We all know Dynampis the great Cisco IOS emulator, and VMWare the great OS Virtual Machine.
we can operate both in order to get a fully equiped network infrastructure. But, that will be very heavy on the host PC resources (CPU and RAM).
to connect Virtual PC to Dynamips, we need at first to define Dynamips device to be connected to our physical interface. then connect our virtual PC (vmware) to that physical interface too using either NAT or Bridged connection.
what an interesting topic to write about :-)
rate limiting on a cisco device could be so easy or so hard...
examples:
on a cisco 4900 series switch (L3 switch) rate limiting is done using QoS, policing or shaping.
policing which dealing with excess traffic by dropping it. while shaping is more smooth by putting excess traffic in a buffer for later transmition.
configuration:
SW#conf t
SW()#policy-map
SW(-pmap)#class
SW(-pmap-c)#shape average
or use the following to police:
SW(-pmap-c)#police
SW(-pmap-c)#interface
SW(-int)#service-policy
SW(-int)#do wr
the same way goes on some routers, like 7600 series.
thank you,
email me: mshak3r@gmail.com
if u r telnetting or doing ssh to a linux server you cant tell the version or its type.
some will tell you to use this command:
uname -a
daaa!! no distr type .
so, i recommend to use this:
dmesg | head -1
or try this one:
cat /etc/issue
or this same effect command:
cat /proc/version
i hope that this was helpfull !!!
BGP
This is the EGP (External Gateway Protocol) protocol used for routing the traffic in the internet. The major concept is AS which is Autonomous System number, which is the building block of the internet, BGP routes traffic between these AS (blocks).
Running Pure BGP:
If BGP is the only routing protocol inside your network, you should define the linking networks between the routers to have full connectivity. Because the absence of IGP (RIP, OSPF,…) will cause that BGP won't know about these networks.
Configuration:
Begins with ()#router bgp 100, AS number = 100
This will initiate the bgp process, aafter that you need to define your internal networks:
(-router)#network 1.1.1.1 mask 255.0.0.0
Then you've to define the neighbors;
(-router)#neighbor 2.2.2.2 remote-as 200
Those are the basic commands, that must be done to run bgp
I hope that was informative for you…and don't hesitate to comment if you need any further help
A+ Manual released
after several months of working on this project, my new A+ certification study guide is DONE. this manual covers personal computers components both hardware and software installation, configuration and troubleshooting.
several topics are covered like: processors, RAM, Expansion Bus, Floppy, CD-DVD, Audio, Video (dispaly), Motherboards, SCSI, Printers, Power Supply, BIOS and software components like: Windows OS, CLI OS (DOS), Networking and Internet.
.
.
CHECK IT-OUT: www.payloadz.com/go?id=1125387
AES Encryption Standard History:
The Advanced Encryption Standard (AES) is an encryption standard adopted by the U.S. government. The standard comprises three block ciphers, AES-128, AES-192 and AES-256, adopted from a larger collection originally published as Rijndael. Each AES cipher has a 128-bit block size, with key sizes of 128, 192 and 256 bits, respectively. The AES ciphers have been analyzed extensively and are now used worldwide, as was the case with its predecessor, the Data Encryption Standard (DES).
AES was announced by National Institute of Standards and Technology (NIST) as U.S. FIPS PUB 197 (FIPS 197) on November 26, 2001 after a 5-year standardization process in which fifteen competing designs were presented and evaluated before Rijndael was selected as the most suitable (see Advanced Encryption Standard process for more details). It became effective as a standard May 26, 2002. AES is the first publicly accessible and open cipher approved by the NSA for top secret information.
easy hardware vpn
.
.
its pretty hard to implement secure vpn tunnels using cisco IOS CLI (command line), although cisco introduced the SDM (Security Device Manager). which has a wizard to setup a vpn tunnel, but i think it still needs fine tuning using the CLI.
so, i good solution to setup site-to-site vpn tunnels or remote access ones, is to have hardware vpn devices, an affordable one is the liksys RVS4000, RV082 or RV042. which has an eassy to setup vpn capabilitis, ipsec, wan ports which could be PPPoE or static ips. for mobile workers you can setup the HQ vpn device to accept any vpn connection, which is usefull if the teleworker is setting behind a NAT device (ie. adsl modem). BUT, it has a drawback, the encryption is not that strong ( NO AES encryption supported).
another device is the Checkpoint SMB, it is more powerfull and reliable device, has the AES encryption supported too.
for more information about this topic don't hesitate to post a comment and i'll reply as soon as possible.