This presentation gives a basic idea of routing with Routing Information Protocol (RIP) configurations. Also, walkthrough about static routes and dynamic routes has included.
This presentation gives a basic idea of routing with Routing Information Protocol (RIP) configurations. Also, walkthrough about static routes and dynamic routes has included.
This tutorial gives very good understanding on CCNA Dynamic Routing Protocols.After completing this tutorial,You will find yourself at a moderate level of expertise in knowing Advance Networking(CCNA)
This tutorial gives very good understanding on CCNA Dynamic Routing Protocols.After completing this tutorial,You will find yourself at a moderate level of expertise in knowing Advance Networking(CCNA)
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
6. Learn about remote networks
Chapter2
6
By Chhay Buntha
• From neighbor routers or from an administrator.
• The router then builds a routing table
• If a network is directly connected, then the router already knows how to get to it.
8. Static Routing Protocol
Chapter2
8
By Chhay Buntha
Static Routing Protocol: គឺជា protocol មួយន្ដល ប្មូវឲ administrator រញ្ចូលលូវព័ ៌មាល
ពីប្គរ់ ីតាំង networks ទំងអស់តៅកនុង routing table តោយផ្ទាល។ ជាការលអប្រតសើរសប្មារ់
សុវ ថិភ្ជពររស់ network ។
Advantages:
- No overhead on router CPU.
- No bandwidth usage between links.
- Security (Only Administrator can add routers)
9. Static Routing Protocol
Chapter2
9
By Chhay Buntha
Disadvantages:
- Administrator must really understand internetwork and how each router is
connected.
- Not recommend for a large network.
- Administrator must update all routers.
12. Dynamic Routing Protocol
Chapter2
12
By Chhay Buntha
Advantages:
- Less work in maintaining the configuration when adding or remove networks.
- Protocol automatically reach to the topology changes.
- Less configuration and more scalable.
Disadvantages:
- Router resources are used
- More administrative knowledge is required for configurations.
13. Dynamic Routing Protocol
Chapter2
13
By Chhay Buntha
The dynamic routing protocols can be categorized on the basis of various
parameters. Dynamic routing protocols are classified into two protocols:
1. Distance Vector Routing Protocol: It uses simple algorithms that calculate
cumulative distance value between routers based on hop count.
Example:
- Routing Information Protocol (RIP)
- Interior Gateway Routing Protocol (IGRP)
14. Dynamic Routing Protocol
Chapter2
14
By Chhay Buntha
2. Link State Routing Protocols: It uses sophisticated algorithms that maintain a
complex database of internetwork topology.
Example:
- Enhanced Interior Gateway Routing Protocol (EIGRP)
- Open Shortest Path First (OSPF)
15. Routing Information Protocols (RIP) version 1
Chapter2
15
By Chhay Buntha
• RIP is a distance vector routing protocol.
• Metric: hop count
• Advertised routes with metric > 15 are unreachable.
• Route updates every 30 seconds.
• Support classful network
• Administrative Distance: 120
• RIP v1 is a classful routing protocol.
• So, a router either uses the subnet mask configured on a local interface, or
applies the default subnet mask.
17. RIP v1 Configuration Scenario 1
Chapter2
17
By Chhay Buntha
• AD is the trustworthiness (or preference) of the route source.
• RIP AD is 120.
192.168.2.2/24
192.168.2.1/24
18. Enabling RIP: router rip
Chapter2
18
By Chhay Buntha
R2#config t
R2(config)#router ?
bgp Border Gateway Protocol (BGP)
eigrp Enhanced Interior Gateway Routing Protocol
(EIGRP)
isis ISO IS-IS
iso-igrp IGRP for OSI networks
lisp Locator/ID Separation Protocol
mobile Mobile routes
odr On Demand stub Routes
ospf Open Shortest Path First (OSPF)
ospfv3 OSPFv3
rip Routing Information Protocol (RIP)
R2(config)#router rip
R2(config-router)#
20. Verifying RIP: show ip route
Chapter2
20
By Chhay Buntha
R1#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static
route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
+ - replicated route, % - next hop override
Gateway of last resort is not set
192.168.1.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.1.0/24 is directly connected, FastEthernet0/0
L 192.168.1.1/32 is directly connected, FastEthernet0/0
192.168.2.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.2.0/24 is directly connected, FastEthernet0/1
L 192.168.2.1/32 is directly connected, FastEthernet0/1
R 192.168.3.0/24 [120/1] via 192.168.2.2, 00:00:19, FastEthernet0/1
R 192.168.4.0/24 [120/1] via 192.168.2.2, 00:00:19, FastEthernet0/1
R 192.168.5.0/24 [120/2] via 192.168.2.2, 00:00:19, FastEthernet0/1
21. Verifying RIP: show ip route
Chapter2
21
By Chhay Buntha
R2#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
+ - replicated route, % - next hop override
Gateway of last resort is not set
R 192.168.1.0/24 [120/1] via 192.168.2.1, 00:00:04, FastEthernet0/1
192.168.2.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.2.0/24 is directly connected, FastEthernet0/1
L 192.168.2.2/32 is directly connected, FastEthernet0/1
192.168.3.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.3.0/24 is directly connected, FastEthernet0/0
L 192.168.3.1/32 is directly connected, FastEthernet0/0
192.168.4.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.4.0/24 is directly connected, FastEthernet1/0
L 192.168.4.2/32 is directly connected, FastEthernet1/0
R 192.168.5.0/24 [120/1] via 192.168.4.1, 00:00:20, FastEthernet1/0
R2#
22. Verifying RIP: show ip route
Chapter2
22
By Chhay Buntha
R3#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
+ - replicated route, % - next hop override
Gateway of last resort is not set
R 192.168.1.0/24 [120/2] via 192.168.4.2, 00:00:11, FastEthernet1/0
R 192.168.2.0/24 [120/1] via 192.168.4.2, 00:00:11, FastEthernet1/0
R 192.168.3.0/24 [120/1] via 192.168.4.2, 00:00:11, FastEthernet1/0
192.168.4.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.4.0/24 is directly connected, FastEthernet1/0
L 192.168.4.1/32 is directly connected, FastEthernet1/0
192.168.5.0/24 is variably subnetted, 2 subnets, 2 masks
C 192.168.5.0/24 is directly connected, FastEthernet0/0
L 192.168.5.1/32 is directly connected, FastEthernet0/0
R3#
23. Verifying RIP: show ip protocols
Chapter2
23
By Chhay Buntha
R2#sh ip protocols
*** IP Routing is NSF aware ***
Routing Protocol is "rip"
Outgoing update filter list for all interfaces is not set
Incoming update filter list for all interfaces is not set
Sending updates every 30 seconds, next due in 11 seconds
Invalid after 180 seconds, hold down 180, flushed after 240
Redistributing: rip
Default version control: send version 1, receive any version
Interface Send Recv Triggered RIP Key-chain
FastEthernet0/0 1 1 2
FastEthernet0/1 1 1 2
FastEthernet1/0 1 1 2
Automatic network summarization is in effect
Maximum path: 4
Routing for Networks:
192.168.2.0
192.168.3.0
192.168.4.0
Routing Information Sources:
Gateway Distance Last Update
192.168.2.1 120 00:00:13
192.168.4.1 120 00:00:26
Distance: (default is 120)
24. Routing Information Protocols (RIP) version 2
Chapter2
24
By Chhay Buntha
Difference between RIPv1 & RIPv2
• RIPv1
• A classful distance vector routing protocol
• Does not support discontiguous subnets
• Does not support VLSM
• Does not send subnet mask in routing update
• Routing updates are broadcast
• RIPv2
• A classless distance vector routing protocol that is an enhancement of
RIPv1’s features
• Next hop address is included in updates
• Routing updates are multicast
• The use of authentication is an option
25. Routing Information Protocols (RIP) version 2
Chapter2
25
By Chhay Buntha
Similarities between RIPv1 & RIPv2
• Use of timers to prevent routing loops
• Use of split horizon or split horizon with poison reverse
• Use of triggered updates
• Maximum hop count of 15
26. RIP v1 Limitations: Scenario 2
Chapter2
26
By Chhay Buntha
• 3 routers set up
• Routers 1 & 3 contain VLSM networks
27. RIP v1 Limitations: Scenario 2
Chapter2
27
By Chhay Buntha
• VLSM, Recall this is sub
netting the subnet
• Private IP addresses are
on LAN links
• Public IP addresses
are used on WAN
links
• Loopback interfaces
These are virtual
28. RIP v1 Limitations: Scenario 2
Chapter2
28
By Chhay Buntha
No CIDR Support
Classful routing protocols do not support CIDR routes that are summarized with a smaller
mask than the classful subnet mask
29. Verifying RIP1: show ip route
Chapter2
29
By Chhay Buntha
R2#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static
route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
+ - replicated route, % - next hop override
Gateway of last resort is not set
10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
C 10.1.0.0/16 is directly connected, FastEthernet0/0
L 10.1.0.1/32 is directly connected, FastEthernet0/0
R 172.30.0.0/16 [120/1] via 209.165.200.233, 00:00:08, FastEthernet1/1
[120/1] via 209.165.200.229, 00:00:16, FastEthernet0/1
209.165.200.0/24 is variably subnetted, 4 subnets, 2 masks
C 209.165.200.228/30 is directly connected, FastEthernet0/1
L 209.165.200.230/32 is directly connected, FastEthernet0/1
C 209.165.200.232/30 is directly connected, FastEthernet1/1
L 209.165.200.234/32 is directly connected, FastEthernet1/1
30. Configuring RIPv2
Chapter2
30
By Chhay Buntha
• Enabling and Verifying RIPv2
• Configuring RIP on a Cisco router
• By default it is running RIPv1
• RIPv2 on a Cisco router
• Requires using the version 2 command
• RIPv2 ignores RIPv1 updates
• To verify RIPv2 is configured use the
• # show ip protocols
31. Verifying RIP2: show ip route
Chapter2
31
By Chhay Buntha
R2#sh ip route
Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
+ - replicated route, % - next hop override
Gateway of last resort is not set
10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
C 10.1.0.0/16 is directly connected, FastEthernet0/0
L 10.1.0.1/32 is directly connected, FastEthernet0/0
172.30.0.0/16 is variably subnetted, 3 subnets, 2 masks
R 172.30.0.0/16 [120/1] via 209.165.200.233, 00:00:18, FastEthernet1/1
R 172.30.1.0/24 [120/1] via 209.165.200.229, 00:00:10, FastEthernet0/1
R 172.30.2.0/24 [120/1] via 209.165.200.229, 00:00:10, FastEthernet0/1
209.165.200.0/24 is variably subnetted, 4 subnets, 2 masks
C 209.165.200.228/30 is directly connected, FastEthernet0/1
L 209.165.200.230/32 is directly connected, FastEthernet0/1
C 209.165.200.232/30 is directly connected, FastEthernet1/1
L 209.165.200.234/32 is directly connected, FastEthernet1/1
32. Dynamic Routing Protocols
Chapter2
32
By Chhay Buntha
Networks within a given organization are grouped into Autonomous Systems (AS)
• An AS is a collection of Internet Protocol (IP) routing prefixes under the
control of a single administrative entity that present a common, clearly
defined routing policy to the Internet
• Interior Gateway Protocols (IGPs) are used to exchange routing information
within a given AS
• Exterior Gateway Protocols (EGPs) are used to exchange routing information
between routers bordering two networks (i.e. between two Autonomous
Systems)
34. Interior Gateway Protocol (IGP)
Chapter2
34
By Chhay Buntha
Interior Gateway Protocols
• Used within an Autonomous System
• Distribute internal infrastructure prefixes only, not external routing information
• Examples –OSPF, IS-IS, RIP
IGPs are designed to route packets within an AS and rapidly adapt to network
failures
All IGPs function to identify the shortest cost path between two endpoints, typically
via summation of the metrics of all the individual links
35. External Interior Gateway Protocol (IGP)
Chapter2
35
By Chhay Buntha
• Interior Routing protocols operated within an Autonomous System.
• Collection of routers and networks under the same administration or routing
policy.
• Usually under single ownership, trust and administrative control.
Characteristics:
• Internal connectivity: All parts of an AS must remain connected, meaning that its
all routers must exchange routing information in order to maintain the
connectivity.
• A single routing protocol required to run in an AS, between all routers.