LVA Syllabus Part 1
|
|
- Megan Bond
- 8 years ago
- Views:
Transcription
1 LVA Syllabus Part 1 Written by: Heimo Zeilinger Network Simulation and Configuration The aim of the laboratory course Part 1 is to get an overview on the configuration of network components (switches, routers, network interface cards) as well as the configuration of a Layer-2 network protocol (RSTP) on a predefined network structure see Figure 1. The course is evaluated by the completion of the tasks as well as a documentation of the work. Traffic sink Manage-PC Domain: ict.tuwien.ac.at PC eth2 MAC: 00:1B:11:19:B2:17 IP: t.b.d. : management-pc (Ubuntu 7.04) MAC: 00:18:4D:D3:97:9D IP: IP: MAC: 00:18:4D:D3:97:9D IP: Netgear GSM7312 Virtual Router / VRRP Netgear GSM7312 MAC: 00:18:4D:D3:97:9D IP: MAC: 00:18:4D:D3:96:1D IP: : RTR1 managed Layer 3 switch IP: : RTR2 managed Layer 3 switch L5 L7 L8 L6 Dell PowerConnect 3424 MAC: 00:19:B9:AD:0C:6A IP: Dell PowerConnect 3424 MAC: 00:19:B9:AC:FD:1F IP: : managed switch SWI3 : managed switch SWI4 L1 L3 Netgear FS105 : non-managed switch SWI1 Hostname: PC-s0 Domain: ict.tuwien.ac.at PC eth1 MAC: 00:14:6C:76:53:80 IP: : test-pc (Ubuntu 7.04) VCX-i Traffic generator Figure 1 Proposed network structure Fehler! Verweisquelle konnte nicht gefunden werden. shows the test network which consists of the host systems (PC-S0, MANAGE-PC) and the network nodes (SWI1, SWI2, SWI3, SWI4, RTR1, RTR2).The MANAGE-PC represents the traffic sink and simulates the Seite 1 von 9 Druckdatum:
2 backbone network. The host PC-S0 represents the traffic generators. The host and node configuration is listed in the Appendix A. One Layer-2 switch (SWI1), two managed Layer-2 switches (SWI3, SWI4), and two Layer-3 switches (RTR1, RTR2) complete the network. PC- S0 and the MANAGE-PC run Linux Ubuntu SWI1 and SWI2 are unmanaged switches. Network configuration Prepare the redundant network structure proposed in Figure 1 (Subnet addresses are optional use addresses regarding the private IP address space) Configure the network nodes as well as the end-systems Establish a connection between PC-s0 and Manage-PC (proof by ping each network node as well as end system) Observe the network behavior in case of shutting down the root node. Additional exercise: Configure the Virtual Router Redundancy Protocol (VRRP) for RTR1 and RTR2. Configure the network the way that RTR1 and RTR2 seem to be a virtual router for the Manage-PC. Test the failover behavior by transmitting a UDP stream through the network and shutting down the root node as well as one link of the main path. The host PC-S0 is used as traffic source which sends a continuous traffic stream to the Manage-PC the appropriate scripts are already written and will be explained on site. Failover times and packets are analyzed by the use of the packet sniffer Wireshark. Proposed procedure 1. Start the engines ;-) 2. Connect the network nodes to the network structure proposed in Figure Login to the Manage-PC, the PC-S0 as well as the managed network nodes. PC-S0 and managed network nodes are reachable from the Manage-PC (The tool Minicom is used for this task) user and pw are provided on site. 4. Look at the IP-settings. Ensure that nodes and end-systems are in the same sub-net. 5. Configure RSTP for all manageable nodes 6. Set the appropriate routes at the end-systems 7. Test the connection between Manage-PC and PC-S0 8. Shut down the root node the root node can be determined by a look at the configuration table. Evaluate the network behavior. Additional tasks 1. Put the Manage-PC to a different sub-network 2. Configure VRRP on both Layer-3 switches (RTR1, RTR2) 3. Check the connection between PC-S0 and Manage-PC 4. Measure the convergence time of the network due to shutting down the root node as well as the links which form the used transmission route In Appendix C, required Linux commands are listed. Examples for a network node configuration is listed in Appendix D. Good Luck! Seite 2 von 9 Druckdatum:
3 Appendix A Network components All nodes are listed in context to their notation in Fehler! Verweisquelle konnte nicht gefunden werden.. For the manuals, please look at the LVA homepage - Node Configuration RTR1 Serial Number MAC-Address (burned in) Software Bootcode GSM7312 L3 Managed Gigabit Switch GSM7312 1C22725B :18:4D:D3:97:9D RTR2 Serial Number MAC-Address (burned in) Software GSM7312 L3 Managed Gigabit Switch Netgear GSM7312 1C22725B :18:4D:D3:96:1D SWI4 Managed Layer-2 Switch Dell PowerConnect 3424 Serial Number MAC-Address (burned in) Software SWI3 00:19:b9:ad:0c:6a Managed Layer-2 Switch Dell PowerConnect 3424 Serial Number MAC-Address (burned in) Software SWI2 00:19:b9:ac:fd:1f Serial Number Ethernet Switch Netgear ProSafe 5 Port 10/100 Fs105 v2 1D51763R03567 Seite 3 von 9 Druckdatum:
4 SWI1 Serial Number Ethernet Switch Netgear ProSafe 5 Port 10/100 Fs105 v2 1D51763R03595 Host Configuration PC-S0 Ubuntu 7.04 Operating system Debian version 4.0 Kernel generic GCC version (Ubuntu ubuntu4) CPUs Processor 0 Vendor GenuineIntel CPU family 6 name Genuine Intel(R) CPU 1.66GHz CPU MHz Cache size 2048 KB Processor 1 Vendor GenuineIntel CPU family 6 14 name Genuine Intel(R) CPU 1.66GHz CPU MHz Hardware FSB Cache size 2048 KB RAM 1 GB Network interfaces eth0 AOPEN Inc. Intel Corporation 82573L Gigabit Ethernet Controller IP address MAC address Hostname 00:01:80:63:FD:CF volare-s0.ict.tuwien.ac.at eth1 D-Link System Inc DFE-530TX rev A VIA Technologies, Inc. VT6102 [Rhine-II] (rev 43) IP address MAC address 00:1B:11:19:B0:42 Seite 4 von 9 Druckdatum:
5 eth2 D-Link System Inc DFE-530TX rev C VIA Technologies, Inc. VT6105 [Rhine-III] (rev 86) IP address t. b. d. MAC address 00:50:BA:FA:C8:C1 Manage-PC Ubuntu 7.04 Operating system Debian version 4.0 Kernel generic GCC version (Ubuntu ubuntu4) CPU Vendor AuthenticAMD CPU family 6 8 name AMD Athlon(TM) XP CPU MHz Cache size 256 KB FSB RAM Network interfaces 512MB eth0 ASUSTeK Computer Inc. VIA Technologies, Inc. VT6102 [Rhine-II] (rev 74) Hardware IP address MAC address 00:0E:A6:92:61:16 Hostname volare-pc.ict.tuwien.ac.at eth1 D-Link System Inc DFE-530TX rev C VIA Technologies, Inc. VT6105 [Rhine-III] (rev 86) IP address - MAC address 00:05:5D:7B:4D:AB eth2 D-Link System Inc DFE-530TX rev C VIA Technologies, Inc. VT6105 [Rhine-III] (rev 86) IP address MAC address 00:1B:11:19:B2:17 Seite 5 von 9 Druckdatum:
6 Appendix B Protocols Rapid Spanning Tree Protocol The Spanning Tree Protocol ensures a loop-free topology for a bridged Local Area Network and works on the base of OSI layer-2. STP allows including redundant links in order to provide automatic backup paths in case of link failures. Bridge loops are avoided. It is defined in the IEEE Standard 802.1D. The Rapid Spanning Tree Protocol (RSTP) IEEE standard 802.1w represents an evolution of STP and provides faster spanning tree convergence. For more information on RSTP please look at Virtual Router Redundancy Protocol The Virtual Router Redundancy Protocol (VRRP) is a non-proprietary redundancy protocol described in RFC 3768, designed to deal with the single hop problem. Like it is explained above, in order to achieve higher network availability, the network structure shows a redundant design. However, the network gateway forms a single point of failure. Hence the VRRP is designed for combining n routers to a virtual router (formed out of master and backup routers) the network gateway is formed by n routers, which seems to be one single router to the provider network as well as the end system. A short introduction to VRRP can be found on the CISCO homepage shtml Seite 6 von 9 Druckdatum:
7 Appendix C Basic Linux Commands A lot of lists on basic Linux commands are placed in the www. One example is the list on If you do not have any experience in Linux you may consider working through such a page. As a start the basic commands should suffice. Network configuration commands The basic commands for network configuration are listed below. For specific information, please look at man XY ping traceroute ip ip route show shows the manual page of any command XY sends echo requests to the host you specify on the command line, and lists the responses received their round trip time. shows the route of a packet. It attempts to list the series of hosts through which your packets travel on their way to a given destination. used to assign IP addresses to interfaces (eth0, lo, ), setting up and displaying the TCP/IP configuration. It replaces the commands ifconfig and route in newer Linux distributions shows all specified routes ip addr add <ip-addr>/24 dev eth0 ip addr del <ip-addr> dev eth0 ip route add /24 dev eth0 ip route add default via ip route delete /24 dev eth0 adds an ip-address to the interface eth0. /24 shows specifies the subnet prefix. /24 accords to the subnet deletes an ip-address sets a route to the Locally Connected Network eth0 sets a default route deletes route from table ifconfig optional command to ip to show the network interface configuration and to configure them Examples: ifconfig ethxy down ifconfig ethxy up deactivates the interface XY activates the interface XY ifconfig ethxy a.b.c.d netmask assigns the IP address a.b.c.d to the network interface ethxy and specifies the sub-netmask route configures the routing information for the kernel this is needed if the sink is not placed in the same sub-net as any interface. It allows to manually set network table entries Examples: route add default gw xy route add -net x netmask eth0 route del x netmask eth0 route -n sets the default gateway adds a route to the network x via "eth0". deletes the specified route lists all routes with numerical addresses Seite 7 von 9 Druckdatum:
8 Appendix D Node Configuration This part gives a short introduction on the configuration of a network node. As example the configuration of RSTP on the managed Layer-2 Switch Dell PowerConnect 3424 is given. Even the user interface of the managed Layer-2 and the Layer-3 switches differs, it is similar to handle. Please, look at the manuals for the commands see On the command line of the Manage-PC type minicom ttyusb1 Minicom is a text-based modem control and terminal emulation program for Unix-like perating systems. The serial port of the managed switch is assigned to ttyusb1. Below, the assignment of all network nodes is listed Network Node SWI3 SWI4 RTR1 RTR2 Name ttyusb1 ttyusb2 ttyusb3 ttyusb4 After connecting to the switch, the switch s user interface appears. Username and password will be given on site. Type (SWI3) >enable to reach the administration mode. With the command? all possible commands, which can be invoked from the current mode, are listed. With the command SWI3# show running-config you can have a look at the current system settings; IP settings included. SWI3# show? shows all possible commands and configuration settings for the command show. The same applies for all commands. With the command SWI3# configure the global configuration mode is reached. With the command exit you can return to the previous configuration mode. To change the nodes IP-address SWI3 (config-if)# ip address To enable spanning-tree functionality, type SWI3 (config) # spanning-tree With the command no spanning-tree, the spanning-tree functionality is turned off. The spanning- tree mode RSTP is chosen by SWI3 (config) # spanning-tree mode rstp Make sure that the different protocol timers for RSTP (hello-time, forward-time, max-age) are set to the same value on each network node. Set the timers to the minimum. SWI3 (config)# spanning-tree forward-time 25 SWI3 (config)# spanning-tree hello-time 5 SWI3 (config)# spanning-tree max-age 10 Seite 8 von 9 Druckdatum:
9 Set the priority for all nodes to the same value. SWI3 (config)# spanning-tree priority 4096 After returning to the admin mode, you are able to verify spanning-tree settings with SWI3 # show spanning-tree or SWI3 # show spanning-tree detail Restarting the devices is executed through the following command: SWI3# reload Seite 9 von 9 Druckdatum:
LAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
More informationTHE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering
THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG 224 Information Technology Laboratory 6: Internet Connection Sharing Objectives: Build a private network that
More informationCCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network
CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network Olga Torstensson SWITCHv6 1 Components of High Availability Redundancy Technology (including hardware and software features)
More informationA New Approach to Developing High-Availability Server
A New Approach to Developing High-Availability Server James T. Yu, Ph.D. School of Computer Science, Telecommunications, and Information Systems DePaul University jyu@cs.depaul.edu ABSTRACT This paper
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with
More informationCHAPTER 10 LAN REDUNDANCY. Scaling Networks
CHAPTER 10 LAN REDUNDANCY Scaling Networks CHAPTER 10 10.0 Introduction 10.1 Spanning Tree Concepts 10.2 Varieties of Spanning Tree Protocols 10.3 Spanning Tree Configuration 10.4 First-Hop Redundancy
More informationObjectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Explain the role of redundancy in a converged
More informationCisco Networking Academy CCNP Multilayer Switching
CCNP3 v5 - Chapter 5 Cisco Networking Academy CCNP Multilayer Switching Implementing High Availability in a Campus Environment Routing issues Hosts rely on a router to find the best path Issues with established
More informationPerformance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
More informationHow To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
More informationTCP/IP Network Essentials. Linux System Administration and IP Services
TCP/IP Network Essentials Linux System Administration and IP Services Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of the Internet are
More informationObjectives. Explain the Role of Redundancy in a Converged Switched Network. Explain the Role of Redundancy in a Converged Switched Network
Implement Spanning Tree Protocols LAN Switching and Wireless Chapter 5 Objectives Explain the role of redundancy in a converged network Summarize how STP works to eliminate Layer 2 loops in a converged
More informationAbstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved.
Configuring Single Instance Rapid Spanning Tree Protocol (RSTP) between an Avaya C360 Converged Switch and HP ProCurve Networking Switches to support Avaya IP Telephony Issue 1.0 Abstract These Application
More informationAT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch. Software Release Notes
AT-S60 Version 1.1.4 Management Software for the AT-8400 Series Switch Supported Platforms Software Release Notes Please read this document before you begin to use the AT-S60 management software. The AT-S60
More informationNote: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
More informationChapter 3. Enterprise Campus Network Design
Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This
More informationLab 4.5.4 Diagramming External Traffic Flows
Lab 4.5.4 Diagramming External Traffic Flows Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 R2 R3 FC-CPE-1 FC-CPE-2 ISP Fa0/1 172.17.0.1
More information1 PC to WX64 direction connection with crossover cable or hub/switch
1 PC to WX64 direction connection with crossover cable or hub/switch If a network is not available, or if it is desired to keep the WX64 and PC(s) completely separated from other computers, a simple network
More informationSwitching in an Enterprise Network
Switching in an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 3 Version 4.0 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Compare the types of
More informationApplicazioni Telematiche
Angelo Coiro Laboratorio Applicazioni Telematiche L emulatore Packet Tracer Packet Tracer Cisco Packet Tracer is an academic software that allows to emulate Cisco devices Packet Tracer can be used for
More informationCreate bridges, add ports, show bridge and port statistics, status, as well as the OVS database
1 Introduction This document provides instructions on how to configure Pica8 s open switches to work in various application scenarios This document assumes the reader with minimal to no knowledge of the
More informationThis techno knowledge paper can help you if: You need to setup a WAN connection between a Patton Router and a NetGuardian.
Problem: Patton / 240T WAN Setup Platform: NetGuardian 240T This TKP is a guide to setting up a PPP to T1 WAN connection between a Patton Model 2603 Router and a NetGuardian 240T. The example in this guide
More informationWelcome to the Dawn of Open-Source Networking. Linux IP Routers Bob Gilligan gilligan@vyatta.com
Welcome to the Dawn of Open-Source Networking. Linux IP Routers Bob Gilligan gilligan@vyatta.com Outline About Vyatta: Open source project, and software product Areas we re working on or interested in
More informationInstructor Notes for Lab 3
Instructor Notes for Lab 3 Do not distribute instructor notes to students! Lab Preparation: Make sure that enough Ethernet hubs and cables are available in the lab. The following tools will be used in
More informationRESILIENT NETWORK DESIGN
Matěj Grégr RESILIENT NETWORK DESIGN 1/36 2011 Brno University of Technology, Faculty of Information Technology, Matěj Grégr, igregr@fit.vutbr.cz Campus Best Practices - Resilient network design Campus
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationZarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)
QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than
More informationPT Activity 8.1.2: Network Discovery and Documentation Topology Diagram
Topology Diagram All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 6 Addressing Table Device Interface IP Address Subnet
More information.Trustwave.com Updated October 9, 2007. Secure Web Gateway Version 11.0 Setup Guide
.Trustwave.com Updated October 9, 2007 Secure Web Gateway Version 11.0 Setup Guide Legal Notice Copyright 2012 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and
More informationChapter 7 Troubleshooting
Chapter 7 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe VPN Firewall 200. After each problem description, instructions are provided to help you diagnose and
More informationCHAPTER 3 STATIC ROUTING
CHAPTER 3 STATIC ROUTING This chapter addresses the end-to-end delivery service of IP and explains how IP routers and hosts handle IP datagrams. The first section discusses how datagrams are forwarded
More informationActive Fabric Manager (AFM) Plug-in for VMware vcenter Virtual Distributed Switch (VDS) CLI Guide
Active Fabric Manager (AFM) Plug-in for VMware vcenter Virtual Distributed Switch (VDS) CLI Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use
More informationObjectives. Router as a Computer. Router components and their functions. Router components and their functions
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 Identify a router as a computer with an OS and
More informationTroubleshooting an Enterprise Network
Troubleshooting an Enterprise Network Introducing Routing and Switching in the Enterprise Chapter 9 Released under Creative Commons License 3.0 By-Sa Cisco name, logo and materials are Copyright Cisco
More informationRouting Protocols and Concepts Chapter 2 Conceitos de protocolos de Encaminhamento Cap 2
Static Routing Routing Protocols and Concepts Chapter 2 1 1 Objectives Define the general role a router plays in networks. Describe the directly connected networks, different router interfaces Examine
More informationSwitching Basics and Intermediate Routing CCNA 3 Labs and Study Guide Allan Johnson
Switching Basics and Intermediate Routing CCNA 3 Labs and Allan Johnson Introduction Switching Basics and Intermediate Routing CCNA 3 Labs and s is a supplement to your classroom and laboratory experience
More informationFirewall Load Balancing
CHAPTER 6 This chapter describes the (FWLB) feature. It includes the following sections: FWLB Overview, page 6-1 FWLB Features, page 6-2 FWLB Configuration Tasks, page 6-3 Monitoring and Maintaining FWLB,
More informationLab 5 Explicit Proxy Performance, Load Balancing & Redundancy
Lab 5 Explicit Proxy Performance, Load Balancing & Redundancy Objectives The purpose of this lab is to demonstrate both high availability and performance using virtual IPs coupled with DNS round robin
More informationSage ERP Accpac Online
Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac
More informationChapter 10 Troubleshooting
Chapter 10 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. After each problem description, instructions are provided
More informationCisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $2035.00
Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $2035.00 This fee includes the following exams: Cisco Certified Network Associate (CCNA) 100-101 ICND1 and 200-101 ICND2
More informationSage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1
Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....
More informationTroubleshooting Bundles and Load Balancing
CHAPTER 5 This chapter explains the procedures for troubleshooting link bundles and load balancing on the Cisco ASR 9000 Aggregation Services Router. A link bundle is a group of ports that are bundled
More informationIP SAN Best Practices
IP SAN Best Practices A Dell Technical White Paper PowerVault MD3200i Storage Arrays THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.
More informationIntroduction to MPIO, MCS, Trunking, and LACP
Introduction to MPIO, MCS, Trunking, and LACP Sam Lee Version 1.0 (JAN, 2010) - 1 - QSAN Technology, Inc. http://www.qsantechnology.com White Paper# QWP201002-P210C lntroduction Many users confuse the
More informationManagement Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
More informationEfficient Video Distribution Networks with.multicast: IGMP Querier and PIM-DM
Efficient Video Distribution Networks with.multicast: IGMP Querier and PIM-DM A Dell technical white paper Version 1.1 Victor Teeter Network Solutions Engineer This document is for informational purposes
More informationHow To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On
Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network
More informationManagement Software. User s Guide AT-S84. For the AT-9000/24 Layer 2 Gigabit Ethernet Switch. Version 1.1. 613-000368 Rev. B
Management Software AT-S84 User s Guide For the AT-9000/24 Layer 2 Gigabit Ethernet Switch Version 1.1 613-000368 Rev. B Copyright 2006 Allied Telesyn, Inc. All rights reserved. No part of this publication
More informationIP SAN BEST PRACTICES
IP SAN BEST PRACTICES PowerVault MD3000i Storage Array www.dell.com/md3000i TABLE OF CONTENTS Table of Contents INTRODUCTION... 3 OVERVIEW ISCSI... 3 IP SAN DESIGN... 4 BEST PRACTICE - IMPLEMENTATION...
More informationTroubleshooting and Maintaining Cisco IP Networks Volume 1
Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training
More informationLab 3 Routing Information Protocol (RIPv1) on a Cisco Router Network
Lab 3 Routing Information Protocol (RIPv1) on a Cisco Router Network CMPE 150 Fall 2005 Introduction Today you are going to be thrown into using Cisco s Internetwork Operating System (IOS) to configure
More informationChapter 7 Configuring Trunk Groups and Dynamic Link Aggregation
Chapter 7 Configuring Trunk Groups and Dynamic Link Aggregation This chapter describes how to configure trunk groups and 802.3ad link aggregation. Trunk groups are manually-configured aggregate links containing
More informationLab 3.10.2 Use Network Inspector to Observe STP Behavior
Lab 3.10.2 Use Network Inspector to Observe STP Behavior Objective The purpose of this lab is to observe STP behavior with the Network Inspector switch trace feature. Scenario A new switched network has
More informationTYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa
TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa Education & Training Plan CompTIA N+ Specialist Program Student Full
More informationBridgewalling - Using Netfilter in Bridge Mode
Bridgewalling - Using Netfilter in Bridge Mode Ralf Spenneberg, ralf@spenneberg.net Revision : 1.5 Abstract Firewalling using packet filters is usually performed by a router. The packet filtering software
More informationConfiguring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance
CHAPTER 4 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive
More informationConnect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.
Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A
More informationLoad Balancing McAfee Web Gateway. Deployment Guide
Load Balancing McAfee Web Gateway Deployment Guide rev. 1.1.4 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org
More informationConfiguring the Transparent or Routed Firewall
5 CHAPTER This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. This chapter also includes information about customizing
More informationCisco Data Centre: Introducing Cisco Data Center Networking
coursemonster.com/uk Cisco Data Centre: Introducing Cisco Data Center Networking View training dates» Overview In the Introducing Cisco Data Center Networking training course, delegates will learn to:â
More informationJOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
More informationIP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.
IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address
More informationLoad Balancing Web Proxies Load Balancing Web Filters Load Balancing Web Gateways. Deployment Guide
Load Balancing Web Proxies Load Balancing Web Filters Load Balancing Web Gateways Deployment Guide rev. 1.4.9 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Appliances
More informationJuniper / Cisco Interoperability Tests. August 2014
Juniper / Cisco Interoperability Tests August 2014 Executive Summary Juniper Networks commissioned Network Test to assess interoperability, with an emphasis on data center connectivity, between Juniper
More informationAcano solution. Virtualized Deployment R1.1 Installation Guide. Acano. February 2014 76-1025-03-B
Acano solution Virtualized Deployment R1.1 Installation Guide Acano February 2014 76-1025-03-B Contents Contents 1 Introduction... 3 1.1 Before You Start... 3 1.1.1 About the Acano virtualized solution...
More informationHost Configuration (Linux)
: Location Date Host Configuration (Linux) Trainer Name Laboratory Exercise: Host Configuration (Linux) Objectives In this laboratory exercise you will complete the following tasks: Check for IPv6 support
More informationDeploying in a Distributed Environment
Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each
More informationLoad Balancing Smoothwall Secure Web Gateway
Load Balancing Smoothwall Secure Web Gateway Deployment Guide rev. 1.1.7 Copyright 2002 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide...3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org
More informationANZA Formación en Tecnologías Avanzadas
INTRODUCING CISCO DATA CENTER NETWORKING (DCICN) Temario This new assoicate level course has been designed to introduce delegates to the three primary technologies that are used in the Cisco Data Center.
More informationICS 351: Today's plan
ICS 351: Today's plan Quiz, on overall Internet function, linux and IOS commands, network monitoring, protocols IPv4 addresses: network part and host part address masks IP interface configuration IPv6
More informationDevice Interface IP Address Subnet Mask Default Gateway
Felix Rohrer Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway S1 VLAN 99 192.168.99.11 255.255.255.0 192.168.99.1 S2 VLAN 99 192.168.99.12 255.255.255.0 192.168.99.1
More informationVLSM Static routing. Computer networks. Seminar 5
VLSM Static routing Computer networks Seminar 5 IP address (network and host part) Address classes identified by first three bits Subnet mask determines how the IP address is divided into network and host
More informationLoad Balancing Trend Micro InterScan Web Gateway
Load Balancing Trend Micro InterScan Web Gateway Deployment Guide rev. 1.1.7 Copyright 2002 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Loadbalancer.org Appliances Supported...
More informationSavvius Insight Initial Configuration
The configuration utility on Savvius Insight lets you configure device, network, and time settings. Additionally, if you are forwarding your data from Savvius Insight to a Splunk server, You can configure
More informationDell PowerVault MD Series Storage Arrays: IP SAN Best Practices
Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices A Dell Technical White Paper Dell Symantec THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND
More informationPFSENSE Load Balance with Fail Over From Version Beta3
PFSENSE Load Balance with Fail Over From Version Beta3 Following are the Installation instructions of PFSense beginning at first Login to setup Load Balance and Fail over procedures for outbound Internet
More informationIP Address: the per-network unique identifier used to find you on a network
Linux Networking What is a network? A collection of devices connected together Can use IPv4, IPv6, other schemes Different devices on a network can talk to each other May be walls to separate different
More informationThis How To Note describes one possible basic VRRP configuration.
AlliedWare TM OS How To Configure VRRP (Virtual Router Redundancy Protocol) Introduction VRRP is a popular protocol for providing device redundancy, for connecting redundant WAN gateway routers or server
More informationGLBP - Gateway Load Balancing Protocol
GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy
More informationConfiguring VIP and Virtual IP Interface Redundancy
CHAPTER 6 Configuring VIP and Virtual IP Interface Redundancy This chapter describes how to plan for and configure Virtual IP (VIP) and Virtual IP Interface Redundancy on the CSS. Information in this chapter
More informationOSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R
OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:
More informationIntroduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1
Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 1 1 Objectives Identify a router as a computer with an OS and hardware designed for the routing process. Demonstrate
More informationVocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch
Vocia MS-1 Network Considerations for VoIP Vocia software rev. 1.4 or higher required Vocia MS-1 and Network Port Configuration The Vocia Message Server 1 (MS-1) has a number of roles in a Vocia Paging
More informationLoad Balancing Sophos Web Gateway. Deployment Guide
Load Balancing Sophos Web Gateway Deployment Guide rev. 1.0.9 Copyright 2002 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide...3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org
More informationNetBrain Workstation Professional Edition 2.3 Release notes
NetBrain Workstation Professional Edition 2.3 Release notes Major Features...1 Known Issues*...5 NetBrain Workstation Support Site...7 Recommended System Requirements...7 Installation Notes...7 Major Features
More information"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
More informationLab 1: Introduction to the network lab
CSCI 312 - DATA COMMUNICATIONS AND NETWORKS FALL, 2014 Lab 1: Introduction to the network lab NOTE: Be sure to bring a flash drive to the lab; you will need it to save your data. For this and future labs,
More informationVoice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone.
Anritsu Network Solutions Voice Over IP Application Note MultiFlow 5048 CALL Manager Serv # 10.100.27 255.255.2 IP address 10.100.27.4 OC-48 Link 255 255 25 IP add Introduction Voice communications over
More informationComputer Networks Administration Help Manual Sana Saadaoui Jemai Oliver Wellnitz
Technische Universität Braunschweig Institut für Betriebssysteme und Rechnerverbund Computer Networks Administration Help Manual Sana Saadaoui Jemai Oliver Wellnitz Braunschweig, 27 th March 2007 Contents
More informationBASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More informationSimulation of High Availability Internet Service Provider s Network
Abdullah Jameel Mahdi 1 and Anas Ali Hussain 2 1 Information and Communication department, Information Engineering Collage, Al-Nahrin University 2 Computer department, Engineering Collage, Al-Nahrin University
More informationInstall Guide for JunosV Wireless LAN Controller
The next-generation Juniper Networks JunosV Wireless LAN Controller is a virtual controller using a cloud-based architecture with physical access points. The current functionality of a physical controller
More informationLayer 3 Routing User s Manual
User s Manual Second Edition, July 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used
More informationGuideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
More informationHow Do I Upgrade Firmware and Save Configurations on PowerConnect Switches?
PowerConnect Application Note #12 February 2004 How Do I Upgrade Firmware and Save Configurations on PowerConnect Switches? This Application Notes relates to the following Dell PowerConnect products: PowerConnect
More informationJuniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009
Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results May 1, 2009 Executive Summary Juniper Networks commissioned Network Test to assess interoperability between its EX4200 and EX8208
More informationThis chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
More informationMultifunctional Broadband Router User Guide. Copyright Statement
Copyright Statement is the registered trademark of Shenzhen Tenda Technology Co., Ltd. Other trademark or trade name mentioned herein are the trademark or registered trademark of above company. Copyright
More informationLaboratory guide nº 2
Introduction to Computer Networks (IRC) Licenciatura in Electronics Engineering (LEE) Licenciatura in Communication Networks Engineering (LERC) Laboratory guide nº 2 1 Objectives To familiarize your- self
More information