Wireless Access Points (Part 2)
|
|
- Avis Anthony
- 5 years ago
- Views:
Transcription
1 Wireless Access Points (Part 2) Details The lab is a virtual simulation of the Cisco Aironet 1200 Wireless Access Point (WAP). Initially the screen should be as in Figure 1. Figure 1: Initial startup screen All rights reserved. 1
2 Tutorial 2 This tutorial outlines some of the key configurations for a wireless access point. DHCP 1. It is possible to run a DHCP server to assign IP parameters to wireless nodes: (config)# ip dhcp pool socpool (config-dhcp)# network (config-dhcp)# lease 10 (config-dhcp)# exit -config Sets the range of addresses to be allocated, and sets the lease for 10 days Using the information from above what are the following: Why would the WAP run a DHCP server: In the above example, what will be the first IP address allocated: In the above example, what will be the last IP address allocated: In the DHCP it is also possible to exclude addresses from the pool: (config)# ip dhcp? (config)# ip dhcp excluded-address? (config)# ip dhcp excluded-address ? (config)# ip dhcp excluded-address config and for defining the ping timeout for DHCP: (config)# ip dhcp? (config)# ip dhcp ping? (config)# ip dhcp ping timeout? (config)# ip dhcp ping timeout 400 -config Other settings for DHCP are: All rights reserved. 2
3 (config)# ip dhcp pool socpool (config-dhcp)# dns-server (config-dhcp)# netbios-name-server (config-dhcp)# domain-name xyz.com -config Host table A local hosts table is useful in defining logical names for remote ports. For example to enable the host table for three remote hosts: (config)# ip? (config)# ip host? (config)# ip host mars? (config)# ip host mars (config)# ip host jupiter (config)# ip host saturn ( config)# end # show hosts -config CDP CDP (Cisco Discovery Protocol) is used to discover Cisco devices which connect to a given port. It is set globally on the device with cdp run, and then the timers are set as: (config)# cdp? (config)# cdp holdtime? (config)# cdp holdtime 120 (config)# cdp timer? (config)# cdp timer 50 (config)# end Using the show cdp command, determine the settings for CDP: To enable CDP on the WAP: (config)# cdp run (config)# end To enable CDP on an interface: (config)# int fa0 (config-if)# cdp? All rights reserved. 3
4 (config-if)# cdp enable (config-if)# end 2. To show CDP information: # show cdp? # show cdp neighbors # show cdp neighbors detail # show cdp neighbors traffic 3. To remove CDP from an interface the no command is inserted in front of the command which is to be removed: (config)# int fa0 (config-if)# no? (config-if)# no cdp enable (config-if)# end View the running-config, and verify that CDP has been removed from the port: Logging The logging facility in the wireless access point is important as it can be used to determine intrusions and also log warning/errors. The following defines logging: (config)# logging on (config)# logging buff? (config)# logging buff 8192 What is the minimum and maximum size of the buffer: There are several types of logging facilities including warning, debugging and critical. To set these for different logging facilities: (config)# logging buff? (config)# logging buff warning (config)# logging console critical (config)# logging monitor critical (config)# logging trap warning How many security levels, and what are they: All rights reserved. 4
5 The logging to the local buffer is fine for short-term logging, but eventually it will run out of space (or may be deleted by mistake). This is good practice is to log to a server or to a syslog server (with the logging host command), such as: (config)# logging buff? (config)# logging (config)# logging host SNMP The SNMP (Simple Network Management Protocol) is a powerful method of gaining information on the operation of the network. The snmp-server command is used to enable SNMP monitoring. The snmp-server community command is used to initialise SNMP, and set the community string (which is basically used as a type of password for the SNMP access). For example to define the read-only string to public: (config)# snmp-server? (config)# snmp-server community? (config)# snmp-server community public? (config)# snmp-server community public RO The RO defines read-only access, while RW defines read-write access. To setup the SNMP contact, the location: (config)# snmp-server? (config)# snmp-server contact fred smith (config)# snmp-server location room c6 SNMP contains a database of monitored network conditions, such as the number of errors in data packets, the IP addresses of the interfaces, and so on. It can also be setup to trigger on certain traps, such as on syslog traps. To enable all of SNMP traps so that all the data is monitored: (config)# snmp-server? (config)# snmp-server enable? (config)# snmp-server enable traps? (config)# snmp-server enable traps (config)# exit Which traps are available: Then to send these traps to a remote host (to All rights reserved. 5
6 (config)# snmp-server host? (config)# snmp-server host (config)# snmp-server host public To determine the status of the SNMP communications: # show snmp and to display the SNMP engine and remote engines: # show snmp engine and to display the SNMP group: # show snmp group SNMP uses an MIB database (Figure 1) to store its values. To display its contents: # show snmp mib As you will see, the MIB has a massive number of entries, and shows the power of the SNMP protocol. Which entry is likely to define the receiving power of the antenna: Which entry is likely to define the number of VLANs: Which entry is likely to define the system uptime: To show the currently pending SNMP requests: # show snmp pending To show the SNMP sessions: # show snmp sessions All rights reserved. 6
7 ICMP: IcmpInMsgs. IcmpInErrors. Etc. SNMP SNMP agent agent MIB TCP: tcprtoalgorithm. tcprtomin. tcprtomax. Etc. System: sysobjectid. sysuptime. syscontact. sysname. syslocation. UDP: udpindatagrams. udpnoports. udpinerrors. Etc. At (address translation): attable. Ip: ipforwarding. ipdefaultttl. ipinreceives. ipinhdrerrors. Etc. Interfaces: ifnumber. iftable. SNMP: snmpinpkts. snmpoutpkts. Etc. Figure 2: SNMP structure Hot standby The hot standby function is used to provide a backup to another access point, and is configured in the same way, so that it is fails, the hot standby device can become active, and associates the active clients, automatically. The only setting that will differ is the IP address of the device. In the following configuration, the MAC address of the device to be monitored is 1111.abcd.ef10. The timeout period in which the device will determine if the monitored device has stopped working is five seconds, and the poll time is two seconds: (config)# iapp? (config)# iapp standby? (config)# iapp standby mac? (config)# iapp standby mac 1111.abcd.ef10 (config)# iapp standby timeout? (config)# iapp standby timeout 5 (config)# iapp standby polltime? (config)# iapp standby polltime 2 What is the minimum and maximum timeout values: What is the minimum and maximum poll time values: All rights reserved. 7
8 And then to display the IAPP settings: # show iapp # show iapp? # show iapp rogue-ap-list # show iapp standby-parms # show iapp statistics Are there any rogue access points: Are the hot standby parameters correctly defined: Line console and VTY commands The CONSOLE connection on the wireless access point is typically used to gain access to the device when there is no network connection, and allows a high-level of access to the device. Thus is should be protected with a strong password. In the following, the console port is configured with a password of fred, and the timeout for a session of 50 seconds, and an executive timeout of 15 minutes: (config) # line? (config) # line con 0 (config-line) #? (config-line) # login (config-line) # password? (config-line) # password fred (config-line) # timeout? (config-line) # timeout login? (config-line) # timeout login response? (config-line) # timeout login response 50 (config-line) # exec-timeout 15 (config-line) # exit TELNET is an important protocol as it allows a remote connection from a terminal. The number of telnet sessions can be limited with the start and end terminal definition. In the following case, the number of terminal sessions is 16 (0 to 15), and freddy is assigned as the password: (config) # line vty 0 15 (config-line) # login (config-line) # password freddy (config-line) # logging synchronous (config-line) # timeout login response 50 (config-line) # exec-timeout 15 (config-line) # exit All rights reserved. 8
9 When the user logs in through TELNET they will be accessed for their password: User Access Verification Password: freddy Services There are many services that can be run on a wireless access point. These include a passwordencryption service, the DHCP service, and so on. (config) # service? List some of the available services: Password encryption service One useful service is for password encryption. Initially it can disabled with: (config) # no service password-encryption (config) # line con 0 (config-line) # login (config-line) # password fred (config-line) # exit What is the line for defining the password: Now enable the password encryption service and view the difference: (config) # service password-encryption (config) # line con 0 (config-line) # login (config-line) # password fred (config-line) # exit What is the line for defining the password: An important service is the one to timestamps the log and debug activities. For this: All rights reserved. 9
10 (config) # service timestamps? (config) # service timestamps log? (config) # service timestamps log datetime (config-line) # exit For this we can either define the timestamps as the current Date/Time or in terms of the UpTime. There are a number of TCP and UDP small server applications, such as ECHO, Discard, Daytime, and so on. These are enabled by default. Thus to view them in the runningconfig: What are the lines relating to tcp-small-servers and udp-small-servers: If we contain the wireless access point on the Daytime port (13), it produces the following: telnet Monday, March 1, :46:32-UTC These can cause security problems, as they allow a method of an intruder to gain access to the device, thus to stop them: (config) # no service tcp-small-servers (config) # no service udp-small-servers (config-line) # exit Are there lines relating to tcp-small-servers and udp-small-servers: Now if we were to access to the wireless access point we get: telnet Connecting To Could not open connection to the host, on port 13: Connect failed Thus, we have closed-off a port, which reduces the opportunities for someone to connect to the access point. Other services, such as finger, have particular problems related to security, but as they are disabled by default, they are not a particular problem. The DHCP service is enabled by default. If it is to be disabled, then: (config) # no service dhcp (config) # exit All rights reserved. 10
11 Banners and HTTP settings The banners can be set for different modes, such as Login, Exec, and for a message-of-the-day (MOTD), such as: (config) # banner? (config) # banner login hello (config) # banner motd system failure (config) # banner exec hello me (config) # exit What are the lines relating to the banners: To get rid of the banners: (config) # no? (config) # no banner login (config) # no banner motd (config) # no banner exec (config) # exit Are the lines relating to the banners gone: The HTTP service is important as it allows remote access through a Web browser. We can enable the server and define the username and password with: (config) # username? (config) # username fred password bert (config) # ip http? (config) # ip http server (config) # ip http authentication? (config) # ip http authentication local (config) # exit then, when the user tries to access to the wireless access point they will not be allowed to connect, unless the have the correct username and password, such as: All rights reserved. 11
12 which should give one of the following: Often a new HTTP port is required (to stop users from trying to access the Web page). Thus to change the port: (config) # ip http? (config) # ip http port? (config) # ip http port 8080 (config) # exit Now we cannot access the Web page with the standard port (80), and we must change the address with a colon to define the port, such as: All rights reserved. 12
13 We can also provide a helper-path with: (config) # ip http help-path (config) # exit Configuring as a repeater A repeater access point does not connect to a wired LAN, and basically forwards the data packets to another repeater or to a wireless access point which is connected to a wired network. With a repeater, of course, the Ethernet port will not operate. The repeater access point typically associates with an access point with has the best connectivity, whoever they can be setup to connect to a specific access point. In the following case, the access point will associate with the parent with the specified MAC address ( ): (config)# interface d0 (config-if)# ssid napier (config-ssid)# infrastructure-ssid (config-ssid)# exit (config-if)# station-role repeater (config-if)# dot11 extensions aironet (config-if)# parent (config-if)# parent aaaa.bbbb (config-if)# end In most cases the Cisco Aironet extensions must be enabled. All rights reserved. 13
14 Clock commands The main commands for clock are: # clock? # clock set? # clock set 11:00? # clock set 11:00 11? # clock set 11:00 11 jun? # clock set 11:00 11 jun 2006 History commands The main commands for history are: # clock? # terminal? # terminal history? # terminal history size? # terminal history size 100 # show history All rights reserved. 14
15 Tutorial 2 1. Complete the following challenges and note down the time you took to complete them: Chall. Description Time taken 10 DHCP Notes 11 Host Table 12 CDP 13 Banners and HTTP 14 CON and VTY 15 Clock 16 Logging 17 Services 18 SNMP 19 Hot standby 20 Repeater All rights reserved. 15
Author: Bill Buchanan. Wireless LAN. Unit 3: Wireless Infrastructure
Wireless LAN Unit 3: Wireless Infrastructure Areas covered: Wireless Infrastructures. Basic details on bridging and topologies. Wireless Data Logging and Device Discovery. Details on protocols such as
More informationUnit 3: Wireless Infrastructure
Wireless LAN CO72047 Unit 3: Wireless Infrastructure Prof. Bill Buchanan Contact: w.buchanan@napier.ac.uk Room: C.63 Telephone: X2759 MSN Messenger: w_j_buchanan@hotmail.com WWW: http://www.dcs.napier.ac.uk/~bill
More informationThis document is a tutorial related to the Router Emulator which is available at:
Introduction This document is a tutorial related to the Router Emulator which is available at: http://www.dcs.napier.ac.uk/~bill/router.html A demo is also available at: http://www.dcs.napier.ac.uk/~bill/router_demo.htm
More informationNote that you can also use the password command but the secret command gives you a better encryption algorithm.
Router Device Security Lab Configuring Secure Passwords 1. Configure the enable secret and password enable password TRUSTME enable secret letmein Look at the configuration: show config terminal Note the
More informationConfiguring Repeater and Standby Access Points
CHAPTER 19 This chapter descibes how to configure your access point as a hot standby unit or as a repeater unit. This chapter contains these sections: Understanding Repeater Access Points, page 19-2 Configuring
More informationOverview of the Cisco NCS Command-Line Interface
CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,
More informationNumerics INDEX. 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC g 3-6, x authentication 4-13
INDEX Numerics 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC 1-8 802.11g 3-6, 3-9 802.1x authentication 4-13 A AAA server group 4-25 aaa authentication login command 4-24 aaa authorization command 4-27 aaa
More informationNetwork security session 9-2 Router Security. Network II
Network security session 9-2 Router Security Network II Router security First line of defense of the network Compromise of a router can lead to many issues: Denial of network services Degrading of network
More informationTroubleshooting Network analysis Software communication tests and development Education. Protocols used for communication (10 seconds capture)
Lab 1 Wireshark Wireshark is an open source and free packet analyser used for many purposes, such as: Troubleshooting Network analysis Software communication tests and development Education This reports
More informationLab 7 Configuring Basic Router Settings with IOS CLI
Lab 7 Configuring Basic Router Settings with IOS CLI Objectives Part 1: Set Up the Topology and Initialize Devices Cable equipment to match the network topology. Initialize and restart the router and switch.
More informationConfiguring Repeater and Standby Access Points and Workgroup Bridge Mode
20 CHAPTER Configuring Repeater and Standby Access Points and Workgroup Bridge Mode This chapter describes how to configure your access point as a repeater, as a hot standby unit, or as a workgroup bridge.
More informationConfiguring Repeater and Standby Access Points and Workgroup Bridge Mode
CHAPTER 19 Configuring Repeater and Standby Access Points and Workgroup Bridge Mode This chapter descibes how to configure your access point as a repeater, as a hot standby unit, or as a workgroup bridge.
More informationChapter 10 Lab 10-2, Securing VLANs INSTRUCTOR VERSION
CCNPv7.1 SWITCH Chapter 10 Lab 10-2, Securing VLANs INSTRUCTOR VERSION Topology Objectives Background Secure the server farm using private VLANs. Secure the staff VLAN from the student VLAN. Secure the
More informationGoCertify Advanced Cisco CCIE Lab Scenario # 1
GoCertify Advanced Cisco CCIE Lab Scenario # 1 (http://www.gocertify.com) IPexpert, Inc. is a leading provider in on-line Cisco CCNA, CCNP and CCIE training material. For more information please visit
More informationLab - Configuring Basic DHCPv4 on a Router (Solution)
(Solution) Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/0 192.168.0.1 255.255.255.0 N/A G0/1 192.168.1.1 255.255.255.0 N/A S0/0/0 (DCE) 192.168.2.253
More informationChapter 2. Switch Concepts and Configuration. Part II
Chapter 2 Switch Concepts and Configuration Part II CCNA3-1 Chapter 2-2 Switch Concepts and Configuration Configuring Switch Security MAC Address Flooding Passwords Spoofing Attacks Console Security Tools
More informationGetting Started with the VG248
CHAPTER 2 Before you can configure the telephony features on the VG248 to interact with the analog phones, you must first configure the basic network, SNMP, and password settings. These settings enable
More informationExam E1 Copyright 2010 Thaar AL_Taiey
Exam E1 2 Exam E1 E1-1. Which of the following statements is true regarding the internetwork shown in Figure E1-1? (Select all that apply) Figure E1-1 A Sample Internetwork A. The link number 15 uses a
More informationLab Using the CLI to Gather Network Device Information Topology
Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A Lo0 209.165.200.225 255.255.255.224 N/A S1 VLAN 1 192.168.1.11 255.255.255.0
More informationSkills Assessment Student Training
Skills Assessment Student Training Topology Assessment Objectives Part 1: Initialize Devices (6 points, 5 minutes) Part 2: Configure Device Basic Settings (33 points, 20 minutes) Part 3: Configure Switch
More information3 Wireless Emulator (Challenges)
3 Wireless Emulator (Challenges) 3.1 Introduction The following relates to the wireless emulator challenges. 3.2 Challenge 1 (BVI 1) The following sets up the BVI 1 port: > enable (config)# int bvi 1 (config-if)#
More informationLaboration 2 Troubleshooting Switching and First-Hop Redundancy
Laboration 2 Troubleshooting Switching and First-Hop Redundancy Topology All contents are Copyright 1992 2011 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1
More informationLab - Configuring a Switch Management Address
Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway S1 VLAN 1 192.168.1.2 255.255.255.0 N/A PC-A NIC 192.168.1.10 255.255.255.0 N/A Part 1: Configure a Basic Network
More informationCCNA Semester 2 labs. Labs for chapters 2 10
CCNA Semester 2 labs Labs for chapters 2 10 2.2.2.5 Lab - Configuring IPv4 Static and Default Routes 2.3.2.4 Lab - Troubleshooting Static Routes 3.2.1.9 Lab - Configuring Basic RIPv2 5.2.2.9 Lab - Configuring
More informationCisco WAAS Software Command Summary
2 CHAPTER This chapter summarizes the Cisco WAAS 4.0.7 software commands. lists the WAAS commands (alphabetically) and indicates the command mode for each command. The commands used to access modes are
More informationLab Guide 1 - Basic Configuration and Interface Configuration
IXP Workshop Lab Lab Guide 1 - Basic Configuration and Interface Configuration Objective: All the workshop lab routers are set to the default configuration and cabling requirements are prebuild according
More informationLecture (02) Switch remote configuration peer2peer star network clients/server star network Traffic analysis using Packet Tracer
Lecture (02) Switch remote configuration peer2peer star network clients/server star network Traffic analysis using Packet Tracer Dr. Ahmed M. ElShafee ١ Topology ٢ Preparation ٣ Commands summery ٤ enabl
More informationexam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)
100-105.exam Number: 100-105 Passing Score: 800 Time Limit: 120 min CISCO 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND) Exam A QUESTION 1 Which route source code represents the routing
More informationLab Configuring Dynamic and Static NAT (Solution)
(Solution) Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway Gateway G0/1 192.168.1.1 255.255.255.0 N/A S0/0/1 209.165.201.18 255.255.255.252 N/A ISP S0/0/0 (DCE)
More informationSkills Assessment Student Training Exam
Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (2 points, 5 minutes) Part 2: Configure Device Basic Settings (18 points, 20 minutes) Part 3: Configure
More informationConfiguring Repeater and Standby Access Points and Workgroup Bridge Mode
CHAPTER 19 Configuring Repeater and Standby Access Points and Workgroup Bridge Mode This chapter describes how to configure your access point as a repeater, as a hot standby unit, or as a workgroup bridge.
More informationChapter 3 Lab 3-1, Assembling Maintenance and Troubleshooting Tools
Chapter 3 Lab 3-1, Assembling Maintenance and Troubleshooting Tools Physical Topology All contents are Copyright 1992 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
More informationLab Configuring Dynamic and Static NAT (Instructor Version Optional Lab)
(Instructor Version Optional Lab) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional activities are designed to enhance understanding and/or
More informationHot Standby Access Points
Hot Standby Access Points This module describes how to configure your wireless device as a hot standby unit in the following sections: Understanding Hot Standby, page 1 Configuring a Hot Standby Access
More informationLaboration 1 Examine the Topology and Basic Troubleshooting Commands
Laboration 1 Examine the Topology and Basic Troubleshooting Commands Topology All contents are Copyright 1992 2011 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page
More informationCCNA 1 Chapter 2 v5.0 Exam Answers %
CCNA 1 Chapter 2 v5.0 Exam Answers 2015 100% 1. Which two features are characteristics of flash memory? (Choose two.) Flash provides nonvolatile storage. Flash receives a copy of the IOS from RAM when
More informationCisco Router Security: Principles and Practise. The foundation of network security is router security.
The foundation of network security is router security. 1) Router security within a general IT security plan, IOS software and standard access. 2) Password security and authentication. 3) Services, applications
More informationLab 8.5.2: Troubleshooting Enterprise Networks 2
Lab 8.5.2: Troubleshooting Enterprise Networks 2 Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Fa0/0 192.168.10.1 255.255.255.0 N/A R1 Fa0/1 192.168.11.1 255.255.255.0
More informationViewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418
This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help
More informationPT Activity: Configure AAA Authentication on Cisco Routers
PT Activity: Configure AAA Authentication on Cisco Routers Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask R1 Fa0/0 192.168.1.1 255.255.255.0 S0/0/0 10.1.1.2
More informationICND1. Switch Configuration Lab. All configurations have been set to factory defaults for these labs
ICND1 Switch Configuration Lab TOPOLOGY 3xPC (hosts) 2x2950 (Layer 2 Switches) 1x3560 (Layer 3 Switch) 5x2811 (Routers, unused in this set of labs) All configurations have been set to factory defaults
More informationTroubleshooting Tools. Tools for Gathering Information
Internetwork Expert s CCNP Bootcamp Troubleshooting Tools http:// Tools for Gathering Information Before implementing a fix, information must be gathered about a problem to eliminate as many variables
More informationLab Configure Basic AP Security through IOS CLI
Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following
More informationLab Configuring Switch Security Features Topology
Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 172.16.99.1 255.255.255.0 N/A S1 VLAN 99 172.16.99.11 255.255.255.0 172.16.99.1 PC-A NIC 172.16.99.3
More informationAdvanced IPv6 Training Course. Lab Manual. v1.3 Page 1
Advanced IPv6 Training Course Lab Manual v1.3 Page 1 Network Diagram AS66 AS99 10.X.0.1/30 2001:ffXX:0:01::a/127 E0/0 R 1 E1/0 172.X.255.1 2001:ffXX::1/128 172.16.0.X/24 2001:ff69::X/64 E0/1 10.X.0.5/30
More informationApplied Cisco Networking (CCNP BCMSN)
Applied Cisco Networking (CCNP BCMSN) Module Leader: Prof Bill Buchanan Module number: C032061 Email: w.buchanan@napier.ac.uk Telephone: X2759 MSN Messenger: w_j_buchanan@hotmail.com Version: Semester
More informationUsing the Web Graphical User Interface
Prerequisites for Using the Web GUI, page 1 Information About Using The Web GUI, page 1 Connecting the Console Port of the Device, page 3 Logging On to the Web GUI, page 3 Enabling Web and Secure Web Modes,
More informationConfigure Site Network Settings
About Global Network Settings, page 1 About Device Credentials, page 2 Configure Global Device Credentials, page 4 Configure IP Address Pools, page 9 Configure Global Network Servers, page 9 Configure
More informationConfiguring SNMP CHAPTER. This chapter describes how to configure the Simple Network Management Protocol (SNMP) on your access point.
CHAPTER 18 This chapter describes how to configure the Simple Network Management Protocol (SNMP) on your access point. Note For complete syntax and usage information for the commands used in this chapter,
More informationCCNA 1 Chapter 2 v5.0 Exam Answers 2013
CCNA 1 Chapter 2 v5.0 Exam Answers 2013 1. Refer to the exhibit. A switch was configured as shown. A ping to the default gateway was issued, but the ping was not successful. Other switches in the same
More informationLab Configuring and Verifying Standard IPv4 ACLs Topology
Topology 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 10 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.10.1
More informationDoS Attacks Malicious Code Attacks Device Hardening Social Engineering The Network Security Wheel
CCNA4 Chapter 4 * DoS Attacks DoS attacks are the most publicized form of attack and also among the most difficult to eliminate. DoS attacks prevent authorized people from using a service by consuming
More informationLab Configuring and Verifying Extended ACLs Topology
Topology 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.10.1
More informationLab Configuring and Verifying Standard IPv4 ACLs (Instructor Version Optional Lab)
(Instructor Version Optional Lab) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Optional activities are designed to enhance understanding and/or
More informationLab - Examining Telnet and SSH in Wireshark
Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A PC-A NIC 192.168.1.3 255.255.255.0 192.168.1.1 Part 1: Configure the Devices
More informationHow to Configure a Cisco Router Behind a Non-Cisco Cable Modem
How to Configure a Cisco Router Behind a Non-Cisco Cable Modem Document ID: 19268 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify
More informationConfiguring System Message Logs
Information About, on page 1 How to Configure System Message Logs, on page 4 Monitoring and Maintaining System Message Logs, on page 12 Configuration Examples for System Message Logs, on page 12 Additional
More information7 Filtering and Firewalling
7 Filtering and Firewalling 7.1 Introduction Security is becoming a major concern in IT, and A major concern in networking and the Internet, and wireless systems are probably more open to abuse than any
More informationLab 1-2Connecting to a Cisco Router or Switch via Console. Lab 1-6Basic Graphic Network Simulator v3 Configuration
MODULE1 GETTING STARTED WITH YOUR CISCO LAB Lab 1-1Identifying Router Components and Accessories Lab 1-2Connecting to a Cisco Router or Switch via Console Lab 1-3Identifying Router & Switch IOS Software
More informationThree interface Router without NAT Cisco IOS Firewall Configuration
Three interface Router without NAT Cisco IOS Firewall Configuration Document ID: 13893 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations
More informationConfiguring Client Profiling
Prerequisites for, page 1 Restrictions for, page 2 Information About Client Profiling, page 2, page 3 Configuring Custom HTTP Port for Profiling, page 4 Prerequisites for By default, client profiling will
More informationLab Designing and Implementing a VLSM Addressing Scheme. Topology. Objectives. Background / Scenario
CSNB214 Packet Tracer Lab Designing and Implementing a VLSM Addressing Scheme Topology Objectives Part 1: Examine Network Requirements Part 2: Design the VLSM Address Scheme Part 3: Cable and Configure
More informationChapter 8: Lab B: Configuring a Remote Access VPN Server and Client
Chapter 8: Lab B: Configuring a Remote Access VPN Server and Client Topology IP Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1 192.168.1.1 255.255.255.0 N/A
More informationBuy full file at
14 Chapter 2 LAN Redundancy Chapter 2 LAN Redundancy 2.0.1.2 Class Activity Stormy Traffic ( ) Objective Explain the purpose of the Spanning Tree Protocol (STP) in a switched LAN environment with redundant
More informationNetwork Infrastructure Filtering at the border. PacNOG19 28th November - 2nd December 2016 Nadi, Fiji
Network Infrastructure Filtering at the border PacNOG19 28th November - 2nd December 2016 Nadi, Fiji Issue Date: [Date] Revision: [XX] What we have in network? Router Switch CPE (ADSL Router / WiFi Router)
More informationUsing the Web Graphical User Interface
Prerequisites for Using the Web GUI, page 1 Information About Using The Web GUI, page 2 Connecting the Console Port of the Switch, page 3 Logging On to the GUI, page 4 Enabling Web and Secure Web Modes,
More informationLab Managing Router Configuration Files with Terminal Emulation Software
Lab Managing Router Configuration Files with Terminal Emulation Software Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1 255.255.255.0 N/A
More informationCISCO EXAM QUESTIONS & ANSWERS
CISCO 100-101 EXAM QUESTIONS & ANSWERS Number: 100-101 Passing Score: 800 Time Limit: 120 min File Version: 35.5 http://www.gratisexam.com/ CISCO 100-101 EXAM QUESTIONS & ANSWERS Exam Name: CCNA Interconnecting
More informationChapter 5 Lab 5-1 Inter-VLAN Routing INSTRUCTOR VERSION
CCNPv7.1 SWITCH Chapter 5 Lab 5-1 Inter-VLAN Routing INSTRUCTOR VERSION Topology Objectives Implement a Layer 3 EtherChannel Implement Static Routing Implement Inter-VLAN Routing Background Cisco's switching
More informationInterconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview
Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview This course will teach students about building a simple network, establishing internet connectivity, managing network device security,
More informationConfiguring Management Access
37 CHAPTER This chapter describes how to access the ASA for system management through Telnet, SSH, and HTTPS (using ASDM), how to authenticate and authorize users, how to create login banners, and how
More informationHP 5120 SI Switch Series
HP 5120 SI Switch Series Network Management and Monitoring Configuration Guide Part number: 5998-1813 Software version: Release 1505 Document version: 6W102-20121111 Legal and notice information Copyright
More informationDiscover Your Network
About Discovery, on page 1 Discovery Prerequisites, on page 2 Discovery Credentials, on page 2 Preferred Management IP Address, on page 4 Discovery Configuration Guidelines and Limitations, on page 5 Perform
More informationLab - Troubleshooting DHCPv4 Topology
Topology 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 9 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/0 192.168.0.1
More informationConfiguring CDP. Understanding CDP CHAPTER. This chapter describes how to configure Cisco Discovery Protocol (CDP) on the Catalyst 3560 switch.
21 CHAPTER This chapter describes how to configure Cisco Discovery Protocol (CDP) on the Catalyst 3560 switch. Note For complete syntax and usage information for the commands used in this chapter, refer
More informationLab Establishing and Verifying a Telnet Connection Instructor Version 2500
Lab 4.2.2 Establishing and Verifying a Telnet Connection Instructor Version 2500 Objective Establish a Telnet connection to a remote router. Verify that the application layer between source and destination
More informationCase Study. Routing & Switching. Cisco Networking Academy Routing and Switching: Scaling Network Case Study
Case Study Routing & Switching Cisco Networking Academy Routing and Switching: Scaling Network Case Study Overview and Objectives This case study allows students to build and configure a complex network
More informationLab Configuring Port Address Translation (PAT) (Instructor Version)
(Instructor Version) Instructor Note: Red font color or gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Objectives Device Interface IP Address Subnet Mask
More informationChapter 5 Lab 5-2 DHCP INSTRUCTOR VERSION
CCNPv7.1 SWITCH Chapter 5 Lab 5-2 DHCP INSTRUCTOR VERSION Topology Objectives Configure DHCP for IPv4 Configure Stateless DHCP for IPv6 Configure Stateful DHCP for IPv6 Background To practice the various
More informationCCNA 4 - Final Exam (B)
CCNA 4 - Final Exam (B) 1. Identify the factors that contribute to congestion on an Ethernet LAN. (Choose three.) improper placement of enterprise level servers addition of hosts to a physical segment
More informationLab Configuring Basic Switch Settings (Solution)
(Solution) Topology Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway S1 VLAN 99 192.168.1.2 255.255.255.0 192.168.1.1 PC-A NIC 192.168.1.10 255.255.255.0 192.168.1.1
More informationLab Configuring Basic RIPv2 (Solution)
(Solution) Topology 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 15 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway
More informationChapter 3 Command List
Chapter 3 Command List This chapter lists all the commands in the CLI. The commands are listed in two ways: All commands are listed together in a single alphabetic list. See Complete Command List on page
More informationSSG Configuration Example
APPENDIX A Example A-1 is a sample SSG configuration for the Cisco 10000 series router based on the topology in Figure A-1. The configuration includes AAA, PPP, SSG, and RADIUS. The SSG configuration enables
More informationcable modem dhcp proxy nat on Cisco Cable Modems
cable modem dhcp proxy nat on Cisco Cable Modems Document ID: 12176 Contents Introduction Prerequisites Requirements Components Used Conventions Dynamic NAT Versus Static NAT Configuration Using cable
More informationCisco Cookbook. Kevin Dooley and IanJ. Brown. O'REILLY 4 Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo
Cisco Cookbook Kevin Dooley and IanJ. Brown O'REILLY 4 Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Table of Contents Preface xv 1. Router Configuration and File Management 1 1.1 Configuring
More informationConfiguring an Access Point as a Local Authenticator
CHAPTER 9 Configuring an Access Point as a Local Authenticator This chapter describes how to configure the access point as a local authenticator to serve as a stand-alone authenticator for a small wireless
More informationCisco.BrainDump v by.MuTe
Cisco.BrainDump.100-101.v2013-06-25.by.MuTe Number: 100-101 Passing Score: 804 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ ICND1 100-101 Practice Exam QUESTION 1 Which three statements
More informationLab 2.8.2: Challenge Static Route Configuration
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway BRANCH HQ ISP PC1 PC2 Web Server Fa0/0 S0/0/0 Fa0/0 S0/0/0 S0/0/1 209.165.201.2 255.255.255.252 Fa0/0 209.165.200.225
More informationConfiguring System Message Logs
Finding Feature Information, on page 1 Restrictions for, on page 1 Information About, on page 2 How to Configure System Message Logs, on page 4 Monitoring and Maintaining System Message Logs, on page 12
More informationLab - Troubleshooting Standard IPv4 ACL Configuration and Placement Topology
Lab - Troubleshooting Standard IPv4 ACL Configuration and Placement Topology 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8 Addressing Table Objectives
More informationRouter pod documentation
Router pod documentation Note: DO NOT USE COPY RUNNING STARTUP, as this may reset the privileged password. If you change the privileged password, and save the configuration, please tell your lecturer as
More informationChapter 11: Networks
Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors
More informationLab Student Lab Orientation
Lab 1.1.1 Student Lab Orientation Objective In this lab, the students will complete the following tasks: Review the lab bundle equipment Understand the security pod topology Understand the pod naming and
More informationConfiguring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services
CHAPTER 11 Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services This chapter describes how to configure your access point/bridges for wireless domain services
More informationChapter 8 Lab 8-1, IP Service Level Agreements and Remote SPAN in a Campus Environment INSTRUCTOR VERSION
CCNPv7.1 SWITCH Chapter 8 Lab 8-1, IP Service Level Agreements and Remote SPAN in a Campus Environment INSTRUCTOR VERSION Topology Objectives Background Configure trunking, VTP, and SVIs. Implement IP
More informationUsing the Command-Line Interface
Information About, page 1 How to Use the CLI to Configure Features, page 5 Information About Command Modes The Cisco IOS user interface is divided into many different modes. The commands available to you
More informationCHAPTER 2 ACTIVITY
CHAPTER 2 ACTIVITY 2.1.1.1 1. CLI stands for 2. GUI stands for 3. Write the step you used to go to CLI interface on Windows 4. The OS, normally loads from a disk drive, into RAM. 5. The portion of the
More informationLab : Challenge OSPF Configuration Lab. Topology Diagram. Addressing Table. Default Gateway. Device Interface IP Address Subnet Mask
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Fa0/0 HQ S0/0/0 S0/0/1 Lo1 10.10.10.1 255.255.255.252 Fa0/0 Branch1 S0/0/0 S0/0/1 Fa0/0 Branch2 S0/0/0 S0/0/1 PC1
More informationConfiguring System Message Logs
Restrictions for, page 1 Information About, page 1 How to Configure System Message Logs, page 4 Monitoring and Maintaining System Message Logs, page 13 Configuration Examples for System Message Logs, page
More information