• Understanding switch securityUnderstanding switch security

    The first level of security is physical. Passwords can be used to limit access to users that have been given the password. The login banner can be used to display a message before the user is prompted for a username. Telnet sends session traffic in cleartext; SSH encrypts the session traffic. Port security can be used to limit MAC addresses t...

    ppt12 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 875 | Lượt tải: 0

  • Basic switch configurationBasic switch configuration

    Displays the configuration of the system hardware, software version, names and sources of configuration files, and boot images Displays the current active configuration file of the switch Displays statistics for all interfaces configured on the switch

    ppt19 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 865 | Lượt tải: 0

  • Ethernet switchEthernet switch

    Station D sends a frame to station C. Switch caches the MAC address of station D to port E3 by learning the source address of data frames. The frame from station D to station C is flooded out to all ports except port E3 (unknown unicasts are flooded).

    ppt20 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 824 | Lượt tải: 0

  • Using the cisco sdmUsing the cisco sdm

    Cisco SDM is a useful tool for configuring Cisco access routers. Cisco SDM contains several easy-to-use wizards for efficient configuration of Cisco access routers. Cisco SDM allows you to customize Cisco access router configurations using advanced features.

    ppt14 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 830 | Lượt tải: 0

  • Dhcp and arpDhcp and arp

    Cisco IOS Software includes a full DHCP server implementation: Assigns IP addresses from specified address pools within the router Can be configured to assign the IP address of these components: Domain Name System (DNS) server Default router

    ppt20 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 925 | Lượt tải: 1

  • Transitioning to ipv6Transitioning to ipv6

    Transition richness means: No fixed day to convert; no need to convert all at once Different transition mechanisms are available: Dual stack Manual tunnel 6to4 tunnel ISATAP tunnel Teredo tunnel Different compatibility mechanisms: Proxying and translation (NAT-PT)

    ppt30 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 820 | Lượt tải: 0

  • Establishing a wan connection with frame relayEstablishing a wan connection with frame relay

    Point-to-point Subinterfaces act like leased lines. Each point-to-point subinterface requires its own subnet. Point-to-point is applicable to hub-and-spoke topologies. Multipoint Subinterfaces act like NBMA networks, so they do not resolve the split-horizon issues. Multipoint can save address space because it uses a single subnet. Multipoi...

    ppt27 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 871 | Lượt tải: 0

  • Establishing a point - To - point wan connection with pppEstablishing a point - To - point wan connection with ppp

    This is an example of the Santa Cruz router authenticating to the HQ router. Hash values, not actual passwords, are sent across the link. The local router or external server is in control of authentication attempts.

    ppt19 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 833 | Lượt tải: 0

  • Scaling the network with nat and patScaling the network with nat and pat

    There are three types of NAT: static, dynamic, and overloading (PAT). Static NAT is one-to-one address mapping. Dynamic NAT addresses are picked from a pool. NAT overloading (PAT) allows you to map many inside addresses to one outside address. Use the show ip nat translation command to display the translation table and verify that translation...

    ppt26 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 842 | Lượt tải: 0

  • Constructing a network addressing schemeConstructing a network addressing scheme

    Follow these steps to determine the subnetwork and host addresses using a subnet mask: Write the octet being split in binary. Write the mask in binary and draw a line to delineate the significant bits. Cross out the mask so you can view the significant bits. Copy the subnet bits four times. Define the network address by placing all zeroes in t...

    ppt22 trang | Chia sẻ: nguyenlam99 | Ngày: 09/01/2019 | Lượt xem: 823 | Lượt tải: 0