Cisco Routers and Switches
|
|
|
- Harry Harrington
- 10 years ago
- Views:
Transcription
1 Cisco Routers and Switches Phoenix Cisco User Group (PCUG) Tools, tips, and tricks you never knew
2 Hello! Jeremy D. Cioara - CCIE, MCSE, CNE AdTEC Networks - Chief Information Officer Cisco IP Telephony Specialist Network Engineer, Author, and Trainer
3 Topic Breakdown IOS Navigation Remote Auto-Configuration Network Monitoring Mesmerizing Utilities
4 IOS Navigation Disabling DNS Lookup Limiting EXEC Interruptions Filtering Command Output Creating Aliases Erasing Interface Configurations The Wonderful Do Command Adjusting the TCP Timeout
5 Disabling DNS Lookup By default, Cisco router attempts to resolve DNS hostnames to IP addresses The result: Any mistyped command in privileged mode causes second delay
6 Disabling DNS Lookup (cont.) The Solution: Disable DNS lookups
7 Limiting Exec Interruptions By default, Cisco devices allow console and line messages to interrupt typed text
8 Limiting Exec Interruptions To prevent this feature, do the following: The line is automatically repainted
9 Filtering Command Output Many commands output excessive information to the screen. Unix-like filtering options can aid in device management
10 Filtering Command Output Router# show <argument> begin <argument>
11 Filtering Command Output Router# show <argument> include <argument>
12 Filtering Command Output Router# show run interface <interface>
13 Getting Fancy with Filtering Router# show process cpu exclude 0.00% 0.00% 0.00%
14 The Alias Command In the world of Cisco, you may find yourself typing the same commands again and again The alias command can help alleviate a little carpal tunnel syndrome Commands I use all the time: show ip interface brief show running-config show ip route show ip <ospf/eigrp> neighbor show ip bgp
15 The Alias Command Syntax: Router(config)# alias <mode> <alias> <command>
16 The Alias Command Verifying your aliases
17 Erasing an Interface Config Router(config)# default interface <int>
18 The Wonderful do Command Allows you to execute privileged mode commands from any mode IOS 12.2(8)T versions and later
19 Shrinking the TCP Timeout When you telnet to a mistyped or unavailable IP address, the router hangs for 30 seconds before you can get a prompt back
20 Shrinking the TCP Timeout To adjust this timer, use the following command: Router(config)# ip tcp synwait-time <5-300 seconds> Be careful - this adjusts the timer for all TCP windows
21 Remote Router Auto-Configuration
22 Remote Router Auto-Configuration Scenario: You are deploying four remote offices for your corporation; however, you are the only Cisco-competent employee phoenix seattle HQ detroit kansas
23 Remote Router Auto-Configuration Concepts: 1. A router (out-of-the-box) will attempt to receive an IP address via DHCP (on LAN interfaces) or SLARP (on serial interfaces) 2. If they receive an IP address, they will begin broadcasting for a file called network.config. This file tells the router its name 3. The router will then broadcast for a file called <router_name>.config
24 Remote Router Auto-Configuration Step 1: Set up a TFTP Server at the central location phoenix seattle HQ TFTP Server detroit kansas
25 Remote Router Auto-Configuration Step 2: Create an ASCII text file on the TFTP server called network.config containing the name-to-ip mappings for the new routers phoenix network.config phoenix seattle detroit TFTP kansas Server seattle detroit kansas
26 Remote Router Auto-Configuration Step 3: Create an ASCII text file on the TFTP server for each router called <rtr_name>.config - routers will broadcast for this filename phoenix phoenix.config seattle network.config version 12.4 service config service timestamps debug datetime msec service timestamps log datetime msec service password-encryption! hostname Router! boot-start-marker boot-end-marker! enable secret 5 $1$ptS9$XjhiveqHFJPlGL/1.GXAZ1! no aaa new-model! resource policy! clock timezone ARIZONA -7 ip cef TFTP Server detroit kansas
27 Remote Router Auto-Configuration Step 4: Add an ip helper-address command on each WAN interface of the HQ router pointing to the TFTP server Router(config-if)# ip helper-address <tftp_ip> TFTP Server
28 Network Monitoring Using Built-in Network Monitoring Network-Based Application Recognition (NBAR) Netflow Using Cool, Free SNMP Monitoring Multi-Router Traffic Grapher (MRTG) Paessler-Router Traffc Grapher (PRTG)
29 Network-Based Application Recognition (NBAR) NBAR is a application recognition utility originally designed for QoS Allows QoS mechanisms to match an manipulate: VoIP traffic Peer-to-Peer file sharing Multiple common applications (such as ftp, http, realaudio, etc...) Also included in NBAR is a spiffy traffic monitoring feature
30 Network-Based Application Recognition (NBAR) Enabling NBAR Requires cisco express forwarding (cef) Activated on a per-interface basis
31 Network-Based Application Recognition (NBAR) Monitoring NBAR - many options
32 Network-Based Application Recognition (NBAR) Monitoring NBAR - top protocols
33 IP Netflow Netflow is an EXTREMELY advanced and complex system Cisco devices can use to track data flows Many commercial systems have been created to take advantage of netflow statistics
34 IP Netflow
35 IP Netflow
36 MRTG and SNMP The Multi-Router Traffic Grapher is a utility that has been around for eons Available as a free download from Creates HTML pages graphing specified SNMP counters
37 MRTG and SNMP The Multi-Router Traffic Grapher is a utility that has been around for eons Available as a free download from Creates HTML pages graphing specified SNMP counters
38 High-level View of SNMP SNMP is a protocol that allows you to perform GET and SET operations on Management Information Base (MIB) objects on a network device GET operations retrieve information SET operations change information Every informational item on a Cisco device has a MIB identifier
39 Replacing Passwords Using SNMP snmpset -t 10 -r 5 -c communityname hostname octetstring configfile.txt Where: is the address of the Trivial File Transfer Protocol (TFTP) server hostname is the hostname of the router (or its IP address) configfile.txt is the file containing the configuration commands that you wish to implement (this file must be in a directory reachable by TFTP to the TFTP server) Example of configfile.txt no enable secret enable secret newpassword end
40 PRTG Freeware / Commercial MRTG-like product Installs on Windows Free version comes with 3 counters Commercial version is relatively inexpensive Automatically comes with MIB counters pre-configured for most Cisco devices Available at
41 PRTG Freeware / Commercial MRTG-like product Installs on Windows Free version comes with 3 counters
42 Mesmerizing Utilities Get Pass Rip Generator Switch Inspector Kiwi Syslog / Cattools
43 Mesmerizing Utilities Boson GetPass Crack level 7 encryption Boson Rip Route Generator
44 Mesmerizing Utilities Netxar SwitchInspector Allows you to identify the devices attached to each of the switch ports in your organization
45 Mesmerizing Utilities
46 Mesmerizing Utilities
47 Mesmerizing Utilities
48 Mesmerizing Utilities
49 Mesmerizing Utilities
50 Mesmerizing Utilities
51 Mesmerizing Utilities Kiwi Syslog
52 Mesmerizing Utilities Kiwi Cattools - config dif, multi commands
53 Mesmerizing Utilities Really Awesome New Cisco config Differ (rancid) Simalr to CatTools, but completely free
54 Questions? Check out:
55
- Basic Router Security -
1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password
The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series
Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including
Enhanced Password Security - Phase I
Enhanced Password Security - Phase I Feature History 120(18)S 121(8a)E 122(14)S This feature was introduced Support for this feature was integrated into Cisco IOS Release 121(8a)E This feature was integrated
Lab Configuring Syslog and NTP (Instructor Version)
(Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Objectives Device Interface IP Address Subnet Mask
Enhanced Password Security - Phase I
Enhanced Password Security - Phase I Feature History 120(18)S This feature was introduced This document describes the Enhanced Password Security feature in It includes the following sections: Feature Overview,
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
Lab 5.3.9b Managing Router Configuration Files Using TFTP
Lab 5.3.9b Managing Router Configuration Files Using TFTP Device Host Name Interface IP Address Subnet Mask R1 R1 Fast Ethernet 0/0 172.17.0.1 255.255.0.0 Objectives Download and install TFTP server software.
Supported Platforms. Supported Standards, MIBs, and RFCs. Prerequisites. Related Features and Technologies. Related Documents. Improved Server Access
Configuring Timeout, Retransmission, and Key Values per RADIUS Server The Configuring Timeout, Retransmission, and Key Values per RADIUS Server feature extends the functionality of the existing radius-server
How To Configure A Cisco Router With A Cio Router
CHAPTER 1 This chapter provides procedures for configuring the basic parameters of your Cisco router, including global parameter settings, routing protocols, interfaces, and command-line access. It also
DHCP Server Port-Based Address Allocation
The feature provides port-based address allocation support on the Cisco IOS Dynamic Host Configuration Protocol (DHCP) server for the Ethernet platform. The DHCP server provides address assignment support
Lab 11.5.6.1 Configure Syslog on AP
Lab 11.5.6.1 Configure Syslog on AP Estimated Time: 25 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, students will configure and use syslog logging to monitor
Using LiveAction with Cisco Secure ACS (TACACS+ Server)
LiveAction Application Note Using LiveAction with Cisco Secure ACS (TACACS+ Server) September 2012 http://www.actionpacked.com Table of Contents 1. Introduction... 1 2. Cisco Router Configuration... 2
Using Link Layer Discovery Protocol in Multivendor Networks
Using Link Layer Discovery Protocol in Multivendor Networks Link Layer Discovery Protocol (LLDP), standardized by the IEEE as part of 802.1ab, enables standardized discovery of nodes, which in turn facilitates
Transferring Files Using HTTP or HTTPS
Transferring Files Using HTTP or HTTPS First Published: May 5, 2005 Last Updated: May 14, 2009 Cisco IOS Release 12.4 provides the ability to transfer files between your Cisco IOS software-based device
3.1 Connecting to a Router and Basic Configuration
3.1 Connecting to a Router and Basic Configuration Objective This lab will focus on the ability to connect a PC to a router in order to establish a console session and observe the user interface. A console
- The PIX OS Command-Line Interface -
1 PIX OS Versions - The PIX OS Command-Line Interface - The operating system for Cisco PIX/ASA firewalls is known as the PIX OS. Because the PIX product line was acquired and not originally developed by
- Advanced IOS Functions -
1 The Configuration Register - Advanced IOS Functions - The configuration register (config-register) is a hexadecimal value that controls various aspects of how a router boots, including: Baud Rate Boot
GLBP - Gateway Load Balancing Protocol
GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy
Flow-Based per Port-Channel Load Balancing
The feature allows different flows of traffic over a Gigabit EtherChannel (GEC) interface to be identified based on the packet header and then mapped to the different member links of the port channel.
Domain Name System Server Round-Robin Functionality for the Cisco AS5800
Domain Name System Server Round-Robin Functionality for the Cisco AS5800 This feature module describes Domain Name System (DNS) server round-robin functionality for the Cisco AS5800 universal access server.
Lab 6.1.3 Configure Local AAA on Cisco Router
Lab 6.1.3 Configure Local AAA on Cisco Router Objective Scenario Topology In this lab, the students will complete the following tasks: Securing and testing access to the privileged EXEC, VTY, and console
Chapter 1: Planning Maintenance for Complex Networks. TSHOOT v6 Chapter 1 2007 2010, Cisco Systems, Inc. All rights reserved.
: Planning Maintenance for Complex Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks TSHOOT v6 1 Objectives Evaluate commonly-practiced models and methodologies for network maintenance
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations
PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface
Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example
Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example Document ID: 45843 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Passwords
LAB II: Securing The Data Path and Routing Infrastructure
LAB II: Securing The Data Path and Routing Infrastructure 8. Create Packet Filters a. Create a packet filter which will deny packets that have obviously bogus IP source addresses but permit everything
Configuring the MNLB Forwarding Agent
CHAPTER 3 Configuring the MNLB Forwarding Agent This chapter describes how to configure a Cisco router as an MNLB Forwarding Agent to operate in conjunction with a Cisco LocalDirector serving as Services
NetFlow Subinterface Support
NetFlow Subinterface Support Feature History Release Modification 12.2(14)S This feature was introduced. 12.2(15)T This feature was integrated into Cisco IOS Release 12.2 T. This document describes the
Planning Maintenance for Complex Networks
Planning Maintenance for Complex Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks Olga Torstensson TSHOOT v6 1 Maintenance Models and Methodologies A network engineer s job description
Virtual Fragmentation Reassembly
Virtual Fragmentation Reassembly Currently, the Cisco IOS Firewall specifically context-based access control (CBAC) and the intrusion detection system (IDS) cannot identify the contents of the IP fragments
ICND1 Lab Guide. 100-101 Interconnecting Cisco Networking Devices Part 1 Version 2.0. Labs powered by
ICND1 Lab Guide 100-101 Interconnecting Cisco Networking Devices Part 1 Version 2.0 ii Interconnecting Cisco Networking Devices Part 1 100-101 Lab Guide LM20130929/BV2.01 iii 25 Century Blvd. Ste. 500
Cisco ASA, PIX, and FWSM Firewall Handbook
Cisco ASA, PIX, and FWSM Firewall Handbook David Hucaby, CCIE No. 4594 Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA Contents Foreword Introduction xxii xxiii Chapter 1 Firewall
Configuring a Router
CHAPTER 3 Configuring a Router This chapter provides information and commands concerning the following topics: Configuring a router, specifically: Names Passwords Interfaces MOTD banners IP host tables
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data NetFlow is a technology that provides highly granular per-flow statistics on traffic in a Cisco router. The NetFlow MIB feature provides
Lab 1.2.3 Review of Basic Router Configuration with RIP. Objective. Background / Preparation. General Configuration Tips
Lab 1.2.3 Review of Basic Router Configuration with RIP Objective Cable and configure workstations and routers Setup IP addressing scheme using Class B networks Configure Routing Information Protocol (RIP)
Firewall Authentication Proxy for FTP and Telnet Sessions
Firewall Authentication Proxy for FTP and Telnet Sessions First Published: May 14, 2003 Last Updated: August 10, 2010 Before the introduction of the Firewall Authentication Proxy for FTP and Telnet Sessions
HOW TO CONFIGURE CISCO FIREWALL PART I
HOW TO CONFIGURE CISCO FIREWALL PART I Cisco Abstract: Please find below a step by step process to configure the PIX Firewall from scratch. A simple scenario is given here where you have a corporate network
Configuring Basic Settings
CHAPTER 9 This chapter describes how to configure basic settings on your ASASM that are typically required for a functioning configuration. This chapter includes the following sections: Configuring the
Document ID: 45741. Introduction
Products & Services 6bone Connection Using 6to4 Tunnels for IPv6 Document ID: 45741 Contents Introduction Prerequisites Requirements Components Used Conventions How 6to4 Tunnels Work Limitations of 6to4
Per-Packet Load Balancing
Per-Packet Load Balancing Feature History Release 12.0(19)ST 12.0(21)S 12.0(22)S Modification This feature was introduced on the Cisco 10000 series routers. This feature was introduced on the Cisco 12000
CS3695/M6-109 Lab 8-NPS02 VOIP Sniffing Ver. 8 Rev. 0
Background For this lab, we will be analyzing some Wireshark capture files that were captured using the ARP Poisoning technique on Cisco VIOP (Voice Over IP) phones As this lab took special equipment (i.e.
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Topology Note: ISR G2 devices have Gigabit Ethernet interfaces instead of FastEthernet Interfaces. All contents are Copyright 1992 2012
APNIC Members Training Course Security workshop. 2-4 July, 2008. Port Vila Vanuatu. In conjunction with PACNOG 4
APNIC Members Training Course Security workshop 2-4 July, 2008 Port Vila Vanuatu In conjunction with PACNOG 4 Router device security lab 1. APNIC s remote lab In these exercises you will be remotely accessing
NetFlow Auditor Manual Getting Started
NetFlow Auditor Manual Getting Started Setting up NetFlow Check if your Routers or Switches Supports NetFlow. Almost all Cisco devices support NetFlow since its introduction in the 11.1 train of Cisco
1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router
1 Basic Configuration of Cisco 2600 Router Basic Configuration Cisco 2600 Router I decided to incorporate the Cisco 2600 into my previously designed network. This would give me two seperate broadcast domains
Lab 1.5.1 Introductory Lab 1 Getting Started and Building Start.txt
Lab 1.5.1 Introductory Lab 1 Getting Started and Building Start.txt Objective This lab will introduce to the student the CCNP lab equipment and certain IOS features that might be new. This introductory
Flow Monitor for WhatsUp Gold v16.2 User Guide
Flow Monitor for WhatsUp Gold v16.2 User Guide Contents Table of Contents Flow Monitor Overview Welcome to WhatsUp Gold Flow Monitor... 1 What is Flow Monitor?... 2 How does Flow Monitor work?... 2 System
Configuring the Cisco Secure PIX Firewall with a Single Intern
Configuring the Cisco Secure PIX Firewall with a Single Intern Table of Contents Configuring the Cisco Secure PIX Firewall with a Single Internal Network...1 Interactive: This document offers customized
Brest. Backup : copy flash:ppe_brest1 running-config
Brest Backup : copy flash:ppe_brest1 running-config Cisco SF300-08 Mise en place des services : - Serveurs : 10.3.50.0/24 VLAN 2 (port 1) - DSI : 10.3.51.0/24 VLAN 3 (port 2) - Direction : 10.3.52.0/24
Configuring a Load-Balancing Scheme
Configuring a Load-Balancing Scheme Last Updated: October 5, 2011 This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco
Lab 1.4.1 Introductory Lab 1 - Getting Started and Building Start.txt
Lab 1.4.1 Introductory Lab 1 - Getting Started and Building Start.txt Objective This lab may introduce new CCNP lab equipment and certain IOS features. This introductory activity also describes how to
Applicazioni Telematiche
Angelo Coiro Laboratorio Applicazioni Telematiche L emulatore Packet Tracer Packet Tracer Cisco Packet Tracer is an academic software that allows to emulate Cisco devices Packet Tracer can be used for
Objectives. Background. Required Resources. CCNA Security
Chapter 8 Lab B, Configuring a Remote Access VPN Server and Client Topology IP Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1 192.168.1.1 255.255.255.0 N/A
Lab 4.2.3 Analyzing Network Traffic
Lab 4.2.3 Analyzing Network Traffic Objective Device Designation Device Name Address Subnet Mask Discovery Server Network Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1 255.255.0.0
Lab 7.2.9 Load Balancing Across Multiple Paths
Lab 7.2.9 Load Balancing Across Multiple Paths Objective Configure Load balance across multiple paths. Observe the load balancing process. Background/Preparation Cable a network similar to the one in the
Lab 7.2.9 Load Balancing Across Multiple Paths Instructor Version 2500
Lab 7.2.9 Load Balancing Across Multiple Paths Instructor Version 2500 Objective onfigure Load balance across multiple paths. Observe the load balancing process. Background/Preparation able a network similar
Configurazione Rete VoIP
Configurazione Rete VoIP 1x CISCO 7940G 1x CISCO 3725 with cme-full-7.0.0.1.tar 1x CISCO IP Communicator Startup Config router CISCO 3725 Procedura Operativa: Topologia di rete Operazioni preliminary sul
8 steps to protect your Cisco router
8 steps to protect your Cisco router Daniel B. Cid [email protected] Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention
Lab 3.3 Configuring QoS with SDM
Lab 3.3 Configuring QoS with SDM Learning Objectives Configure Quality of Service tools with the SDM QoS wizard Monitor traffic patterns using the SDM QoS interface Topology Diagram Scenario Cisco Security
Volume SYSLOG JUNCTION. User s Guide. User s Guide
Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages
Connecting to the Firewall Services Module and Managing the Configuration
CHAPTER 3 Connecting to the Firewall Services Module and This chapter describes how to access the command-line interface and work with the configuration. This chapter includes the following sections: Connecting
BRI to PRI Connection Using Data Over Voice
BRI to PRI Connection Using Data Over Voice Document ID: 14962 Contents Introduction Prerequisites Requirements Conventions Background Information Configure Network Diagram Configurations Verify Troubleshoot
Lab: Basic Router Configuration
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Def. Gateway R1 Fa0/0 192.168.1.1 255.255.255.0 N/A S0/0/0 192.168.2.1 255.255.255.0 N/A R2 Fa0/0 192.168.3.1 255.255.255.0 N/A
Configuring a Load-Balancing Scheme
This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco Express Forwarding traffic. Load-balancing allows you to optimize
How to Configure Cisco 2600 Routers
Helsinki University of Technology Department of Communications and Networking How to Configure Cisco 2600 Routers Juha Järvinen 10.6.2004 [email protected] Modified by Zhong Yunqiu 7.8.2008 Table
Sampled NetFlow. Feature Overview. Benefits
Sampled NetFlow This feature module describes the Sampled NetFlow feature. It includes information on the benefits of the new feature, supported platforms, supported standards, and the commands necessary
Cisco Configuration Professional Quick Start Guide
Cisco Configuration Professional Quick Start Guide April 29, 2011 This document explains how to start using Cisco Configuration Professional Express (Cisco CP Express) and Cisco Configuration Professional
Configurazione Rete VoIP
Configurazione Rete VoIP 1x CISCO 7940G 1x CISCO 3725 with cme-full-7.0.0.1.tar 1x CISCO IP Communicator Startup Config router CISCO 3725 Procedura Operativa: Topologia di rete Operazioni preliminary sul
NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes
NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to
HTTP 1.1 Web Server and Client
HTTP 1.1 Web Server and Client Finding Feature Information HTTP 1.1 Web Server and Client Last Updated: August 17, 2011 The HTTP 1.1 Web Server and Client feature provides a consistent interface for users
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering
Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering 7.1 Details Aim: Rich Macfarlane The aim of this lab is to introduce the concepts of stateful firewalls, using Cisco Contextbased Access Control
Encrypted Preshared Key
The feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Release Modification 12.3(2)T This feature was introduced. Finding Support Information
Lab 5.5 Configuring Logging
Lab 5.5 Configuring Logging Learning Objectives Configure a router to log to a Syslog server Use Kiwi Syslog Daemon as a Syslog server Configure local buffering on a router Topology Diagram Scenario In
Simple MPLS network topology for Dynamips/Olive
Simple MPLS network topology for Dynamips/Olive R1 version 12.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption hostname R1 boot-start-marker
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Introduction to Network Security
LAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
Introduction to Cisco router configuration
Introduction to Cisco router configuration AFNOG 2001 Workshop 07 to 11 May 2001 Accra - GHANA By: Adiel AKPLOGAN CAFE Informatique S. A. - TOGO E-mail: [email protected] - Web: http://www.akplogan.net
Encrypted Preshared Key
Encrypted Preshared Key The Encrypted Preshared Key feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Encrypted Preshared Key Release
Lab 3.8.3 Configure Cisco IOS Firewall CBAC on a Cisco Router
Lab 3.8.3 Configure Cisco IOS Firewall CBAC on a Cisco Router Objective Scenario Topology Estimated Time: 35 minutes Number of Team Members: Two teams with four students per team In this lab exercise,
Using The Paessler PRTG Traffic Grapher In a Cisco Wide Area Application Services Proof of Concept
Using The Paessler PRTG Traffic Grapher In a Cisco Wide Area Application Services Proof of Concept What You Will Learn Understanding bandwidth traffic and resource consumption is vital to enhanced and
Configuring Fax Pass-Through
Configuring Fax Pass-Through This chapter describes the configuration of fax pass-through. With fax pass-through, modulated fax information from the PSTN is passed in-band over a voice speech path in an
Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.
Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A
School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations
School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management Lab 4: Remote Monitoring (RMON) Operations Objective To become familiar with basic RMON operations, alarms,
Basic Configuration of the Cisco 12000 Series Internet Router
CHAPTER 2 Basic Configuration of the Cisco 12000 Series Internet Router This chapter describes how to boot and configure the Cisco 12000 Series Internet Router. It discusses the following subjects: Cisco
NetSpective Global Proxy Configuration Guide
NetSpective Global Proxy Configuration Guide Table of Contents NetSpective Global Proxy Deployment... 3 Configuring NetSpective for Global Proxy... 5 Restrict Admin Access... 5 Networking... 6 Apply a
ROLE-BASED COMMAND-LINE INTERFACE ACCESS
ROLE-BASED COMMAND-LINE INTERFACE ACCESS DENISE HELFRICH MARCH 2004 1 Agenda Role-Based Command-Line Interface (CLI) Access Overview Configuration Tasks CLI Views Lawful Intercept View How to access and
Lab 4.1.4 Creating a Network Map using CDP Instructor Version 2500
Lab 4.1.4 Creating a Network Map using CDP Instructor Version 2500 Objective Use Cisco Discovery Protocol (CDP) commands to get information about neighboring network devices. Background/Preparation CDP
7750 SR OS System Management Guide
7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R4 July 2012 Document Part Number: 93-0071-09-02 *93-0071-09-02* This document is protected by copyright. Except as specifically permitted
Objectives. Router as a Computer. Router components and their functions. Router components and their functions
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Introduction to Routing and Packet Forwarding Routing Protocols and Concepts Chapter 1 Identify a router as a computer with an OS and
Lab 2 - Basic Router Configuration
CS326 Fall 2001 Room: PAI 5.48 Name: Lab 2 - Basic Router Configuration In this lab you will learn: the various configuration modes of Cisco 2621 routers how to set up IP addresses for such routers how
IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections
IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections Document ID: 99427 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram
Lab 3.1.2 Creating a Logical Network Diagram
Lab 3.1.2 Creating a Logical Network Diagram Objectives Use router and switch commands to obtain information about an existing network. Use Cisco Network Assistant to obtain information about an existing
Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
Managing and Monitoring Network Management Features
Managing and Monitoring Network Management Features This feature module describes how to monitor, manage and deploy a variety of network management features, including Cisco Active Network Abstraction
Basic Software Configuration Using the Cisco IOS Command-Line Interface
Basic Software Configuration Using the Cisco IOS Command-Line Interface This document describes how to use the Cisco IOS command-line interface (CLI) to perform a basic software configuration for your
Configuring Basic Settings
CHAPTER 12 This chapter describes how to configure basic settings on your ASASM that are typically required for a functioning configuration. This chapter includes the following sections: Configuring the
ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices. Secure Access How-to User Series
ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices Secure Access How-to User Series Author: Technical Marketing, Policy and Access, Security Business Group, Cisco Systems Date: January
