• Quản trị mạng - Chương 3: Tầng transportQuản trị mạng - Chương 3: Tầng transport

    The following commands can be used to help verify frame relay configuration Show interfaces Show frame-relay lmi Show frame-relay pvc ### Show frame-relay map Use the following command to help troubleshoot a frame relay configuration Debug frame-relay lmi

    pdf110 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 1151 | Lượt tải: 0

  • Quản trị mạng - Chương 2: Lớp ứng dụng (application layer)Quản trị mạng - Chương 2: Lớp ứng dụng (application layer)

    Các chủ đề quan trọng:  Điều khiển với các thông điệp dữ liệu  in-band, out-of-band  Tập trung và không tập trung  Không trạng thái và có trạng thái  Truyền tin cậy và không tin cậy

    pdf107 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 1204 | Lượt tải: 0

  • Point - To - point protocol (ppp)Point - To - point protocol (ppp)

    PPP authentication PAP 2 way handshake CHAP 3 way handshake Use debug ppp authentication to confirm authentication configuration PPP configuration Done on a serial interface After PPP configuration, use show interfaces command to display: LCP state NCP state

    ppt28 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 1093 | Lượt tải: 0

  • Configure a switchConfigure a switch

    CISCO IOS CLI includes the following features Built in help Command history/options Switch security Password protection Use of SSH for remote access Port security

    ppt29 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 1057 | Lượt tải: 0

  • Living in a network centric worldLiving in a network centric world

    Describe basic measures to secure data networks Ensure confidentiality through use of User authentication Data encryption Maintain communication integrity through use of Digital signatures Ensure availability through use of Firewalls Redundant network architecture Hardware without a single point of failure

    ppt22 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 1014 | Lượt tải: 0

  • Quản trị mạng - Services in a converged wanQuản trị mạng - Services in a converged wan

    Cisco Enterprise Architecture This is an expansion of the hierarchical model that further divides the enterprise network into Physical areas Logical areas Functional areas Selecting the appropriate WAN technology requires considering some of the following: WAN’s purpose Geographic scope of WAN Traffic requirements If WAN uses a public or ...

    ppt18 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 920 | Lượt tải: 0

  • Quản trị mạng - Implementing the cisco adaptive security appliance (asa)Quản trị mạng - Implementing the cisco adaptive security appliance (asa)

    The management interface depends on the model of ASA: – Cisco ASA 5505 - The management switch port can be any port, except for Ethernet 0/0. – Cisco ASA 5510 and higher - The interface to connect is Management 0/0

    pdf50 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 1049 | Lượt tải: 0

  • Quản trị mạng - Chapter 9: Managing a secure networkQuản trị mạng - Chapter 9: Managing a secure network

    The security policy is an integral component of an organization’s network security design and implementation. It answers questions about what assets are to be protected and how to protect them. • A security policy typically consists of a goverming policy, a technical policy, and an end-user policy. • Standards, guidelines, and procedures cont...

    pdf82 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 1041 | Lượt tải: 0

  • Quản trị mạng - Chapter 8: Implementing virtual private networksQuản trị mạng - Chapter 8: Implementing virtual private networks

    Describe the purpose and operation of VPN types • Describe the purpose and operation of GRE VPNs • Describe the components and operations of IPsec VPNs • Configure and verify a site-to-site IPsec VPN with preshared key authentication using CLI • Configure and verify a site-to-site IPsec VPN with preshared key authentication using CCP • Configu...

    pdf124 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 1122 | Lượt tải: 1

  • Quản trị mạng - Chapter 7: Cryptographic systemsQuản trị mạng - Chapter 7: Cryptographic systems

    To authenticate each other, users have to obtain the certificate of the CA and their own certificate. These steps require the out-of-band verification of the processes. Public-key systems use asymmetric keys whe one is public and the other one is private. Key management is simplified because two users can freely exchange the certificates. Th...

    pdf104 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 1251 | Lượt tải: 0