EIGRP is a cisco proprietary, Advance distance vector, classless Interior gateway routing protocol.
Released in-1994.
It works on Network Layer of OSI Model.
It use the IP protocol no 88. (It doesn’t use TCP or UDP)
EIGRP AD – 90
Eigrp External routes AD – 170
EIGRP has a maximum hop-count of 224, though the default maximum hop-count is set to 100
A VPN (Virtual Private Network) extends a private network across a public network, such as the
Internet.
A VPN is a network that uses a public telecommunication infrastructure, such as the Internet, to provide
remote offices or individual users with secure access to their organization's network. A VPN ensures
privacy through security procedures and tunneling protocols such as the Layer Two Tunneling Protocol
(L2TP). Data is encrypted at the sending end and decrypted at the receiving end.
IPSec: настройка туннеля с шифрованием между двумя Mikrotikmikrotik-training
Привет!
В этот раз мы будем настраивать туннель между 2-мя роутерами Mikrotik. Разберемся с механизмом генерации ключей, конфигурацией процедур шифрования, режимами шифрования и многими другими нюансами.
Я расскажу о том, с какими нюансами приходится сталкиваться при настройке IPSec: какие трудности могут поджидать и как их обойти.
Marek Isalski, Faelix.net Ltd, describes the MikroTik range of routers and their applications, gives a pros and cons summary, and recommendations for budget provider edge deployment.
The document outlines the steps taken to design, configure, and test a network topology in Packet Tracer:
1. An addressing scheme was designed allocating subnets and IP addresses for three LANs and two WAN links based on host requirements.
2. Equipment was selected and devices were cabled according to the topology. Routers and PCs were configured with IP addresses.
3. Initial testing showed no layer 3 connectivity due to the lab defaulting to RIP v2 which was not enabled. RIP v2 was configured on the routers to allow routing updates and full connectivity was achieved.
This document provides an overview and agenda for a MikroTik Certified Network Associate (MTCNA) training course. The training will cover RouterOS software and RouterBoard hardware capabilities, configuration, maintenance, and troubleshooting over two 3.5 hour sessions with breaks. Attendees will learn about MikroTik as a router and wireless hardware manufacturer, the history and features of RouterOS and RouterBOARD devices, and hands-on configuration including firewalls, bandwidth management, and more.
EIGRP is a cisco proprietary, Advance distance vector, classless Interior gateway routing protocol.
Released in-1994.
It works on Network Layer of OSI Model.
It use the IP protocol no 88. (It doesn’t use TCP or UDP)
EIGRP AD – 90
Eigrp External routes AD – 170
EIGRP has a maximum hop-count of 224, though the default maximum hop-count is set to 100
A VPN (Virtual Private Network) extends a private network across a public network, such as the
Internet.
A VPN is a network that uses a public telecommunication infrastructure, such as the Internet, to provide
remote offices or individual users with secure access to their organization's network. A VPN ensures
privacy through security procedures and tunneling protocols such as the Layer Two Tunneling Protocol
(L2TP). Data is encrypted at the sending end and decrypted at the receiving end.
IPSec: настройка туннеля с шифрованием между двумя Mikrotikmikrotik-training
Привет!
В этот раз мы будем настраивать туннель между 2-мя роутерами Mikrotik. Разберемся с механизмом генерации ключей, конфигурацией процедур шифрования, режимами шифрования и многими другими нюансами.
Я расскажу о том, с какими нюансами приходится сталкиваться при настройке IPSec: какие трудности могут поджидать и как их обойти.
Marek Isalski, Faelix.net Ltd, describes the MikroTik range of routers and their applications, gives a pros and cons summary, and recommendations for budget provider edge deployment.
The document outlines the steps taken to design, configure, and test a network topology in Packet Tracer:
1. An addressing scheme was designed allocating subnets and IP addresses for three LANs and two WAN links based on host requirements.
2. Equipment was selected and devices were cabled according to the topology. Routers and PCs were configured with IP addresses.
3. Initial testing showed no layer 3 connectivity due to the lab defaulting to RIP v2 which was not enabled. RIP v2 was configured on the routers to allow routing updates and full connectivity was achieved.
This document provides an overview and agenda for a MikroTik Certified Network Associate (MTCNA) training course. The training will cover RouterOS software and RouterBoard hardware capabilities, configuration, maintenance, and troubleshooting over two 3.5 hour sessions with breaks. Attendees will learn about MikroTik as a router and wireless hardware manufacturer, the history and features of RouterOS and RouterBOARD devices, and hands-on configuration including firewalls, bandwidth management, and more.
Контроль сайтов и пользователей на Mikrotik: кто куда ходитmikrotik-training
Mikrotik для контроля сетевого трафика пользователей: составляем отчеты о пользователях и сайтах.
На вебинаре мы разберем, каким образом решить часто задаваемую задачу: как определить, кто из пользователей куда ходит и на каких сайтах проводит рабочее время.
Для данного метода есть несколько разноплановых подходов:
— Использование специализированных DNS-сервисов (быстро, дешево, неточно)
— Использование встроенного Proxy-Сервера в Mikrotik (дешево, сложно, мало данных)
— Использование Mikrotik в паре с SQUID прокси (сложно, круто, много данных, много возможностей)
На вебинаре мы разберем все три метода и подробно остановимся на третьем методе. Покажем, как это реализовать в своей компании.
Networking connects two or more computers to share resources. It involves client computers that access shared resources from server computers via communication links and network interface cards. Common network types include personal area networks (PANs) for connecting devices near a single user, local area networks (LANs) for connecting devices within an office or building, and wide area networks (WANs) for connecting sites over long distances. Network topologies determine how devices are arranged and connected in a network.
This document provides an overview of networking concepts including routing protocols. It begins with an introduction and explanation of common networking terms like routers, switches, servers and IP addressing. The document then focuses on routing protocols, describing different types like static, default, dynamic routing protocols and examples like RIP, EIGRP, OSPF. It provides details on each protocol's functionality and purpose in routing network traffic between devices.
VPN allows for secure communication over public networks through tunneling protocols like PPTP, L2TP, and IPsec. There are three main types of VPN implementations: intranet within an organization, extranet between an organization and outside users, and remote access for mobile users. VPNs provide advantages like reducing costs of long-distance lines and charges while allowing flexibility and efficiency. However, they also have disadvantages like requiring expertise in security issues and performance depending on external factors. Industries like healthcare, manufacturing, retail, and banking commonly use VPNs to securely transfer private information between locations.
Webinar topic: BGP tuning: Peer with loopback
Presenter: Achmad Mardiansyah
In this webinar, we discussed BGP tuning: peer with loopback. a loopback interface is a virtual interface, which is always ON and will not be affected by physical status. therefore it is very useful to use it as a peering parameter to ensure high availability of BGP peer.
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording is available on youtube:
https://youtu.be/tRW1xQDtH7w
This ppt includes what is wireless hacking, types of wi-fi eg,wep,wpa,wpa/psk and terms related to it .this also conclude how to crack the wireless hacking ,the tools and commands required for it. this is very usefull . catch it..... :)
MSTP divides a bridged network into multiple regions called MST regions. Within each region, multiple RSTP instances called MSTIs are enabled to map VLANs and build separate spanning trees. A representative bridge in each region communicates with representatives of other regions to form a common spanning tree (CST) that connects all the MST regions as a single spanning tree across the entire network.
Este documento presenta una introducción a IPv6. Explica las características y beneficios de IPv6 como su mayor espacio de direcciones de 128 bits. Describe el formato de las direcciones IPv6 y los diferentes tipos como unicast, anycast y multicast. También cubre temas como la asignación de direcciones mediante DHCPv6, los mensajes de control ICMPv6, la resolución de nombres DNS y el protocolo de descubrimiento de vecinos NDP. El objetivo es proporcionar una visión general de los conceptos básicos de IPv6.
This document contains the slides for a webinar on Mikrotik RouterOS presented by GLC Networks. The webinar covers an introduction to RouterOS, its features, and a live practice session. It begins with reviewing prerequisite networking knowledge like the OSI model, TCP/IP protocols, routing tables, and network devices. It then introduces Mikrotik as a company and product line, and dives into the features and capabilities of RouterOS. The presentation concludes by advertising GLC Network's training courses and inviting questions.
BGP Flow Specification allows network operators to define and distribute traffic filtering rules via BGP. This helps operators quickly mitigate DDoS attacks by filtering traffic at an upstream level rather than just blackholing entire prefixes. It separates filtering information from routing data using new BGP address families. Validating flow specifications against the best unicast route helps prevent spoofing. Common filtering actions include traffic policing, sampling, and redirection. While some ISPs have begun implementations, widespread adoption is still needed to realize the benefits of centralized DDoS defense using BGP Flow Specification.
This document provides an overview of a project report on Voice over Internet Protocol (VoIP) submitted by two students, Amardeep Singh and Jaswinder Singh, at Chandigarh Engineering College in partial fulfillment of their B-Tech degree in Electronics and Communication Engineering. The report introduces VoIP technology, discusses software and hardware used in the project including Cisco routers and switches, and provides details on configuring an IP phone network with Cisco Call Manager Express including assigning IP addresses via DHCP and configuring phone directory numbers. Future enhancements discussed include integrating VoIP with wireless networks.
This document provides an overview of managing a Cisco network. It discusses CCNA certification which validates skills in installing, configuring, operating and troubleshooting switched and routed networks. It also covers topics like internetworking which connects different networks, IP addressing classes, subnetting to increase networks, routing protocols like RIP, EIGRP, OSPF, switching, VLANs, interVLAN routing, and STP to prevent network loops.
The document provides information about the CCNA certification course. It discusses that CCNA is a popular certification course developed by Cisco that certifies skills in network fundamentals, networking concepts, security, automation and more. It can help candidates get jobs as network administrators, engineers, and other networking roles. The document outlines the topics covered in the CCNA course and lists the most common employers of CCNA certified professionals.
The document discusses the development of 5G identity and access management (IAM) architecture with a user-centric view. Key points include transitioning to a service-based architecture, defining the basic concept of user identity in 5G with relationships between users, identities and attributes, and developing a 5G user-centric authentication layer and use cases. Authorization of network functions and third-party applications is based on OAuth 2.0 and identity management for mission critical services uses OpenID Connect.
The document discusses Automatic Private Internet Protocol Address (APIPA), which enables devices to self-configure with a private IP address in the 169.254.0.0/16 range when a DHCP server is unavailable. It explains that APIPA is enabled by default in Windows and can be disabled by editing the registry, and outlines how APIPA works to allow devices to communicate on a local area network when DHCP fails. The disadvantages of APIPA are that addresses are only for local use and it does not provide a network gateway address.
Контроль сайтов и пользователей на Mikrotik: кто куда ходитmikrotik-training
Mikrotik для контроля сетевого трафика пользователей: составляем отчеты о пользователях и сайтах.
На вебинаре мы разберем, каким образом решить часто задаваемую задачу: как определить, кто из пользователей куда ходит и на каких сайтах проводит рабочее время.
Для данного метода есть несколько разноплановых подходов:
— Использование специализированных DNS-сервисов (быстро, дешево, неточно)
— Использование встроенного Proxy-Сервера в Mikrotik (дешево, сложно, мало данных)
— Использование Mikrotik в паре с SQUID прокси (сложно, круто, много данных, много возможностей)
На вебинаре мы разберем все три метода и подробно остановимся на третьем методе. Покажем, как это реализовать в своей компании.
Networking connects two or more computers to share resources. It involves client computers that access shared resources from server computers via communication links and network interface cards. Common network types include personal area networks (PANs) for connecting devices near a single user, local area networks (LANs) for connecting devices within an office or building, and wide area networks (WANs) for connecting sites over long distances. Network topologies determine how devices are arranged and connected in a network.
This document provides an overview of networking concepts including routing protocols. It begins with an introduction and explanation of common networking terms like routers, switches, servers and IP addressing. The document then focuses on routing protocols, describing different types like static, default, dynamic routing protocols and examples like RIP, EIGRP, OSPF. It provides details on each protocol's functionality and purpose in routing network traffic between devices.
VPN allows for secure communication over public networks through tunneling protocols like PPTP, L2TP, and IPsec. There are three main types of VPN implementations: intranet within an organization, extranet between an organization and outside users, and remote access for mobile users. VPNs provide advantages like reducing costs of long-distance lines and charges while allowing flexibility and efficiency. However, they also have disadvantages like requiring expertise in security issues and performance depending on external factors. Industries like healthcare, manufacturing, retail, and banking commonly use VPNs to securely transfer private information between locations.
Webinar topic: BGP tuning: Peer with loopback
Presenter: Achmad Mardiansyah
In this webinar, we discussed BGP tuning: peer with loopback. a loopback interface is a virtual interface, which is always ON and will not be affected by physical status. therefore it is very useful to use it as a peering parameter to ensure high availability of BGP peer.
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording is available on youtube:
https://youtu.be/tRW1xQDtH7w
This ppt includes what is wireless hacking, types of wi-fi eg,wep,wpa,wpa/psk and terms related to it .this also conclude how to crack the wireless hacking ,the tools and commands required for it. this is very usefull . catch it..... :)
MSTP divides a bridged network into multiple regions called MST regions. Within each region, multiple RSTP instances called MSTIs are enabled to map VLANs and build separate spanning trees. A representative bridge in each region communicates with representatives of other regions to form a common spanning tree (CST) that connects all the MST regions as a single spanning tree across the entire network.
Este documento presenta una introducción a IPv6. Explica las características y beneficios de IPv6 como su mayor espacio de direcciones de 128 bits. Describe el formato de las direcciones IPv6 y los diferentes tipos como unicast, anycast y multicast. También cubre temas como la asignación de direcciones mediante DHCPv6, los mensajes de control ICMPv6, la resolución de nombres DNS y el protocolo de descubrimiento de vecinos NDP. El objetivo es proporcionar una visión general de los conceptos básicos de IPv6.
This document contains the slides for a webinar on Mikrotik RouterOS presented by GLC Networks. The webinar covers an introduction to RouterOS, its features, and a live practice session. It begins with reviewing prerequisite networking knowledge like the OSI model, TCP/IP protocols, routing tables, and network devices. It then introduces Mikrotik as a company and product line, and dives into the features and capabilities of RouterOS. The presentation concludes by advertising GLC Network's training courses and inviting questions.
BGP Flow Specification allows network operators to define and distribute traffic filtering rules via BGP. This helps operators quickly mitigate DDoS attacks by filtering traffic at an upstream level rather than just blackholing entire prefixes. It separates filtering information from routing data using new BGP address families. Validating flow specifications against the best unicast route helps prevent spoofing. Common filtering actions include traffic policing, sampling, and redirection. While some ISPs have begun implementations, widespread adoption is still needed to realize the benefits of centralized DDoS defense using BGP Flow Specification.
This document provides an overview of a project report on Voice over Internet Protocol (VoIP) submitted by two students, Amardeep Singh and Jaswinder Singh, at Chandigarh Engineering College in partial fulfillment of their B-Tech degree in Electronics and Communication Engineering. The report introduces VoIP technology, discusses software and hardware used in the project including Cisco routers and switches, and provides details on configuring an IP phone network with Cisco Call Manager Express including assigning IP addresses via DHCP and configuring phone directory numbers. Future enhancements discussed include integrating VoIP with wireless networks.
This document provides an overview of managing a Cisco network. It discusses CCNA certification which validates skills in installing, configuring, operating and troubleshooting switched and routed networks. It also covers topics like internetworking which connects different networks, IP addressing classes, subnetting to increase networks, routing protocols like RIP, EIGRP, OSPF, switching, VLANs, interVLAN routing, and STP to prevent network loops.
The document provides information about the CCNA certification course. It discusses that CCNA is a popular certification course developed by Cisco that certifies skills in network fundamentals, networking concepts, security, automation and more. It can help candidates get jobs as network administrators, engineers, and other networking roles. The document outlines the topics covered in the CCNA course and lists the most common employers of CCNA certified professionals.
The document discusses the development of 5G identity and access management (IAM) architecture with a user-centric view. Key points include transitioning to a service-based architecture, defining the basic concept of user identity in 5G with relationships between users, identities and attributes, and developing a 5G user-centric authentication layer and use cases. Authorization of network functions and third-party applications is based on OAuth 2.0 and identity management for mission critical services uses OpenID Connect.
The document discusses Automatic Private Internet Protocol Address (APIPA), which enables devices to self-configure with a private IP address in the 169.254.0.0/16 range when a DHCP server is unavailable. It explains that APIPA is enabled by default in Windows and can be disabled by editing the registry, and outlines how APIPA works to allow devices to communicate on a local area network when DHCP fails. The disadvantages of APIPA are that addresses are only for local use and it does not provide a network gateway address.
2. Що е то VPN?
VPN – (Virtual Private Network или виртуална частна
мрежа) представлява логически създадена
компютърна мрежа между две точки, която използва
интернет или други публични мрежи като криптира
трафика между точките които свързва или като
създава логически "тунел" между точките.
3. Какво позволява VPN?
VPN позволява връзката между:
• Офиси (клонове на основния)
• Телекомуникативни служители
• Представители на фирмата
• Други потребители
4. VPN Протоколи
• - Тунелен протокол (VPN протокол) -
използва се за изграждане на тунела.
• - Протокол за криптиране (протокол за
сигурност) - използва се за сигурност на
данни.
• - Мрежов/транспортен протокол (LAN
протокол) - използва се за комуникация по
частната мрежа.
5. Ето и някой от тях...
• IPsec - протокол, ESP- тунелиращ мод — може да
бъде използван за отдалечен достъп и в локална
мрежа.
• L2TP - използван само за отдалечен достъп
• L2F - тунелиращ протокол
• PPTP протокол на Microsoft изполващ Point-to-Point
криптиране на Microsoft
• SSL VPN, чрез което се предоставя достъп до
ресурсите на информационната система на
компанията чрез криптирана връзка, все пак пакети
не се транспортират в мрежата на организацията
6. Видове VPN мрежи
1. Access VPNs – осигуряват отдалечен
достъп за служители, които са
постоянно в движение и за оffice/home
office (SOHO) към интранета или
екстранета на компанията
7. Видове VPN мрежи
2. Intranet VPNs– Intranet VPNs
осигуряват връзка на местните и
отдалечените офиси с вътрешната мрежа
посредством обща инфраструктура,
използвайки арендовани линии.
8. Видове VPN мрежи
3. Extranet VPNs– Extranet VPNs
свързват бизнес партньорите с
компанията посредством обща
инфраструктура, използвайки
арендовани линии.
9. Добре проектирания VPN може да
предостави следните услуги:
• Свързаност между физически разделени
места.
• Подобрена сигурност.
• Ниски разходи за поддръжка на мрежата.
• Подобрена продуктивност.
• Проста мрежова топология.
• Възможност за пренос на глас и видео.
• По – бърза възвръщаемост на инвестициите.
10. Недостатъци на VPN
1. Повишени инвестиционни разходи, свуързани с промяна на
предприемаческата структура.
2. Подложена е на общите атаки, характерни за една публична
мрежа.
3. необходима е координация на политиката по сигурността с
останалите участници в VPN
11. Предимства на VPN
1. Повишена сигурност и надежност
2. Посредтвом иновация може да се
стимулират бъдещите инвестиции.
3. Повишена защита за корпоративни
сайтове
4. Свързва отдалечени dail up
потребители към корпоративните мрежи.
5. Позволява да комуникирате сигурно в
рамките на собствения си отдел.
12. Предимства на VPN
6. По-евтин е от 20 до 70% от взетите под лизинг
линии и dailup връзките.
7. Подобрява комуникацията между персонала,
клиентите и бизнес партньорите.
8. Предоставя защита посредством:
- Конфиденциалност
- Автентификация
- Цялостност