SlideShare une entreprise Scribd logo
1  sur  56
www.professordkinney.com
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Lessons Summary:
Configuring Network Devices
Enterprise Network Security
Managing Cisco Devices
 Some Bonus Cheat Sheets
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Configuring Network Devices
ISR (Integrated Services Router combines routing, LAN
switching, security, voice, & WAN connectivity features.
Ideal for small to medium-sized businesses & ISP managed
customers.
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Cisco IOS – offered in modules called images
IP Base image: entry-level Cisco IOS
Images are specific to models of devices
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
CISCO IOS Image: Types of Images
Two main types of image your router may use:
System image - complete Cisco IOS software. This image is loaded when your
router boots and is used most of the time.
On most platforms, the image is located in Flash memory.
Boot image - A subset of the Cisco IOS software. This image is used to
perform network booting or to load Cisco IOS images onto the router.
This image is also used if the router cannot find a valid system image.
Depending on your platform, this image may be called xboot image, rxboot
image, bootstrap image, or boot loader/helper image.
On some platforms, the boot image is contained in ROM. In others, the boot
image can be stored in Flash memory. On these platforms, you can specify
which image should be used as the boot image using the boot bootldr global
configuration command. Refer to your hardware documentation for
information about the boot image used on your router.
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Image Naming Convention
You can identify the platform, features and image
location by the image name.
Naming convention is: platform – features – type
Example: c2600-js-l_121-3.bin
• c2600 - hardware platform
• js - features set (enterprise)
• l - file format (relocatable, not compressed)
• 121-3 - version & release # (version 12.1 release 3)
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Platform – variable platform that can use image
For example c1700, c2600, c7000
Features –feature sets supported by image.
Type – can contain following characters
• f—The image runs from Flash memory.
• m—The image runs from RAM.
• r—The image runs from ROM.
• l—The image is relocatable.
• z—The image is zip compressed.
• x—The image is mzip compressed.
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Tools and equipment required for setup:
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Three-stage bootup process:
Power-on self test (POST)
Locate and load Cisco IOS
Locate startup configuration file or enter setup mode
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
POST (Power On Self Test) – test hardware
After POST, the bootstrap program is loaded
Bootstrap locates IOS and loads it into RAM
– IOS can be located – flash memory, TFTP server, or
another location
– By default, IOS loads from flash
After IOS is loaded, bootstrap locates startup
configuration file in NVRAM (non-volatile random
access memory)
Startup configuration – when loaded into RAM (working
memory), it become the “running” configuration.
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Loading Cisco IOS
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Show version command output
Router>show version
• IOS version
• Bootstrap program stored in ROM
• Complete filename of IOS
• Type of CPU; amount of RAM
• Number & type of interfaces
• Amount of NVRAM (used to store startup config)
• Amount of Flash (used to store IOS
• Configuration register in hex
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Configuration register
Default setting – 0x2102 (remember this?)
– Loads IOS from flash
– Loads startup-config from NVRAM
Most common settings
• 0x2142 –ignores contents of
NVRAM/configuration
• 0x2120 – The router into ROMmon mode
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Initial ISR Router Configuration
Verifying and troubleshooting bootup process:
View output from the show version command
Use dir flash: and boot flash: in ROMmon mode
View boot system commands [see miage below on next slide]
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Out-of-band management for initial configuration
In-band management over a network connection
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Command Line Interface (CLI): text-based program
Can be used in both in-band or out-of-band
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
SDM
Security Device Manager (SDM): web-based GUI
In-Band only
SDM Express (Basic) or Full package (Advanced
configuration)
Comes preinstalled in flash
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
CLI vs. SDM
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Using Cisco SDM Express and SDM
Follow best practices for installing a new device to ensure
correct functions
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Eight SDM Express configuration screens:
• Overview
• Basic configuration
• LAN IP address
• DHCP
• Internet (WAN)
• Firewall
• Security settings
• Summary
Use Basic NAT Wizard to configure dynamic NAT with
PAT
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Use Cisco IOS CLI to perform an initial router
configuration
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Configure serial and Ethernet interfaces on a router
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
(DTE) Data Terminal Equipment
endpoint of user’s device on the WAN
link; Cisco routers
(DCE) Data Communications
Equipment; provides clock rate;
modem; converts data from router to
acceptable format to cross the WAN
If back-to-back router scenario, one of
the routers will be DCE and one DTE.
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Configure a default route for the Cisco router
Default route used when router does not know where
to send a packet. IP address of
next-hop router
Or
port number
Configure a Cisco router to function as a DHCP server
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Configure static NAT on a Cisco router to enable Internet
access for an internal server
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Back up and restore configuration files using a TFTP server
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Capture and save configuration file output from a terminal
session
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Customer Premise Equipment (CPE) – network devices installed at
customer location.
Configuration checklists ensure that all configuration requirements
are met
Use inventory and configuration checklists and an
installation plan to ensure successful installation
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Types of customer connections over a WAN:
Point-to-point: often called leased lines; typically most
expensive; price based on bandwidth & distance between 2
points
Circuit-switched – similar to a phone call made over a
phone network; example is ISDN or dialup connection;
physical circuit reserved from source to destination
Packet-switched – each customer has a virtual circuit;
example is Frame Relay
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Customer Connections over WAN
Bandwidth and cost influence WAN choices
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Connecting the CPE to the ISP
 Clock rate and serial encapsulation are needed when configuring serial WAN
connections
– Clock rate is set by DCE
– DTE accepts clock rate
 Leased WAN connections use serial connection & require Channel Service
Unit/Data Service Unit (CSU/DSU
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Initial Cisco 2960 Switch Configuration
 Fixed-configuration, standalone devices – does not use modules or flash card
slots. Physical configuration can’t be changed.
 Layer 2 device that directs stream of message coming in from one port, our of
another based on destination MAC address.
Configured using GUI or CLI
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Cisco 2960 switch
Comes preconfigured
Needs to be assigned basic security info
Basic commands (ex: hostname, passwords) sames as
ISR switch.
Configure management IP address
One virtual local area network, VLAN 1 is
preconfigured to provide access to management
functions.
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Switch settings can be configured using the Cisco
IOS CLI
Assign an IP address to the default management
virtual local area network, VLAN1
Check switch components
Connect cables to the switch
Power up the switch and observe POST
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Connect the stand-alone LAN switch to the router and
verify connectivity
Configure port security to prevent unauthorized use
Shut down unused ports
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Switch port security
Port security limits the # of MAC addresses allowed per port.
Set port to access mode using switchport mode access
command
3 ways to configure port security:
Static – MAC addresses are manually assigned using
switchport port-security mac-address [mac-address]
interface config command.
S1# configure terminal
S1(config-if)#interface fastethernet 0/20
S1(config-if)#switchport mode access
S1(config-if)#switchport port-security mac-address
1000.2000.3000
S1(config-if)#end
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Dynamic MAC addresses are dynamically learned & stored in
address table
# of addresses stored can be controlled; default is one
address.
If port is shut down or switch is restarted, address learned
are cleared from the table
S1# configure terminal
 S1(config-if)#interface fastethernet 0/20
 S1(config-if)#switchport mode access
 S1(config-if)#switchport port-security
 S1(config-if)#end
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Sticky – similar to dynamic
Addresses learned are saved to the running-config
 S1# configure terminal
 S1(config-if)#interface fastethernet 0/20
 S1(config-if)#switchport mode access
 S1(config-if)#switchport port-security
 S1(config-if)#switchport port-security maximum 50
 S1(config-if)#switchport port-security mac-address
sticky
 S1(config-if)#end
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Cisco Discovery Protocol (CDP) gathers information about
directly-connected Cisco network devices
Two Cisco devices directly connected on the same local
network are called neighbors
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Describe the most common security threats and
how they impact enterprises
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Common Attacks
Describe the common mitigation techniques that
enterprises use to protect themselves against threats
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Explain the concept of the Network Security Wheel
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Explain the goals of a comprehensive security policy in
an organization
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Explain why the security of routers and their configuration settings is vital
to network operation
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Describe the recommended approach to applying Cisco IOS security
features on network routers
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management
Lessons Learned:
Cisco Device Management.
Enterprise Security
Some bonus Sheets and Tables
09/06/13
Instructional Design-Computer Networking -
Bridges Educational Group
Network Device Management

Contenu connexe

Tendances

Tendances (20)

Doc6 mpls vpn-ppt
Doc6 mpls vpn-pptDoc6 mpls vpn-ppt
Doc6 mpls vpn-ppt
 
Design And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPNDesign And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPN
 
MPLS Presentation
MPLS PresentationMPLS Presentation
MPLS Presentation
 
Mpls vpn toi
Mpls vpn toiMpls vpn toi
Mpls vpn toi
 
How to implement mpls
How to implement mplsHow to implement mpls
How to implement mpls
 
Comparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpnComparison between traditional vpn and mpls vpn
Comparison between traditional vpn and mpls vpn
 
Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010
 
Nokia IES Configuration guide
Nokia IES Configuration guideNokia IES Configuration guide
Nokia IES Configuration guide
 
MPLS ppt
MPLS pptMPLS ppt
MPLS ppt
 
WAN (wide area network)
WAN (wide area network)WAN (wide area network)
WAN (wide area network)
 
Voice over MPLS
Voice over MPLSVoice over MPLS
Voice over MPLS
 
Mpls te
Mpls teMpls te
Mpls te
 
Mpls concepts. Time to Certify
Mpls concepts. Time to CertifyMpls concepts. Time to Certify
Mpls concepts. Time to Certify
 
Mpls
MplsMpls
Mpls
 
Mpls
MplsMpls
Mpls
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
MPLS L2VPN (VLL) Technology
MPLS L2VPN (VLL) TechnologyMPLS L2VPN (VLL) Technology
MPLS L2VPN (VLL) Technology
 
MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)MPLS (Multi-Protocol Label Switching)
MPLS (Multi-Protocol Label Switching)
 
VPLS Fundamental
VPLS FundamentalVPLS Fundamental
VPLS Fundamental
 
Mpls L3_vpn
Mpls L3_vpnMpls L3_vpn
Mpls L3_vpn
 

En vedette

Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 
Fundamental of Secure Socket Layer (SSL) | Part - 2
Fundamental of Secure Socket Layer (SSL) | Part - 2 Fundamental of Secure Socket Layer (SSL) | Part - 2
Fundamental of Secure Socket Layer (SSL) | Part - 2 Vishal Kumar
 
2015.10.05 Updated > Network Device Development - Part 1: Switch
2015.10.05 Updated > Network Device Development - Part 1: Switch2015.10.05 Updated > Network Device Development - Part 1: Switch
2015.10.05 Updated > Network Device Development - Part 1: SwitchCheng-Yi Yu
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web securityrajakhurram
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets LayerNascenia IT
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsDsunte Wilson
 

En vedette (12)

Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
 
SSL Technology
SSL TechnologySSL Technology
SSL Technology
 
CCNA Routing Protocols
CCNA Routing Protocols CCNA Routing Protocols
CCNA Routing Protocols
 
Routing to components
Routing to componentsRouting to components
Routing to components
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Fundamental of Secure Socket Layer (SSL) | Part - 2
Fundamental of Secure Socket Layer (SSL) | Part - 2 Fundamental of Secure Socket Layer (SSL) | Part - 2
Fundamental of Secure Socket Layer (SSL) | Part - 2
 
2015.10.05 Updated > Network Device Development - Part 1: Switch
2015.10.05 Updated > Network Device Development - Part 1: Switch2015.10.05 Updated > Network Device Development - Part 1: Switch
2015.10.05 Updated > Network Device Development - Part 1: Switch
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web security
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 

Similaire à Network device management

Cloud computing and its job opportunities
Cloud computing and its job opportunities Cloud computing and its job opportunities
Cloud computing and its job opportunities Ramya SK
 
How to integration DataPower with Zos
How to integration DataPower with ZosHow to integration DataPower with Zos
How to integration DataPower with ZosShiu-Fun Poon
 
NetDevOps for the Network Dude: How to get started with API's, Ansible and Py...
NetDevOps for the Network Dude: How to get started with API's, Ansible and Py...NetDevOps for the Network Dude: How to get started with API's, Ansible and Py...
NetDevOps for the Network Dude: How to get started with API's, Ansible and Py...Cisco DevNet
 
Cloud and its job oppertunities
Cloud and its job oppertunitiesCloud and its job oppertunities
Cloud and its job oppertunitiesRamya SK
 
Abdelrahman Moussa Curriculum Vitae
Abdelrahman Moussa Curriculum VitaeAbdelrahman Moussa Curriculum Vitae
Abdelrahman Moussa Curriculum VitaeAbdelrahmn Mousaa
 
Shared Memory Communications-Direct Memory Access (SMC-D) Overview
Shared Memory Communications-Direct Memory Access (SMC-D) OverviewShared Memory Communications-Direct Memory Access (SMC-D) Overview
Shared Memory Communications-Direct Memory Access (SMC-D) OverviewzOSCommserver
 
Oracle RAC 12c Best Practices with Appendices DOAG2013
Oracle RAC 12c Best Practices with Appendices DOAG2013Oracle RAC 12c Best Practices with Appendices DOAG2013
Oracle RAC 12c Best Practices with Appendices DOAG2013Markus Michalewicz
 
Synopsis on online shopping by sudeep singh
Synopsis on online shopping by  sudeep singhSynopsis on online shopping by  sudeep singh
Synopsis on online shopping by sudeep singhSudeep Singh
 
Eng.Abd Elrhman.doc
Eng.Abd Elrhman.docEng.Abd Elrhman.doc
Eng.Abd Elrhman.docINOGHOST
 
QRadar_CEddfdfdsfdfdfdfdfdfdfdfdfdfdff.pdf
QRadar_CEddfdfdsfdfdfdfdfdfdfdfdfdfdff.pdfQRadar_CEddfdfdsfdfdfdfdfdfdfdfdfdfdff.pdf
QRadar_CEddfdfdsfdfdfdfdfdfdfdfdfdfdff.pdfmindhackers161
 
How do you deliver your applications to the cloud?
How do you deliver your applications to the cloud?How do you deliver your applications to the cloud?
How do you deliver your applications to the cloud?Michael Elder
 
Ccna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 AnswersCcna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 Answersccna4discovery
 
Building Multi-Channel Data-Aware Applications
Building Multi-Channel Data-Aware ApplicationsBuilding Multi-Channel Data-Aware Applications
Building Multi-Channel Data-Aware Applicationscjolif
 

Similaire à Network device management (20)

Ron.Glenn
Ron.GlennRon.Glenn
Ron.Glenn
 
Cloud computing and its job opportunities
Cloud computing and its job opportunities Cloud computing and its job opportunities
Cloud computing and its job opportunities
 
How to integration DataPower with Zos
How to integration DataPower with ZosHow to integration DataPower with Zos
How to integration DataPower with Zos
 
NetDevOps for the Network Dude: How to get started with API's, Ansible and Py...
NetDevOps for the Network Dude: How to get started with API's, Ansible and Py...NetDevOps for the Network Dude: How to get started with API's, Ansible and Py...
NetDevOps for the Network Dude: How to get started with API's, Ansible and Py...
 
Cloud and its job oppertunities
Cloud and its job oppertunitiesCloud and its job oppertunities
Cloud and its job oppertunities
 
Abdelrahman Moussa Curriculum Vitae
Abdelrahman Moussa Curriculum VitaeAbdelrahman Moussa Curriculum Vitae
Abdelrahman Moussa Curriculum Vitae
 
Ip san-best-practices-en
Ip san-best-practices-enIp san-best-practices-en
Ip san-best-practices-en
 
Shared Memory Communications-Direct Memory Access (SMC-D) Overview
Shared Memory Communications-Direct Memory Access (SMC-D) OverviewShared Memory Communications-Direct Memory Access (SMC-D) Overview
Shared Memory Communications-Direct Memory Access (SMC-D) Overview
 
CIE_overview
CIE_overviewCIE_overview
CIE_overview
 
Cloud ppt
Cloud pptCloud ppt
Cloud ppt
 
Oracle RAC 12c Best Practices with Appendices DOAG2013
Oracle RAC 12c Best Practices with Appendices DOAG2013Oracle RAC 12c Best Practices with Appendices DOAG2013
Oracle RAC 12c Best Practices with Appendices DOAG2013
 
Synopsis on online shopping by sudeep singh
Synopsis on online shopping by  sudeep singhSynopsis on online shopping by  sudeep singh
Synopsis on online shopping by sudeep singh
 
Eng.Abd Elrhman.doc
Eng.Abd Elrhman.docEng.Abd Elrhman.doc
Eng.Abd Elrhman.doc
 
QRadar_CEddfdfdsfdfdfdfdfdfdfdfdfdfdff.pdf
QRadar_CEddfdfdsfdfdfdfdfdfdfdfdfdfdff.pdfQRadar_CEddfdfdsfdfdfdfdfdfdfdfdfdfdff.pdf
QRadar_CEddfdfdsfdfdfdfdfdfdfdfdfdfdff.pdf
 
How do you deliver your applications to the cloud?
How do you deliver your applications to the cloud?How do you deliver your applications to the cloud?
How do you deliver your applications to the cloud?
 
Ccna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 AnswersCcna 4 Chapter 3 V4.0 Answers
Ccna 4 Chapter 3 V4.0 Answers
 
Building Multi-Channel Data-Aware Applications
Building Multi-Channel Data-Aware ApplicationsBuilding Multi-Channel Data-Aware Applications
Building Multi-Channel Data-Aware Applications
 
Cloud Computing Presentation
Cloud Computing PresentationCloud Computing Presentation
Cloud Computing Presentation
 
Cisco data center
Cisco data centerCisco data center
Cisco data center
 
Arun
ArunArun
Arun
 

Plus de Arnold Derrick Kinney (8)

Windows 7 configuration
Windows 7 configurationWindows 7 configuration
Windows 7 configuration
 
Basics of unix
Basics of unixBasics of unix
Basics of unix
 
Managing Network Device Security
Managing Network Device SecurityManaging Network Device Security
Managing Network Device Security
 
Mastering Binary For IPV4
Mastering Binary For IPV4Mastering Binary For IPV4
Mastering Binary For IPV4
 
Ccnp route
Ccnp routeCcnp route
Ccnp route
 
Presentation 3 for Students of professordkinney.com
Presentation 3 for Students of professordkinney.comPresentation 3 for Students of professordkinney.com
Presentation 3 for Students of professordkinney.com
 
Lesson 2 slideshow
Lesson 2 slideshowLesson 2 slideshow
Lesson 2 slideshow
 
Lesson 1 slideshow
Lesson 1 slideshowLesson 1 slideshow
Lesson 1 slideshow
 

Dernier

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Network device management

  • 2. 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 3. Lessons Summary: Configuring Network Devices Enterprise Network Security Managing Cisco Devices  Some Bonus Cheat Sheets 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 4. Configuring Network Devices ISR (Integrated Services Router combines routing, LAN switching, security, voice, & WAN connectivity features. Ideal for small to medium-sized businesses & ISP managed customers. 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 5. Cisco IOS – offered in modules called images IP Base image: entry-level Cisco IOS Images are specific to models of devices 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 6. CISCO IOS Image: Types of Images Two main types of image your router may use: System image - complete Cisco IOS software. This image is loaded when your router boots and is used most of the time. On most platforms, the image is located in Flash memory. Boot image - A subset of the Cisco IOS software. This image is used to perform network booting or to load Cisco IOS images onto the router. This image is also used if the router cannot find a valid system image. Depending on your platform, this image may be called xboot image, rxboot image, bootstrap image, or boot loader/helper image. On some platforms, the boot image is contained in ROM. In others, the boot image can be stored in Flash memory. On these platforms, you can specify which image should be used as the boot image using the boot bootldr global configuration command. Refer to your hardware documentation for information about the boot image used on your router. 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 7. Image Naming Convention You can identify the platform, features and image location by the image name. Naming convention is: platform – features – type Example: c2600-js-l_121-3.bin • c2600 - hardware platform • js - features set (enterprise) • l - file format (relocatable, not compressed) • 121-3 - version & release # (version 12.1 release 3) 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 8. Platform – variable platform that can use image For example c1700, c2600, c7000 Features –feature sets supported by image. Type – can contain following characters • f—The image runs from Flash memory. • m—The image runs from RAM. • r—The image runs from ROM. • l—The image is relocatable. • z—The image is zip compressed. • x—The image is mzip compressed. 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 9. Tools and equipment required for setup: 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 10. Three-stage bootup process: Power-on self test (POST) Locate and load Cisco IOS Locate startup configuration file or enter setup mode 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 11. POST (Power On Self Test) – test hardware After POST, the bootstrap program is loaded Bootstrap locates IOS and loads it into RAM – IOS can be located – flash memory, TFTP server, or another location – By default, IOS loads from flash After IOS is loaded, bootstrap locates startup configuration file in NVRAM (non-volatile random access memory) Startup configuration – when loaded into RAM (working memory), it become the “running” configuration. 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 12. Loading Cisco IOS 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 13. Show version command output Router>show version • IOS version • Bootstrap program stored in ROM • Complete filename of IOS • Type of CPU; amount of RAM • Number & type of interfaces • Amount of NVRAM (used to store startup config) • Amount of Flash (used to store IOS • Configuration register in hex 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 14. Configuration register Default setting – 0x2102 (remember this?) – Loads IOS from flash – Loads startup-config from NVRAM Most common settings • 0x2142 –ignores contents of NVRAM/configuration • 0x2120 – The router into ROMmon mode 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 15. Initial ISR Router Configuration Verifying and troubleshooting bootup process: View output from the show version command Use dir flash: and boot flash: in ROMmon mode View boot system commands [see miage below on next slide] 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 16. Out-of-band management for initial configuration In-band management over a network connection 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 17. Command Line Interface (CLI): text-based program Can be used in both in-band or out-of-band 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 18. SDM Security Device Manager (SDM): web-based GUI In-Band only SDM Express (Basic) or Full package (Advanced configuration) Comes preinstalled in flash 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 19. CLI vs. SDM 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 20. Using Cisco SDM Express and SDM Follow best practices for installing a new device to ensure correct functions 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 21. 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management Eight SDM Express configuration screens: • Overview • Basic configuration • LAN IP address • DHCP • Internet (WAN) • Firewall • Security settings • Summary
  • 22. Use Basic NAT Wizard to configure dynamic NAT with PAT 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 23. Use Cisco IOS CLI to perform an initial router configuration 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 24. Configure serial and Ethernet interfaces on a router 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management (DTE) Data Terminal Equipment endpoint of user’s device on the WAN link; Cisco routers (DCE) Data Communications Equipment; provides clock rate; modem; converts data from router to acceptable format to cross the WAN If back-to-back router scenario, one of the routers will be DCE and one DTE.
  • 25. 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management Configure a default route for the Cisco router Default route used when router does not know where to send a packet. IP address of next-hop router Or port number
  • 26. Configure a Cisco router to function as a DHCP server 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 27. Configure static NAT on a Cisco router to enable Internet access for an internal server 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 28. Back up and restore configuration files using a TFTP server 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 29. Capture and save configuration file output from a terminal session 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 30. 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management Customer Premise Equipment (CPE) – network devices installed at customer location. Configuration checklists ensure that all configuration requirements are met
  • 31. Use inventory and configuration checklists and an installation plan to ensure successful installation 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 32. Types of customer connections over a WAN: Point-to-point: often called leased lines; typically most expensive; price based on bandwidth & distance between 2 points Circuit-switched – similar to a phone call made over a phone network; example is ISDN or dialup connection; physical circuit reserved from source to destination Packet-switched – each customer has a virtual circuit; example is Frame Relay 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 33. Customer Connections over WAN Bandwidth and cost influence WAN choices 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 34. Connecting the CPE to the ISP  Clock rate and serial encapsulation are needed when configuring serial WAN connections – Clock rate is set by DCE – DTE accepts clock rate  Leased WAN connections use serial connection & require Channel Service Unit/Data Service Unit (CSU/DSU 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 35. Initial Cisco 2960 Switch Configuration  Fixed-configuration, standalone devices – does not use modules or flash card slots. Physical configuration can’t be changed.  Layer 2 device that directs stream of message coming in from one port, our of another based on destination MAC address. Configured using GUI or CLI 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 36. Cisco 2960 switch Comes preconfigured Needs to be assigned basic security info Basic commands (ex: hostname, passwords) sames as ISR switch. Configure management IP address One virtual local area network, VLAN 1 is preconfigured to provide access to management functions. 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 37. 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management Switch settings can be configured using the Cisco IOS CLI Assign an IP address to the default management virtual local area network, VLAN1
  • 38. Check switch components Connect cables to the switch Power up the switch and observe POST 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 39. Connect the stand-alone LAN switch to the router and verify connectivity Configure port security to prevent unauthorized use Shut down unused ports 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 40. Switch port security Port security limits the # of MAC addresses allowed per port. Set port to access mode using switchport mode access command 3 ways to configure port security: Static – MAC addresses are manually assigned using switchport port-security mac-address [mac-address] interface config command. S1# configure terminal S1(config-if)#interface fastethernet 0/20 S1(config-if)#switchport mode access S1(config-if)#switchport port-security mac-address 1000.2000.3000 S1(config-if)#end 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 41. Dynamic MAC addresses are dynamically learned & stored in address table # of addresses stored can be controlled; default is one address. If port is shut down or switch is restarted, address learned are cleared from the table S1# configure terminal  S1(config-if)#interface fastethernet 0/20  S1(config-if)#switchport mode access  S1(config-if)#switchport port-security  S1(config-if)#end 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 42. Sticky – similar to dynamic Addresses learned are saved to the running-config  S1# configure terminal  S1(config-if)#interface fastethernet 0/20  S1(config-if)#switchport mode access  S1(config-if)#switchport port-security  S1(config-if)#switchport port-security maximum 50  S1(config-if)#switchport port-security mac-address sticky  S1(config-if)#end 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 43. Cisco Discovery Protocol (CDP) gathers information about directly-connected Cisco network devices Two Cisco devices directly connected on the same local network are called neighbors 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 44. Describe the most common security threats and how they impact enterprises 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 45. 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management Common Attacks
  • 46. Describe the common mitigation techniques that enterprises use to protect themselves against threats 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 47. Explain the concept of the Network Security Wheel 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 48. Explain the goals of a comprehensive security policy in an organization 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 49. Explain why the security of routers and their configuration settings is vital to network operation 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 50. Describe the recommended approach to applying Cisco IOS security features on network routers 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 51. 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 52. 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 53. 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 54. 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 55. 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management
  • 56. Lessons Learned: Cisco Device Management. Enterprise Security Some bonus Sheets and Tables 09/06/13 Instructional Design-Computer Networking - Bridges Educational Group Network Device Management

Notes de l'éditeur

  1. Bonus cheat Sheets On CCNA Print it and keep it to yourself so quick referencing.