and general management of Cisco's core technology group, saying: "We'd be silly to walk away from that installed base and loyal set of customers."
Knowing that Cisco is only continuing to develop for the 6500 platform is peace of mind that your budget dollars were spent well. In addition, new cards and expansions mean price drops and pre-owned market availability on current cards like the Supervisor 720′s and 6700 series line cards in the not too distant future.
Cisco engineers like me are ready and willing to help you talk through your 6500 growth, and the needs and requirements that come along with it. We can help you navigate the sometimes slippery slope of your network hardware upgrades and save you time and money along the way. We'd be happy to chat more in depth on the topic!
All things considered, the best just keeps getting better. The Cisco 6500 is here to stay and no one should feel bad about having this shield-slinging super-hero anywhere in their network. After all, it takes a veteran to show the new guys the ropes.
Comments from some Cisco fans:
It still has its uses, but IMHO the highly oversubscribed, high latency networking architectures of the past won't make sense in the modern Data Center even at the access layer. Even looking at newer Cisco products like the 5548, let alone even higher density products from companies like Force10, Juniper, Brocade and Arista, which have substantially higher densities, substantially lower cost per port, substantially better performance across the board. Not to mention they all use a tiny fraction of the power and space and emit a tiny fraction of the heat.
Art Fewell: Cisco 6500 iEven re-purposing this box in the campus has limited utility because of the power, space and heating requirements. Given that the price of 10gig is coming down drastically (on other platforms) and most campus access switches come with 10gig uplinks, so many enterprises are upgrading their campus cores to support higher densities of 10gig. Other platforms can support 64 10gig ports in 1 rack unit with again a small fraction of the overhead costs. These newer platforms have such a lower cost basis that even used 6500's are substantially more expensive. Even keeping an existing 6500 is often much more in overhead costs than purchasing newer higher density equipment.
Jason: Cisco 6500 is like the C-130 of the network devices. It does the heavy lifting of being the core router or switch of any enterprise or simply aggregating multiple devices on the edge of network. I think the reason it will go on for another decade, are the service modules, like ACE, NAM, VPN, FWSM, AIP etc... I think without these modules, having a 6500 in a SMB, would have been over kill.... The idea of integrating modules in 6500 is the main life saver of this legendary network ANVIL.
Ali_A: I have been working with C6500 since 2000 .great product with great features. You can do whatever you want with the switch .it can be your Service Chassis switch, Campus, Core , … . I always love them and happy to hear that Cisco have plan to support them (maybe) for another decade. The C6500 show its stability and versatility it the battlefield.i still have C6500+SUP-2 with FWSM installed as datacenter service chassis with no problem and constant software update (SUP-2 lasted software update was 2010 even the device is EOS) take the product survived longer. Also the great blue-print, Deign guide , Cisco-SAFE for C6500 make everything straight when you want to deployment the switch in a scenario , more easier without the risk of wrong deployment or down-time.
Static routes while manually intensive to keep up, are a very quick and effective way to route data from one subnet to different subnet. Let’s start with the basics.
What is a static route?
- a static route is a hard coded path in the router that specifies how the router will get to a certain subnet by using a certain path.
What do you mean by "hard coded"?
- you or someone has typed in the network ID and the next hop to get to the network specified
How do I add a static route into my Cisco router?
- Pretty simple
router# config t ; get into the configuration mode
router(config)# ip route A.B.C.D (destination network/host) A.B.C.D (mask) A.B.C.D (next hop); this is a simple static route
Are there any other ways to name the next hop except by using an IP address?
- Yes, you can use the port name i.e. ethernet0, E0, S0 and so on
What is "distance metric" that I can add at the end of the command?
- All routes have a value that allows the router to give a priority to which type of routing is used first. In static routes, the value is 1 which means no matter what other protocol you may have running like OSPF or RIP, the static route will always be used first. This can be changed to special needs. for example, if you have a frame link with ISDN back up, you can static routes for the frame and a second set of the same static routes but with a distance matric of 255. This means while the frame is up, it goes first but when the frame goes down, the router will try to use the 2nd static which is normally ignored due to the 255 value.
Why do I want to use static routes when there are neat routing protocols like OSPF?
- static routes are easy, no overhead either on the link or the the CPU of the router. They also offer good security when coupled with a tight IP mask like 252 which gives only 2 hosts on a given link
If static routes are so easy, why not use them all the time?
- Static routes while easy can be overwhelming in a large or complicated network. Each time there is a change, someone must manually make changes to reflect the change. If a link goes down, even if there is a second path, the router would ignore it and consider the link down.
One of the most common uses of a static map is the default classless route
- ip classless
- ip route 0.0.0.0 0.0.0.0 [next hop]
This static map says that everything is remote and should be forwarded to the next hop( or supernet) which will take care fo the routing.
Dial on demand is also a big user of static routes. Many times with dial up or ISDN, you do not have the bandwidth or you do not want to pay the connection fees for routing updates so you use static routes.
Static routes allow you to set up load balancing after a fashion. Keep in mind that the IOS load balances across routes first and not interfaces. The easiest way to configure multiple routes on the same interface is to use the secondary IP command
interface serial 0
ip address 192.0.0.1 255.255.255.0
ip address 192.0.0.2 255.255.255.0 secondary ! second route on same interface
interface serial 1
ip address 188.8.131.52 255.255.255.0
ip address 184.108.40.206 255.255.255.0 secondary
ip route 220.127.116.11 255.255.255.0 18.104.22.168; goes to serial 0
ip route 22.214.171.124 255.255.255.0 126.96.36.199; goes to serial 0
ip route 188.8.131.52 255.255.255.0 184.108.40.206; goes to serial 1
interface ethernet 0
ip address 220.127.116.11 255.255.255.0
interface serial 0
ip address 18.104.22.168 255.255.255.0
ip address 22.214.171.124 255.255.255.0 secondary
interface serial 1
ip address 126.96.36.199 255.255.255.0
ip address 188.8.131.52 255.255.255.0 secondary
The traffic would go out router 1 across the two IPs on serial 0 first then across 1 IP on serial 1
This gives you unequal load balancing.
Notes: This is just the basics of static routing. You can get very creative if you want and take things further then described here. I would suggest "Routing TCP/IP Vol 1" from Cisco Press for more information.
Functions of a Network Switch
A switch is a device that is used at the Access or OSI Layer 2; a switch can be used to connect multiple hosts (PCs) to the network.
Unlike a hub, a switch forwards a message to a specific host. When any host on the network or a switch sends a message to another host on the same network or same switch, the switch receives and decodes the frames to read the physical (MAC) address portion of the message.
Forwards Frames with MAC address
When a message is sent between hosts on a network or the same switch, the switch checks its MAC address table for the destination address. A switch MAC address table contains a list of all active ports, host or PCs MAC addresses that are attached to it. If the destination MAC address is not found in the table, the switch will not have the necessary information to forward the message. When the switch cannot determine where the destination host is located, it will flood or forward the message out to all attached hosts. Each host compares the destination MAC address in the message to its own MAC address, but only the host with the correct destination address processes the message and responds to the it.
How Switches Learn MAC addresses
A switch builds its MAC address table by examining the source MAC address of each frame that is sent between hosts. When a new host sends a message or responds to a flooded message, the switch immediately learns its MAC address and the port to which it is connected. The table is dynamically updated each time a new source MAC address is read by the switch. In this way, a switch quickly learns the MAC addresses of all attached hosts.
A switch prevents collisions by providing a circuit between the source and destination ports. This circuit provides a dedicated channel over which the hosts connected to the various ports on the switch can communicate. Each port is allocated with a separate bandwidth; these separate circuits allow many conversations to take place at the same time, without collisions occurring.
Main Types of Switches
Fixed configuration switches:-
These types of switches are fixed in their configuration. What that means is that you cannot add features or options to the switch beyond those that originally came with the switch. The particular model you purchase determines the features and options available. For example, if you purchase a 24-port gigabit fixed switch, you cannot add additional ports when you need them. There are typically different configuration choices that vary in how many and what types of ports are included.
These types of switches offer more flexibility in their configuration. Modular switches typically come with different sized chassis that allow for the installation of different numbers of modular line cards the line cards actually contain the ports. The line card fits into the switch chassis like expansion cards fit into a PC. The larger the chassis, the more modules it can support.
Stackable switches can be interconnected using a special back cable that provides high-bandwidth between the switches. Cisco introduced StackWise technology in one of its switch product lines. Stack Wise allows you to interconnect up to nine switches using fully redundant back plane connections. As you can see in the figure, switches are stacked one atop of the other, and cables connect the switches in daisy chain fashion. The stacked switches effectively operate as a single larger switch. Stackable switches are desirable where fault tolerance and bandwidth availability are critical and a modular switch is too costly to implement. Using cross-connected connections, the network can recover quickly if a single switch fails. Stackable switches use a special port for interconnections and do not use line ports for inter-switch connections. The speeds are also typically faster than using line ports for connection switches.
Layer 3 switches were conceived as a technology to improve on the performance of routers used in large local area networks (LANs) like corporate intranets. The key difference between Layer 3 switches and routers lies in the hardware technology used to build the unit. The hardware inside a Layer 3 switch merges that of traditional switches and routers, replacing some of a router's software logic with hardware to offer better performance in some situations.
Layer 3 switches often cost less than traditional routers. Designed for use within local networks, a Layer 3 switch will typically not possess the WAN ports and wide area network features a traditional router will always have.
Discussion: Router vs. Layer 3 Switches ---from Cisco learning home
Q: As we all know that Layer 3 switch can perform the routing tasks if routing is enabled. But I`ve some questions regarding this:
1. What is the main difference between this two?
2. What is the choosing criteria between this two i.e. when should I use which one? What’s about the cost effects?
3. Why router is needed if there is existence of Layer 3 Switch?
Re1: L3 switches do not have WAN interfaces.
You can connect Ethernet circuits to a switch so you only need a router if you want to connect traditional circuits such as E1 E1 SDH or old technology such as X21 V35 or async circuits. As far as I know Call Manager Express does not run on a switch but does on a router. Switches support Wi-Fi controller, Firewall so are quite powerful. So you need to understand the business requirement before deciding router or switch. Also routers can include switch modules.
Re2: If it routes, it's a router.
L3-switch is a marketing term. It's a router with only Ethernet interfaces and lots of them. It also has a switching function to it. Which makes it both a router and a switch? The differences will vary based on model. It depends... Cost varies as well, everywhere from inexpensive to very expensive! And truly there isn't a "need". You need an L3 device of some sort to exit your subnet. How you design that, or what specific piece you use is entirely up to you.
Re3: Traditionally, Routers were devices that connected the LAN to the WAN and switches were just LAN devices and you may add a layer 3 switch to the lan if you had some vlans and didn't want to use a router.
However, as technology changes, the tradition of the WAN and LAN are fading. My "WAN" links are actually 1 gig single mode fiber circuits that terminate to an ethernet fiber interface on a Layer 3 switch, a 6500, 4500, 3750 or even a 3560. Now some will say that I have a MAN with those kinds of links. It seems that as Scott said, Cisco Marketing is still stuck on calling a router a device that terminates a traditional WAN link, I do agree that if the device routes, it is a router.... to some degree.
One thing I did notice regarding routers and layer 3 switches, and I will admit that router model and IOS version may play very heavily into this, and that is Routers seem to support more traffic monitoring features, such as netflow and nbar where as Layer 3 switches don't seem to have that kind of support.... until you get to the 6500.
Re4: Technically, the differences are:
1- L3 Switch do switching at layer 3 by preserving the source and destination mac and preserving the TTL value of the IP header of the 1st routed packet, so the first packet is routed using normal routing lookup, but after that all packet are switched.
2- router do normal routing lookup, but by introducing fast switching and CEF, packets are also now switched on a router.
3- Switches doesnt support some QoS features.
4- Switches doesnt support NAT.
5- The forwarding on switches is done on ASIC (Application Specific Integrated Circuits) which is done in hardware rather than a software.
6- Forwarding on routers are done in a software.
7- router supports different WAN technologies (modules) unlike switches.
Re5: I was just thinking about this. I didn't learn about Layer 3 switches until the bcmsn. I know in CCNA they were still really pushing the router vs switch concept. Talk about throwing a monkey wrench into things when you throw in the concept of Layer 3 switch.
So to review:
1. A pure router will do just that, typically no switch ports, in today’s cisco world I don't even know if they make one of these, wouldn't that be something like an ASA with 1 or (2) 100 mb or gig ports with a serial port or similiar?
2. A switch will just allow connections to edge devices, a true layer 2 switch like a 2960, Int vlan's is what allows management of the switch at layer 3. No routing between vlans, this is where router on a stick comes into play.
3. A layer 3 switch integrates both abilities, but it depends on the model on how integrated and featurific it is. Will it support netflow? Will it route between vlans? If you do a show ip route what will be displayed? How does it implement vlans, is it traditional vlan.dat file or will it do the switching way with show vlan? -- The simplest true layer 3 switch will support all switching features, but have the ability to do routed ports and route between the vlans. I have had a Integrated services router like a 1760 or 3725 or similiar where they had a small switch module, say 4-24 (100).
The definition of a layer 3 switch also may include the ability for a port to be either a routed port or a switched port, the commands switch port vs no switch port followed by having to assign it an ip address.
This is another point that also took some getting used to. In a port that can be either layer 2 or layer 3, or strictly layer 3 or layer 2. Example, a router can only do layer 3, so to do inter vlan routing while connecting to another switch via trunk port you have to give it sub interfaces to a physical switch port, give each one its own ip address and tag it with the encapsulation dot1q #. Router on a stick, vs. switchport mode trunk command with layer 3 interfaces via the "int vlan 1" with an ip address assignment.
While I understand the ccna approach to teaching fundamentals and where thing started, it no doubts confuses someone especially when a question asks about the differences between a hub/switch/router. In today’s world, hubs don't really exist, and in a large company odds are you’re going to be using a layer 3 switch.
Re6: Not sure that is accurate. I think most layer 3 switches can handle BGP, but to what extent? Full tables? Probably not. Dishing out money for 2 Cisco 2821's or Cisco 2921's is going to be way cheaper than purchasing another Cisco 6500 for our network....not to mention our Catalyst 6500 already does a lot of work...and now I am going to throw BGP at it....AH it would just shut off and give me the middle line card!
Catalyst is the brand name for a variety of network switches sold by Cisco Systems. While commonly associated with Ethernet switches, a number of different interfaces have been available throughout the history of the brand. Cisco acquired several different companies and rebranded their products as different versions of the Catalyst product line. The original Catalyst 5000 and 6000 series were based on products originally developed by Crescendo Communications. The 1700, 1900, and 2800 -series Catalysts came from Grand Junction Networks, and the Catalyst 3000 came from Kalpana in 1994.
In addition, Cisco increasingly offers routers with switching capabilities, and indeed Cisco's 7600 router line and 6500 switch line have interchangeable parts. Even Cisco's smaller routers, including their newest "ISR" series, can have switch modules installed in them - basically making Cisco's smaller switches fully integrated devices.
In most cases, the technology for the Catalyst Switch was developed separately from Cisco's router technology. The Catalyst switches originally ran software called CatOS rather than the more widely known Cisco IOS software used by routers. However, this has changed as the product lines have merged closer together. In some cases, particularly in the modular chassis switches, a configuration called 'Hybrid' has emerged - this is where the layer 2 functions are configured using CatOS, and the layer 3 elements are configured using IOS. 'Native IOS' can also be found with newer software versions that have eliminated CatOS entirely in favor of IOS, even on hardware that originally required CatOS.
The latest version of IOS for the Catalyst 6500 series is 12.2(33)SXI which enables In-Service Software Upgrade (ISSU) via IOS Software Modularity.
Some newer Catalyst switch models (with recent versions of the Cisco IOS) also allow configuration via web-based graphical interface module which is hosted on a HTTP server located on the switch. The IOS config-mode command 'ip http-server' will enable this style of configuration. In series 12.x IOS, 'ip http-server' is always on as a factory default. The Catalyst 3750-series of switches is an example of a Cisco Catalyst switch that allows this style of GUI configuration via HTTP.
Some newer models of Catalyst switches (called Catalyst Express) no longer allow access to IOS or CatOS at all - these switches can only be configured by using a Graphical User Interface (GUI).
CatOS (Catalyst Operating System) is the discontinued operating system for many of the Catalyst brand of legacy network switches. It was originally called "XDI" by the switching company Crescendo Communications, Inc. Cisco renamed it to CatOS when they acquired Crescendo in late 1993.
CatOS ran on switches such as 1200, 4000, 4500, 5000, 5500, 6000, 6500 series. CatOS can still run on some of Cisco's modular switches, "hybrid" mode. In hybrid mode, the NMP (switch processor) runs CatOS and the route processor runs Cisco IOS.
As Catalyst devices are primarily Ethernet switches, all modern Catalyst models have Ethernet interfaces, ranging from 10 Mbit/s to 10 Gbit/s depending on the model. Some models can accommodate Asynchronous Transfer Mode interfaces which can be used to bridge Ethernet traffic across wide area networks. Other models can support T1, E1, and ISDN PRI interfaces to provide connections to the PSTN. Legacy models supported a variety of interfaces, such as token ring, FDDI, and 100BaseVG, but are no longer sold by Cisco Systems.
Most models have basic layer 2 functions and are capable of switching Ethernet frames between ports. Commonly found additional features are VLANs, trunking (Cisco proprietary ISL or IEEE 802.1Q) and QoS or CoS. The switches, whether IOS or CatOS, are fully manageable.
Many Catalysts that run IOS are also capable of functioning as a router, making them layer 3 devices; when coupled with TCP and UDP filtering, these switches are capable of layer 2-4 operation. Depending on the exact software image, a Catalyst that runs IOS may be able to tackle large-scale enterprise routing tasks, using router technologies like OSPF or BGP.
Most chassis-based Catalyst models have the concept of field-replaceable "supervisor" cards. These work by separating the line cards, chassis, and processing engine (mirroring most Cisco router designs). The chassis provides power and a high-speed backplane, the line cards provide interfaces to the network, and the processing engine moves packets, participates in routing protocols, etc. This gives several advantages:
- If a failure occurs, only the failed component needs to be replaced (typically a line card or supervisor). This means faster turnaround than having to uncable, unbolt, pull out, replace, re-bolt, and re-cable an entire switch, which may be as large as a quarter-rack, weigh over 150 pounds, and service over 500 cables.
- A redundant supervisor engine may be installed to rapidly recover from supervisor failures. This is subject to restrictions (as some switches don't support redundant supervisors), but typically results in restoration times under 90 seconds.
- A supervisor engine may be upgraded after purchase, increasing performance and adding features without losing any investment in the rest of the switch.
Additionally, most high-end switches off-load processing away from the supervisors, allowing line cards to switch traffic directly between ports on the same card without using any processing power or even touching the backplane. Naturally, this can't be done for all traffic, but basic layer-2 switching can usually be handled exclusively by the line card, and in many cases also more complex operations can be handled as well.
Cisco switches are very popular for a number of reasons, including advanced customization and manageability. The switches can be configured using a serial console or a telnet session (or ssh if the correct OS is loaded along with the ssh keys generated). SNMP allows monitoring of many states, and measurement of traffic flows. Many devices can also run an HTTP server, but this is often disabled because of the security problems it creates - either because it's not encrypted, or because of the relatively frequent security vulnerabilities in the Cisco http daemon itself. Some Cisco switches focused on smaller organizations forego a command line interface and offer ONLY a web/html interface for configuration and management.
Configuration of the switch is done in plain text and is thus easy to audit - no special tools are required to generate a useful configuration. For sites with more than a few devices it is useful to set up a TFTP server for storing the configuration files and any IOS images for updating. Complex configurations are best created using a text editor (using a site standard template), putting the file on the TFTP server and copying it to the Cisco device. However, it can be noted that a TFTP server can present security problems.
Cisco StackWise is a technology offered by Cisco Systems that allows for up to nine Catalyst switch---3750 series switches to operate as though they were one 32-Gbit/s switch. This allows for greater resiliency, and performance.
One switch from the stack will act as the master switch. The master switch will maintain the stack and allow you to configure and monitor the whole stack as though one via a single console.
If one switch fails the remaining switches will continue to operate by looping back any information that would normally traverse the failed switch, effectively bypassing it. If the master switch fails, the next switch in the stack will automatically take over as master. This feature means greater redundancy, as one switch's failure will not bring about a failure of the entire stack.
As each switch contains the entire configuration for the stack one of the benefits of this technology is the ability to replace a down switch (any including master) with a new un-programmed switch. The stack will configure the new switch on the fly and allow for minimal downtime
StackWise effectively replaced the GigaStack found on lower-price models such as Catalyst 35xx and 29xx series.
Recently, there is a new variation of the technology, known as Cisco Stackwise Plus, offering 64Gbit/s nonblocking switching fabric speed.
The master switch of a stack is determined in the following order.
- User specified.
- The switch with the most advanced IOS, i.e. Advanced IP Services IPv6 (AIPv6), then Enhanced Multilayer Software Image (EMI) and then Standard Multilayer Software Image (SMI).
- Programmed switch. A configured switch will preside over a switch with just the defaults.
- Uptime. The switch that has been running the longest.
- MAC address. The switch with the lowest MAC address.
Models/Types of Cisco Catalyst Switches
Like most Cisco product lines, the Catalyst Switch series evolves fairly rapidly. There are two general types of Catalyst switches: fixed configuration models/ fixed-configuration switch that are usually one or two rack units in size, with 12 to 80 ports; and modular switches/ chassis-based switch in which virtually every component, from the CPU card to power supplies to switch cards, are individually installed in a chassis.
- As of 2011, the most popular fixed configuration switches are the WS-C2960, the WS-C3560 and WS-C3750 series at the high end, an entry level managed "express" series - with models beginning WS-CE (configurable by web interface only, no command line interface), the "ME" metroline series of switches, and a new "Small Business" series coming from Cisco's acquisition of Linksys. In addition, there are many excellent legacy switches suitable for most business and service provider needs no longer offered directly through Cisco (WS-C2950, WS-C3550 for example). Cisco fixed configuration switches come with a bewildering assortment of features (10/100 ports versus 10/100/1000 ports, some with power over Ethernet, some with varying types of gigabit and 10gig uplink ports, some with standard or enhanced software, varying power supplies) and it is difficult to tell what features a switch has (aside from the number of ports) from a visual inspection, and similar-appearing switches can have dramatically different features.
Cisco Model Names & Switch Features
In general, switch names start with WS-C, followed by the model line (2960). A letter at the end of this number signifies a special feature, followed by the number of ports (usually 24 or 48) and additional nomenclature indicating other features.
Cisco modular switches are much larger and are entirely configurable, beginning with a chassis, power supplies, the choice of supervisory engines (CPU mainboards), and switch modules. Among Cisco's modular series are:
- The Cisco Catalyst 6500 Series is a chassis-based switch family. This series can support interfaces up to 10 Gigabit Ethernet in speed and redundant Supervisor modules.
- The Cisco Catalyst 5500 Series and Cisco Catalyst 5000 Series is a chassis-based switch family. The Cisco Catalyst 5000 Series is acquired from another company. This entire series has now reached end-of-sale.
- The Cisco Catalyst 4900 series is a fixed-configuration switch. Uplink interfaces are either SFP ports or 10 gigabit Ethernet, with 48 copper ports of 10/100/1000 Ethernet.
- The Cisco Catalyst 4500 Series is a mid-range modular chassis based Switch manufactured by Cisco System.
- The Cisco Catalyst 3000 and 3100 series switches are switches for use in blade-enclosures: the Catalyst 3032 is a Layer2 switch and the Catalyst 3130x and 3130G are blade-switches for the Dell M1000e enclosure.
- The 1000 switch family is considered an edge device, having many functionalities that can be built as the device is very modular.
To sum up, the Cisco Catalyst range is designed to meet the needs of a wide range of customers—from small to medium businesses, right up to large enterprise networks and service providers. Cisco Catalyst switches provide high performance, scalability, manageability, and many other intelligent features that ensure their success to date.
Generally, a Firewall protects your computer from intrusion (scanning or attack) by hackers or script kiddies while it is connected to the Internet. A firewall examines electronic data coming in to, or out of, a computer (or network - computers joined together by wires or wireless connection) and compares it to rules it has been given. If that data matches the rules which say it is OK, it will let the data pass. If it doesn't, it blocks the data. To be simple, just think of a Firewall as a piece of software (or hardware for those with more computers) that keeps the bad guys out and let the good ones in. It stops hackers and script kiddies from gaining access to your computer and the information on it.
There are many people who still use the internet without thinking twice about protecting themselves when online. Most of these people are home or small business users who never give it a second thought, or just don't understand enough about the risks to worry. Using the internet without a firewall can be explained quite easily - You wouldn't leave your house or office unlocked, or with the windows and doors wide open so that anyone can walk in and look around, or even steal your items, but using the internet isn't much different than that. If you are online without a firewall you are leaving it wide open to attack, and intruders and thieves could view or steal your information.
So for people who use the internet, no matter it is a home, or an enterprise, a firewall is an essential hardware or software to help to protect your privacy and data on your computer by stopping hackers from gaining control of your system.
A firewall also prevents confidential information on your system from being sent without your permission. This could be your passwords, bank details and other personal information.
About Personal Firewall & Hardware Firewall
A Personal Firewall (also known as a desktop firewall, or Software firewall) is installed on each computer that is connected to the internet and monitors (and blocks, where necessary) internet traffic. It is used to help protect a single Internet-connected computer from intruders. Personal firewall protection is useful for users with "always-on" connections such as DSL, cable modem or dial-up connections.
Hardware firewall's can be purchased as a stand-alone product but more recently hardware firewall's are typically found in broadband routers, and should be considered an important part of your system and network set-up, especially for anyone on a broadband connection. Hardware firewalls can be effective with little or no configuration, and they can protect every machine on a local network. Most hardware firewalls will have a minimum of four network ports to connect other computers, but for larger networks, business networking firewall solutions are available.
Software and Hardware Firewall
The differences between a software and hardware firewall are vast, and the best protection for your computer and network is to use both, as each offers different but much-needed security features and benefits. Updating your firewall and your operating system is essential to maintaining optimal protection, as is testing your firewall to ensure it is connected and working correctly.
Intro of Most Popular CISCO Firewall Hardware: About Cisco ASA 5500 Series
Designed as a core component of the Cisco Self-Defending Network, the Cisco ASA 5500 Series provides proactive threat defense that stops attacks before they spread through the network, controls network activity and application traffic, and delivers flexibleVPN connectivity. The result is a powerful multifunction network security appliance family that provides the security breadth and depth for protecting home office, branch office, small and medium-sized business, and enterprise networks while reducing the overall deployment and operations costs and complexities associated with providing this new level of security.
Cisco is at the forefront of embracing the consumerization of IT - here's how.
It’s painfully obvious that the consumerization of IT isn’t going away. You hear it in the news, from manufacturers, and the loudest voice of all – your end-users.
Most likely, helpdesk requests about configuring, updating or using consumer devices has eked their way into your top 10 most common calls list. (A personal favorite, though not a top 10: “How do I get that bird game on here?”)
Beyond the onslaught of “How do I set up my work email account on my iPhone?” requests, there are major implications to the consumerization of IT in the workplace – above all, security. Do you have a plan in place for when a senior executive’s iPad gets stolen, along with classified company information? Or when a sales rep connects their tablet to the network and unknowingly places bugs in the CRM?
Back in 2009, Chris Christiansen of IDC was interviewed for Cisco’s Fact or Fiction video series. Christiansen said that while consumer devices aren’t specifically designed for use in the workplace, most IT operations would eventually have to accommodate them. He went so far as to say that it could be a career limiting move to forbid consumer devices in the workplace completely – particularly if you’re dealing with a senior level executive.
In 2010, Cisco began pushing borderless security to enable enterprise IT to deal with the onslaught of consumer devices in the workplace and the security concerns that came with them.
That same year, Cisco also introduced the Cius tablet – which meant enterprise IT could not only have the security measures in place for dealing with consumer devices, but could also provide the devices themselves. (The verdict is still out on how well the Cius will satisfy both end-users and IT.)
And just a month ago, Cisco general manager Tom Gillis named virtualization as the solution to security issues brought on by the consumerization of IT.
Cisco appears to be one of the players at the forefront of dealing with the implications of consumer devices in the workplace. All along, Cisco has made a point to pronounce this shift as not only unavoidable, but something to embrace. (Perhaps Cisco realizes that like social media in the workplace, you’re better off creating a policy to accommodate consumer devices rather than deny their use completely.) How are they extending the digital olive branch?
They are starting on their own shores. Cisco has been pioneering consumerization in their network for years. In doing so they can speak from experience and bring solutions to market that make sense. Introducing AnyConnect into their security offering is one such solution. Having a client that can interface with Symbian OS-based Nokia dual-mode phones, Windows Mobile Operating System devices, Apple iPhones, Android phones, Apple iPads, Cisco Cius tablets, and Windows, Mac, and Linux desktops and laptops was vital to allowing a BYOD (bring you own device) policy at Cisco. So what is the solution?
Cisco’s AnyConnect allows its users to connect from anywhere, on any device. It’s also always on, meaning that you don’t have to continue to log in if you are disconnected. The session is automatically re-established. Not only that, but AnyConnect will establish a tunnel in the best way based on how you are connecting and from where. Trying to webconference in from a high latency location? The client will utilize protocols like Datagram Transport Layer Security (DTLS), which is designed to handle higher latency traffic. What about under the hood?
The AnyConnect client establishes a secure tunnel into the network through Cisco ASA 5500’s that work in tandem with Cisco IOS to handle authentication and access to Cisco’s network. In addition to authentication, the client checks that the device is registered and conforms to security standards. What if a device doesn’t measure up? It’s not allowed on the network. What about lost or stolen devices? Cisco IT can remotely terminate the VPN sessions and no longer allow the device on the network.
The only question now is; will other organizations follow suit, or continue to keep their heads buried in the sand?
I know cisco is a pioneer in networking products. Do all enterprises use cisco products? Does Cisco have a real Competitor? Who are they? And how far? ---Q FROM Cisco learning home
As we known, Cisco is the worldwide leader in networking that transforms how people connect, communicate and collaborate, which is the best choice for headquarter and all kinds of offices, industries and enterprises. Although Cisco doesn’t get a big applause from consumer market, it also shares a large market in networking solution and network hardware. Just like one Chinese saying: “Lose dead camel a ratio a horse greatly”, and so, does Cisco have a real competitor? And here we can read some points from Cisco fans and Cisco users:
“Define competitor. Yes, there are other companies who offer network equipment. Juniper, Extreme Networks, HP even has some gear out there as does Dell. However, when it comes down to full spectrum solutions, it's tough to beat Cisco. Juniper is working on building more market base though, and they have some features in JunOS that are arguably nicer than IOS. However, their slice of the market isn't as large as Cisco's is.” ---Travis
"However, when it comes down to full spectrum solutions, it's tough to beat Cisco. Juniper is working on building more market base though, and they have some features in JunOS that are arguably nicer than IOS. However, their slice of the market isn't as large as Cisco's is. Would it be easy work with devices from other vendors? Being a cisco professional do we have to learn the corresponding OS? Also, because we learnt cisco IOS, of-course we will recommend cisco devices. Which is a plus for cisco?” ---KARTHICK KUMARAGURU
“I am certified in Cisco products and practices. Through various jobs I have worked on Cisco, F5, Packeteer, Citrix, Riverbed, Juniper and Avaya equipment. Most enterprise networks will find a network appliance from another vendor on it in some form or fashion, if not several. The larger the scale of the deployment, I've noticed, the more specialized equipment you deploy, due to economy of scale.” ---Daniel
“The competitors that come to win my business are usually Allied Telysen, HP & Foundry, who just recently got bought out by someone... I don't remember who. Dell used to, but they have just become a Cisco reseller themselves so that will be interesting. I looked at Dell switches a few years ago and they stunk!
We were a HP shop at one point in time and decided to move to cisco, just for sheer performance. One thing I really like about Cisco switches is the switching in hardware, not in software approach. There is a noticeable performance difference. I also have some networks that have HP gear and I am trunking vlans across a mixed HP and Cisco environment.
The thing that keeps me using Cisco gear is.... Features! Every time a vendor gives their spill, I ask if they have certain features that I am currently using. If the answer is no, then they have just answered their own question.” ---Jared
“Quick question, my company just deployed Riverbed....in your experience, how does Riverbed match up to Cisco's WAN acceleration products? Jared, we also use to have Dell switches....they were indeed horrible.....not to say that ports don't go bad on Cisco switches, because obviously they do, BUT they always use to go bad on the Dell ones.” ---SKeemz
“Skeemz- I haven't used Cisco's WAN accerlation products much - but I am really impressed with Riverbed and their RIOS. It's a locked down Linux shell and it really gives you a lot of control and visibility within the device, especially with logging. They have some bright folks working over there and with their new partnership with HP - I think they are going to really have some interesting gear coming out soon. Riverbed has very granular control policies, their GUI is intuitive and quick, and their boxes are fairly stout, especially the bigger ones. I think their RAID rebuild function when a drive dies is a little questionable but overall I like their product. I've worked on more or less their entire enterprise product line and can't think of a box I wouldn't recommend to someone.” ---Micheal
Right, what Cisco fans said tell us that Cisco owns a good reputation, trust by its better networking solutions and powerful Cisco network equipment. Have you felt it?
Notes: If you need to know some info of Cisco’s main hardware types such as Cisco routers, Cisco switches, Cisco firewall, Cisco modules and cards, etc. you can visit a very popular leading Cisco supplier---router-switch.com to see more…
Gigenet utilizes Cisco's firewall services module (FWSM) to provide instant firewall activation and simple management through a secure web interface.
High Performance, High Scalability,
- Gbps throughput per module
- 100,000 connections per second
- 1,000,000 concurrent connections
- Single port or VLAN spanning
Best-In Class Features
- Time-tested Cisco PIX operating system
- PIX Device Manager GUI
- Transparent Layer(2) Firewalls
- Rich stateful inspection for web, VOIP
The Cisco firewall services module is designed to recognize and filter the following types of traffic:
- Core services: HTTP, FTP, ESMTP, DNS, ICMP, TCP, UDP
- Voice over IP (VoIP) / Unified Communication services: SIP, SCCP, H.323, RTSP, TAPI/JTAP, GTP
- Application/operating system services: LDAP/ILS, SunRPC, XDMCP, TFTP
More about Cisco ASA 5500 Series Adaptive Security Appliances
There are six main models in the ASA range, from the basic 5505 branch office model up to the 5580 datacenter versions; a full comparison is available on the Cisco website here: Cisco ASA 5500 Series Adaptive Security Appliances
Although this article will concentrate on the 5505 and 5510 models the basic feature set is in fact fairly consistent across the range, the main differences being in the maximum traffic throughput handled by each model and the number/type of interfaces.
At the most basic level the ASA is a transparent or routed firewall/NAT device, this means it is designed to sit between your LAN and the Internet; one interface (normally known as "outside") will be connected to your Internet access device and one or more interfaces (e.g. "inside" and "DMZ") will connect to your internal networks. This enables the ASA to inspect and control all traffic passing between your network and the Internet, exactly what it does with that traffic is the clever bit.
The ASA5510 is intended to be a single device solution to your Internet security requirements and with its 300Mbps throughput and 9,000 firewall connections per second capacity will be suitable for most office deployments. The key features will be covered in more detail later but in brief these are; firewall/NAT, SSL/IPsec VPN, content security and intrusion prevention. It has five 10/100Mbps ports, by default these provide one outside (Internet) interface, one management and three internal network interfaces but they are fully reconfigurable and also support vLANing for further network subdivision if required. Functionality can be upgraded via a Security Services Module port which provides support for additional Content Security and Intrusion Prevention features.
The ASA5505 is intended for small or branch office and teleworker deployments, often in conjunction with a 5510 or higher model at the head office to which it will establish a secure VPN, whilst providing full security for other Internet traffic. The device has 8 10/100Mbps Ethernet ports, including 2 with Power over Ethernet support suitable for PoE devices such as IP phones or cameras, so it can be used as single unit solution for the smaller office. Key differences compared to the 5510 are the reduced support for VPN connections (only 10 but upgradeable to 25 with license), only 3 vLANs (25 with Security Plus license) and only a slot for the optional Security Services Card so there is no option for the advanced Content Security services.
All ASA models include a fully featured policy based firewall and routing engine which allows you complete control of which traffic you allow in and out of your network. Layer 2/3 firewalling allows you to specify which hosts are allowed access through the ASA and also to perform Network Address Translation to map internal hosts to public IP addresses. Layer 7 firewall goes several steps further and also allows you to define access policies based on application and protocol type, providing extremely granular control over Internet access and protection against advanced types of network attack. Unlike many competitor's firewalls the ASA's policy and interface based approach to access control gives you complete control over traffic leaving your network as well as incoming, for example allowing you to restrict Instant Messaging use to only your approved client application. Deep packet inspection goes beyond simply analysing the protocol and port of the attempted connection to discover the application behind it making it virtually impossible for users to circumvent company IT policies.
SSL & IPsec VPN
Even the ASA 5505 includes full support for IPsec and SSL VPN endpoints, providing highly encrypted tunnels for office to office and remote user to office connections. The basic license for all ASAs allows IPsec VPN connections up to the maximum supported on each model but only includes two SSL VPN licenses, to allow for testing before deployment. The 5505 will support up to 25 simultaneous VPN connections, whilst the 5510 supports a maximum of 250 - these can be any combination of IPsec or SSL, and site to site or remote client types.
IPsec VPNs are commonly deployed between Cisco VPN devices for site to site connections, or initiated by client software on the remote worker's computer. Included with all ASA license bundles is the Cisco AnyConnect VPN client, with versions available for all major operating systems; Windows 2000 up to Windows 7, Mac OS X (10.4/5), Linux Intel kernel 2.6.x and even Windows Mobile 5.0/6.0/6.1 . Cisco AnyConnect provides several improvements over the basic IPsec functionality built into those operating systems, key features are:
- DTLS protocol support to help minimize latency for applications such as VoIP
- Support for SSL tunneling to ensure connectivity even through restrictive proxies and firewalls (if web browsing is possible then so is a VPN connection)
- Advanced encryption and wide range of authentication protocols, including two factor smartcard/token based
- Flexible IP tunneling for consistent user experience with features such as connection retention, ensuring the mobile user retains connectivity through disconnections, reboots and standby/hibernation.
Cisco ASA Firewalls: 5505, 5510, 5520, 5540, 5580, the full Cisco PIX Firewall family, FWSM, CSM, Cisco VPN Routers etc.
Cisco VPN: VPN 3000 Series Concentrators, VPN blades, Site-to-Site VPN, Remote Access VPN, Cisco SSL VPN etc.
Cisco IPS: 4200 series, IDSM-2 blade, Cisco IOS IPS, Shunning, IPS Manager, IDM, AIP-SSM, HIPS (CSA) etc.
Cisco MARS: MARS 20, MARS 50, MARS 100, integration with IPS and CSA, reports, queries, local / global set ups etc.
Identity Management: Cisco ACS, RADIUS, TACACS+, 802.1x, LDAP, OTP, RSA, certificates, biometrics etc.
Router & Switch Security: Access-Lists, VLAN maps, TCP Intercept, Lock-and-Key, Anti Spoofing, CBAC, IOS Firewall etc.
Network Admission Control (NAC): In-band, out-of-band, clean access client, ACS integration, 3rd. party integration etc.
Generally speaking, the Cisco switches are the best in the market. Versatile, reliable, flexible and powerful, the Cisco switch product line (such as the 2960, Cisco 3560, Cisco 3750, 4500, 6500, etc.) offer unparalleled performance and features.
Although a Cisco switch is a much simpler network device compared with other devices (e.g. routers and firewalls), many people have difficulties in configuring a Cisco Catalyst Switch. Unlike other lower class switch vendors (which are plug-and-play), the Cisco switch needs some initial basic configuration in order to enable management, security and some other important features.
How to configure a Cisco switch from scratch? Basic steps help you finish the Cisco switch configuration.
STEP1: Connect to the device via console
Use a terminal emulation software such as PuTTY and connect to the console of the switch. You will get the initial command prompt “Switch>”
Type “enable” and hit enter. You will get into privileged mode (“Switch#”)
Now, get into Global Configuration Mode:
Switch# configure terminal
STEP2: Set up a hostname for the particular switch to distinguish it in the network
Switch(config)# hostname access-switch1
STEP3: Configure an administration password (enable secret password)
access-switch1(config)# enable secret somestrongpass
STEP4: Configure a password for Telnet access
access-switch1(config)# line vty 0 15
access-switch1(config-line)# password strongtelnetpass
STEP5: Define which IP addresses are allowed to access the switch via Telnet
access-switch1(config)# ip access-list standard TELNET-ACCESS
access-switch1(config-std-nacl)# permit 10.1.1.100
access-switch1(config-std-nacl)# permit 10.1.1.101
!Apply the access list to Telnet VTY Lines
access-switch1(config)# line vty 0 15
access-switch1(config-line)# access-class TELNET-ACCESS in
STEP6: Assign IP address to the switch for management
!Management IP is assigned to Vlan 1 by default
access-switch1(config)# interface vlan 1
access-switch1(config-if)# ip address 10.1.1.200 255.255.255.0
STEP7: Assign default gateway to the switch
access-switch1(config)# ip default-gateway 10.1.1.254
STEP8: Disable unneeded ports on the switch
! This step is optional but enhances security
! Assume that we have a 48-port switch and we don’t need ports 25 to 48
access-switch1(config)# interface range fe 0/25-48
STEP9: Save the configuration
The above are some steps that can be followed for basic set-up of Cisco switches. Of course there are more things you can configure (such as SNMP servers, NTP, AAA etc) but those depend on the requirements of each particular network.