DAFTAR PUSTAKA. [2] Prof.Dr. Richard Sethmann Access Control Lists CCNA 2 (ACLs).German.

Size: px
Start display at page:

Download "DAFTAR PUSTAKA. [2] Prof.Dr. Richard Sethmann Access Control Lists CCNA 2 (ACLs).German."

Transcription

1 DAFTAR PUSTAKA [1] Nahush Kulkarni 1, Harsh Kothari 2, Hardik Ashar 3, sanchit Patil International Journal for Research in Applied Science & Engineering Technology (IJRASET) Mumbay University. [2] Prof.Dr. Richard Sethmann Access Control Lists CCNA 2 (ACLs).German. [3] Cisco Systems, Inc., 2017, Security Configuration Guide: Access Control Lists, Cisco IOS XE Release 3S, [pdf], (hhttp:// diakses tanggal 12 Maret 2017). [4] Cisco Systems, Inc., 2017, Access List Extended Version 1.0, [pdf],( diakses tanggal 15 Maret 2017). [5] Ravi S. Sandhu 1, Pierangela smarati 2, 1994, Access Control Principle and Practice, [pdf],( diakses tanggal 22 Maret 2017). [6] Cisco Systems, Inc., 2013, AStandard ACL Configuration Mode Commands,[pdf] 1_v403/command/reference/cmdref/std_acl.pdf, diakses tanggal 3 April 2017). [7] Riswanto ASimulasi Konfigurasi Kontrol Keamanan Jaringan Komputer Berbasis Access List Menggunakan Cisco Router, [Pdf]. [8] John N. Davies 1, Paul Comerford 2, Vicgrout Principles of Eliminating Access Control Lists within a Domain, [Pdf]. United Kingdom.

2 [9] Aditya Yuniar PENERAPAN ACCESS CONTROL LIST (ACL) PADA JARINGAN VLAN DI PT GOODYEAR INDONESIA TBK,[Pdf]. TROL_LIST_ACL_PADA_JARINGAN_VLAN_DI_PT_GOODYEAR_I NDONESIA_TBK_ADITYA_YUNIAR_PROGRAM_KEAHLIAN_TEK NIK_KOMPUTER_PROGRAM_DIPLOMA_INSTITUT_PERTANIAN_ BOGOR_BOGOR_2014, Indonesia. [10] AD Purwanto Implementasi Access List sebagai Filter Traffic Jaringan (Study Kasus PT.Usaha entertaiment Indonesia).[Pdf].ejournal.bsi.ac.id/ejurnal/index.php/jtk/article/download/365/274, Indonesia.

3 DAFTAR GAMBAR Gambar. 2.1 Switch Dell Networking N3024F... 5 Gambar.3.1 Router Cisco RV Gambar 3.2 Algoritma ACL Group MFC-OA Gambar 3.3. ACL Rule Group CPL-L Gambar 3.4 ACL Rule Group RCL-L Gambar 3.5. ACL Rule Group LAB-L Gambar 3.6. ACL Rule Group GAPL-L Gambar 3.7. ACL Rule Group MFC-FACTORY Gambar 3.8. Acl Rule Group CPL-L Gambar 3.9 ACL Rule Group RCL-L Gambar 3.10 ACL Rule Group LAB-L Gambar 3.11 ACL Rule Group GAPL-L Gambar 4.1 Network Campus Hierarchy Gambar 4.2 Network High Availailty Design Gambar 4.3 DELL N3024F dengan Metode Stacking Gambar 4.4 MTPutty Telnet SSH Gambar 4.5 Hasil Implementasi Access Control List Gambar 4.6 Rule Access Control List MFC-OA Gambar 4.7 Rule Access Control List MFC-RCL-L Gambar 4.8 Rule Access Control List MFC-CPL-L Gambar 4.9 Rule Access Control List MFC-LAB-L Gambar 4.10 Rule Access Control List MFC-GAPL-L Gambar 4.11 Rule Access Control List MFC-FACTORY-L Gambar 4.12 Rule Access Control List MFC-CPL-L Gambar 4.13 Rule Access Control List MFC-RCL-L Gambar 4.14 Rule Access Control List MFC-TWS-L Gambar Rule Access Control List MFC-SCW-L Gambar 4.16 Hasil Pengujian Ping yang di berikan ACL Gambar 4.17 Testing Ping yang tidak di berikan Rule ACL Gambar 4.18 Forti Client Access SSL VPN... 43

4 DAFTAR TABEL Tabel 2.1 Sepsifikasi General Switch Tabel 2.7 Spesifikasi Miscellaneous Switch Tabel 2.8 Sepsifikasi Environmental Parameters Switch Tabel 3.1 IP Asal atau Source IP Tabel 3.2 IP Tujuan atau Destination IP Tabel 3.3 VLAN ID Assign Rule Access Control List Tabel 3.4. Nama Group Access Control List Tabel 3.5. Rule ACL Group MFC-OA Tabel 3.6. Rule ACL Group CPL-L Tabel 3.7. Rule ACL Group RCL-L Tabel 3.8. Rule ACL Group LAB-L Tabel 3.9. Rule ACL Group GAPL-L Tabel Rule ACL MFC-FACTORY Tabel 3.11 Rule ACL CPL-L Tabel 3.12 Rule ACL RCL-L Tabel 3.13 Rule ACL LAB Tabel 3.14 Rule ACL GAPL-L Tabel 3.15 Konfigurasi MFC-OA Tabel 3.16 Konfigurasi CPL-L Tabel 3.17 Konfigurasi RCL-L Tabel 3.18 Konfigurasi LAB-L Tabel 3.19 Konfigurasi GAPL-L Tabel 3.20 Konfigurasi MFC FACTORY Tabel 3.21 Konfigurasi CPL-L Tabel 3.22 Konfigurasi RCL-L Tabel 3.23 Konfigurasi LAB-L Tabel 3.24 Konfigurasi GAPL-L

5

ABSTRAK... Error! Bookmark not defined. DAFTAR ISI... v. DAFTAR GAMBAR... viii. DAFTAR TABEL... xi. BAB I... Error! Bookmark not defined.

ABSTRAK... Error! Bookmark not defined. DAFTAR ISI... v. DAFTAR GAMBAR... viii. DAFTAR TABEL... xi. BAB I... Error! Bookmark not defined. DAFTAR ISI ABSTRAK... Error! Bookmark not DAFTAR ISI... v DAFTAR GAMBAR... viii DAFTAR TABEL... xi BAB I... Error! Bookmark not PENDAHULUAN... Error! Bookmark not 1.1 Latar Belakang... Error! Bookmark

More information

DAFTAR ISI. ABSTRAK... Error! Bookmark not defined. ABSTRACT... Error! Bookmark not defined. KATA PENGANTAR... Error! Bookmark not defined.

DAFTAR ISI. ABSTRAK... Error! Bookmark not defined. ABSTRACT... Error! Bookmark not defined. KATA PENGANTAR... Error! Bookmark not defined. DAFTAR ISI ABSTRAK... Error! Bookmark not ABSTRACT... Error! Bookmark not KATA PENGANTAR... Error! Bookmark not DAFTAR ISI... 64 DAFTAR TABEL... 67 DAFTAR GAMBAR... 68 BAB I PENDAHULUAN... Error! Bookmark

More information

DAFTAR ISI. HALAMAN JUDUL... Error! Bookmark not defined. LEMBAR PERSETUJUAN... Error! Bookmark not defined.

DAFTAR ISI. HALAMAN JUDUL... Error! Bookmark not defined. LEMBAR PERSETUJUAN... Error! Bookmark not defined. DAFTAR ISI Hlm HALAMAN JUDUL... Error! Bookmark not LEMBAR PERSETUJUAN... Error! Bookmark not LEMBAR PENGESAHAN... Error! Bookmark not LEMBAR PERSEMBAHAN... Error! Bookmark not ABSTRAK... Error! Bookmark

More information

PENDAHULUAN... Error! Bookmark not defined.

PENDAHULUAN... Error! Bookmark not defined. Daftar Isi PENDAHULUAN... Error! Bookmark not defined. 1.1 Latar Belakang... Error! Bookmark not defined. 1.2 Rumusan Masalah... Error! Bookmark not defined. 1.3 Tujuan Tugas Akhir... Error! Bookmark not

More information

INSTRUCTION: This section consists of TWO (2) questions. Answer ALL questions. ARAHAN: Bahagian ini mengandungi DUA (2) soalan. Jawab SEMUA soalan.

INSTRUCTION: This section consists of TWO (2) questions. Answer ALL questions. ARAHAN: Bahagian ini mengandungi DUA (2) soalan. Jawab SEMUA soalan. SECTION B: 55 MARKS BAHAGIAN B: 55 MARKAH INSTRUCTION: This section consists of TWO (2) questions. Answer ALL questions. ARAHAN: Bahagian ini mengandungi DUA (2) soalan. Jawab SEMUA soalan. QUESTION 1

More information

DAFTAR ISI ABSTRAK... 1 KATA PENGANTAR...ERROR! BOOKMARK NOT DEFINED. UCAPAN TERIMAKASIH...ERROR! BOOKMARK NOT DEFINED. DAFTAR ISI...

DAFTAR ISI ABSTRAK... 1 KATA PENGANTAR...ERROR! BOOKMARK NOT DEFINED. UCAPAN TERIMAKASIH...ERROR! BOOKMARK NOT DEFINED. DAFTAR ISI... ABSTRAK Perkembangan teknologi scanner yang berkembang begitu pesat memunculkan ide yang menjadi dasar konsep tugas akhir ini. Pada awalnya scanner digunakan untuk membaca gambar sehingga dapat diolah

More information

MiPDF.COM. 3. Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?

MiPDF.COM. 3. Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment? CCNA1 v6.0 Chapter 2 Exam Answers 2017 (100%) MiPDF.COM 1. What is the function of the kernel of an operating software? It provides a user interface that allows users to request a specific task. The kernel

More information

Zone-Based Policy Firewall

Zone-Based Policy Firewall CHAPTER31 Configuration Task Order Zone-based policy firewall (also known as Zone-Policy Firewall or ZPF ) changes the firewall from the older interface-based model to a more flexible, more easily understood

More information

Visitor Management System

Visitor Management System WWW.VALLINME.COM Visitor Management System Ver 1.0 Mohd Noor Azam 18-03-2015 [Type the abstract of the document here. The abstract is typically a short summary of the contents of the document. Type the

More information

BANDWIDTH MANAGEMENT USING SIMPLE QUEUE METHOD IN INFORMATIC ENGINEERING LABORATORY OF MUSAMUS UNIVERSITY USING MICROTICS

BANDWIDTH MANAGEMENT USING SIMPLE QUEUE METHOD IN INFORMATIC ENGINEERING LABORATORY OF MUSAMUS UNIVERSITY USING MICROTICS International Journal of Mechanical Engineering and Technology (IJMET) Volume 10, Issue 02, February 2019, pp.1414 1424, Article ID: IJMET_10_02_147 Available online at http://www.iaeme.com/ijmet/issues.asp?jtype=ijmet&vtype=10&itype=02

More information

DAFTAR GAMBAR. Gambar 1.1 Model Waterfal Gambar 2.1 Gambar Full Matrix Gambar 2.2 Kartu Aktivasi (tampak depan)... 14

DAFTAR GAMBAR. Gambar 1.1 Model Waterfal Gambar 2.1 Gambar Full Matrix Gambar 2.2 Kartu Aktivasi (tampak depan)... 14 DAFTAR GAMBAR Gambar 1.1 Model Waterfal... 7 Gambar 2.1 Gambar Full Matrix... 13 Gambar 2.2 Kartu Aktivasi (tampak depan)... 14 Gambar 2.3 Kartu Aktivasi (tampak belakang)... 14 Gambar 2.4 Karakter Sistem...

More information

Lab Configuring and Verifying Extended ACLs Topology

Lab Configuring and Verifying Extended ACLs Topology Topology 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.10.1

More information

CCNA 1 Chapter 2 v5.0 Exam Answers %

CCNA 1 Chapter 2 v5.0 Exam Answers % CCNA 1 Chapter 2 v5.0 Exam Answers 2015 100% 1. Which two features are characteristics of flash memory? (Choose two.) Flash provides nonvolatile storage. Flash receives a copy of the IOS from RAM when

More information

INTRUSION DETECTION SYSTEM BASED SNORT USING HIERARCHICAL CLUSTERING

INTRUSION DETECTION SYSTEM BASED SNORT USING HIERARCHICAL CLUSTERING INTRUSION DETECTION SYSTEM BASED SNORT USING HIERARCHICAL CLUSTERING Moch. Zen Samsono Hadi, Entin M. K., Aries Pratiarso, Ellysabeth J. C. Telecommunication Department Electronic Engineering Polytechnic

More information

DAFTAR ISI. BAB II... Error! Bookmark not defined.

DAFTAR ISI. BAB II... Error! Bookmark not defined. DAFTAR ISI KATA PENGANTAR... Error! Bookmark not ABSTRAK... Error! Bookmark not ABSTRACT... Error! Bookmark not DAFTAR ISI... v DAFTAR GAMBAR... viii DAFTAR TABEL... x BAB I... Error! Bookmark not 1.1

More information

Certified Cisco Networking Associate v1.1 ( )

Certified Cisco Networking Associate v1.1 ( ) Certified Cisco Networking Associate v1.1 (640-802) Exam Description: The Cisco Certified Networking Associate v1.1 640-802 is the composite exam that is associated with Cisco CCNA Routing and Switching

More information

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS PART II ONLINE COURSE OUTLINE

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS PART II ONLINE COURSE OUTLINE Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS PART II ONLINE COURSE OUTLINE COURSE TITLE ROUTING AND SWITCHING FUNDAMENTALS PART II COURSE DURATION 10 Hour(s) of Self-Paced Interactive Training COURSE

More information

DAFTAR REFERENSI. [GRE07] diakses tanggal 7 Desember 2007.

DAFTAR REFERENSI. [GRE07]  diakses tanggal 7 Desember 2007. DAFTAR REFERENSI [GRE07] http://en.wikipedia.org/wiki/gregorian_calendar diakses tanggal 7 Desember 2007. [PHP07] http://www.php.net diakses tanggal 7 Desember 2007. [RIC06] Richards, Robert. Pro PHP XML

More information

Cosine Similarity Measurement for Indonesian Publication Recommender System

Cosine Similarity Measurement for Indonesian Publication Recommender System Journal of Telematics and Informatics (JTI) Vol.5, No.2, September 2017, pp. 56~61 ISSN: 2303-3703 56 Cosine Similarity Measurement for Indonesian Publication Recommender System Darso, Imam Much Ibnu Subroto,

More information

Analysis and Implementation of Backup Line Network Using Branch Office VPN and Speedy Internet Broadband

Analysis and Implementation of Backup Line Network Using Branch Office VPN and Speedy Internet Broadband Journal Homepage : https://jurnal.umj.ac.id/index.php/jasat Analysis and Implementation of Backup Line Network Using Branch Office VPN and Speedy Internet Broadband Kotim Subandi 1*,Adriana Sari Aryani

More information

Quality Performance Test of Service Due to the Band-width Management Using Hierarchical Token Bucket Method and Queuing Connection

Quality Performance Test of Service Due to the Band-width Management Using Hierarchical Token Bucket Method and Queuing Connection J. Basic. Appl. Sci. Res., 7(10)1-10, 2017 2017, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Quality Performance Test of Service Due to the Band-width

More information

CCNA 1 Chapter 2 v5.0 Exam Answers 2013

CCNA 1 Chapter 2 v5.0 Exam Answers 2013 CCNA 1 Chapter 2 v5.0 Exam Answers 2013 1. Refer to the exhibit. A switch was configured as shown. A ping to the default gateway was issued, but the ping was not successful. Other switches in the same

More information

The Implementation of Alert System for LAN Network Monitoring Using the Dude Based

The Implementation of Alert System for LAN Network Monitoring Using the Dude Based IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS The Implementation of Alert System for LAN Network Monitoring Using the Dude Based Email To cite this article: E A Z Hamidi et

More information

COURSE CONTENT CCNA. web: call: (+91) / 400,

COURSE CONTENT CCNA.   web:  call: (+91) / 400, COURSE CONTENT CCNA Course 200-120 CCNA: Cisco Networking Devices: Accelerated (CCNAX) 1. Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches,

More information

Laboratory Exercise 1

Laboratory Exercise 1 I. Objectives - Using RouterSim. - Building a simple LAN. Laboratory Exercise 1 II. Using RouterSim 1. Network Visualizer Screen CCNA Network Visualizer 6.0 Net Visualizer Screen 2. Adding a Device to

More information

DAFTAR ISI. KATA PENGANTAR... Error! Bookmark not defined. DAFTAR TABEL... vi DAFTAR GAMBAR... 8 DAFTAR LAMPIRAN... 17

DAFTAR ISI. KATA PENGANTAR... Error! Bookmark not defined. DAFTAR TABEL... vi DAFTAR GAMBAR... 8 DAFTAR LAMPIRAN... 17 DAFTAR ISI ABSTRAK.Error! Bookmark n KATA PENGANTAR... Error! Bookmark not defined. DAFTAR ISI... i DAFTAR TABEL... vi DAFTAR GAMBAR... 8 DAFTAR LAMPIRAN... 17 BAB I PENDAHULUAN... Error! Bookmark not

More information

Chapter 2. Switch Concepts and Configuration. Part II

Chapter 2. Switch Concepts and Configuration. Part II Chapter 2 Switch Concepts and Configuration Part II CCNA3-1 Chapter 2-2 Switch Concepts and Configuration Configuring Switch Security MAC Address Flooding Passwords Spoofing Attacks Console Security Tools

More information

LOAD DISTRIBUTION ANALYSIS ON BIPARTITE TOPOLOGY USING FLOODLIGHT CONTROLLER

LOAD DISTRIBUTION ANALYSIS ON BIPARTITE TOPOLOGY USING FLOODLIGHT CONTROLLER LOAD DISTRIBUTION ANALYSIS ON BIPARTITE TOPOLOGY USING FLOODLIGHT CONTROLLER 1 ROHMAT TULLOH, 2 HALIMAH TUSSYADIAH, 3 RISKI WAHYU HUTABRI, 4 RIDHA MULDINA NEGARA 1 School of Applied Science, Telkom University,

More information

14 December, Mikrotik V2 9 DAILY BOOKS # Kindle # 3TB3OLQRB7. 14 December, 2017 E-BOOK MIKROTIK V2 9. Document Filetype: PDF 259.

14 December, Mikrotik V2 9 DAILY BOOKS # Kindle # 3TB3OLQRB7. 14 December, 2017 E-BOOK MIKROTIK V2 9. Document Filetype: PDF 259. 14 December, 2017 E-BOOK MIKROTIK V2 9 Document Filetype: PDF 259.11 KB 0 E-BOOK MIKROTIK V2 9 Load balancing is implemented as equal cost multipath routing. Mikrotik also uses 24v 0.8A (19.2 watt) and

More information

VPN Troubleshooting. VPN Troubleshooting CHAPTER20. Tunnel Details

VPN Troubleshooting. VPN Troubleshooting CHAPTER20. Tunnel Details CHAPTER20 Cisco SDM can troubleshoot VPN connections that you have configured. Cisco SDM reports the success or failure of the connection tests, and when tests have failed, recommends actions that you

More information

Cisco CCNA ACL Part II

Cisco CCNA ACL Part II Cisco CCNA ACL Part II Cisco CCNA Access List Applications This slide illustrates common uses for IP access lists. While this chapter focuses on IP access lists, the concept of access lists as mechanisms

More information

The Design Of Virtual Class Android-Based Mobile Video Streaming Using The Real Time Streaming Protocol

The Design Of Virtual Class Android-Based Mobile Video Streaming Using The Real Time Streaming Protocol The Design Of Virtual Class Android-Based Mobile Video Streaming Using The Real Time Streaming Protocol 1) Heryanto Bernadus, 2) Marwan Prodi Magister Sistem Komputer,Pascasarjana STMIK Handayani makassar

More information

COMBINING TABLES. Akademi Audit Negara. CAATs ASAS ACL / 1

COMBINING TABLES. Akademi Audit Negara. CAATs ASAS ACL / 1 COMBINING TABLES CAATs ASAS ACL / 1 OBJEKTIF MODUL Mempelajari kaedah menggabung dan menghubungkan dua atau lebih table bagi mencapai objektif Audit. Mempelajari kaedah menggunakan maklumat yang sedia

More information

UniNets CCNA Security LAB MANUAL UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL UniNets CCNA LAB MANUAL

UniNets CCNA Security LAB MANUAL UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL UniNets CCNA LAB MANUAL UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL Contents: UniNets CCNA Security LAB MANUAL Section 1 Securing Layer 2 Lab 1-1 Configuring Native VLAN on a Trunk Links Lab 1-2 Disabling

More information

The primary audience for this course includes Network Administrators, Network Engineers,

The primary audience for this course includes Network Administrators, Network Engineers, CCNA COURSE DESCRIPTION: Cisco Certified Network Associate (CCNA) validates the ability to install, configure, operate, and troubleshoot medium-size route and switched networks, including implementation

More information

ACCESS ROUTEROS USING MULTI-FACTOR AUTHENTICATION MIKROTIK USER MEETING 2018

ACCESS ROUTEROS USING MULTI-FACTOR AUTHENTICATION MIKROTIK USER MEETING 2018 ACCESS ROUTEROS USING MULTI-FACTOR AUTHENTICATION MIKROTIK USER MEETING 2018 Yogyakarta, Indonesia 20 Oktober 2018 About Me 2 Didiet Kusumadihardja 12 tahun pengalaman di IT RT/RW Net, Startup (e-commerce),

More information

ATA Infotech Ventures Pvt. Ltd.

ATA Infotech Ventures Pvt. Ltd. ATA Infotech Ventures Pvt. Ltd. ATA in a nutshell ATA Infotech Ventures Pvt. Ltd. happens to be a premiere institute at the heart of Salt Lake, Sector V, imparting state of the art instructor led training

More information

ABSTRAKSI. untuk sebuah bioskop yang berkonsep Romantic Dating. Penulis mencari sumber

ABSTRAKSI. untuk sebuah bioskop yang berkonsep Romantic Dating. Penulis mencari sumber ABSTRAKSI Dalam tulisan ilmiah ini, penulis memaparkan perancangan interior sebuah bioskop. Tujuan penulisan ini adalah untuk membuat sebuah rancangan yang tepat untuk sebuah bioskop yang berkonsep Romantic

More information

Securing Mikrotik

Securing Mikrotik Securing Mikrotik Router @VALENSRIYADI Valens Riyadi Twitter & IG: @valensriyadi info@mikrotik.co.id MikroTik Certified Trainer Citra.net.id WISP CEO Expert on IT for Disaster Relief, Digital Forensic,

More information

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet Interfaces. 2016 Cisco and/or its affiliates. All

More information

REGISTRATION GUIDE MCIS CUSTOMER PORTAL. Page 1

REGISTRATION GUIDE MCIS CUSTOMER PORTAL. Page 1 REGISTRATION GUIDE MCIS CUSTOMER PORTAL Page 1 Customer Portal Registration Guide Go to www.mcis.my and click the Customer Portal tab Page 2 Customer Portal Registration Guide 1. The page shown below will

More information

CCNA Course Access Control Lists

CCNA Course Access Control Lists CCNA Course Access Control Lists Access Control Lists (ACL) Traffic Filtering Permit or deny packets moving through router Permit or deny (VTY) access to or from a router Traffic Identifying for special

More information

Configuring Ethernet Management Port

Configuring Ethernet Management Port Finding Feature Information, page 1 Prerequisites for Ethernet Management Ports, page 1 Information about the Ethernet Management Port, page 1 How to Configure the Ethernet Management Port, page 4 Additional

More information

Junos Security. Chapter 3: Zones Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Junos Security. Chapter 3: Zones Juniper Networks, Inc. All rights reserved.   Worldwide Education Services Junos Security Chapter 3: Zones 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After successfully completing this chapter, you will be

More information

UNIVERSITI SAINS MALAYSIA. CST332 Internet Protocols. Architecture & Routing [Protokol, Seni Bina & Penghalaan Internet]

UNIVERSITI SAINS MALAYSIA. CST332 Internet Protocols. Architecture & Routing [Protokol, Seni Bina & Penghalaan Internet] UNIVERSITI SAINS MALAYSIA First Semester Examination 2016/2017 Academic Session December 2016 / January 2017 CST332 Internet Protocols. Architecture & Routing [Protokol, Seni Bina & Penghalaan Internet]

More information

NAT Support for Multiple Pools Using Route Maps

NAT Support for Multiple Pools Using Route Maps NAT Support for Multiple Pools Using Route Maps Document ID: 13739 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Access List Approach Host 1 to Host

More information

CCNA Discovery 3 Chapter 8 Reading Organizer

CCNA Discovery 3 Chapter 8 Reading Organizer Name Date Chapter 8 Reading Organizer After completion of this chapter, you should be able to: Describe traffic filtering and explain how Access Control Lists (ACLs) can filter traffic at router interfaces.

More information

Book Heading. 2 Configurating Static Routing. 7 Router Security VLAN Network Router Security Network Infrastructure Design

Book Heading. 2 Configurating Static Routing. 7 Router Security VLAN Network Router Security Network Infrastructure Design CND 1: Part 1. Navigation and Administration Switch CL EXEC Mode Switch CL Configuration Process Switch CL Configuration Process Router CL EXEC Mode Router CL EXEC Mode Router CL Configuration Process

More information

Cisco Router Dpc3825 Manual

Cisco Router Dpc3825 Manual Cisco Router Dpc3825 Manual Read Book Online: Cisco Router Dpc3825 Manual Download or read online ebook cisco router dpc3825 manual in any format for any devices. Cisco Router Dpc3825 Manual - Are you

More information

CCNA ROUTING & SWITCHING

CCNA ROUTING & SWITCHING CCNA ROUTING & SWITCHING Curriculum Overview The CCNA Routing and Switching curriculum consists of four courses that make up the recommended learning path. Students will be prepared to take the Cisco CCENT

More information

Configuring Ethernet Management Port

Configuring Ethernet Management Port Prerequisites for Ethernet Management Ports, page 1 Information About the Ethernet Management Port, page 1 How to Configure the Ethernet Management Port, page 4 Example for Configuring IP Address on Ethernet

More information

PT Activity: Configuring a Zone-Based Policy Firewall (ZPF)

PT Activity: Configuring a Zone-Based Policy Firewall (ZPF) PT Activity: Configuring a Zone-Based Policy Firewall (ZPF) Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 R2 R3 Fa0/1 192.168.1.1 255.255.255.0

More information

Database dan Sistem Manajemen Database

Database dan Sistem Manajemen Database Database dan Sistem Manajemen Database Organisasi Data Data Field Unit terkecil dari data Record Kumpulan dari fields yg berhubungan File Kumpulan dari record Organisasi Data Folders Kumpulan dari files

More information

Interconnecting Cisco Networking Devices

Interconnecting Cisco Networking Devices Interconnecting Cisco Networking Devices Q&A DEMO Version Copyright (c) 2007 Chinatag LLC. All rights reserved. Important Note Please Read Carefully For demonstration purpose only, this free version Chinatag

More information

Using the Management Ethernet Interface

Using the Management Ethernet Interface The Cisco ASR 920 Series Router has one Gigabit Ethernet Management Ethernet interface on each Route Switch Processor. The purpose of this interface is to allow users to perform management tasks on the

More information

Cisco SFE2010P 48-Port 10/100 Ethernet Switch: PoE Cisco Small Business Managed Switches

Cisco SFE2010P 48-Port 10/100 Ethernet Switch: PoE Cisco Small Business Managed Switches Cisco SFE2010P 48-Port 10/100 Ethernet Switch: PoE Cisco Small Business Managed Switches Secure, Reliable Switching to Support Growing Businesses Highlights Connects up to 48 network devices - PCs, printers,

More information

CISCO NETWORK ROUTER USER MANUALS DOWNLOAD - MANUALSLIB

CISCO NETWORK ROUTER USER MANUALS DOWNLOAD - MANUALSLIB PDF CISCO USER MANUALS DOWNLOAD - MANUALSLIB CISCO NETWORK ROUTER USER MANUALS DOWNLOAD - MANUALSLIB 1 / 5 2 / 5 3 / 5 cisco router manuals pdf View & download of more than 11341 Cisco PDF user manuals,

More information

Environmental Monitoring School Based Raspberry

Environmental Monitoring School Based Raspberry IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 5, Ver. I (Sep.-Oct.2016), PP 84-90 www.iosrjournals.org Environmental Monitoring

More information

CISCO SRW208MP-EU SWITCH 8 x 10/100 PoE /100/1000 mini-gbic porttia, WebView/ Max PoE

CISCO SRW208MP-EU SWITCH 8 x 10/100 PoE /100/1000 mini-gbic porttia, WebView/ Max PoE CISCO SRW208MP-EU SWITCH 8 x 10/100 PoE + 2 10/100/1000 mini-gbic porttia, WebView/ Max PoE Specifications Ports 8 RJ-45 connectors for 10BASE-T and 100BASE-TX, 2 RJ-45 connectors for 10BASE-T/100BASE-

More information

Lab Catalyst 2950 and 3550 Series Intra-VLAN Security

Lab Catalyst 2950 and 3550 Series Intra-VLAN Security Lab 7.2.5.1 Catalyst 2950 and 3550 Series Intra-VLAN Security Objective Scenario Configure intra-vlan security with Access Control Lists (ACLs) using the command-line interface (CLI) mode. This lab will

More information

1. Which two statements are true about VLAN implementation? (Choose two.)

1. Which two statements are true about VLAN implementation? (Choose two.) CCNA 2 Chapter 3 v5.0 Exam Answers 2015 (100%) 1. Which two statements are true about VLAN implementation? (Choose two.) The size of the collision domain is reduced. The number of required switches in

More information

Retake - Skills Assessment Student Training (Answer Key)

Retake - Skills Assessment Student Training (Answer Key) Retake - Skills Assessment Student Training (Answer Key) Name:. Topology Assessment Objectives Part 1: Develop the IPv4 Address Scheme (15 points, 0 minutes) Part 2: Configure Device IPv4 and Security

More information

EIGRP Practice Skills Assessment - Packet Tracer

EIGRP Practice Skills Assessment - Packet Tracer CCNA Routing and Switching Scaling Networks EIGRP Practice Skills Assessment - Packet Tracer A few things to keep in mind while completing this activity: 1. Do not use the browser Back button or close

More information

Comparison Route Redistribution on Dynamic Routing Protocol (EIGRP into OSPF and EIGRP into IS-IS) Chairul Mukmin, Darius Antoni, Edi Surya Negara

Comparison Route Redistribution on Dynamic Routing Protocol (EIGRP into OSPF and EIGRP into IS-IS) Chairul Mukmin, Darius Antoni, Edi Surya Negara The 5th ICIBA 2016, International Conference on Information Technology and Engineering Application Palembang-Indonesia, 19-20 February 2016 Comparison Route Redistribution on Dynamic Routing Protocol (EIGRP

More information

Configuring a DHCP Server DHCP Operation

Configuring a DHCP Server DHCP Operation CCNA4 Chapter 7 * Configuring a DHCP Server The steps to configure a router as a DHCP server: Step 1. Define a range of addresses that DHCP is not to allocate. These are usually static addresses reserved

More information

CONFIGURATION OF CISCO 2610 ROUTER OWNERS MANUAL DOWNLOAD

CONFIGURATION OF CISCO 2610 ROUTER OWNERS MANUAL DOWNLOAD 11 November, 2017 CONFIGURATION OF CISCO 2610 ROUTER OWNERS MANUAL DOWNLOAD Document Filetype: PDF 233.19 KB 0 CONFIGURATION OF CISCO 2610 ROUTER OWNERS MANUAL DOWNLOAD Cisco 2610 Ethernet Router overview

More information

INFRANSTRUKTUR TEKNOLOGI INFORMASI

INFRANSTRUKTUR TEKNOLOGI INFORMASI Physical Layer INFRANSTRUKTUR TEKNOLOGI INFORMASI Ramadhan Rakhmat Sani, M.Kom Overview Konsep Jaringan Komputer Protokol Jaringan Physical Layer Data Link Layer Konsep Lan Network Layer Ip Address Subnetting

More information

Lab Command Line Fundamentals Instructor Version 2500

Lab Command Line Fundamentals Instructor Version 2500 Lab 2.2.9 Command Line Fundamentals Instructor Version 2500 Objective Log into a router and go to the user and privileged modes. Use several basic router commands to determine how the router is configured.

More information

5 What two Cisco tools can be used to analyze network application traffic? (Choose two.) NBAR NetFlow AutoQoS Wireshark Custom Queuing

5 What two Cisco tools can be used to analyze network application traffic? (Choose two.) NBAR NetFlow AutoQoS Wireshark Custom Queuing 1 Refer to the exhibit. After configuring QoS, a network administrator issues the command show queueing interface s0/1. What two pieces of information can an administrator learn from the output of this

More information

Course Outline. Pearson Cisco: CCNA Routing and Switching (ICND ) Official Cert Guide. 28 Jun 2018

Course Outline. Pearson Cisco: CCNA Routing and Switching (ICND ) Official Cert Guide.  28 Jun 2018 Course Outline Pearson Cisco: CCNA Routing and Switching (ICND2 200-105) Official Cert Guide 28 Jun 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number

More information

Course Outline. ICND2 - Interconnecting Cisco Networking Devices Part 2. ICND2 - Interconnecting Cisco Networking Devices Part 2

Course Outline. ICND2 - Interconnecting Cisco Networking Devices Part 2.   ICND2 - Interconnecting Cisco Networking Devices Part 2 Course Outline ICND - Interconnecting Cisco Networking Devices Part 03 Oct 018 Contents 1. Course Objective. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

INSTRUCTION: This section consists of TWO (2)short answers and TWO (2) structured essays. Answer ALL questions.

INSTRUCTION: This section consists of TWO (2)short answers and TWO (2) structured essays. Answer ALL questions. SECTION B : 70 MARKS BAHAGIAN B :70 MARKAH INSTRUCTION: This section consists of TWO (2)short answers and TWO (2) structured essays. Answer ALL questions. ARAHAN: Bahagian ini mengandungi DUA(2) soalan

More information

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM This lab has been updated for use on NETLAB+ Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet interfaces.

More information

CCNP R&S. Plan, implement, secure, maintain, and troubleshoot converged enterprise networks. Prepare for Cisco CCNP Routing & Switching certification

CCNP R&S. Plan, implement, secure, maintain, and troubleshoot converged enterprise networks. Prepare for Cisco CCNP Routing & Switching certification Course Overview The CCNP Routing & Switching curriculum provides a comprehensive overview of enterpriselevel networking concepts, including advanced routing switching, and troubleshooting. The curriculum

More information

Cisco SGE Port Gigabit Switch Cisco Small Business Managed Switches

Cisco SGE Port Gigabit Switch Cisco Small Business Managed Switches Cisco SGE2010 48-Port Gigabit Switch Cisco Small Business Managed Switches Performance and Reliability to Support Small Business Networks Highlights 48 high-speed ports optimized for the network core or

More information

Lab Configuring and Verifying Standard ACLs Topology

Lab Configuring and Verifying Standard ACLs Topology Topology 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 9 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.10.1

More information

Router and ACL ACL Filter traffic ACL: The Three Ps One ACL per protocol One ACL per direction One ACL per interface

Router and ACL ACL Filter traffic ACL: The Three Ps One ACL per protocol One ACL per direction One ACL per interface CCNA4 Chapter 5 * Router and ACL By default, a router does not have any ACLs configured and therefore does not filter traffic. Traffic that enters the router is routed according to the routing table. *

More information

Scope and Sequence: CCNA Exploration v4.0

Scope and Sequence: CCNA Exploration v4.0 Scope and Sequence: CCNA Exploration v4.0 Last Updated August 30, 2007 The course objectives and outline for the final two CCNA Exploration courses, LAN Switching and Wireless and Accessing the WAN, are

More information

IPv6 in Campus Networks

IPv6 in Campus Networks IPv6 in Campus Networks Dave Twinam Manager, Technical Marketing Engineering Internet Systems Business Unit dtwinam@cisco.com Cisco Twinam IPv6 Summit 2003 Cisco Systems, Inc. All rights reserved. 1 IPv6

More information

Administrasi Jaringan (Network Administration) Ferry Astika Saputra Isbat Udzin Nadhori Iwan Syarif M. Udin Harun al Rasyid

Administrasi Jaringan (Network Administration) Ferry Astika Saputra Isbat Udzin Nadhori Iwan Syarif M. Udin Harun al Rasyid Administrasi Jaringan (Network Administration) Ferry Astika Saputra Isbat Udzin Nadhori Iwan Syarif M. Udin Harun al Rasyid Introduction Networks are no longer a luxury, but a requirement to keep the organization

More information

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM This lab has been updated for use on NETLAB+ Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet Interfaces.

More information

Sniffing & Keylogger. Deff Arnaldy, M.Si

Sniffing & Keylogger. Deff Arnaldy, M.Si Sniffing & Keylogger Deff Arnaldy, M.Si 0818 0296 4763 deff_arnaldy@yahoo.com 1 Konsep sniffing Capturing Live Network Data Explorasi hasil capturing Countermeasure sniffing Keyloggers Overview 2 Sniffer

More information

Using the Management Ethernet Interface

Using the Management Ethernet Interface This chapter covers the following topics: Gigabit Ethernet Management Interface Overview, page 1 Gigabit Ethernet Port Numbering, page 1 IP Address Handling in ROMmon and the Management Ethernet Port,

More information

The Establishment of Decision Tree Model in Network Traffic Incident Using C4.5 Method

The Establishment of Decision Tree Model in Network Traffic Incident Using C4.5 Method International Journal of rmatics and Communication Technology (IJ-ICT) Vol. 3, No.1, April 2014, pp. 23~29 ISSN: 2252-8776 23 The Establishment of Decision Tree Model in Network Traffic Incident Using

More information

Manually Configure Default Gateway Cisco Switch 2960

Manually Configure Default Gateway Cisco Switch 2960 Manually Configure Default Gateway Cisco Switch 2960 Catalyst 2960 and 2960-S Switches Software Configuration Guide, Cisco IOS Release 15.2(1)E. Assigning the Switch IP Address and Default Gateway. A Cisco

More information

CCNA Boot Camp. Course Description

CCNA Boot Camp. Course Description CCNA Boot Camp Course Description CCNA Boot Camp combines both the Interconnecting Cisco Network Devices Part 1 (ICND1) course and the Interconnecting Cisco Network Devices Part 2 (ICND2) course into one

More information

MICROSOFT EXCEL. Membina Hamparan Elektronik Fungsi Hamparan Elektronik

MICROSOFT EXCEL. Membina Hamparan Elektronik Fungsi Hamparan Elektronik MICROSOFT EXCEL Membina Hamparan Elektronik Fungsi Hamparan Elektronik Microsoft Excel 2010 Kandungan Penggunaan Asas Excel Memformat Sel, Lembaran dan Buku Kerja (Work Book) Penggunaan Asas Excel Fail

More information

Cisco SGE Port Gigabit Switch Cisco Small Business Managed Switches

Cisco SGE Port Gigabit Switch Cisco Small Business Managed Switches Cisco SGE2010 48-Port Gigabit Switch Cisco Small Business Managed Switches Performance and Reliability to Support Small Business Networks Highlights 48 high-speed ports optimized for the network core or

More information

Toshiba Manual Laptop Satellite C800 Windows 8

Toshiba Manual Laptop Satellite C800 Windows 8 Toshiba Manual Laptop Satellite C800 Windows 8 Toshiba Satellite C800 Notebook Windows 7 Driver, Utility, Manual For Windows 8 Toshiba Satellite C50-A Drivers For Windows 8 Category Company Model. Link

More information

Chapter 8. The Routing Table: A Closer Look

Chapter 8. The Routing Table: A Closer Look Chapter 8 The Routing Table: A Closer Look CCNA2-1 Chapter 8 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario. Thanks

More information

Skills Assessment Student Training Exam

Skills Assessment Student Training Exam Skills Assessment Student Training Exam Time: 20 minutes Given an IP address and mask of (address / mask), design an IP addressing scheme that satisfies the following requirements. Network address/mask

More information

5 Days Course on LAN Switching & Wireless and Accessing the WAN (CCNA 3 & 4)

5 Days Course on LAN Switching & Wireless and Accessing the WAN (CCNA 3 & 4) PROFESSIONAL TRAINING COURSE 5 Days Course on LAN Switching & Wireless and Accessing the WAN (CCNA 3 & 4) About the Course This course is designed based on CCNA curriculum. Focus of this course is on two

More information

CCNA-A Scope and Sequence (March 2007-Draft)

CCNA-A Scope and Sequence (March 2007-Draft) CCNA-A Scope and Sequence (March 2007-Draft) This document is a preliminary overview of the new CCNA-A curriculum and is subject to change since the courses are still under development. The English versions

More information

TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified

TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE Modified 2017-07-10 TestOut Routing and Switching Pro Outline- English 6.0.x Videos: 133 (15:42:34) Demonstrations: 78 (7:22:19) Simulations:

More information

Lab Configuring and Verifying Standard IPv4 ACLs Topology

Lab Configuring and Verifying Standard IPv4 ACLs Topology Topology 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 10 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.10.1

More information

Lab 1.3.2: Review of Concepts from Exploration 1 - Challenge

Lab 1.3.2: Review of Concepts from Exploration 1 - Challenge Lab 1.3.2: Review of Concepts from Exploration 1 - Challenge Topology Diagram Learning Objectives Upon completion of this lab, you will be able to: Create a logical topology given network requirements

More information

Ccna 1 And 2 Lab Companion Revised Cisco Networking Academy Program

Ccna 1 And 2 Lab Companion Revised Cisco Networking Academy Program Ccna 1 And 2 Lab Companion Revised Cisco Networking Academy Program We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on

More information

Introduction to Networks: Case Study, Option 2

Introduction to Networks: Case Study, Option 2 Introduction to Networks: Case Study, Option 2 Name: Name: Name: Academy username: Academy username: Academy username: Topology Diagram Assessment Objectives For an acceptable Case Study, the student must

More information

Adaptive Unified Differential Evolution for Clustering

Adaptive Unified Differential Evolution for Clustering IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol.12, No.1, January 2018, pp. 53~62 ISSN (print): 1978-1520, ISSN (online): 2460-7258 DOI: 10.22146/ijccs.27871 53 Adaptive Unified Differential

More information

PERU BAHAN PERKHIDMATAN KREDIT DAN PERBANKAN ARAHAN KERJA UNIT KOMPUTER. Tatacara Proses AGM03. BPKP/KJAK-104 Bilangan Semakan : 0 Tarikh :

PERU BAHAN PERKHIDMATAN KREDIT DAN PERBANKAN ARAHAN KERJA UNIT KOMPUTER. Tatacara Proses AGM03. BPKP/KJAK-104 Bilangan Semakan : 0 Tarikh : ARAHAN KERJA UNIT KOMPUTER Tatacara Proses AGM03 BPKP/KJAK-104 Bilangan Semakan : 0 Tarikh : 30.09.13 Disediakan oleh :- Disahkan oleh ;- Pengurus PERU BAHAN Ubahan Muka surat Tarikh Keterangan Diluluskan

More information