Featured Article
  • How to Configure the Password Encryption Service

    Under today's 7th on the Cisco device-level encryption encryption standards were considered extremely weak. There are a lot of Web sites, provided a decipher script, allowing you to copy and paste the service password hash value is encrypted and decrypted hash value that you clear the text....
  • How to Configuring Named Access Control Lists

    Real World Application: Numbered access lists with main downfall was edited in the ability to access a particular row in the list. Unfortunately the only way to do this is to edit the lines in the text editor and delete and re-add the ACL completely. Numbered access lists can still be found in...
  • Configuring AAA Authentication via TACACS+

    Real World Application: Not a network engineer wants to spend countless hours of your time to maintain hundreds of local user accounts on a Cisco device. This question is to see for many, many years ago, resolving with the AAA level. Aaa you can Configuring the opposite it is a Cisco router, or...
  • How to Configuring Numbered ACL's

    Real World Application: Access control lists for all network security Foundation. Device ACL to control traffic and to prevent unwanted traffic from a specific source to a specific destination. This laboratory will discuss and demonstrate numbered access lists are not due to the newer access...
  • How to Configuring AAA Authentication Lists

    Real World Application and Core Knowledge: This is a very simple, several Cisco equipment companies usually use the RADIUS or TACACS + user authentication and authorization. Local authentication is only used as a backup method when a communications failure with the AAA server. AAA server, but...
  • Configuring Local User Authentication

    Real World Application: Usually with Cisco devices, more than one user to access and configure the device, hence the need to implement Cisco devices have different individuals in different administrative responsibilities required access level different user credentials. This lab will discuss...
  • How to Configure the Password Encryption Service

    Under today's 7th on the Cisco device-level encryption encryption standards were considered extremely weak. There are a lot of Web sites, provided a decipher script, allowing you to copy and paste the service password hash value is encrypted and decrypted hash value that you clear the text....
  • How to Configuring Named Access Control Lists

    Real World Application: Numbered access lists with main downfall was edited in the ability to access a particular row in the list. Unfortunately the only way to do this is to edit the lines in the text editor and delete and re-add the ACL completely. Numbered access lists can still be found in...
Previous Next
Latest Post

Friday, 29 November 2013

How to Configuring VLAN Trunking Protocol (VTP)

Traditions across multiple switches and maintaining VLAN on one of the biggest obstacles is that you want to add/remove and separate management VLAN on each switch. VLAN Trunking Protocol, also known as VTP is a technology, which allows the propagation of VLAN from a single switch to multiple Exchange Server-client way. In this lab you will dive into the configuration that you want to propagate...

How to Configuring a Management VLAN Interface

Switch in the world, called switched virtual interface for the VLAN logical interface. Exchanger you will see when you are configuring a VLAN interface these interfaces. You have the ability, like a FastEthernet interfaces to configure these interfaces. You can assign a VLAN interface IP address, the bridge group, interface descriptions, and even quality of service policies. Have a VLAN interface...

How to Creating Virtual Local Area Networks (VLANs)

Real World Application & Core Knowledge: Starting off first allows the use of a flat network definition. Flat network design network is a network engineer do not daisy chain hubs together with the knowledge of and/or switches to create a single large network includes hundreds of, if not tens of thousands of devices in a single subnet. From a design point of view it was broadcast and control...

How to Configure Cisco Discovery Protocol (CDP)

Real World Application & Core Knowledge: Cisco Discovery Protocol every day by network engineers worldwide record and all understand the physical network topology and not stall. CDP runs on the 2nd layer of the OSI model and exchanging information between IP addresses of most Cisco devices, physical link connection port identifier, interface device IOS version, device capabilities, such...

Popular Posts

Powered by Blogger.