Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

-How can you utilize these protocols (CDP, NTP, and Syslog) during the day-to-da

ID: 3851060 • Letter: #

Question

-How can you utilize these protocols (CDP, NTP, and Syslog) during the day-to-day operation of your network operations?

-Do any of these protocols (CDP, NTP, and Syslog) introduce any security concerns? How? If so, how would you protect your network resources from such a security concern?

-Search for a protocol that is used for building, maintaining, and troubleshooting the networks and is not introduced in this course. Share your finding with your classmates and explain how it can be used in modern networks.

Explanation / Answer

Answer :

Part 1: a)

Cisco Discovery Protocol (CDP) is data link layer protocol which allows to find an information about the connections between neighboring devices to identify protocol addresses of Cisco devices on network and configuring their connection.

Cisco protocol which can run among directly connected network devices(routers, switches, remote access devices, IP telephones ) to supply a network device with information of its directly connected neighboring devices.

It is used to share information about the operating system version and IP address through the network devices under CDP service.

.As CDP is media- and protocol-independent that are supported for Cisco Discovery Protocol (CDP) are Ethernet, Token Ring, FDDI, PPP, HDLC, ATM, and Frame Relay.

CDP Information

CDP messages containing information about devices are -

CDP messages are casted at every 60 seconds , holding down for missing neighbor is 180 seconds..

Part 1: b) NTP :

Network Time Protocol (NTP) is used to coordinate computer clock times within a network.

Clock synchronization is that used to synchronize clock times.

synchronizing a client to a server consists of packet exchanges as a pair of request and reply. For sending a request, the client stores its originate timestamp into the sent packet . When a server receives that packet, it will also store its receive timestamp into the packet, and the packet will be returned on its transmit timestamp into the packet.. The travelling time (delay) is estimated to be half of "the total delay minus remote processing time",

As the time differences can be used to estimate the time offset between both sender and receiver the dispersion for the maximum offset error when there is a more symmetric the round-trip time to accurately estimate the current time.

NTP uses UDP/IP packets for data transfer because of the fast,authenticated connection setup having request and response times.

NTP works:

The NTP client initiates a time-request exchange with the NTP server.

The client is able to calculate the connection delay and offset

Adjust its local time stamp to match with the clock at the server. This transaction occurs through the User Datagram Protocol to support broadcast synchronization of clocks.

Part 1 c):

Syslog

. The Syslog protocol uses a layered architecture that allows any number of transport protocols for transmission of messages.

The Syslog standard defines three different layers, namely

the Syslog content or Syslog event message

the Syslog application or that generates, interprets, routes, and stores the message

the Syslog transport that transmits the message

.

Part 2:

Protocols (CDP, NTP, and Syslog) introduce any security concerns

Cisco Discovery Protocol

As The Cisco Discovery Protocol does not support any security mechanisms and is prone to attacks. So the Secure Cisco Discovery Protocol provides security by allowing users to select the type, length, value (TLV) fields which are sent on to filter the fields in Cisco Discovery Protocol packets

NTP Service

If NTP, described earlier in "Network Time Protocol Security," is not used in the network,

The Secure Cisco Discovery Protocol feature are needed to select that information is being sent in Cisco Discovery Protocol packets and block information.

This feature supports the following functions:

• TLV lists can be configured globally and also at the interface level, but only one TLV fields list can be configured globally.

• A TLV list configured on an interface

• Device-ID TLV and the Application TLV can be blocked specially in sending site

Syslog service:

Syslog is useful for system management and security for information analysis, and debugging messages.