Featured Article
  • How to Configure EXEC and Absolute Timeouts

    It is a common meeting time with the corporate security policy. Put it in a simple way, exec timeout exec to be configured after you terminate the exec session session idle timeout. The default value is 10 minutes. But an absolute timeout the maximum amount of time for a single session can...
  • How to Configuring Numbered ACL's

    Real World Application: Access control lists for all network security Foundation. Device ACL to control traffic and to prevent unwanted traffic from a specific source to a specific destination. This laboratory will discuss and demonstrate numbered access lists are not due to the newer access...
  • How to Configuring a Management VLAN Interface

    Switch in the world, called switched virtual interface for the VLAN logical interface. Exchanger you will see when you are configuring a VLAN interface these interfaces. You have the ability, like a FastEthernet interfaces to configure these interfaces. You can assign a VLAN interface IP address,...
  • How to Configuring AAA Authentication Lists

    Real World Application and Core Knowledge: This is a very simple, several Cisco equipment companies usually use the RADIUS or TACACS + user authentication and authorization. Local authentication is only used as a backup method when a communications failure with the AAA server. AAA server, but...
  • How to Configuring SSH Access

    Real World Application: Telnet is not cutting the cheese when it comes to the production network remote management security. As you are aware, Telnet does not seal mounted payload, so with that being said online that anyone can sniff, transportation and reconstruction of the Telnet...
  • How to Configuring VLAN Trunking Protocol (VTP)

    Traditions across multiple switches and maintaining VLAN on one of the biggest obstacles is that you want to add/remove and separate management VLAN on each switch. VLAN Trunking Protocol, also known as VTP is a technology, which allows the propagation of VLAN from a single switch to multiple...
  • How to Configure EXEC and Absolute Timeouts

    It is a common meeting time with the corporate security policy. Put it in a simple way, exec timeout exec to be configured after you terminate the exec session session idle timeout. The default value is 10 minutes. But an absolute timeout the maximum amount of time for a single session can...
  • How to Configuring Numbered ACL's

    Real World Application: Access control lists for all network security Foundation. Device ACL to control traffic and to prevent unwanted traffic from a specific source to a specific destination. This laboratory will discuss and demonstrate numbered access lists are not due to the newer access...
Previous Next

Friday, 29 November 2013

How to Configuring VLAN Trunking Protocol (VTP)

Traditions across multiple switches and maintaining VLAN on one of the biggest obstacles is that you want to add/remove and separate management VLAN on each switch. VLAN Trunking Protocol, also known as VTP is a technology, which allows the propagation of VLAN from a single switch to multiple Exchange Server-client way. In this lab you will dive into the configuration that you want to propagate...

How to Configuring a Management VLAN Interface

Switch in the world, called switched virtual interface for the VLAN logical interface. Exchanger you will see when you are configuring a VLAN interface these interfaces. You have the ability, like a FastEthernet interfaces to configure these interfaces. You can assign a VLAN interface IP address, the bridge group, interface descriptions, and even quality of service policies. Have a VLAN interface...

How to Creating Virtual Local Area Networks (VLANs)

Real World Application & Core Knowledge: Starting off first allows the use of a flat network definition. Flat network design network is a network engineer do not daisy chain hubs together with the knowledge of and/or switches to create a single large network includes hundreds of, if not tens of thousands of devices in a single subnet. From a design point of view it was broadcast and control...

How to Configure Cisco Discovery Protocol (CDP)

Real World Application & Core Knowledge: Cisco Discovery Protocol every day by network engineers worldwide record and all understand the physical network topology and not stall. CDP runs on the 2nd layer of the OSI model and exchanging information between IP addresses of most Cisco devices, physical link connection port identifier, interface device IOS version, device capabilities, such...

Thursday, 28 November 2013

How to Configure EXEC and Absolute Timeouts

It is a common meeting time with the corporate security policy. Put it in a simple way, exec timeout exec to be configured after you terminate the exec session session idle timeout. The default value is 10 minutes. But an absolute timeout the maximum amount of time for a single session can remain established. So if you have 12 minutes to more than an absolute timeout the user is active, the session...

How to Configure Cisco IOS Web Server Authentication

Configure Cisco IOS Web server authentication (HTTP and HTTPS) is a common configuration used on the equipment used in the production network, such as Cisco routers running the host Web based device management interface of Cisco Security Device Manager (SDM) Cisco Catalyst converter Web interface hosting management only users of the Web interface for authentication. Than load if you use GNS3 CCNA...

How to Configure the Password Encryption Service

Under today's 7th on the Cisco device-level encryption encryption standards were considered extremely weak. There are a lot of Web sites, provided a decipher script, allowing you to copy and paste the service password hash value is encrypted and decrypted hash value that you clear the text. Sample Web site is the Web site. This lab will teach you how to configure the password encryption service,...

How to Configuring VTY Lines ACL

It is common security policies in your production network, used to control the access control list specifies that only a specific subnet of the remote management of network devices and/or host network access management establish a remote session to the device. This lab will teach you how to configure the ACL to control access to specific networks and/or host exec session is established through...

How to Configuring Named Access Control Lists

Real World Application: Numbered access lists with main downfall was edited in the ability to access a particular row in the list. Unfortunately the only way to do this is to edit the lines in the text editor and delete and re-add the ACL completely. Numbered access lists can still be found in networks around the world, but engineers now commonly use a named access list, the minimum required to...

How to Configuring Numbered ACL's

Real World Application: Access control lists for all network security Foundation. Device ACL to control traffic and to prevent unwanted traffic from a specific source to a specific destination. This laboratory will discuss and demonstrate numbered access lists are not due to the newer access list named advantage is quite common. Numbered access lists of biggest downfall was involved with editing...

How to Configuring SSH Access

Real World Application: Telnet is not cutting the cheese when it comes to the production network remote management security. As you are aware, Telnet does not seal mounted payload, so with that being said online that anyone can sniff, transportation and reconstruction of the Telnet communication, turn on password can be reckoned a major loophole, as well as other types of confidential sensitive...

Configuring AAA Authentication via TACACS+

Real World Application: Not a network engineer wants to spend countless hours of your time to maintain hundreds of local user accounts on a Cisco device. This question is to see for many, many years ago, resolving with the AAA level. Aaa you can Configuring the opposite it is a Cisco router, or switch device to a centralized user authentication, database authentication. Cisco sales known as the...

How to Configuring AAA Authentication Lists

Real World Application and Core Knowledge: This is a very simple, several Cisco equipment companies usually use the RADIUS or TACACS + user authentication and authorization. Local authentication is only used as a backup method when a communications failure with the AAA server. AAA server, but they will be TACACS+ (pronounced "tack hammer plus") or the RADIUS provides a centralized point of management...

Configuring Local User Authentication

Real World Application: Usually with Cisco devices, more than one user to access and configure the device, hence the need to implement Cisco devices have different individuals in different administrative responsibilities required access level different user credentials. This lab will discuss and demonstrate local user account profile requirements. Lab Prerequisites: If you are using GNS3,...

Configuring Basic Password Authentication

Real World Application: Is sideways importance of safety in production networks, especially the Internet facing network. Secure Cisco routers or switches are not expose your risk virtually an unlimited number of networks. This lab will teach you in the Cisco IOS software to ensure that your Cisco router and exchanger basics of password authentication. Lab Prerequisites: If you are using...

Popular Posts

Powered by Blogger.