tag:blogger.com,1999:blog-33903678820933681312024-03-04T21:06:11.222-08:00IT & IAnonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.comBlogger25125tag:blogger.com,1999:blog-3390367882093368131.post-42291515592185660592011-06-09T11:11:00.000-07:002011-06-10T14:49:51.403-07:00Freedom & Ubuntu<div dir="ltr" style="text-align: left;" trbidi="on"><table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjHs-eZH4sLv-FGR1yIfiPA8WYPE0gXz8HmRWcSy1x_3V0t9kAx_CRXsL3oyCcDZpX_UlA0fQWFDNogSrACC_0lh58cLy673M0en1Fx347z-4twQHMsxeDBKXUsGDlr0CLYex8KnUBA1M/s1600/Ubuntu+2011.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjHs-eZH4sLv-FGR1yIfiPA8WYPE0gXz8HmRWcSy1x_3V0t9kAx_CRXsL3oyCcDZpX_UlA0fQWFDNogSrACC_0lh58cLy673M0en1Fx347z-4twQHMsxeDBKXUsGDlr0CLYex8KnUBA1M/s200/Ubuntu+2011.jpg" width="151" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span class="Apple-style-span" style="color: #444444; font-family: Verdana, Arial, Helvetica, sans-serif; line-height: 16px;"><b><span class="Apple-style-span" style="font-size: x-small;">Writers</span><span class="Apple-style-span" style="font-size: xx-small;">:</span></b></span><span class="Apple-style-span" style="color: #444444; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 13px; line-height: 16px;"><span class="Apple-style-span" style="font-size: xx-small;"> Matthew Helmke,<br />
Andrew Hudson, Paul Hudson<br />
<b>Language:</b> English<br />
<b>Paperback:</b> 769 pages<br />
<b>Data:</b> March 15, 2011<br />
<b>Format:</b> </span></span><span class="Apple-style-span" style="color: #444444; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: x-small;"><span class="Apple-style-span" style="line-height: 16px;">PDF</span></span><br />
<span class="Apple-style-span" style="color: blue; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: large;"><span class="Apple-style-span" style="line-height: 16px;"><b><a href="http://www.4shared.com/document/BGfUNwGG/Ubuntu.html?"><span class="Apple-style-span" style="color: blue;">FREE DOWNLOAD!</span></a></b></span></span></td></tr>
</tbody></table><br />
</div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com0tag:blogger.com,1999:blog-3390367882093368131.post-78030601982082071162011-06-08T16:52:00.000-07:002011-06-08T16:52:33.353-07:00PuTTY Config!<div dir="ltr" style="text-align: left;" trbidi="on">PuTTY is a free and open source terminal emulator application which can act as a client for the<b> SSH</b>, Telnet, logging, and raw TCP computing protocols and as a serial console client. The name "PuTTY" has no definitive meaning, though 'tty' is the name for a terminal in the Unix tradition, usually held to be short for teletype.<br />
<br />
PuTTY was originally written for Microsoft Windows, but it has been ported to various other operating systems. Official ports are available for some Unix-like platforms, with work-in-progress ports to Classic Mac OS and Mac OS X, and unofficial ports have been contributed to platforms such as Symbian and Windows Mobile.<br />
<br />
<div><br />
<div><b>PuTTY Vs. Telnet? PuTTY win!<span class="Apple-style-span" style="color: blue;"> <a href="http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html"><span class="Apple-style-span" style="color: blue;">download</span></a></span></b></div><div><b><br />
</b></div><div><b>PuTTY </b><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 20px;"> </span><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 20px;">|ـــــ</span><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 15px; line-height: 20px;"> </span><i><b><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 20px;">Serial </span><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 20px;"> </span></b></i><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 20px;">|ـــــ<i> <b>Enter </b></i></span><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 20px;"><b><i> </i></b></span><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif;"><span class="Apple-style-span" style="line-height: 20px;">|ـــــ<b><i> </i></b></span></span><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif;"><span class="Apple-style-span" style="line-height: 20px;"><b><i>en</i></b> or <i><b>enable</b></i> </span></span><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 20px;"> </span><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 20px;">|ـــــ<i><b> conf t</b></i> </span><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 20px;"> </span><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 20px;">|ـــــ<i><b> line con</b></i> or <i><b>line console 0</b></i></span><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 20px;"><i><b> </b></i></span></div><div><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 20px;"><i>router name#<b> show interface status</b></i></span></div><div><span class="Apple-style-span" style="font-size: x-small;"><i><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 20px;"><b>address </b></span><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 20px;"> </span></i><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; line-height: 20px;">|ـــــ <i><b>add</b></i></span></span></div><div></div></div></div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com0tag:blogger.com,1999:blog-3390367882093368131.post-24482801522067193822011-05-28T18:06:00.000-07:002011-05-31T18:47:57.747-07:00ARP (Address Resolution Protocol)<div dir="ltr" style="text-align: left;" trbidi="on">It help ip network devices find other device on the same segment or Vlan |ـــــ ARP uses a local broad cast to discover neighboring device |ـــــ ARP resolves ip addresses to mac addresses so that machines on the same data link layer media can communicate with each other.<br />
<br />
<br />
<b>Protocol </b><b> </b><b> Protocol ID</b><br />
<span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: x-small; line-height: 17px;"><i style="font-style: normal; font-weight: bold;">Internet Control Message Protocol</i> (<i style="font-style: normal; font-weight: bold;"><a href="http://en.wikipedia.org/wiki/Internet_Control_Message_Protocol"><span class="Apple-style-span" style="color: blue;">ICMP</span></a></i>) </span><b> </b><span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: x-small; line-height: 17px;"> </span><b> </b><b> </b><span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: x-small; line-height: 17px;"> </span>1<br />
<span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: x-small; line-height: 17px;"><i style="font-style: normal; font-weight: bold;">Transmission Control Protocol</i> (<i style="font-style: normal; font-weight: bold;"><a href="http://en.wikipedia.org/wiki/Transmission_Control_Protocol"><span class="Apple-style-span" style="color: blue;">TCP</span></a></i>) </span><b> </b><span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: x-small; line-height: 17px;"> </span><b> </b><span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: x-small; line-height: 17px;"> </span>6<br />
<span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: x-small; line-height: 17px;"><i style="font-style: normal; font-weight: bold;">Interior Gateway Routing Protocol</i> (<i style="font-style: normal; font-weight: bold;"><a href="http://en.wikipedia.org/wiki/Interior_Gateway_Routing_Protocol"><span class="Apple-style-span" style="color: blue;">IGRP</span></a></i>)</span> <b> </b> <span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: x-small; line-height: 17px;"> </span><b> </b><span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: x-small; line-height: 17px;"> </span> 9<br />
<span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: x-small; line-height: 17px;"><i style="font-style: normal; font-weight: bold;">User Datagram Protocol</i> (<i style="font-style: normal; font-weight: bold;"><a href="http://www.google.com/url?sa=t&source=web&cd=1&sqi=2&ved=0CCQQFjAA&url=http%3A%2F%2Fen.wikipedia.org%2Fwiki%2FUser_Datagram_Protocol&ei=wJDhTdb9M6TViALc0-28Bg&usg=AFQjCNF0iSPrKO-nmxqFwfzCFfGheSjsRA&sig2=SEVy_lge7x64-EKNFVAsXw"><span class="Apple-style-span" style="color: blue;">UDP</span></a></i>) </span><b> </b><span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: x-small; line-height: 17px;"> </span><b> </b><span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: x-small; line-height: 17px;"> </span><b> </b><span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: x-small; line-height: 17px;"> 17</span><br />
<span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: x-small; line-height: 17px;"><i style="font-style: normal; font-weight: bold;">Internet Protocol version 6</i> (<i style="font-style: normal; font-weight: bold;"><a href="http://www.google.com/url?sa=t&source=web&cd=1&sqi=2&ved=0CDcQFjAA&url=http%3A%2F%2Fen.wikipedia.org%2Fwiki%2FIPv6&ei=ApHhTczGCezRiAKLhsWwBg&usg=AFQjCNFRwd6CDQIgmvRF0-0AtfmtnkIuXA&sig2=i0226hIns6S6eTkgBX0Raw"><span class="Apple-style-span" style="color: blue;">IPv6</span></a></i>) </span><b> </b><span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: x-small; line-height: 17px;"> </span><span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: x-small; line-height: 17px;"> </span><b> </b><span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: x-small; line-height: 17px;"> 41</span><br />
<span class="Apple-style-span" style="font-family: sans-serif; font-size: medium;"><span class="Apple-style-span" style="line-height: 19px;">Internet-work</span></span><span class="Apple-style-span" style="font-family: sans-serif; font-size: 13px; line-height: 19px;"> Packet Exchange</span><span class="Apple-style-span" style="font-family: sans-serif; font-size: 13px; line-height: 19px;"> </span><span class="Apple-style-span" style="font-family: sans-serif; font-size: 13px; line-height: 19px;">(</span><span class="Apple-style-span" style="font-family: sans-serif; font-size: 13px; line-height: 19px;"><a href="http://en.wikipedia.org/wiki/Internetwork_Packet_Exchange"><span class="Apple-style-span" style="color: blue;">IPX</span></a></span><span class="Apple-style-span" style="font-family: sans-serif; font-size: 13px; line-height: 19px;">) </span><b> </b><span class="Apple-style-span" style="font-family: sans-serif; font-size: 14px; line-height: 19px;"> 111</span></div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com0tag:blogger.com,1999:blog-3390367882093368131.post-87471157452572856422011-05-28T17:00:00.000-07:002011-05-28T17:00:17.041-07:00Internet Control Message Protocol (ICMP)<div dir="ltr" style="text-align: left;" trbidi="on"><ul style="text-align: left;"><li>It is used to send error & control information between ip network devices.</li>
<li>There are many diffident messages that can be shared, including the following: </li>
</ul>1. Echo request: Determines whether on ip node ( a host or a router is available on network.) <br />
2. Echo Reply: Replies to ICMP echo request.<br />
3. Destination Unreachable: Informs the host that a datagram can't be delivered.<br />
4. Source Quench: Informs the host to lower the rate at which it sends datagram because of congestion.<div>5. Redirect: Informs the host of a preferred rate.</div><div>6. Time Exceeded: Indicate that the TTL of IP datagram has expired.<br />
<div><br />
</div></div></div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com0tag:blogger.com,1999:blog-3390367882093368131.post-85659151660671366402011-05-21T01:11:00.000-07:002011-05-21T01:11:00.747-07:00What is Datagram?<div dir="ltr" style="text-align: left;" trbidi="on">A <a href="http://itakeccie.blogspot.com/">datagram </a>is a basic transfer unit associated with a packet-switched network in which the delivery arrival time and order are not guaranteed. A datagram consists of header and data areas, where the header contains information sufficient for routing from the originating equipment to the destination without relying on prior exchanges between the equipment and the network. The source and destination addresses as well as a type field are found in the header of a <a href="http://itakeccie.blogspot.com/">datagram</a>.<br />
<a name='more'></a>The term datagram is often considered synonymous to "packet", but there are some nuances. First, the term packet applies to any message formatted as a packet, while the term datagram is generally reserved for packets of an "unreliable" service. An "unreliable" service does not notify the user if delivery fails. For example, IP itself provides an unreliable service and UDP over IP also provides an unreliable one. That is why UDP packets are generally called datagrams. Second, if a <a href="http://itakeccie.blogspot.com/">datagram</a> fragments, then its fragments may be referred as packets, but not as datagrams. However, TCP refers to its fragments as TCP segments, not packets, presumably to assert that its fragments are reliable.</div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com0tag:blogger.com,1999:blog-3390367882093368131.post-9828451196404518752011-05-15T20:08:00.000-07:002011-05-22T11:08:15.922-07:00Any thing About cisco Security Device Manager (SDM)<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="margin-bottom: 0px; margin-left: 1em; margin-right: 1em; margin-top: 0px; text-align: center;"></div><div class="separator" style="margin-bottom: 0px; margin-left: 1em; margin-right: 1em; margin-top: 0px; text-align: center;"></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;"><table cellpadding="0" cellspacing="0" class="tr-caption-container" style="clear: left; float: right; margin-bottom: 1em; text-align: right;"><tbody>
<tr><td style="text-align: center;"><a href="http://findicons.com/files/icons/2198/dark_glass/128/xine.png" imageanchor="1" style="clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" src="http://findicons.com/files/icons/2198/dark_glass/128/xine.png" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><a href="http://www.4shared.com/video/4a2GinEj/Installing_Cisco_Security_Devi.html?">Part 3</a></td></tr>
</tbody></table><div style="text-align: left;"><b>Installing Cisco Security Device Manager (SDM)</b></div></div><table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: left; margin-right: 1em; text-align: left;"><tbody>
<tr><td style="text-align: center;"><a href="http://findicons.com/files/icons/2198/dark_glass/128/xine.png" imageanchor="1" style="clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" src="http://findicons.com/files/icons/2198/dark_glass/128/xine.png" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><a href="http://www.4shared.com/video/EOStN6kH/Installing_Cisco_Security_Devi.html?">Part 1</a></td></tr>
</tbody></table><table cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><img border="0" src="http://findicons.com/files/icons/2198/dark_glass/128/xine.png" style="margin-left: auto; margin-right: auto;" /></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><a href="http://www.4shared.com/video/rZkRpYaB/Installing_Cisco_Security_Devi.html?">Part 2</a></td></tr>
</tbody></table><table cellpadding="0" cellspacing="0" class="tr-caption-container" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="http://www.blogger.com/goog_1867459292"><img border="0" height="150" src="http://www.ereleases.com/prfuel/wp-content/uploads/2010/06/video_film.jpg" width="200" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><b><a href="http://www.4shared.com/video/d8Kg4Oxf/Security_Device_Manager__SDM__.html?">Security Device Manager (SDM) - Cisco CCNA Security Training</a></b></td></tr>
</tbody></table><div class="separator" style="clear: both; text-align: center;"></div></div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com0tag:blogger.com,1999:blog-3390367882093368131.post-34556506591178364612011-05-14T22:33:00.000-07:002011-05-14T22:33:45.611-07:00Do you want to have FREEDOM ?<div dir="ltr" style="text-align: left;" trbidi="on"><blockquote></blockquote><table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right; text-align: left;"><tbody>
<tr><td style="text-align: center;"><a href="http://www.freebooklinks.com/images/bookcovers/1178370619_512kceds0fl.jpg" style="clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" src="http://www.freebooklinks.com/images/bookcovers/1178370619_512kceds0fl.jpg" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span class="Apple-style-span" style="font-size: small;"><b>Publisher:</b> Hall PTR<br />
<b>Language:</b> English<br />
<b>ISBN:</b> 0132435942<br />
<b>Paperback: </b>448 pages<br />
<b>Data:</b> August 11, 2006<br />
<b>Format:</b> PDF</span></td></tr>
</tbody></table><blockquote></blockquote><table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="http://www.freebooklinks.com/images/bookcovers/1178362192_51vp547amvl.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="http://www.freebooklinks.com/images/bookcovers/1178362192_51vp547amvl.jpg" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span class="Apple-style-span" style="color: #444444; font-family: Verdana, Arial, Helvetica, sans-serif;"><b><span class="Apple-style-span" style="font-size: small;">P</span><span class="Apple-style-span" style="font-size: xx-small;">ublisher:</span></b></span><span class="Apple-style-span" style="color: #444444; font-family: Verdana, Arial, Helvetica, sans-serif;"><span class="Apple-style-span" style="font-size: xx-small;"> Apress<br />
<b>Language:</b> English<br />
<b>ISBN:</b> 1590596277<br />
<b>Paperback:</b> 608 pages<br />
<b>Data:</b> March 15, 2006<br />
<b>Format:</b> </span></span><span class="Apple-style-span" style="color: #444444; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: small;">PDF</span></td></tr>
</tbody></table><br />
<blockquote></blockquote><div class="separator" style="clear: both; text-align: center;"></div></div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com0tag:blogger.com,1999:blog-3390367882093368131.post-35513308969125050382011-05-13T12:25:00.000-07:002011-05-14T21:53:09.425-07:00Using the Pipe<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhy2nuzPF3oTdMsLsQLC2uCRt1a7trT3E1MY_dTCL8WgWwj0YMQvB9lJn0qIjZrD6ivTqywWJbZfIhlwxa7BEy4NW6XRza5Qg-IaILWhja7bDkAZELnyYL3dIaUTdm2L9uQ0FzaG8mbTP8/s1600/607.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="125" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhy2nuzPF3oTdMsLsQLC2uCRt1a7trT3E1MY_dTCL8WgWwj0YMQvB9lJn0qIjZrD6ivTqywWJbZfIhlwxa7BEy4NW6XRza5Qg-IaILWhja7bDkAZELnyYL3dIaUTdm2L9uQ0FzaG8mbTP8/s200/607.jpg" width="200" /></a></div><span class="Apple-style-span" style="border-collapse: collapse; font-family: arial, sans-serif; font-size: 15px;"> It is the output modifier. This pipe ( | ) allow us to wade through all the configurations or other long out puts & get straight to our goods fast.<br />
<br />
<b>Arman#sh run | ?</b><br />
<i>Append Append redirected out put to URL ( URLs supporting append operation only )<br />
Begin Begin with the line that matches.</i><br />
<i></i></span><br />
<a name='more'></a><br />
<a href="http://www.blogger.com/post-edit.g?blogID=3390367882093368131&postID=3551330896912505038" name="more" style="color: #2244bb;" target="_blank"></a><i>Exclude Exclude line that match.<br />
Include Include line that match.<br />
Redirect Redirect out put to URL.<br />
Section Filter a section of out put.<br />
Tee </i><i>Copy out put to URL.</i><br />
<div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><b></b><br />
<b>Arman#sh run | begin interface </b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><i>interface fast Ether net 0/0</i></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><i>description sales VLAN</i></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><i>ip address 10.10.10.1 255.255.255.248</i></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><i>duplex auto </i></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><i>Speed auto</i></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><i>!</i></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><i>interface fast Ethernet 0/1</i></div></div></div></div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com1tag:blogger.com,1999:blog-3390367882093368131.post-73026136935732025082011-05-07T09:09:00.000-07:002011-05-07T09:09:00.808-07:00Setting up SSH<div dir="ltr" style="text-align: left;" trbidi="on">Which creates a more secure session than the Telnet app that use an uncrypted data stream.<br />
Here are the steps to setting up SSH:<br />
1. Set your host name: <br />
<i>Router(config)#host name Rezakhani</i><br />
<i><br />
</i><br />
2. Set the domain name (both the host name & domain name are required for the encryption keys to be generated) :<br />
<i>Rezakhani(config)# ip domain -name ArmanRezakhani.com</i><br />
<br />
3. Generate the encryption keys for security the session:<br />
<i>Rezakhani(config)# crypto key generate rsa general -keys modulus ?</i><br />
<i><360-2048> size of the key modulus [360-2048]</i><br />
<i>Rezakhani(config)# crypto key generate rsa general -keys modulus 1024</i><br />
<i><br />
</i><br />
- The name for keys will be Rezakhani.ArmanRezakhani.com<br />
- % The key modulus size is 1024 bits<br />
<br />
<a name='more'></a>- % Generating 1024 bit RSA keys, will be non-exportable ...[Ok]<br />
- * June 24 9:25:30.035: %SSH-5-ENABLED: SSH 1.99<br />
has been enabled.<br />
<br />
4. Set the max idle timer for a SSH Session:<br />
<i>Rezakhani(Config)# ip SSH time -out ?</i><br />
<i><1-120> SSH time -out interval (secs)</i><br />
<i>Rezakhani (config)# ip ssh time -out 60</i><br />
<i><br />
</i><br />
5. Set the max failed attempts for an SSH connection:<br />
<i>Rezakhani(config)# ip ssh authentication -retries ?</i><br />
<i><0-5> number of authentication retries</i><br />
<i>Rezakhani (config)# ip ssh authentication -retries 2</i><br />
<i><br />
</i><br />
6. Connect to the vty line of the router:<br />
<i>Rezakhani (config)# line vty0 1180</i><br />
<i><br />
</i><br />
7. last, configure SSH & the Telnet as access protocols:<br />
<i>Rezakhani (config-line)# than sport input ssh telnet.</i><br />
<i><br />
</i><br />
<ul style="text-align: left;"><li>If you do not use the key word telnet at the end of the command string, then only SSH will work on the router.</li>
<li>I am not suggesting you use either way, but just understand that SSH is more secure than Telnet</li>
</ul><div class="separator" style="clear: both; text-align: center;"><a href="http://abuhawa.files.wordpress.com/2008/10/ssh-tunnel.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="200" src="http://abuhawa.files.wordpress.com/2008/10/ssh-tunnel.gif" width="320" /></a></div><div style="text-align: left;"><br />
</div><br />
<div style="text-align: center;"><i>*** <b>You can download the SSH software <a href="http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html"><span class="Apple-style-span" style="color: red;">here</span></a></b>,<b> called</b> <b>PuTTY ***</b></i></div></div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com1tag:blogger.com,1999:blog-3390367882093368131.post-83479001440714447252011-05-07T04:44:00.000-07:002011-05-08T15:40:47.222-07:00Do command<div dir="ltr" style="text-align: left;" trbidi="on"><div style="text-align: justify;">** Beginning with IOS version 12.3</div><ul style="text-align: left;"><li style="text-align: justify;">Cisco has finally added a command to the IOS that always you to view the configuration & statics from within configuration mode.</li>
</ul><div style="text-align: justify;"><a href="http://www.udidahan.com/wp-content/uploads/Configuration_icon_by_obsilion.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em; text-align: justify;"><img border="0" height="196" src="http://www.udidahan.com/wp-content/uploads/Configuration_icon_by_obsilion.png" width="200" /></a> ** In fact with a pre -12.3 router,</div><br />
<ul style="text-align: left;"><li style="text-align: justify;">you'd get the following error if you tried to view the configuration from global - Config</li>
</ul><blockquote><div style="text-align: justify;">you see:</div><i></i><br />
<div style="text-align: justify;"><i><span class="Apple-style-span" style="font-style: normal;"><i>Router (config)# sh run</i></span></i></div><i></i><br />
<div style="text-align: justify;"><i><span class="Apple-style-span" style="font-style: normal;"><i> ^</i></span></i></div><i><div style="text-align: justify;"><span class="Apple-style-span" style="font-style: normal;"><i>% invalid input detected at ' ^ ' marker</i></span></div></i></blockquote><div style="text-align: left;"><ul style="text-align: left;"><li style="text-align: justify;">Compare that to the output i got from entering that same command on my router that's running the 12.4 IOS</li>
</ul><div style="text-align: justify;">Enter configuration commands, one per line. End with CNTL/Z</div><div style="text-align: justify;"><br />
</div></div><div style="text-align: left;"><a name='more'></a><i>Hot (config)# do show ru</i></div><div style="text-align: left;">Building configuration...</div><div style="text-align: left;">Current configuration : 3276 bytes</div><div style="text-align: left;">!</div><div style="text-align: left;">[out put cut]</div><div style="text-align: left;"><br />
</div><div style="text-align: left;"><i>Hot (config)# do sh int f0/0</i></div><div style="text-align: left;">FastEthernet 0/0 is UP, line protocol is down</div><div style="text-align: left;">Hardware is MV96340 Ethernet, address is 001a.2f55.c9e8</div><div style="text-align: left;">Description: sales Vlan</div><div style="text-align: left;">[out put cut]</div><div style="text-align: left;"><br />
</div><div style="text-align: left;">** going back to the example of encrypting our passwords the do command would definitely have gotten the party started sooner</div><div style="text-align: left;"> so, my friends, this is a very, very good thing indeed</div></div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com0tag:blogger.com,1999:blog-3390367882093368131.post-45860115859128631272011-05-06T03:33:00.000-07:002011-05-06T03:33:00.121-07:00OSI v TCP/IP<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://epicdoom.com/images/1_TCPIP_and_OSI_models.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="320" src="http://epicdoom.com/images/1_TCPIP_and_OSI_models.jpg" width="233" /></a></div><div style="text-align: justify;"><b>OSI:</b></div><div style="text-align: justify;">you can see it, <a href="http://itakeccie.blogspot.com/2011/04/osi-layers.html"><span class="Apple-style-span" style="color: #cc0000;">HERE</span></a></div><div style="text-align: justify;"><b><br />
</b></div><div style="text-align: left;"><b><a href="http://www.blogger.com/"></a><span id="goog_2089963565"></span><span id="goog_2089963566"></span>TCP/IP:</b></div><div style="text-align: justify;"></div><ul><li style="text-align: left;">Rout able: it can pass through routers.</li>
<li style="text-align: left;">Connect dissimilar systems: Win, Mac, Unix, etc...</li>
<li style="text-align: left;">Method of access to the inventor. </li>
</ul><div style="text-align: left;"><span class="Apple-style-span" style="color: #6aa84f;">App Layer:</span> using an app, it gains access to the network.</div><div style="text-align: left;">Telnet, FTP, TFTP , NFS, SMTP, LPD, DNS, DHCP.</div><div style="text-align: left;"><span class="Apple-style-span" style="color: #274e13;">Transportation:</span> provides communication sessions between the two computers. TCP, UDP</div><div style="text-align: left;"><span class="Apple-style-span" style="background-color: white;"><span class="Apple-style-span" style="color: cyan;">Internet Layer:</span></span> routers the data from it's source to it's source to its destination. ARP, RARP, IP, ICMP, IGMP.</div><div style="text-align: left;"><span class="Apple-style-span" style="color: #0b5394;">Network Layer:</span> it sends & receive data on the wire. Ethernet, Token Ring, Frame, Relay, ATM </div><div style="text-align: left;"><br />
</div><div style="text-align: left;">(Well-Know Port Numbers:</div><div style="text-align: left;">FTP: 20 & 21, SMTP: 25, DNS: 53, Telnet:23, HTTP: 80, HTTPS: 443)</div><div><br />
<a name='more'></a></div><div class="separator" style="clear: both; text-align: center;"><a href="http://www.ml-ip.com/assets/images/tcpip-layers.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="274" src="http://www.ml-ip.com/assets/images/tcpip-layers.gif" width="400" /></a></div><div class="separator" style="clear: both; text-align: center;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><br />
</div><div class="separator" style="clear: both; text-align: left;"><span class="Apple-style-span" style="color: red; font-size: xx-small;"><i>** IMPORTANT FIELDS</i></span></div><div class="separator" style="clear: both; text-align: left;"><span class="Apple-style-span" style="font-family: inherit; font-size: x-large;"><b>TCP Segment:</b></span></div><div class="separator" style="clear: both; text-align: left;"><br />
</div><div class="separator" style="clear: both; text-align: left;"></div><ul style="text-align: left;"><li>Source port: sending App port number</li>
<li>Destination port: receiving App number</li>
<li>Sequence number: maintains reliability & sequencing</li>
<li> Acknowledgement number: used to acknowledge received segments formation .</li>
<li>Windows: the number of segments that are allowed to be sent before waiting for an acknowledgement from the destination.</li>
<li>Checksum: CRC of the header & data.</li>
<li>Data: user App information. </li>
</ul><br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://penguin.dcs.bbk.ac.uk/academic/networks/transport-layer/tcp/tcp-segment.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://penguin.dcs.bbk.ac.uk/academic/networks/transport-layer/tcp/tcp-segment.gif" /></a></div></div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com0tag:blogger.com,1999:blog-3390367882093368131.post-53122982830649842362011-05-04T15:33:00.000-07:002011-05-04T15:33:00.212-07:00Subneting class c addresses **Normal Way!**<div dir="ltr" style="text-align: left;" trbidi="on">Before i start this article i should say don't worry if you can't understanding it! you can see the <a href="http://itakeccie.blogspot.com/2011/04/subneting-class-c-address-fast-way.html">fast way</a>!<br />
<br />
- In class C address, only 8 bits are available for defining the hosts.<br />
- Remember that subnet bits start at the left & go to the right without skipping bits.<br />
- This means that the only class C subnet mask can be following.<br />
<br />
Binary Decimal CIDR<br />
00000000 0 /24<br />
10000000 128 /25<br />
11000000 192 /26<br />
11100000 224 /27<br />
<br />
** We can't use /31 or /32 because we have to at least 2 host bits for <b>assigning IP address to hosts</b></div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com0tag:blogger.com,1999:blog-3390367882093368131.post-1957755753348822972011-05-04T11:11:00.000-07:002011-05-05T15:00:20.598-07:00Robots & Transportation Network<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://dc307.4shared.com/download/j3ikOHJr/modulnetworktransportation.flv?tsid=20110502-001548-6f4dfc5b"><img border="0" src="http://icons.iconarchive.com/icons/babasse/imod/96/Download-icon.png" /></a><a href="http://www.4shared.com/video/j3ikOHJr/modulnetworktransportation.html?"><img border="0" src="http://www.softicons.com/download/folder-icons/goodies-folder-icons-by-samurai3/png/128/BlueGreenEye.png" /></a></div><div class="separator" style="clear: both; text-align: center;"><span class="Apple-style-span" style="font-family: tahoma;"></span></div><h1 class="entry-title" style="line-height: 1.3em; margin-bottom: 5px; margin-left: 0px; margin-right: 0px; margin-top: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;"><span class="Apple-style-span" style="font-size: small; font-weight: normal;">فیلم ساخت و عملکرد یک <a href="http://itakeccie.blogspot.com/">شبکه</a> حمل و نقل اتوماتیک به وسیله لگو و <a href="http://itakeccie.blogspot.com/">رباتهای</a> مختلف</span></h1><div style="text-align: center;">Construction methods and <a href="http://itakeccie.blogspot.com/">performance</a> of a transportation network by automated various robots</div><br />
</div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com0tag:blogger.com,1999:blog-3390367882093368131.post-28055777505915020872011-05-02T21:09:00.000-07:002011-05-05T14:58:55.145-07:00نکاتی در مورد امنیت شبکه (PERSIAN)<div dir="ltr" style="text-align: left;" trbidi="on"><span class="Apple-style-span" style="color: #333333; font-family: tahoma; font-size: 13px; line-height: 19px;"></span><br />
<div style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><a href="http://pishnet.com/wp-content/uploads/2011/05/security.jpg" style="clear: left; color: #2c445e; float: left; margin-bottom: 1em; margin-right: 1em; text-decoration: none;"><img alt="" class="alignnone size-medium wp-image-804" height="225" src="http://pishnet.com/wp-content/uploads/2011/05/security-300x225.jpg" style="border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;" title="security" width="300" /></a></div><div dir="rtl" style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: right;"><div style="text-align: justify;"><a href="http://pishnet.com/wp-content/uploads/2011/05/security.jpg" style="color: #2c445e; text-decoration: none;"></a>امنیت شبکه یکی از مورد بسیار بسیار مهم میباشد که جا دارد به آن پرداخته شود.</div></div><div dir="rtl" style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: right;"><div style="text-align: justify;">وقتی که از امنیت شبکه صحبت میکنیم شامل مورد بسیار زیادی میشود که هر کدام از آنها به تنهای میتواند مورد بحث قرار گیرد،همیشه در امنیت شبکه موضوی که بسیار اهمیت دارد لایههای دفأعی یک شبکه میباشد، باید یاد آوری کرد که اولین لایه دفأعی در امنیت شبکه و حتا امنیت فیزیکی وجود یک ساختار و خط مشی (policy) میباشد که بدون آن ،لیست کنترل ، فایروال و هر لایه دیگری بدون معنی میباشد دقیقا مثل ساختمانی میباشد که پایه ندارد !</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"></div><a name='more'></a></div><div dir="rtl" style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: right;"><div style="text-align: justify;">برای داشتن policy باید پنج مرحله را در نظر داشت:</div></div><div dir="rtl" style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: right;"><div style="text-align: justify;">۱-بازرسی (inspection)</div></div><div dir="rtl" style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: right;"><div style="text-align: justify;">۲-حفاظت (protection)</div></div><div dir="rtl" style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: right;"><div style="text-align: justify;">۳-ردیابی (detection )</div></div><div dir="rtl" style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: right;"><div style="text-align: justify;">۴-واکنش (reaction )</div></div><div dir="rtl" style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: right;"><div style="text-align: justify;">۵-بازتاب (reflection )</div></div><div dir="rtl" style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: right;"><div style="text-align: justify;">برای اینکه شبکه امنی داشته باشیم باید همیشه این پنج مرحله را در نظر داشته باشیم.</div></div><div dir="rtl" style="text-align: right;"><div style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div style="text-align: justify;">اولین جای که باید در شبکه ایمن سازی شود،ایمن کردن تمامی سندیتهای (authortication) موجود میباشد.</div></div><div style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div style="text-align: justify;">رایجترین روش استفاده از شناسه کاربری و کلمه رمز است که به این مورد را باید در نظر داشت:</div></div><div style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div style="text-align: justify;">-بر رسی و کنترل کلمات عبور کلیه کاربران به ویژه مدیرن سیستم.</div></div><div style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div style="text-align: justify;">-کلمات عبور برای سویچها و رترها که بسیار مهم میباشد.</div></div><div style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div style="text-align: justify;">-کلمات عبور مربوط به SNMP</div></div><div style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div style="text-align: justify;">-کلمات عبور مربوط به پرینت سرور</div></div><div style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div style="text-align: justify;">-کلمات عبور مربوط به محافظ صفحه نمایش</div></div><div style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div style="text-align: justify;">در واقعه شما باید امنیت کاملی را برای account password security در نظر داشته باشید.</div></div><div style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div style="text-align: justify;">دومین مورد، نصب و به روز رسانی آنتی ویروسها روی همه کامپیوتر ها،سرورها و میل سرورها و وب سرورها میباشد و همینطور به روز رسانی آنتی ویروسها روی کامپیوتر کاربرها باید به صورت اتوماتیک انجام شود و در صورت مشاهده مورد مشکوک حتما اقدامات امنیتی لازم انجام شود.</div></div><div style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div style="text-align: justify;">سومین مورد شامل نصب و به روز رسانی سیستم عامل و حفرههای امنیتی سیستمهای موجود است. باید حفرههای امنیتی کلیه سرور ها، سوئیچها و روترها ، شناسایی و رفع شود و سرویسهای غیر ضروری حذف و غیر فعال گردد.</div></div><div style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div style="text-align: justify;">چهارمین مورد که بسیار مهم است، دسته بندی کاربران و دادن سطح دسترسی مناسب با کار هر کاربر به آنها میباشد که همه نتوانند به همه فآیلها و دایرکتوریها دسترسی داشته باشند.</div></div><div style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div style="text-align: justify;">پنجمین مورد، کنترل و config کردن deviceهای موجود که شامل روتر ، سوئیچ و فایروال میباشد، که همه آنها باید بر اساس policy موجود در شبکه و با توجه به توپولوژی شبکه config شود .</div></div><div style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div style="text-align: justify;">تکنولوژیهای مثل PAT, NAT, Filtering و غیره در این مرحله وجود دارد و به همین خاطر این مرحله یکی از مهمترین مراحل امنیت یک شبکه میباشد.</div></div><div style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div style="text-align: justify;">مرحله بعدی، که آن هم بسیار مهم است داشتن یک استراتژی برای پشتیبانی (backup ) است و اینکه مطمئن باشیم که این سیستم به درستی کار میکند.</div></div><div style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div style="text-align: justify;">سپس باید به امنیت فیزیکی یک شبکه بپردازیم که شامل UPSها میشود و باید مطمئن باشیم که آنها درست کار میکنند و اینکه اتاق سرور از درجه حرارت و رطوبت مناسب برخوردار باشد و همین طور در برابر سرقت و آتش سوزی هم ایمن باشد.به طور کلی هر چیزی که مربوط به فیزیک شبکه میشود در این قسمت وجود دارد.</div></div><div style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div style="text-align: justify;">سپس باید به برسی و تنظیم و آزمایش سیستمهای auditing و logging میپردازیم این سیستمها میتواند هم بر پایه host و هم بر پایه network باشد، سیستمهای ردگیری و ثبت حملات هم در این مرحله نصب و تنظیم میگردد،باید کاملا اطمینان حاصل کنیم که تمام اطلاعات لازم ثبت شده و به خوبی محافظت میگردد.</div></div><div style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div style="text-align: justify;">در ضمن درست بودن ساعت و تاریخ سیستمها خیلی مهم است چرا که در غیر این صورت امکان ردّ گیری و پیگیری قانونی در صورت لزوم وجود نخواهد داشت.</div></div><div style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div style="text-align: justify;">نکته دیگری که باید توجه داشته باشیم ایمن کردن Remote Access با پروتکل و تکنولوژیهای امن.</div></div><div style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div style="text-align: justify;">باید در این قسمت با توجه به شرایط و امکانات ، ایمنترین پروتکل و تکنولوژیها را باید به خدمت گرفت.</div></div><div style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div style="text-align: justify;">نکته دیگر اینکه نصب فایروالهای شخصی در ساعت hostها و لایههای امنیتی مضاعفی به شبکه شما میدهد که بسیار مهم است، پس نصب فایروالها را فراموش نکنید.</div></div><div style="line-height: 1.5; margin-bottom: 1.25em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div style="text-align: justify;">نکته آخر: شرایط بازیابی در حالتهای ضروری را حتما بر رسی کنید و به روز رسانی کنید اینها شامل خرابی قطعات کامپیوتری، خرابکاری کاربران و خرابی نشی از مسأیل طبیعی ، نفوذ هکرها به سیستم میباشد. استانداردهای Warm site و Hot site را حتما رعایت کنید و به خاطر داشته باشید که اطلاعات باید همیشه در دسترس و محفوظ باشد و اینکه حتما در سایتهای خبری و بولتنهای امنیتی عضو شوید و اطلاعات خود را همیشه به روز کنید!</div></div></div></div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com0tag:blogger.com,1999:blog-3390367882093368131.post-63884892790251762352011-05-01T15:06:00.000-07:002011-05-01T15:06:52.552-07:00VLAN Video Learning (ENGLISH)<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="http://www.4shared.com/video/U-jsw3fT/Vlan.html?"><img border="0" src="http://aux.iconpedia.net/uploads/1955551837.png" /></a><a href="http://dc205.4shared.com/download/swu7_tq3/Vlan_Video_Learning.zip?tsid=20110501-174811-4c18907a"><img border="0" src="http://mjfela.com/images/downloadIcon.png" /></a></div><div class="separator" style="clear: both; text-align: center;"> </div></div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com0tag:blogger.com,1999:blog-3390367882093368131.post-58456757949543429522011-05-01T10:42:00.000-07:002011-05-01T10:42:37.319-07:00How to create Subnets<div dir="ltr" style="text-align: left;" trbidi="on">To create subnetworks you take bits from the host portion of the ip address & reserve them to define the subnet address.<div>This means fewer bits for hosts, so the more subnets the fewer bits available for defining hosts.</div><div><br />
</div><div><a name='more'></a>1. Determine the number of required network IDs:</div><div><ul style="text-align: left;"><li>One for each subnet.</li>
<li>One for each wide area network connection.</li>
</ul><div>2. Determine the number of required host IDs per subnet:</div></div><div><ul style="text-align: left;"><li>One for each TCP/IP.</li>
<li>One for each router interface.</li>
</ul><div>3. Based on the above requirements, create the following:</div></div><div><ul style="text-align: left;"><li>One subnet mask for your entire network.</li>
<li>A unique subnet ID for each physical segment.</li>
<li>A range of host IDs for each subnet.</li>
</ul><div><br />
</div></div></div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com0tag:blogger.com,1999:blog-3390367882093368131.post-4485036518568895542011-05-01T10:15:00.000-07:002011-05-01T10:15:18.229-07:00IP Subnet-Zero<div dir="ltr" style="text-align: left;" trbidi="on">This command allows you to use first & last subnet in your network design.<br />
FOR EXAM:<br />
The class C mask of 192 provides subnets 64 & 128.<br />
BUT with the ip subnet-zero command, you now get to use subnets 0 , 64, 128 & 192.<br />
* that is two more subnets for every subnet mask use.<br />
<br />
</div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com0tag:blogger.com,1999:blog-3390367882093368131.post-54490228882162574222011-04-29T16:11:00.000-07:002011-04-29T16:11:17.479-07:00Subneting a class C address *** THE FAST WAY! ***<div dir="ltr" style="text-align: left;" trbidi="on">You need to do is answer five simple questions:<br />
<ol><li>How many subnets does the chosen subnet mask produce?</li>
<li>How many valid hosts per subnet are available?</li>
<li>What are the valid subnets?</li>
<li>what's the broad cast address of each subnet?</li>
<li>what are the valid hosts in each subnet?</li>
</ol>well ...<br />
<br />
<a name='more'></a>1: 2^x = Number of subnets <br />
X is the number of masked bits, or the 1s.<br />
<br />
FOR EXAM: in 11000000 the number of 1s gives us 2^2 subnets.<br />
- in this example, there are 4 subnets.<br />
<br />
<br />
2: 2^y - 2 = Number of hosts per subnet.<br />
Y is the number of unmasked bits, or the 0s.<br />
<br />
FOR EXAM: in 11000000 the number of 0s gives us 2^6 - 2 hosts.<br />
- in this example, there are 62 hosts per subnet address & the broad cast address, which are NOT valid hosts.<br />
<br />
<br />
3: 256-subnet mask = block size, or increment number.<br />
FOR EXAM: would be 256 - 192 = 64<br />
the block size of 192 mask is always 64. <br />
bin: 11000000 dec: 128+64+0+0+0+0+0+0=192<br />
star counting at <strong>zero</strong> in block of 64 untill you rich the subnetmask.<br />
value & these are your sub-nets. 0, 64, 128, 192. Easy, huh? 0, <em><span style="font-size: x-small;">(+64)</span></em> 64, <span style="font-size: x-small;">(<em>+64)</em></span> 128, <em><span style="font-size: x-small;">(+64)</span></em> 192<br />
<br />
<br />
4: since we ciunted our subnets in the last section as 0, 64, 128 & 192. the broad cast address is always the number right befor the next subnet!<br />
<br />
FOR EXAM: the subnet has a broadcast address of 127 because the next subnet is 128.<br />
and so on!! remember, the broad cast address of the last subnet is always 255.<br />
<br />
<br />
5: valid hosts are the number between the subnet, all 0s & all 1s.<br />
FOREXAM: if 64 is the subnet number & 127 is the boardcast address then 65 - 126 is the valid host range. it's always the numbers between the subnet address & the broadcast address.</div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com1tag:blogger.com,1999:blog-3390367882093368131.post-70456724465730694252011-04-28T22:12:00.000-07:002011-04-28T22:12:55.829-07:00Cisco Switch 2600 Presentation!<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsJR35VQjL-OWigfhsc5njSyQe_yS7szaKuWY8M19eqpGRwqUdh_V_7krGwIeMzjYeU1EXz5mZ2X0ijBxCWI-4KiRaVHUWCkn2a0RRr0TOYkEHlAeC8VDehDzCWlJhccjR92SIjsTfcMk/s1600/IMAG0116.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="118" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsJR35VQjL-OWigfhsc5njSyQe_yS7szaKuWY8M19eqpGRwqUdh_V_7krGwIeMzjYeU1EXz5mZ2X0ijBxCWI-4KiRaVHUWCkn2a0RRr0TOYkEHlAeC8VDehDzCWlJhccjR92SIjsTfcMk/s200/IMAG0116.jpg" style="cursor: move;" width="200" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZOntLanqB0GlI7bMEuwkG6eM75fi4okbtqUPGl-4jR3Ie-1mrBzvf2DzHT3sAx91ThV58C2lZVUr4V91Re6C7kFYQCRtVCGpWoD5qVIt8mM8p0iULhEONjrlzXjpwUchpzNDdhFHxxVE/s1600/IMAG0119.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="118" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZOntLanqB0GlI7bMEuwkG6eM75fi4okbtqUPGl-4jR3Ie-1mrBzvf2DzHT3sAx91ThV58C2lZVUr4V91Re6C7kFYQCRtVCGpWoD5qVIt8mM8p0iULhEONjrlzXjpwUchpzNDdhFHxxVE/s200/IMAG0119.jpg" width="200" /></a><a href="http://www.starnet.com/images/coming%20soon" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="163" src="http://www.starnet.com/images/coming%20soon" width="200" /></a></div><br />
<div class="separator" style="clear: both; text-align: center;"></div><a name='more'></a><br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggncONYiQTJPnKmC-RpqZQaewhYs6y3HOmbAg06Rtn3oc4M3oZMSDK8lLDbwpGXdEoMHJ9fdItRryU4YW1OZdhHXWGN-iZ6UYzAIC9QH_Ro-vvqwUp1ABBxD4aGLMdgEwENDQpBFK51RA/s1600/IMAG0117.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="190" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggncONYiQTJPnKmC-RpqZQaewhYs6y3HOmbAg06Rtn3oc4M3oZMSDK8lLDbwpGXdEoMHJ9fdItRryU4YW1OZdhHXWGN-iZ6UYzAIC9QH_Ro-vvqwUp1ABBxD4aGLMdgEwENDQpBFK51RA/s320/IMAG0117.jpg" width="320" /></a></div><div class="separator" style="clear: both; text-align: center;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggncONYiQTJPnKmC-RpqZQaewhYs6y3HOmbAg06Rtn3oc4M3oZMSDK8lLDbwpGXdEoMHJ9fdItRryU4YW1OZdhHXWGN-iZ6UYzAIC9QH_Ro-vvqwUp1ABBxD4aGLMdgEwENDQpBFK51RA/s1600/IMAG0117.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0QJ3ooDD5c8lG31EHyMalNulAh6xeintK6fWtlPm7K-7Ym4RbqSqoCylCsuFCgMKInlqPrvU-gaQs7vm3YZCfNQuXnc9lMstn58j4aFpnR-6OMlx4PfwCJ3I0n2Atipb6nsInvCVoVN0/s1600/IMAG0118.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="190" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0QJ3ooDD5c8lG31EHyMalNulAh6xeintK6fWtlPm7K-7Ym4RbqSqoCylCsuFCgMKInlqPrvU-gaQs7vm3YZCfNQuXnc9lMstn58j4aFpnR-6OMlx4PfwCJ3I0n2Atipb6nsInvCVoVN0/s320/IMAG0118.jpg" width="320" /></a></div></div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com0tag:blogger.com,1999:blog-3390367882093368131.post-16159512008329879252011-04-24T19:17:00.000-07:002011-04-30T18:45:13.158-07:00LAN & WAN Interface Descriptions<div dir="ltr" style="text-align: left;" trbidi="on"><ul style="text-align: left;"><li>LAN Interface Descriptions:</li>
</ul><br />
<b>Atlanta </b>(Router`s name<b>) (config)# int e0</b><br />
<b>Atlanta (config-if)# description sales lan</b><br />
<b>Atlanta (config)# int e1</b><br />
<b>Atlanta (config-if)# description marketing lan</b><br />
<br />
<ul style="text-align: left;"><li><b>WAN Interface Descriptions</b></li>
</ul><br />
<b>Titanic</b><b> </b>(Router`s name<b>) (config-if) int e1</b><br />
<b>Titanic (config-if)# desc wan to maimai circuit: anythings!</b><br />
<b><br />
</b><br />
<div class="separator" style="clear: both; text-align: left;"></div><a name='more'></a>Start up -config (NVRM) & Running -config (RAM) Moving: <span class="Apple-style-span" style="font-size: large;">RAM</span><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghqJyFQFJGwPbCI1UkSvYRALf7bGRXdVOdeb9tGuk3pAKgiOHA-8TMCJcN4CdplphiIf6xiK94-109IM5ChMiYxnTH6wClTV7dVeDRzcr71XvJdq1-BVmMqEoZwUxkP53_J1Ik4my4ofk/s1600/rsz_1rsz_arrow-2-pointnig-both-ways-left-and-right-748162.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghqJyFQFJGwPbCI1UkSvYRALf7bGRXdVOdeb9tGuk3pAKgiOHA-8TMCJcN4CdplphiIf6xiK94-109IM5ChMiYxnTH6wClTV7dVeDRzcr71XvJdq1-BVmMqEoZwUxkP53_J1Ik4my4ofk/s1600/rsz_1rsz_arrow-2-pointnig-both-ways-left-and-right-748162.jpg" /></a><span class="Apple-style-span" style="font-size: large;">NVRAM</span><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghqJyFQFJGwPbCI1UkSvYRALf7bGRXdVOdeb9tGuk3pAKgiOHA-8TMCJcN4CdplphiIf6xiK94-109IM5ChMiYxnTH6wClTV7dVeDRzcr71XvJdq1-BVmMqEoZwUxkP53_J1Ik4my4ofk/s1600/rsz_1rsz_arrow-2-pointnig-both-ways-left-and-right-748162.jpg" /><span class="Apple-style-span" style="font-size: large;">TFTP Server</span><br />
<div class="separator" style="clear: both; text-align: left;">copy commands: COPY (SENDER)(RECEIVER)</div><br />
<ol style="text-align: left;"><li>Show interface ? <b> </b> that will reveal all the available interface to cinfigure</li>
<li>Show ip interface (layer3) </li>
</ol><div><ul style="text-align: left;"><li>Status of the interafce</li>
<li>The ip address & mask</li>
<li>Information on whether an access list is sent on interface.</li>
<li>Basic ip interface</li>
</ul><div> 3.Show ip interface brief quick over view --> logical address & Status</div></div><div> 4.Show controllers</div><div><ul style="text-align: left;"><li>This command displays information about the physical interface it self.</li>
<li>Type of serial cable plugged into a serial port.</li>
<li>Usually, this will only be a DTE cable That plugs into a type of Data Service Unit (DSU)</li>
</ul><div><br />
</div></div></div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com0tag:blogger.com,1999:blog-3390367882093368131.post-56067564383475030482011-04-24T17:55:00.000-07:002011-05-02T16:30:39.926-07:00Router Interface Configuration<div dir="ltr" style="text-align: left;" trbidi="on"><div style="text-align: center;">* IP addresses *Media Type * Bandwidth * Other administrative commands</div><div style="text-align: center;"><br />
</div><br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right; margin-left: 1em; text-align: right;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj48KYsKHvh2e9svk45XyjQ4rrGSVh71ScbgbxIMNzud2IawKeupfdE09l7TdErkPDuge8hjSeM9lhALZ52nGPrNZR_M36J859g_Ak2JVrE4N3qsK28qzzZyKVSac2CMgPYpQpu5p4McXQ/s1600/cisco2522.jpg" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj48KYsKHvh2e9svk45XyjQ4rrGSVh71ScbgbxIMNzud2IawKeupfdE09l7TdErkPDuge8hjSeM9lhALZ52nGPrNZR_M36J859g_Ak2JVrE4N3qsK28qzzZyKVSac2CMgPYpQpu5p4McXQ/s1600/cisco2522.jpg" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Cisco 2522</td></tr>
</tbody></table><ul style="text-align: left;"><li><b><span class="Apple-style-span" style="font-size: large;">Cisco 2522</span></b> has 10 serial: </li>
</ul><div><b>Router (config)# int Serial?</b></div><div><i><0-9> serial interface number</i></div><div><i><br />
</i></div><div>The 2522 router has one Ethernet 10baset port; <b>Router (config)# int ethernet ?</b></div><div><i><0-0> Ethernet interface number</i></div><div><b>Router (config)# int ethernet 0</b></div><div><b>Router (config-if)#</b></div><div><br />
<a name='more'></a><br />
</div><div>+ The 2600, 3600, 4000 & 7000 Series router <b>USE</b> a " Physical slot in the router, with a port number on the module plugged info that slot" </div><div>+ MUST type the full command; as same as: <b>int fast ethernet 0/0</b> or <b>int fa0/0.</b> "slot/port"</div><div><br />
</div><div><b>Router (config)#int fa0/0</b></div><div><b>Router (config-if)# media -type ?</b></div><div><i>100base x use Rj-45 for -tx, SC F0 for -fx </i></div><div><i>MII use MII connector</i></div><div><i><br />
</i></div><div><i>* </i>Default: interface command is OFF, <b>shutdown</b>. To turn on interface ON: <b>no shutdown. <span class="Apple-style-span" style="color: red;">[</span></b><span class="Apple-style-span" style="color: red;">important because if shutdown will NOT send packets]</span></div><div><span class="Apple-style-span" style="color: red;"><br />
</span></div><div style="text-align: center;"><b><span class="Apple-style-span" style="font-size: x-large;">HOW?!</span></b></div><div style="text-align: center;"><b><span class="Apple-style-span" style="font-size: x-large;"><br />
</span></b></div><div><b>Router # config</b></div><div>(Enter configuration commands, one per line. End with Ctrl+Z)</div><div><b>Router (config)# int ethernet 0</b></div><div><b>Router (config-if)# no shutdown </b></div><div><b>Router (config-if) # ^z</b></div><div><i>00:57:08: %link -3- up down: interface ethernet 0, changed state to up 00:57:09: %link port -5- up down: line protocol on interface ethernet 0, changed state to up</i></div><div><b>Router#sh int ethernet 0</b></div><div><b></b><i>ethernet 0 is up line protocol is up </i></div><div><i><br />
</i></div><div><span class="Apple-style-span" style="font-size: large;">configuring ip address</span></div><div><span class="Apple-style-span" style="font-size: x-small;"><br />
</span></div><div><b>Router (config)#int e0</b></div><div><b>Router (config-if)# ip address 172.16.10.2 255.255.255.0</b></div><div><b>Router (config-if)#no shut</b></div><div><span class="Apple-style-span" style="font-size: large;"><b><i><br />
</i></b></span></div><div>+ Ip address verification with the: show running -config command sh run for short </div><div>+ Cisco router support two proprietary serial connections:</div><div><ol style="text-align: left;"><li>60-pin serial connector.</li>
<li>Smart serial: about 1/10 the size of the 60-pin.</li>
</ol><div>DCE (Data Communication Equipment); Service provider "CSU". DCE requires a DCE cable.</div></div><div>DTE (Data Terminal Equipment); End user device "Router". DTE requires a DTE cable.</div><div><br />
</div><div><br />
</div></div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com0tag:blogger.com,1999:blog-3390367882093368131.post-66047573194415802562011-04-23T18:03:00.000-07:002011-05-01T10:04:53.588-07:00the Router<div dir="ltr" style="text-align: left;" trbidi="on"><span class="Apple-style-span" style="font-size: large;"><b><i>Connecting to the Router</i></b></span><br />
<div class="separator" style="clear: both; text-align: center;"></div>We have three ways:<br />
<blockquote class="" style="text-align: left;"><ol style="text-align: left;"><li><b>Auxiliary Port / </b>Phone line </li>
<li><b>Console Port / </b>Rj-45 / Console Cable or Console cable-rollover</li>
<li><b>Telnet / </b>(USER MODE) ip net - 10Baset t</li>
</ol></blockquote><b><span class="Apple-style-span" style="font-size: large;"><i>Cisco Router Components </i></span></b><br />
<div style="text-align: left;"></div><ol style="text-align: left;"><li><b>Bootstrap</b>: boot the router & then load the IOS. <span class="Apple-style-span" style="color: red;"><b> [Microcode of the Rom]</b></span></li>
<li><b>POST </b>(Power On Self Test): check the basic functionality of the router hard ware. <span class="Apple-style-span" style="color: red;"><b> [Microcode of the Rom]</b></span></li>
<li><b>Rom monitor</b>: testing & troubleshooting. <span class="Apple-style-span" style="color: red;"><b> [Microcode of the Rom]</b></span></li>
<li><b>Mini-IOS</b> (Rx-boot / boot-loader): small IOS in Rom. load a Cisco IOS into flash memory.</li>
<li><b>RAM</b>: hold packet buffers, ARP cache, routing table.</li>
<li><b>ROM</b>: star & main tent the router.</li>
<li><b>Flash memory</b>: hold the Cisco IOS, <b>NOT</b> erased when the routers is reloaded, it is EEPROM.</li>
<li>NVRAM: hold the router & switch configuration.</li>
</ol><div><table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right; margin-left: 1em; text-align: right;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikrbJEKPzgMM6HgOKg8p6VJcXODoSB4wXffYYnxtnTGx6H9va9ckDTOjV-Bi4mifuTOyfMw5X9ZtytQxzp5HylacPFdXtlKgbP2RUJ_PcB5lRvPQJnagCfM4JCpXAAcHaaU3vBidh-Of4/s1600/cisco-n-router.jpg" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikrbJEKPzgMM6HgOKg8p6VJcXODoSB4wXffYYnxtnTGx6H9va9ckDTOjV-Bi4mifuTOyfMw5X9ZtytQxzp5HylacPFdXtlKgbP2RUJ_PcB5lRvPQJnagCfM4JCpXAAcHaaU3vBidh-Of4/s1600/cisco-n-router.jpg" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Cisco Router </td></tr>
</tbody></table><span class="Apple-style-span" style="font-size: large;"><b>Summary:</b></span></div><div><ul style="text-align: left;"><li>Basic IOS: ROM</li>
<li>Boot strap: ROM</li>
<li>Diagnestics: ROM</li>
<li>Current IOS: Flash</li>
<li>Start up configuration: NVRAM</li>
<li>Running configuration: RAM</li>
</ul><div><br />
</div></div><b><span class="Apple-style-span" style="font-size: large;"><i><br />
</i></span></b></div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com0tag:blogger.com,1999:blog-3390367882093368131.post-21568124355292988932011-04-23T17:04:00.000-07:002011-04-27T19:11:04.200-07:00Types of IP addresses<div dir="ltr" style="text-align: left;" trbidi="on"><table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0LHdNePDHgDm3IqFfDZ5eK9QSS3IOZL-UgKTp2GRoLkRVeLZlWHtgQFBQgn6UQPaf1BkfVx7S75P8YfV6JCg40PfDpDIVgyb4J_AQug7SMkyVXkbtQRFhtQRkoLGAHzfYD-pnvRLHEm4/s1600/uc2bc.gif" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="116" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0LHdNePDHgDm3IqFfDZ5eK9QSS3IOZL-UgKTp2GRoLkRVeLZlWHtgQFBQgn6UQPaf1BkfVx7S75P8YfV6JCg40PfDpDIVgyb4J_AQug7SMkyVXkbtQRFhtQRkoLGAHzfYD-pnvRLHEm4/s200/uc2bc.gif" width="200" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><span class="Apple-style-span" style="font-size: small;">Types of addresses are: 1-Unicast 2-Multicast 3-Broadcast </span></td></tr>
</tbody></table><br />
<div><div style="text-align: center;"><div style="text-align: left;"> First Network ID Last Network ID</div></div><div style="text-align: justify;">Class A 1.0.0.0 126.0.0.0</div><div style="text-align: justify;">Class B 128.0.0.0 191.255.0.0 <b><span class="Apple-style-span" style="color: red;"> 127.0.0.1 is Loop Back</span></b></div><div style="text-align: justify;">Class C 192.0.0.0 223.255.255.0</div><div style="text-align: justify;"><br />
<a name='more'></a><br />
</div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWnuG8z1kWTmbCpkarKTq6-Uwt-TufYZfoI3xHcxYW2O1zDTP_ZjxLZRKOXJdXYzihkzYSQu1E6bW9bYGzmkjskHM5m18D1du2s-JCY62TqnE9mEwLvsE5VcMPMKcBLKyZlC5B4jWxdbE/s1600/CLASSABC.GIF" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWnuG8z1kWTmbCpkarKTq6-Uwt-TufYZfoI3xHcxYW2O1zDTP_ZjxLZRKOXJdXYzihkzYSQu1E6bW9bYGzmkjskHM5m18D1du2s-JCY62TqnE9mEwLvsE5VcMPMKcBLKyZlC5B4jWxdbE/s320/CLASSABC.GIF" width="216" /></a></div><div class="separator" style="clear: both; text-align: center;">Mac Address 48-bit (6-byte) = OUI 24-bit + Vender Assigned 24-bit</div><div class="separator" style="clear: both; text-align: center;"><br />
</div><div class="separator" style="clear: both; text-align: center;"> NAT:</div><div class="separator" style="clear: both; text-align: center;"> Class A: 10.0.0.0 through 10.255.255.25</div><div class="separator" style="clear: both; text-align: center;"> Class B: 172.16.0.0 thought 172.31.255.255</div><div class="separator" style="clear: both; text-align: left;"></div><div class="separator" style="clear: both; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: center;"> Class C: 192.168.0.0 thought 192.168.255.255</div><br />
<div style="text-align: justify;"><br />
</div></div></div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com0tag:blogger.com,1999:blog-3390367882093368131.post-55980297061502043492011-04-22T11:19:00.000-07:002011-05-02T15:34:25.292-07:00OSI Layers<div dir="ltr" style="text-align: left;" trbidi="on"><div style="text-align: right;"><a href="http://www.49-nt-reseller-hosting.com/assets/images/lan-switch-osi.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><b style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" src="http://www.49-nt-reseller-hosting.com/assets/images/lan-switch-osi.jpg" width="175" /></b></a><a href="http://www.49-nt-reseller-hosting.com/assets/images/lan-switch-osi.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><b><br />
</b></a><a href="http://www.49-nt-reseller-hosting.com/assets/images/lan-switch-osi.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><b><br />
</b></a><a href="http://www.49-nt-reseller-hosting.com/assets/images/lan-switch-osi.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><b><br />
</b></a><a href="http://www.49-nt-reseller-hosting.com/assets/images/lan-switch-osi.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><b><br />
</b></a></div><span class="Apple-style-span" style="font-size: x-large;"></span><br />
<div><span class="Apple-style-span" style="font-size: x-large;"><span class="Apple-style-span" style="font-size: x-large;"></span></span><br />
<span class="Apple-style-span" style="font-size: x-large;"><b>1. Physical</b></span></div><div><span class="Apple-style-span" style="font-size: x-large;"><b><span class="Apple-style-span" style="font-weight: normal;"><b>2. Data link</b></span></b></span><br />
<span class="Apple-style-span" style="font-size: x-large;"><b><span class="Apple-style-span" style="font-weight: normal;"><b>3. Network</b></span></b></span></div><div></div><div><span class="Apple-style-span" style="font-size: x-large;"><b></b></span><span class="Apple-style-span" style="font-size: x-large;"><b>4. Transmission</b></span></div><div><span class="Apple-style-span" style="font-size: x-large;"><b></b></span><span class="Apple-style-span" style="font-size: x-large;"><b>5. Session</b></span></div><div><span class="Apple-style-span" style="font-size: x-large;"><b></b></span><span class="Apple-style-span" style="font-size: x-large;"><b>6. Presentation</b></span></div><div><span class="Apple-style-span" style="font-size: x-large;"><b></b></span><span class="Apple-style-span" style="font-size: x-large;"><b>7. Application</b></span><br />
<span class="Apple-style-span" style="font-size: x-large;"><b></b></span><br />
<a name='more'></a></div><ol style="text-align: left;"><li style="text-align: left;"><b><span class="Apple-style-span" style="font-size: x-large;">Physical:</span></b></li>
</ol><div style="text-align: left;"> 1.1 Network connection types (Rj-45...) </div><div><div style="text-align: left;"> 1.2 Physical network topology (Bus...)</div><div><div style="text-align: justify;"><div style="text-align: left;"> 1.3 Bit encoding</div><div style="text-align: left;"> 1.4 Channel use</div></div><div style="text-align: justify;"><div style="text-align: left;"><br />
</div></div><div style="text-align: justify;"><div style="text-align: left;"><b><span class="Apple-style-span" style="font-size: x-large;"> 2. Data link:</span></b></div><div style="text-align: left;"><u><span class="Apple-style-span" style="font-size: x-small;"><br />
</span></u></div></div><div style="text-align: justify;"><div style="text-align: left;"> 2.1 Organizing the bits</div><div style="text-align: left;"> 2.2 The IEEE 802 standard</div><div style="text-align: left;"><br />
</div><ol style="display: inline !important;"><div style="text-align: left;">
<li style="display: inline !important;"><span class="Apple-style-span" style="font-weight: normal;"><b> 2.2.1 </b></span><span class="Apple-style-span" style="font-weight: normal;">Media Access Control (MAC) </span></li>
</div></ol><b><span class="Apple-style-span" style="font-weight: normal;"><b></b></span></b><br />
<ul><ul><li style="text-align: left;">Logical Topology</li>
<li style="text-align: left;">Media access Method</li>
<li style="text-align: left;">Addressing</li>
</ul></ul><div style="text-align: left;"> <br />
<b>2.2.2</b> Logical Link Control (LLC)</div><blockquote class=""></blockquote><blockquote class=""><ul><li style="text-align: left;">Transmission Timing</li>
<li style="text-align: left;">Error Control</li>
<li style="text-align: left;">Flow Control </li>
</ul></blockquote><div style="text-align: left;"><br />
<br />
</div><div style="text-align: left;"><span class="Apple-style-span" style="font-size: x-large;"> <b>3. Network:</b></span></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"></div><blockquote class=""><ul></ul></blockquote><blockquote class=""><ul></ul></blockquote><blockquote class=""><div style="text-align: left;">3.1 Network Addressing</div><div style="text-align: left;">3.2 Packet Switching (PDVs)</div><div style="text-align: left;">3.3 Routing</div></blockquote><div style="text-align: left;"><br />
<div style="text-align: left;"><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><b><span class="Apple-style-span" style="font-size: x-large;"> 4. Transmission: </span></b></div></div></div><blockquote class=""><div style="text-align: left;">4.1 Segment Sequencing</div><div style="text-align: left;">4.2 Error Control</div><div style="text-align: left;">4.3 End of End flow control</div></blockquote><div style="text-align: left;"><br />
<div style="text-align: left;"><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"></div><div style="text-align: left;"><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;"><span class="Apple-style-span" style="font-size: x-large;"> </span><b><span class="Apple-style-span" style="font-size: x-large;"> 5. Session:</span></b></div></div></div></div></div><blockquote class="" style="text-align: left;"><div style="text-align: left;">5.1 Connection Manager</div><ul><li style="text-align: left;">Simplex (T.V)</li>
</ul><ul><li style="text-align: left;">Half - Duplex (Walki-Taki)</li>
</ul><ul><li style="text-align: left;">Full - Duplex</li>
</ul><div style="text-align: left;">5.2 Session Manager</div></blockquote><br />
<div style="text-align: justify;"><div style="text-align: left;"><b><span class="Apple-style-span" style="font-size: x-large;"> 6. Presentation: </span></b></div><blockquote class=""><div style="text-align: left;">6.1 Data Formating Translation</div><div style="text-align: left;">6.2 Data Encryption</div></blockquote><div style="text-align: left;"><br />
</div><div style="text-align: left;"><span class="Apple-style-span" style="font-size: x-large; font-weight: bold;"> 7. Application </span>(Firewall)</div></div><div style="text-align: justify;"><div style="text-align: left;"><span class="Apple-style-span" style="font-size: large;"><b><br />
</b></span></div></div><strike></strike></div></div></div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com0tag:blogger.com,1999:blog-3390367882093368131.post-57331213230072794392011-04-21T21:52:00.000-07:002011-04-22T10:33:16.430-07:00First post!<div dir="ltr" style="text-align: left;" trbidi="on">This blog will continue till i take CCIE & prove my language!<br />
<br />
</div><div class="blogger-post-footer">http://feeds.feedburner.com/~u/02231845015002053239</div>Anonymoushttp://www.blogger.com/profile/12792576925627288287noreply@blogger.com0