Showing posts with label Useful Articles. Show all posts
Showing posts with label Useful Articles. Show all posts

Jun 8, 2011

PuTTY Config!

PuTTY is a free and open source terminal emulator application which can act as a client for the SSH, Telnet, logging, and raw TCP computing protocols and as a serial console client. The name "PuTTY" has no definitive meaning, though 'tty' is the name for a terminal in the Unix tradition, usually held to be short for teletype.

PuTTY was originally written for Microsoft Windows, but it has been ported to various other operating systems. Official ports are available for some Unix-like platforms, with work-in-progress ports to Classic Mac OS and Mac OS X, and unofficial ports have been contributed to platforms such as Symbian and Windows Mobile.


PuTTY Vs. Telnet?  PuTTY win! download

PuTTY  |ـــــ Serial  |ـــــ Enter  |ـــــ en or enable  |ـــــ conf t  |ـــــ line con or line console 0 
router name# show interface status
address  |ـــــ add

May 21, 2011

What is Datagram?

A datagram is a basic transfer unit associated with a packet-switched network in which the delivery arrival time and order are not guaranteed. A datagram consists of header and data areas, where the header contains information sufficient for routing from the originating equipment to the destination without relying on prior exchanges between the equipment and the network. The source and destination addresses as well as a type field are found in the header of a datagram.

May 14, 2011

Do you want to have FREEDOM ?

Publisher: Hall PTR
Language: English
ISBN: 0132435942
Paperback: 448 pages
Data: August 11, 2006
Format: PDF
Publisher: Apress
Language: English
ISBN: 1590596277
Paperback: 608 pages
Data: March 15, 2006
Format: 
PDF

May 2, 2011

نکاتی‌ در مورد امنیت شبکه (PERSIAN)


امنیت شبکه یکی‌ از مورد بسیار بسیار مهم می‌باشد که جا دارد به آن پرداخته شود.
وقتی‌ که از امنیت شبکه صحبت می‌کنیم شامل مورد بسیار زیادی میشود که هر کدام از آنها به تنهای میتواند مورد بحث قرار گیرد،همیشه در امنیت شبکه موضوی که بسیار اهمیت دارد لایه‌های دفأعی یک شبکه می‌باشد، باید یاد آوری کرد که اولین لایه دفأعی در امنیت شبکه و حتا امنیت فیزیکی‌ وجود یک ساختار و خط مشی‌ (policy) می‌باشد که بدون آن ،لیست کنترل ، فایروال و هر لایه دیگری بدون معنی می‌باشد دقیقا مثل ساختمانی می‌باشد که پایه ندارد !

May 1, 2011

How to create Subnets

To create subnetworks you take bits from the host portion of the ip address & reserve them to define the subnet address.
This means fewer bits for hosts, so the more subnets the fewer bits available for defining hosts.

IP Subnet-Zero

This command allows you to use first & last subnet in your network design.
FOR EXAM:
The class C mask of 192 provides subnets 64 & 128.
BUT with the ip subnet-zero command, you now get to use subnets 0 , 64, 128 & 192.
* that is two more subnets for every subnet mask use.

Apr 23, 2011

the Router

Connecting to the Router
We have three ways:
  1. Auxiliary Port / Phone line 
  2. Console Port / Rj-45 / Console Cable or Console cable-rollover
  3. Telnet /  (USER MODE) ip net - 10Baset t
Cisco Router Components 
  1. Bootstrap: boot the router & then load the IOS.    [Microcode of the Rom]
  2. POST (Power On Self Test): check the basic functionality of the router hard ware.    [Microcode of the Rom]
  3. Rom monitor: testing & troubleshooting.    [Microcode of the Rom]
  4. Mini-IOS (Rx-boot / boot-loader): small IOS in Rom. load a Cisco IOS into flash memory.
  5. RAM:  hold packet buffers, ARP cache, routing table.
  6. ROM: star & main tent the router.
  7. Flash memory: hold the Cisco IOS, NOT erased when the routers is reloaded, it is EEPROM.
  8. NVRAM: hold the router & switch configuration.
Cisco Router 
Summary:
  • Basic IOS: ROM
  • Boot strap: ROM
  • Diagnestics: ROM
  • Current IOS: Flash
  • Start up configuration: NVRAM
  • Running configuration: RAM