News Update :
Powered by Blogger.
Hot News »
Bagikan kepada teman!

Dhcp Routing configaretion (cisco methode 1) - cisco lesson

Penulis : Ktech on Tuesday, April 14, 2015 | 7:47 PM

Tuesday, April 14, 2015


Why do today, spare a little thought sized Dhcp Routing configuration that brings about. Cisco had accepted methods of exciting. I'll let you guys thought of cisco equipment
 (Router, switch, PC) from. Let us right.

DHCP Routing is - Machine together your IP Address auto assign (IP pool) is like your Cisco (1941 or 1841) is an up-love. It can use a pc Server. It is the right way, but I'm the first one came out making cupcakes Awesome Video here today. Go See ... (YouTube)

1. Sever 1 through the opportunity to build Dhcp configuration

2. Sever 1 in 2 chance falling to build Dhcp configuration

So why is a want Command little more to put Down

YouTube video watch 



comments | | Read More...

Remotely connecting to a Cisco Switch off configuration SSH for one other device

Why Switch now talking to other connections must be one of the most secure Ssh configuration cisco switch 1 know how. We are in Networking

1.Inbank connection - Telnet (port number 22)
                                  - Ssh (port number 23)

2 outbank connection - Console / Aux

 Remote connection 2 will be made .එහිදී Remotely will be used for the connection with the other device. Why talk about it today is a more secure switch through remotely SSh by Network Other device (router, pc etc ..) how to connect to a ..
Switch on first down, I have pointed out before .Switch Configuration Setting a little to get together ..

enable
conf t
fa ethernet 0/1
interface vlan 1
ip address 172.17.99.11 255.255.0.0
no shutdown
Love to watch the rest of the frame images




Go in to the pcyou Ssh ok or not ok? Make the check to the IMAGE (putty software) is a liveReal environment Packet tracer is one by one

comments | | Read More...

Professional (Cisco) Network environment must follow the rules of the time a 11 Network Administrator


1. Return policy should have

2. Users CD / Dvd Rom, to be able to block your pen use

3.Time to time password you want to change the movie's Network on users & Deep

4. psychical security have to
For example -

* Provide a separate security institutions and the Network Room together security garud Security
* Network Room one, the use of locked doors, even one is related to security
* And CCTV camera series

5. Because of the need to use HTTPS HTTP Clear Texts

Attack 6.Social engineering should be protected

7. pissing from the need to protect their system Network

8. Firewall update you want

9. Software update you want

10. Network security Tool use to make

      * Network Admin who will take care of themselves and their own Network together Attack Network is safe. It is for them to use a Penetration Test. The testing will be able to find one by one if there is a weakness in his Network
* Port Down has not
* Do not put proper Security ..

***  to remember something special test shows he is .Control Environment Network Admin Real Environment Unit .so without one, as it would have to pay him damages Device effort on their Network.
comments | | Read More...
 
Company Info | Contact Us | Privacy policy | Term of use | Widget | Advertise with Us | Site map
Copyright © 2011. Us Tech . All Rights Reserved.
Design Template by panjz-online | Support by creating website | Powered by Blogger