Networking, the communication between two or more networks, encompasses every aspect of connecting computers together. With the evolution of networking and the Internet, the threats to
information and networks have risen dramatically and performance has depleted enormously.
As a company grows its business its network design needs to be updated from the existing network
and expand it to accommodate additional users or workloads. But the diculty arises as networks
are being pressured to cost less, yet support the emerging applications and higher number of users
with increased performance. As personal, government and business-critical applications become
more prevalent on the Internet, it is imperative that all networks be protected from threats and
vulnerabilities in order for a business to achieve its fullest potential. Hence a Secure Design for a
network is critical in todays expanding corporate world.
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...thesakshi12
Best PROJECT TRAININg In CCNA from CMC faridabad. for details Call @ 9212508525 or send your resume at pt@cmcfaridabad.com ISP Of branch office to headoffice Network Project of CCNA
To find a good job in Networking, join IIHT’s Diploma Programme in Networking and learn all about CompTIA – A+, CCNA, CCNA-Voice, CCNA-Security, Juniper Networking, Security Fundamentals and more. Though there are many training Institutes, courses and coaching centres offering courses in Networking, IIHT is the leading Institute that provides job-oriented training in Networking due to its latest lab facilities, well-experienced faculty, industry based curriculum and 94.3% placement record. Enquire more about IIHT training Institute Now.
This is an introductory presentation regarding the issues in designing a campus network infrastructure. Unlike theoretical approaches, this presentation actually was used to describe some of the real configurations performed by Server Administrators and Network Managers. This is for an introductory audience with very little background in computer networks assumed.
Step by Step guide to set up a simple network in Packet TracerSorath Asnani
This document shows the detailed Steps to set up a simple network inside Packet Tracer. You will get familiarity with the software after following the Steps.
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
Point to Point Connections, Serial Communications, Troubleshoot WAN Connectivity, PPP Sessions
Choosing IT security does not need to be hard or time taking. Business Suite puts all the necessary elements into one package to make your life easier, and your business safer.
Business Suite puts you on the driver's seat, giving you the necessary tools to centrally manage the whole IT environment. The in-depth features give you full control to what is allowed in your network.
Business Suite includes security products from the gateway level to endpoints, with versatile management features for demanding IT environments.
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...thesakshi12
Best PROJECT TRAININg In CCNA from CMC faridabad. for details Call @ 9212508525 or send your resume at pt@cmcfaridabad.com ISP Of branch office to headoffice Network Project of CCNA
To find a good job in Networking, join IIHT’s Diploma Programme in Networking and learn all about CompTIA – A+, CCNA, CCNA-Voice, CCNA-Security, Juniper Networking, Security Fundamentals and more. Though there are many training Institutes, courses and coaching centres offering courses in Networking, IIHT is the leading Institute that provides job-oriented training in Networking due to its latest lab facilities, well-experienced faculty, industry based curriculum and 94.3% placement record. Enquire more about IIHT training Institute Now.
This is an introductory presentation regarding the issues in designing a campus network infrastructure. Unlike theoretical approaches, this presentation actually was used to describe some of the real configurations performed by Server Administrators and Network Managers. This is for an introductory audience with very little background in computer networks assumed.
Step by Step guide to set up a simple network in Packet TracerSorath Asnani
This document shows the detailed Steps to set up a simple network inside Packet Tracer. You will get familiarity with the software after following the Steps.
CCNA (R & S) Module 02 - Connecting Networks - Chapter 2
Point to Point Connections, Serial Communications, Troubleshoot WAN Connectivity, PPP Sessions
Choosing IT security does not need to be hard or time taking. Business Suite puts all the necessary elements into one package to make your life easier, and your business safer.
Business Suite puts you on the driver's seat, giving you the necessary tools to centrally manage the whole IT environment. The in-depth features give you full control to what is allowed in your network.
Business Suite includes security products from the gateway level to endpoints, with versatile management features for demanding IT environments.
The background for this presentation was a client engagement for a new network for an established University. The things to consider, while dated, mostly still apply to network design.
One of the most difficult challenges facing Security, VoIP, and Network Management Solutions is how to implement network tools onto enterprise networks. Enterprise networks are becoming more complex when looking at how to monitor and capture data. It can be difficult or impossible to gain access to network SPAN Ports or inserting In-line Devices like Intrusion Prevention Systems into enterprise networks. Contention for network access is a major problem. Learn how to design a network access solution that meets the requirements for security, network monitoring, and overall network access solutions. We help solve the questions, How do I get secure access to the network for capturing data or monitoring data traffic? Why TAP your network?
New Frameworks for Measuring Capacity and Assessing PerformanceTCC Group
If we start with the assumption that — in order to improve our social sector as a whole — those who do the work to strengthen our communities (the nonprofits) are equally as critical as those responsible for providing the resources for the work to get done (the foundations), then why wouldn’t we expect all social sector actors to build their capacity? How do we know when our grantees and our foundations are becoming more effective and impactful as a result of our capacity investments, organizational development efforts and technical assistance? What does a high performing organization or foundation look like? And can we measure that?
This presentation, provided during the Grantmakers for Effective Organizations 2016 National Conference in Minneapolis, reviews and demonstrates existing resources for assessing nonprofit and foundation capacity and effectiveness. Speakers introduced the pros and cons of a variety of rubrics in use in the field and offered guidance on how funders decide on the right fit for the desired purpose. Grantmaker peers also shared how they used different frameworks and tools to assess individual nonprofits and grantee cohorts. Session participants left with increased awareness of the importance of the facilitator’s role in interpreting data gleaned from assessments and of the data collection methods most appropriate for their organization.
SIP Trunking & Security in an Enterprise NetworkDan York
How secure are your VoIP systems as you deploy SIP-based systems in an enterprise environment? In this slide deck presented by VOIPSA Best Practices Chair Dan York at the Ingate SIP Trunking Seminars at ITEXPO September 17, 2008, Dan York walks through the security issues related to VoIP (with a focus on SIP trunking), the tools out there to attack/test VoIP systems, best practices and resources. (An audio recording of this session was made and will be available.)
Capacity Planning for Virtualized Datacenters - Sun Network 2003Adrian Cockcroft
Presentation I made at the Sun Network conference in 2003 on how to do capacity planning for virtualized systems, tied into the N1 product that Sun was pushing at the time. This project was structured as a design for six sigma (DFSS) project.
Mobile Internet - Africa's Digital BackboneAdeyemi Fowe
A presentation at the University of Illinois Urbana-Champaign to the students in Faculty of Engineering on the state of the art of Mobile technology in Africa.., the hopes and what the future holds.
Proactive behavior-based protection combined with automatic software updates and advanced tools to control web access provide the best protection for workstations and laptops.
Client Security offers award-winning protection for Windows computers. F-Secure has received the "Best protection" award from AV-Test four years in a row which clearly shows that you can trust us to keep your PCs safe.
AV-Test awarded F-Secure with "Best Protection" award for corporate endpoint protection. This is the 4th year in a row that F-Secure has received this award, clearly showing that our Windows security is of top-notch quality.
F-Secure Email and Server Security takes server protection to the same level as F-Secure Client Security, which has been rated by AV-TEST as providing the best protection in the world. The combination of email and server security in the same package, along with several performance improving features, makes the solution easier to install and maintain.
Powerful, modern, and designed to solve challenging security needs as easily as possible,
Protection Service For Business is one of the world’s leading multi-endpoint security solutions.
The popularity of Virtual SAN is growing daily. Server admins are finally free to aggregate storage in their servers to create a shared storage system that scales with their compute needs. The underlying key to making it all work is networking. All Virtual SAN data flows through it, and correct selection and configuration of networking components will mean the difference between disruptive success or dramatic failure. This session will give deep insight in the do's and don'ts of Virtual SAN networking. Best practices for physical and virtual switch configuration and performance testing will be discussed. Virtual SAN 5.5 and 6.0 will be covered, and the networking differences discussed. Methods of troubleshooting network issues will be covered. For those configuring a Virtual SAN network for the first time, for labs or enterprise scale, this session is a must-see.
In this presentation, we will discuss how branch controllers work and run through different deployments examples in 6.x and 8.x.
Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-Recording-Slides-Manage-Devices-at-Branch/td-p/351983
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
NetFlow Analyzer lets you capture and analyze your entire network traffic. Learn how to visualize traffic details such as speed, volume, packets, and utilization with the help of our network traffic analyzer. FREE TRIAL -https://www.manageengine.com/products/netflow/download.html
Codec stands for enCOder/DECoder or COmpressor/DECompressor. It is a software or hardware that compresses and decompresses audio and video data streams.
Codec stands for enCOder/DECoder or COmpressor/DECompressor. It is a software or hardware that compresses and decompresses audio and video data streams.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
2. •
•
• BRIEFLY, THIS PROJECT AIMS TO SETUP AN END-TO-END SECURE DATA & VOIP NETWORK FOR A SMALL
ENTERPRISE, WITH FEATURES LIKE HIGH AVAILABILITY, ENHANCED PERFORMANCE, RESILIENCY, SECURITY FOR
WIRED & WIRELESS COMMUNICATION AND INCREASED PRODUCTIVITY.
•
3. THE MAJOR OBJECTIVE OF THIS PROJECT WAS A SMALL
ENTERPRISE NETWORK UPGRADE IN ORDER TO:
• IMPROVE AND CONSOLIDATE NETWORK PERFORMANCE ON SITE.
• PROVIDE INCREASED NETWORK CAPACITY.
• IMPROVE THE NETWORKS FAULT TOLERANCE CAPABILITY.
• PROVIDE FUTURE EXPANSION CAPABILITY.
• IMPROVE THE NETWORK SECURITY TO PREVENT UNAUTHORIZED ACCESS.
• IDENTIFY THE CRITICAL POINTS OF FAILURE IN THE EXISTING NETWORK
AND PROPOSE ON HOW TO ELIMINATE THEM.
4. SECURITY POLICY & REQUIREMENTS:
• WIRELESS USERS ARE DENIED ACCESS TO THE PRIVATE NETWORK. ONLY ACCESS TO INTERNET.
• NETWORK DEVICES MUST ONLY BE ACCESSED BY LOCAL SITE OR REMOTE SITE ADMIN WITH
AUTHORIZATION. ONLY PERMITTED DEPARTMENTS ARE ALLOWED TO COMMUNICATE WITH OTHER
DEPARTMENTS.
• NO OTHER HOST OTHER THAN THE COMPANY’S END DEVICES CAN BE ATTACHED TO THE NETWORK. IF
ATTACHED, ACCESS MUST BE DENIED IMMEDIATELY AND ADMIN SHOULD SOMEHOW BE NOTIFIED.
• TWO GUEST COMPUTERS SHOULD BE ACCOMMODATED IN ANY DEPARTMENT AND THEY ARE ONLY
PERMITTED TO COMMUNICATE WITH THE MARKETING DEPARTMENT AND LIMITED INTERNET ACCESS.
• EMPLOYEES CAN ONLY ACCESS THE ALLOWED SITES.
• HUMAN RESOURCES IS DENIED ACCESS TO ANY OTHER DEPARTMENT & IS JUST ALLOWED INTERNET
ACCESS.
5. FUTURE EXPANSION CAPABILITY:
• SERVERS CAN BE ADDED TO THE NETWORK AT ANY TIME.
• CLUSTERING OF THE SEVERS CAN ALSO BE POSSIBLE IF NECESSARY IN THE FUTURE AS THE EXISTING SERVER
HARDWARE CAN SUPPORT BEING IDENTICAL & SUPPORT SCSI.
• SYSTEM COMPONENTS ARE IDENTICAL AT ALL NODES FOR EASE OF MANAGEMENT & CONFIGURATIONS
ARE SIMILAR BETWEEN ALL UNITS AND CAN BE USED AS TEMPLATES FOR ADDING NODES.
• THE DISTRIBUTION SWITCH IS A 24-PORT GIGABIT SWITCH WITH 4 SFP FIBER MODULES
• HENCE EXPANDING THE NUMBER OF DEPARTMENTS OR EVEN THE NUMBER OF BRANCHES WILL ALWAYS BE
ACCEPTABLE AS ALL THE NECESSARY CONFIGURATIONS HAVE BEEN DONE.
6. ACCESS LAYER SWITCHES ALSO HAVE CAPABILITIES TO BEAR MORE USERS
AND ARE ALSO CONFIGURED FOR SUCH EXPANSION:
7. FUTURE TRANSITION TO IPV6
• FOR FUTURE PURPOSE WITH CERTAIN CONFIGURATIONS, THE FULL
ENTERPRISE NETWORK CAN BE IMPLEMENTED WITH AN IPV6 SETUP.
• DOCUMENTATION IS ALSO PROVIDED FOR A FULL IPV6 DEPLOYMENT.
8. NETWORK FEATURES
• WEB SERVER
• FTP SERVER
• DHCP SEVER
• DNS SEVER
• SYSLOG SERVER
• VOIP
9. VOIP
Steps:
1. Configure Call Manager ExpressTM on a 2811 router.
2. Use the various telephony devices
3. Setup dial peers
4. Connect CiscoTM IP phones on the network.
• ADDITIONALLY IN THE CURRENT NETWORK INFRASTRUCTURE IP PHONES HAVE ALSO BEEN CONFIGURED IN EACH
DEPARTMENT USING THE SAME ETHERNET NETWORK.
• BY RECONFIGURING THE NETWORK & MANAGEABLE SWITCHES VOICE IS NOW COMMUNICATED OVER THE
NETWORK.
10. VOIP CONFIGURATION:
• TASKS 1 : CONFIGURE INTERFACE FASTETHERNET 0/0 AND DHCP SERVER ON ROUTERA
(2811 ROUTER)
• TASK 2 : CONFIGURE THE CALL MANAGER EXPRESS TELEPHONY SERVICE ON ROUTERA
• TASK 3 : CONFIGURE A VOICE VLAN ON SWITCHA
• TASK 4 : CONFIGURE THE PHONE DIRECTORY FOR IP PHONE 1
• TASK 5 : VERIFY THE CONFIGURATION
11. CISCO IP PHONE CONFIGURATION COMMANDS:
#Configure the FA 0/0 interface#
RouterA>enable
RouterA#configure terminal
RouterA(config)#interface FastEthernet0/0
RouterA(config-if)#ip address 192.168.10.1 255.255.255.0
RouterA(config-if)#no shutdown
#The DHCP server is needed to provide an IP adress and the TFTP server location for each IP phone
connected to the network:
RouterA(config)#ip dhcp pool VOICE #Create DHCP pool named VOICE
RouterA(dhcp-config)#network 192.168.10.0 255.255.255.0 #DHCP network network 192.168.10 with /24 mask#
RouterA(dhcp-config)#default-router 192.168.10.1 #The default router IP address#
RouterA(dhcp-config)#option 150 ip 192.168.10.1 #Mandatory for voip configuration.
After the configuration, wait a moment and check that ‘IP Phone 1’ has received an IP address by checking
the phone screen until a configuration summary appears.
Apply the following configuration on SwitchA interfaces. This configuration will separate voice and data traffic in
different vlans on SwitchA. Data packets will be carried on the access vlan.
SwitchA(config)#interface range fa0/1 – 5 #Configure interface range#
SwitchA(config-if-range)#switchport mode access
SwitchA(config-if-range)#switchport voice vlan 1 #Define the VLAN on which voice packets will be handled#
12. CISCO IP PHONE CONFIGURATION COMMANDS (CONTINUED):
Configure the Call Manager Express telephony service on RouterA to enable voip on the network.
RouterA(config)#telephony-service #Configuring the router for telephony services#
RouterA(config-telephony)#max-dn 5 #Define the maximum number of directory numbers#
RouterA(config-telephony)#max-ephones 5 #Define the maximum number of phones#
RouterA(config-telephony)#ip source-address 192.168.10.1 port 2000 #IP Address source#
RouterA(config-telephony)#auto assign 1 to 6 #Automatically assigning ext numbers to buttons#
Although ‘IP Phone 1’ is already connected to SwitchA, it needs additional configuration before being
able to communicate. So to configure RouterA CME to assign a phone number to this IP phone:
RouterA(config)#ephone-dn 1 #Defining the first directory entry#
RouterA(config-ephone-dn)#number 999 #Assign the phone number to this entry#
Ensure that the IP Phone receives an IP Address and a the phone number 999 from RouterA
This can take a short while.
13. REMOTE SITE VOIP CONFIGURATION USING DIAL PEER:
SITE1 ROUTER SITE2 ROUTER:
dial-peer voice 47 voip
destination-pattern 1..
session target ipv4:18.18.18.2
dial-peer voice 47 voip
destination-pattern ...
session target ipv4:78.78.78.2
14. ADDITIONAL FEATURES WHICH INCREASE NETWORK
PERFORMANCE & CAPACITY:
• VTP PRUNING:
• WHEN VTP PRUNING IS ENABLED ON VTP SERVERS, ALL THE
CLIENTS IN THE VTP DOMAIN WILL AUTOMATICALLY ENABLE VTP
PRUNING. BY DEFAULT, VLANS 2 – 1001 ARE PRUNING
ELIGIBLE, BUT VLAN 1 CAN’T BE PRUNED BECAUSE IT’S AN
ADMINISTRATIVE VLAN.
• SPANNING-TREE PORTFAST VERY CAREFULLY ENABLED
ON ACCESS PORTS CONNECTED TO HOSTS ONLY
ESPECIALLY THE SERVERS SO UPTIME IS HIGH & NO
UNNECESSARY DELAY BY STP.
SW1#config t
SW1(config)#interface Fa0/1
SW1(config-if)#switchport trunk pruning vlan 3-4
15. NETWORK CONNECTIVITY TESTING PLAN:
Layer 1 Error Checklist Layer 2 Error Checklist
Broken cables
Disconnected cables
Cables connected to the wrong ports
Intermittent cable connections
Cables incorrectly terminated
Wrong cables used
Cross-connects
Rollovers
Straight-through cables
Transceiver problems
DCE cable problems
DTE cable problems
Devices powered off
Improperly configured serial interfaces
Improperly configured Ethernet interfaces
Wrong clock rate settings on serial interfaces
Wrong encapsulation set on serial interfaces
Faulty NIC
Layer 3 Error Checklist
Wrong routing protocol enabled
Incorrect network/IP addresses
Incorrect subnet masks
Incorrect interface addresses
Incorrect DNS-to-IP bindings
Wrong autonomous system number for EIGRP
16. STANDARD COMMAND LINE TOOLS USED TO TROUBLESHOOT
STANDARD COMMAND LINE TOOLS THAT WILL BE USED TO TROUBLESHOOT HOST LEVEL PROBLEMS ARE:
PING – CHECK CONNECTIVITY BETWEEN HOST AND OTHER NETWORK DEVICES
TRACERT – CHECK PATH TO OTHER NETWORK DEVICES
IPCONFIG – SEE IF HOST PROPERLY DETECTS CONFIGURATIONS ASSIGNED TO IT
ARP -A – DISPLAYS THE IP-TO-PHYSICAL ADDRESS TRANSLATION TABLES
STANDARD CISCO IOS COMMAND LINE TOOLS THAT WILL BE USED TO TROUBLESHOOT ROUTER LEVEL
PROBLEMS ARE:
PING – CHECK CONNECTIVITY BETWEEN ROUTER AND OTHER NETWORK DEVICES
TRACEROUTE - CHECK PATH TO OTHER NETWORK DEVICES
SHOW ARP – SHOW THE IP/MAC ADDRESS USED
SHOW IP ROUTE – SHOWS A ROUTER’S ROUTING TABLE
SHOW INTERFACE/SHOW INTERFACE BRIEF – SHOWS EXISTING INTERFACE CONFIGURATIONS AND IF
ADMINISTRATIVELY UP OR DOWN
SHOW RUN – SHOWS EXISTING OVERALL ALL CONFIGURATIONS
25. ETHER CHANNEL : CISCO’S IMPLEMENTATION OF PORT AGGREGATION
• PORT AGGREGATION: ALLOWS US TO TIE MULTIPLE PORTS TOGETHER INTO A SINGLE
LOGICAL INTERFACE.
• NOT ONLY DOES PORT AGGREGATION INCREASE THE BANDWIDTH OF A LINK, BUT IT
ALSO PROVIDES REDUNDANCY.
Benefits
1. Enhanced Performance.
2. Redundancy
3. Resiliency And Faster Convergence.
So once Again How did we
implement Ether Channel??
Switch(config)#interface range gigabitEthernet 0/1-2
Switch(config-if)#Switchport mode trunk
Switch(config-if)#Switchport nonnegotiable
Switch(config)#Channel-group 1 mode desirable
26.
27. FIBER-UPLINK
• TO HAVE A FIBER BACKBONE IS THE WISEST DECISION IN ANY ENTERPRISE
NETWORK DESIGN.
• WE HAVE IT IN THE CORE BACKBONE WHICH CONNECTS THE CORE ROUTER TO
THE DISTRIBUTION SWITCH.
• ALSO THE SEVERS OF ALL 3 SITES ARE NOW CONNECTED WITH A GIGABIT FIBER
TO THE NETWORK.
Benefits
1. High Availability
2. High Response time.
3. Increased Reliability
40. ACCESS-CONTROL LIST
ACCESS CONTROL LISTS (ACLS)CAN BE USED FOR
TWO PURPOSES ON NETWORKING DEVICES:
• TO FILTER TRAFFIC.
• TO LOCALIZE SPECIFIC TRAFFIC IN SPECIFIC
SUBNETS.
TYPES OF ACCESS LISTS:
• NUMBERED
• NAMED
• EXTENDED
• STANDARD
• ACCESS CONTROL LISTS WORKS IN A TOP DOWN
APPROACH
- A PERMIT STATEMENT IS USED TO ALLOW TRAFFIC
- A DENY STATEMENT IS USED TO BLOCK TRAFFIC.
COMMANDS :
- ROUTER(CONFIG) #IP ACCESS - LIST EXTENDED <NAME>
- ROUTER(CONFIG-EXT-NACL) #PERMIT IP HOST <SOURCE
IP> HOST <DESTINATION IP>
41.
42. SWITCH PORT SECURITY
• NO OTHER WORKSTATION CAN BE PLUGGED TO THE FASTETHERNET PORT.
• IF UNREGISTERED MAC PLUGGED IT WILL BE SHUTDOWN OR RESTRICTED.
Switch(config) #Interface fa 0/1
Switch(config) # Switchport port-security
Switch(config) # Switchport port-security mac-address sticky
43.
44. REMOTE ACCESS &
REMOTE ACCESS SECURITY:
• REMOTE ACCESS: TELNET (PORT 23)
• SECURE REMOTE ACCESS:
SSH VERSION 2 (PORT 22)
CONFIGURATION AS FOLLOWS:
Host identification (Using RSA-Keys)
Encryption (IDEA)
Authentication (RSA Challenge)
Router(config)# ip domain-name cisco.com
Router(config)# crypto key generate rsa
How many bits in the modulus [512]: 1024
% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]
Router(config)#exit
*Mar 1 0:4:8.988: %SSH-5-ENABLED: SSH 1.99 has been enabled
Router(config)#ip ssh version 2
Router(config)# username cisco password cisco
Router(config)# line vty 0 4
Router(config-line)# login local
Router(config-line)# transport input ssh
Router(config)#ip ssh time-out 90
Router(config)#ip ssh authentication-retries 2
45.
46.
47. ACCESS LISTS ( ACL )
ACCESS CONTROL LISTS (ACLS)CAN BE USED FOR TWO PURPOSES ON
NETWORKING DEVICES:
• TO FILTER TRAFFIC.
• TO LOCALIZE SPECIFIC TRAFFIC IN SPECIFIC SUBNETS.
TYPES OF ACCESS LISTS:
• NUMBERED
• NAMED
• EXTENDED
• STANDARD
51. RADIUS (REMOTE DIAL IN USER SERVICE)
• RADIUS IS A AAA PROTOCOL, SECURITY SYSTEM BASED ON AUTHENTICATION, AUTHORIZATION,
AND ACCOUNTING.
• CLIENT SERVER MODEL
• SHARED SECRET MUST BE SHARED BETWEEN CLIENT(ACCESS POINT) AND SERVER AND CLIENT MUST
BE CONFIGURED TO USE RADIUS SERVER TO GET SERVICE.
• RADIUS USES A CENTRALIZED SERVER THAT ALLOWS YOU TO DEFINE THE USERNAME AND
PASSWORD OF THE USERS BY WHICH THEY CAN LOGIN TO THEIR ACCOUNT BEFORE ACCESSING
THE NETWORK.
• RADIUS SERVER IS RESPONSIBLE FOR GETTING USER CONNECTION REQUESTS, AUTHENTICATING THE
USER AND THEN RETURNING ALL CONFIGURATION INFORMATION NECESSARY FOR THE CLIENT TO
DELIVER SERVICE TO THE USER.
• TRANSACTIONS BETWEEN CLIENT AND SERVER ARE AUTHENTICATED THROUGH THE USE OF A SHARED
KEY AND THIS KEY IS NEVER SENT OVER THE NETWORK.
• PASSWORD IS ENCRYPTED BEFORE SENDING IT OVER NETWORK USING WPA2
• HERE SECURITY IS FULLY DEPENDENT ON THE SEVER NOT THE ACCESS POINT, HENCE SECURITY
INCREASED.