Cisco Open source tools

I came across a great resource, Cisco-centric Open Source Community (COSI). COSI is an Internet-based community that develops free Cisco tools and makes them available for download from its Web site. There are almost 50 utilities available for download. The scripts and utilities all include documentation, and the community has developed all of these tools to work with Cisco IOS routers, switches, firewalls, or CiscoWorks management software.

COSI’s Web site also offers other advantages. Clicking the link to download a script takes you to a community download page, which also features discussion forums for questions and support of these tools. It’s important to remember that Cisco’s Technical Assistance Center (TAC) doesn’t support these tools, so you must count on your own skills and the help of others in the community.

A tradeoff: These tools are not ideal for new Cisco IOS users or anyone who doesn’t have some Linux experience. Many of these tools help automate more advanced Cisco
admin tasks when administering a midsize to large Cisco network.

Grep for Cisco commands

To view a IOS line parser

Show parser dump

Its an excellent command to see the selected functionality of the command. we can use it just like a Grep in Unix.

For example:

R1#sh parser dump interface include queue

15 tx-queue-limit Number

15 dialer hold-queue <0-100> timeout <1-2147483>

15 dialer hold-queue <0-100>

15 dialer hold-queue

15 funi rate-queue Number Number

15 funi rate-queue tolerance svc pvc 0 strict

15 funi rate-queue tolerance svc pvc 0

15 funi rate-queue tolerance svc pvc <5-99> strict

15 funi rate-queue tolerance svc pvc <5-99>

15 funi rate-queue tolerance svc 0 strict

15 funi rate-queue tolerance svc 0

15 funi rate-queue tolerance svc <5-99> strict

15 funi rate-queue tolerance svc <5-99>

15 funi rate-queue Number Number

15 funi rate-queue tolerance svc pvc 0 strict

15 funi rate-queue tolerance svc pvc 0

15 funi rate-queue tolerance svc pvc <5-99> strict

15 funi rate-queue tolerance svc pvc <5-99>

15 funi rate-queue tolerance svc 0 strict

15 funi rate-queue tolerance svc 0

15 funi rate-queue tolerance svc <5-99> strict

15 funi rate-queue tolerance svc <5-99>

15 funi rate-queue Number Number

or more extensively

Willow#show parser dump interface extend in queue.*(EnableConfigure)

tx-queue-limit : Configure card level transmit queue limit

srr-queue : Configure shaped round-robin transmit queues

srr-queue : Configure shaped round-robin transmit queues

srr-queue : Configure shaped round-robin transmit queues

fair-queue : Enable Fair Queuing on an Interface

fair-queue : Enable Fair Queuing on an Interface

fair-queue : Enable Fair Queuing on an Interface

fair-queue : Enable Fair Queuing on an Interface

fair-queue : Enable Fair Queuing on an Interface

tx-queue-limit : Configure card level transmit queue limit

srr-queue : Configure shaped round-robin transmit queues

srr-queue : Configure shaped round-robin transmit queues

srr-queue : Configure shaped round-robin transmit queues

fair-queue : Enable Fair Queuing on an Interface

fair-queue : Enable Fair Queuing on an Interface

fair-queue : Enable Fair Queuing on an Interface

fair-queue : Enable Fair Queuing on an Interface

fair-queue : Enable Fair Queuing on an Interface

it can be pretty handy, if used intelligently.

Cisco router Planes


The router is typically segmented into three planes, each with a clearly identified objective. The dataplane allows the ability to forward packets; the control plane allows the ability to route data correctly; and the management plane allows the ability to manage network elements.
Management Plane—The management plane manages traffic that is sent to the Cisco IOS device and is made up of applications and protocols such as SSH and SNMP.

Control Plane— The control plane of a network device processes the traffic that is paramount to maintaining the functionality of the network infrastructure. The control plane consists of applications and protocols between network devices, which includes the Border Gateway Protocol (BGP), as well as the Interior Gateway Protocols (IGPs) such as the Enhanced Interior Gateway Routing Protocol (EIGRP) and Open Shortest Path First (OSPF).

Data Plane— The data plane forwards data through a network device. The data plane does not include traffic that is sent to the local Cisco IOS device.

Digital Subscriber Line (DSL) & Its Types

A Digital Subscriber Line (DSL) is a type of broadband connection that takes advantage of the existing telephone cables to enable high-speed data transmissions to and from a customer’s premises.
Other broadband platforms include ISDN, Leased Lines, terrestrial broadcast, cable and cable modem, satellite, fibre optic, fixed wireless access (FWA), mobile wireless and powerlines.
Broadband telecommunication enables a wide band of frequencies or channels to transmit information concurrently on a wire, which means more information can be sent in a given amount of time.
Digital Subscriber Line (DSL) is a broadband connection that uses the existing telephone line. DSL provides high-speed data transmissions over the twisted copper wire, the so-called “lastmile” or “local loop”, that connects a customer’s home or office to their local telephone company Central Offices (COs).There are a number of different types of DSL and they are referred to collectively as xDSL.
Symmetric:
  1. HDSL High data rate Digital Subscriber Line
  2. SDSL Symmetric Digital Subscriber Line
  3. SHDSL Symmetric High bit rate Digital Subscriber Line

Asymmetric:

  1. ADSL Asymmetric Digital Subscriber Line
  2. ADSL lite Asymmetric Digital Subscriber Line Lite
  3. ADSL 2 Asymmetric Digital Subscriber Line Two
  4. ADSL 2+ Asymmetric Digital Subscriber Line Two Plus
  5. ADSL 2++ Asymmetric Digital Subscriber Line Two Plus Plus (or ADSL4)

Symmetric and AsymmetricVDSL Very high bit rate Digital Subscriber Line

WLAN(Wireless Local Area Network) Glossary

802.11

Developed as a standard by the Institute of Electrical and Electronic Engineers (IEEE,
or I-triple-E), 802.11 is a radio technology used for wireless local area networks (WLANs). 802.11 is the parent standard of several technologies operating across several different frequencies.The 802.11 specification defines three types of wireless LAN, all operating at a
data transmission rate of 1Mbps or 2Mbps. 802.11 FHSS and 802.11 DSSS use radio frequency radiation as the transmission medium. The third 802.11 specification is based on diffuse infra-red transmission.

802.11a

Operates in the UNII (Unlicensed National Information Infrastructure) 5GHz band with a maximum data transfer rate of 54 Mbps.. 802.11a uses Orthogonal Frequency Division Multiplexing (OFDM), as opposed to the DSSS or FHSS schemes used in 802.11b and
802.11 networks. Due to its higher frequency of operation, the range of 802.11a equipment is less that of lower frequency systems such as 802.11b and 802.11g. This can increase the cost of an 802.11a network, because a greater number of access points may be required. Since it operates in a different RF band, 802.11a cannot work directly with 802.11b or 802.11g equipment. Using multi-mode 802.11a/b/g access points and/or client adapters will resolve this problem.

802.11b

Currently the most popular and widespread standard for wireless LANs, which operates in the 2.4GHz ISM band and supports data rates up to 11Mbps. Also known as 802.11 High-Rate (HR) and as Wi-Fi, 802.11b uses the DSSS spread spectrum transmission scheme, and operates at
data rates of 1Mbps, 2Mbps, 5.5Mbps and 11Mbps.

Important TCP/IP Concepts


The four layers of the TCP/IP model are:
  • Application (Process)
  • Host-to-host (Transport)
  • Internet
  • Network Access (Physical and Data link)


The two protocols that function at the host-to-host layer of the TCP/IP model are TCP and
UDP. (TCP is a connection-oriented, reliable protocol. UDP is a connectionless and unacknowledged protocol.). The protocol number for TCP is 6. The protocol number for UDP is 17.A TCP header contains 20 bytes, and a UDP header contains 8 bytes.

To pass information (such as e-mail) to upper layers, TCP and UDP use Port numbers. These
port numbers are used to keep track of different conversations among different hosts at the same time. Originating source port numbers are dynamically assigned by the source host, which is a number greater than 1023.Defined in RFC 1700, the well-known port numbers are 1 to 1023.

The steps for the TCP three-way handshake are as follows:

Step 1. The source host sends a SYN to the destination host.

Step 2. The destination host replies with a SYN/ACK to the source host.

Step 3. The source host replies with an ACK.

Some protocols that operate at the TCP/IP Internet layer are

  • IP
  • ICMP
  • ARP
  • RARP

IP is a connectionless protocol that provides best-effort delivery routing of datagram's.

ICMP is a management protocol for IP. ICMP messages are carried in IP data grams and are used to send error and control messages. An example of a utility that uses ICMP is ping.

ARP is used to resolve a known IP address to a MAC address. In order for a host to communicate with another host, it must know the MAC address of the destination host (if they are on the same network) or next hop router. This is the reason for ARP

RARP is a protocol used to find the IP address of a station that knows its MAC address. It is mainly used for diskless workstations that boot up and need an IP address. An RARP request is a broadcast packet.

CCNA Study Guide Of Exam 640-802


Cisco networking authority Todd Lammle has completely
updated this new edition to cover all of the exam objectives
for the latest version of the CCNA exam. Todd’s straightforward style provides lively examples, easy-to-understand analogies, and real-world scenarios that will not only help you prepare for the exam, but also give you a solid foundation as a Cisco networking professional.

Packed with updated topics that have been added to the 2007 version of the CCNA exam, this updated study guide features expanded coverage of key topic areas plus new material on switching, network address translation, and OSPF. Inside, find the complete instruction you need, including:


  • Full coverage of all exam objectives in a systematic pproach, so you can be confident you’re getting the instruction you need for the exam
  • Practical hands-on exercises and labs to reinforce critical skills,
  • Real-world scenarios that put what you’ve learned in the context of actual job roles
  • Challenging review questions in each chapter to prepare you for exam day
  • Exam Essentials, a key feature in each chapter that identifies critical areas you must become proficient in before taking the exam


CD-ROM Includes:


  • Chapter Review Questions
  • Four Full-Length Practice Exams
  • 200 Electronic Flashcards
  • Audio and Video Instruction from Todd Lammle
  • Full book in searchable PDF format

Approach the CCNA exam (640-802) with confidence through the detailed preparation you’ll
receive in this bestselling study guide from leading Cisco networking authority Todd Lammle. This new edition—updated to reflect the very latest changes in the CCNA exam—features
expanded coverage of key topic areas plus new material on the latest switching techniques, network address translation, IPv6, and advanced OSPF. Reinforce your study with the author’s supplemental video and audio instruction on CD. Inside, find the complete instruction you need,
including:


  • Full coverage of all exam objectives in a systematic approach, so you can be confident you’re getting the instruction you need for the exam
  • Practical hands-on exercises and labs to reinforce critical skills
  • Real-world scenarios that put what you’ve learned in the context of actual job roles
  • Challenging review questions in each chapter to prepare you for exam day
  • Exam Essentials, a key feature in each chapter that identifies critical areas you must become proficient in before taking the exam
  • A handy tear card that maps every official exam objective to the corresponding chapter in the book, so you can track your exam prep objective by objective

About the Author

Todd Lammle, CCSI, CCNA/CCNP/CCSP, MCSE, CEH/CHFI, FCC RF Licensed, is the authority on Cisco Certification internetworking. He is a world-renowned author, speaker, trainer, and consultant. Todd has over 25 years of experience working with LANs, WANs, and large Wireless
networks. He is president of GlobalNet Training, Inc, a network integration and training firm based in Dallas, and also CEO of RouterSim, LLC. You can reach Todd through his forum at www.lammle.com.

You can buy this book or get more infomation from here.

Exam Cram: CCNA Practice Questions (Exam 640-802), 3rd Edition


Master Your Knowledge of the CCNA Exam!
  • Simulations now included with MeasureUp’s innovative test engine for better preparation for the real exam.
  • Features more than 300 questions organized according to the CCENT and CCNA exam objectives so you can easily assess your knowledge of each topic, no matter which exam you take.

  • Each answer includes detailed explanations.
  • Use our innovative Quick-Check Answer Key™ to quickly find answers as you work your way through the questions.
  • Our popular Cram Sheet, which includes tips, acronyms, and memory joggers, helps you review key facts before you enter the testing center.

More than 300 Questions on CD!

MeasureUp’s innovative test engine gives you an effective tool to assess your readiness for the exam, including:


  • Simulation questions
  • Multiple test modes
  • Random questions and order of answers
  • Coverage of each CCENT and CCNA exam objective

About the Author

Jeremy Cioara, CCIE No. 11727, works in many facets of the Cisco networking realm. As an author, he has written multiple books for Cisco Press and Exam Cram. As an instructor, he teaches at Interface Technical Training (http://www.interfacett.com/) in Phoenix, Arizona. Likewise, Jeremy has recorded many E-Learning titles at CBTNuggets (http://www.cbtnuggets.com/). Finally, Jeremy is the CIO of AdTEC Networks and works as a
network consultant focusing on Cisco network and Voice over IP (VoIP) implementations. Jeremy also runs the Cisco Blog (http://www.ciscomag.blogspot.com) in his “free time.” Thankfully, he is married to the Certified Best Wife in the World (CBWW) who helps him manage his time and priorities and prevents him from getting an enormous Cisco logo tattooed across his chest.

How to recover a lost xp password

These techniques to recover a lost xp password are among the more advanced Windows XP Tips and Tricks. In some cases, recovering from a lost password can be very easy though.

For completeness' sake we start with the simplest tips that can help you regain access to a locked account. But even if you find yourself in a more complex situation, please read on. You'll find out what to do.

Warning : Be extra careful if you are using Encrypting File System (EFS) in Windows XP Professional. If you don't know what EFS is, you probably shouldn't worry about it. It's a feature in Windows XP Professional that deals with file security on a local level. If you do use it, please always make sure to export your private and public keys before attempting to reset your password.

If you can login with another user account

If you share your computer with other users it's fairly simple to regain access to your account. You could ask one of the other users to log on to Windows with their password and perform the following steps :
  • Click the Start button
  • Click "Run"
  • In the "Open" field, type "control userpasswords2" (without the quotes)
  • Click ok

Windows opens a user accounts dialog. Select the user with the lost password and click the "Reset Password" button. Enter a new password (and a second time in the confirmation box) and click ok. Click ok once again and you are ready.

Now you can log on to your account using the new password.

More advanced password recovery
If there are no other users on your machine to unlock your account, you need to reset your password "offline". Offline means that you boot your pc from outside your usual Windows XP environment using a boot disk or a bootable cdrom.

This offline technique to recover a lost xp password isn't for the faint of heart; the procedure isn't presented in a nice graphical interface and there even is a small risk involved ...

Sometimes the password reset fails and as a consequence you cannot log on with the locked user account afterwards. This doesn't happen often though, and if you are reading this because you need to recover a lost xp password ...

you weren't able to log on after all ...

Of course you will need access to another pc to create a boot disk or bootable cd.

Is your boot sequence right ?
Your computer's boot sequence is set in the BIOS and determines if the pc can boot from a floppy or cdrom. To get into the BIOS, you typically need to press a certain key or key combination during startup. Depending on the brand of your computer this can be :

  • The F1 key
  • The F2 key
  • The F10 key
  • The del key
  • Ctrl+Alt+Enter
  • Ctrl+Alt+Esc

If you have made your way into the BIOS, now would the time to choose either your floppy drive or your cdrom as primary startup device.

Below is a BIOS boot sequence screenshot where the floppy drive has top priority.


Lost XP Password

Creating the boot disk


You can download an offline password and registry editor to create the bootable disk at http://home.eunet.no/~pnordahl/ntpasswd/ or if this url has become invalid over time, you can request your copy with the small form below. You will receive a mail with a valid download link shortly afterwards.

Don't worry, we will use your email address only to send you the download link, not for anything else. We hate spammers as much as you do.

After you have downloaded the Offline Password and Registry editor you have a .zip file on your hard drive that could use some unzipping. Depending on the choice that you have made in your BIOS, you either need to carry out the steps to create a bootable floppy, or the steps to create a bootable cdrom.

Instructions for the boot disk (floppy)

Once unzipped, you'll have 3 files : rawrite2.exe, install.bat and a .bin file. Put a blank, formatted floppy in your floppy drive and launch install.bat. That will create a bootable floppy from which you need to boot your pc (the one with the lost xp password).

The bootable cdrom

The unzipped file delivers a .iso file that you need to burn to a cd with your cd burner software. That creates a bootable cd to boot your pc (again, the one with the lost xp password).

Time to fix that lost xp password

Shortly after you boot your computer from the floppy or cd you'll have an intimidating screen filled with text staring you in the face.
Like this :


Lost XP Password

There's no need to feel overwhelmed. In order to reset your lost xp password you need to go through some questions in a number of steps. In each step the program offers a default answer. Usually these defaults are ok and you just need to press ENTER.

Step 1 : Select the disk where the Windows XP installation is.

Step 2 : Select PATH and registry files. For most Windows installations you can safely accept the defaults.


Step 3 : Password or registry edit. Select "Edit user data and passwords" - the default. After that you need to choose the user account. The program defaults to "Administrator", so you need to type the name of the user with the lost xp password if it's not the administrator account that you're trying to unlock. Once you've made clear which user account's lost xp password you want to reset, you need to supply the new password. To finish it off confirm the password change and type "!" to quit the user selection menu. Now type "q" (for quit) to continue with ...

Step 4 : Writing back changes. This step requires one more confirmation and then wants to know if you want another run. Answer with the defaults, remove the bootable floppy or cdrom and reboot your pc.

You should now be able to log on with your account and the new password.

Windows Service Recommened Settings

Event Log

It’s best to leave this one on Automatic.

Protected Storage

Leave this set to Automatic, as setting it to Manual can cause a delay at startup of 1 to 2 minutes. It also has the odd side effect of causing property pages in the Services tab not to appear.

Net Logon

if you do need to logon to a domain or LAN, you need to keep this on Automatic.

Alerter

A home user can set this to Manual.

Computer Browser

A home user can set this to Manual.

Distributed Link Tracking Client

This sends notifications of files moving between NTFS volumes in a network domain. A home user can set this to Manual.

Distributed Transaction Coordinator

A home user can set this to Manual.

Fax Service

If you are not using Modems with Fax capabilities, you should set this to Manual.

Indexing Service

A home user can set this to Manual.

Internet Connection Sharing

If you are sharing an Internet connection on a small home network, then set this to Automatic. If not, set this to Manual.

IPSEC Policy Agent

This manages IP security. A home user can set this to Manual.

Messenger

Messenger sends and receives messages transmitted by administrators or by the Alerter service. A home user can set this to Manual.

NT LM Security Support Provider

This provides security to Remote Procedure Call programs that use transports other than named pipes. A home user can set this to Manual.

Performance Logs & Alerts

This configures performance logs and alerts. A home user can set this to Manual.

Print Spooler

If you don’t have a printer installed (network or local), you can set this to Manual. Remember to change it back to Automatic if you ever do install a printer.

QoS RSVP

This feature provides network signaling and local traffic control setup functionality for QoS-aware programs & control applets. A home user can set this to Manual.

Remote Registry Service

Allows remote registry manipulation. You should set this to Disable.

Routing & Remote Access

This offers routing services to businesses in local area and wide area network environments. A home user can set this to Manual.

RunAs Service

This enables starting processes under alternate user IDs. A home user can set this to Manual.

Security Accounts Manager

This stores security information for local user accounts. Unless you have changed some security policies via the Local Security Policy editor, you can set this to Manual.

Smart Card and Smart Card Helper

A home user can set these to Manual.

TCP/IP NetBIOS Helper Service

This service enables NetBIOS name resolution. A home user can set this to Manual.

Telnet

A home user can Disable it altogether.

DNS client

A home user can usually set this to manual, as it’s used for when you use a DNS server on your network (i.e., not the Internet or dial up connections). If you have name resolution problems afterwards, put this one back to Automatic.

Server Service

This Provides RPC support and file, printer and name pipe sharing. You can set this to manual, unless you are running IIS or using offline files (or similar features), which is not that likely for a home desktop user.

Workstation Service

You should be able to set this to Manual unless you use Alerter or Messenger, in which case set this to Automatic. Otherwise you should be able to safely set this to Manual instead.

WMDM PMSP Service

I suggest it’s set to manual. If you have any problems with Media Player, set it back to Automatic.

Microsoft Internet Security and Accelerator

It is useful to speedup internet access (Accelerator) and to protect private network from public
network(Firewall). It is actually firewall & acts as a proxy as well.

Types of firewalls:

  • Hardware firewall
  • Software firewall

Hardware firewall:

  • CISCO Pix
  • Watch Guard
  • Multi com Ethernet II

Software firewall:


  • ISA server
  • Checkpoint
  • Smooth wall

Firewall: A firewall protects networked computers from international hostile intrusions.

List of Important Diagnostic Tools

Network Monitor - Tracks usage of network resources
(good for establishing a network baseline).

Performance Monitor - Tracks usage of various resources over time(good for establishing a
general baseline).

Tone Generator - Used to test cabling. Identifies which cable or wire is being tested
by generating different tones.

TDR (Time Domain Reflectometer): Sends a signal down a cable and measures the distance that the signal travelled before bouncing back(like sonar). Used to find opens and shorts in cables.

Oscilloscope - Tests cable by determining where there are shorts, crimps or attenuation.

Protocol Analyzers - This tool is used to monitor network traffic and display packet and
protocol statistics and information.

Optical Testers - A tool used to monitor and troubleshoot the performance of a fiber optic network.


Crimping Tools - Crimping tools are used to connect cabling to their appropriate connectors.
There are different crimping tools for different types of connections.

Punch Down Tool - A punch down tool is used to connect cabling such as telephone and ethernet to wall jacks.

Windows 2003 Server Roles


Windows Server 2003 includes 11 roles administrators can assign to servers by using the Manage Your Server Wizard.

Terminal Server:

Provides a single point of installation that gives multiple users access to any Windows Server 2003. Users can run programs, save files, and use network resources from a remote location as if these resources are installed on their local computers. Benefits include

  • Offers rapid, centralized deployment of applications
  • Provides a uniform version of Windows on desktops, reducing maintenance and administrative costs
  • Provides increased scalability
  • Provides improved manageability
  • Has an easy-to-use remote desktop connection

File Server

Sets and helps manage access to files such as data files and network-accessible applications. Benefits include:


  • Automatically copies critical data volumes by using the Volume Shadow Copy Restore service, eliminating downtime. The copies are used to restore or archive files, and users can retrieve archived versions of their documents
  • Enables Encrypting File System (EFS), which provides core file encryption technology. EFS is a public key-based system that makes it easy to manage, difficult to attack, and transparent to the user.
  • Initiates Distributed File System (DFS), a stable, orderly, location-independent naming scheme for all shared files when using Windows. A single share, or a single drive mapped to such a share, can contain files and directories on any number of file servers.
  • Quickly stores, manages, and shares information such as files and network-accessible applications.
  • Limits and monitors the amount of disk space available to individual users.
  • Securely searches for information, either locally or on the network. It also searches in files
    that are in different formats and languages.
  • Helps users manage their disk space by logging and reporting when a user exceeds a specified disk space limit or warning level—that is, the point at which a user is nearing his or her quota limit.

Network cabling requirements for ethernet


  • 10Base2 50-ohm coaxial is also called thinnet which is up to 185 meters and supports 30 hosts per segment. Physical and logical bus is used with AUI connectors.
  • 10Base5 50-ohm coaxial is also called thicknet which is up to 500 meters and supports 208 users per segment. It uses a physical and logical bus with AUI connectors. It is up to 2500 meters with repeaters and supports 1024 users for all segments.
  • 10BaseT EIA/TIA category 3, 4, or 5, using two-pair unshielded twisted-pair (UTP) wiring supports one user per segment; up to 100 meters long.RJ-45 connector is used along with star topology.

  • 100BaseTX EIA/TIA category 5, 6, or 7 UTP two-pair wiring supports one user per segment; up to 100 meters long. It uses an RJ-45 MII connector with a physical star topology and a logical bus.
  • 100BaseFX Uses fiber cabling 62.5/125-micron multimode fiber supports point-to-point topology; up to 400 meters long. It uses an ST or SC connector, which are duplex media-interface connectors.
  • 1000BaseCX Copper shielded twisted-pair that can only run up to 25 meters.
  • 1000BaseT Category 5 is a four-pair UTP wiring that can run up to 100 meters.
  • 1000BaseSX MMF using 62.5 and 50-micron core; uses a 780-nanometer laser and can go up to 260 meters.
  • 1000BaseLX Single-mode fiber that uses a 9-micron core, 1300-nanometer laser and can go from 3 km up to 10 km.

Free Windows XP Remote Desktop Connection software


OverviewThis software package will install the client portion of Remote Desktop on any of the following operating systems: Windows 95, Windows 98 and 98 Second Edition, Windows Me, Windows NT 4.0, Windows 2000, and Windows 2003. (This is the same version of the client software as in Windows XP Service Pack 2.) When run, this software allows older Windows platforms to remotely connect to a computer running Windows XP Professional with Remote Desktop enabled.

This package provides flexible deployment options of the full Terminal Services Client, including auto-repair through Windows Installer technology and application publishing via IntelliMirror™ management technologies or Microsoft Systems Management Server (SMS).

Note The Remote Desktop Connection software is pre-installed with Windows XP. To run it, click Start, click All Programs, click Accessories, click Communications, and then click Remote Desktop Connection. This software package can also be found on the Windows XP Professional and Windows XP Home Edition product CDs and can be installed on any supported Windows platform. To install from the CD, insert the disc into the target machine’s CD-ROM drive, select Perform Additional Tasks, and then click Install Remote Desktop Connection..

Brief Introduction of Cisco Router Series

Cisco 2600 Series Routers

The Cisco 2600 series router, with over 70 network modules and interfaces, offers versatility and expandability ideal for branch office connectivity in a multiservice access router. In addition, Cisco 2600 series routers provide flexible LAN and WAN configurations, multiple security options and a range of high performance processors. By deploying Cisco 2600 series routers, companies can consolidate the functions of multiple separate devices into a single, compact
package that can be managed remotely.
Cisco 3600 Series Routers

The Cisco 3600 series router is a family of modular, multi-service routers for medium and large
size offices as well as smaller Internet Service Providers. Cisco 3600 routers support over 70 modular interface options in a high performance manageable access platform. The Cisco 3600 series routers provide solutions for data, voice, video, hybrid dial access, Virtual Private Networks (VPNs), and multi-protocol data routing while integrating the functions of several devices into a single manageable solution.

Cisco 3700 Series Routers

The Cisco 3700 series multiservice access router enables dramatically higher levels of application and service integration in enterprise branch offices. With on-board LAN/WAN connectivity, new high-density service modules, and support for multiple Advanced Integration Modules (AIMs), the Cisco 3700 series routers deliver internal inline power for the EtherSwitch ports, thus delivering a compelling single platform Branch Office IP Telephony and Voice Gateway solution which enables flexible, incremental, and scalable migration to a converged branch office network.

Cisco 6400 Series Universal Concentrators

The Cisco 6400 carrier-class broadband concentrator is a high-performance, scalable service gateway that enables the selection and delivery of broadband network services, Virtual Private Networks (VPNs) and voice and entertainment-driven traffic over the full suite of access media. Cisco 6400 series concentrators include Service Selection Gateway (SSG), which allows subscribers to dynamically select on-demand services. As the gateway to next generation services, the SSG enables services such as videoconferencing, streaming video, personalized Internet, business-grade Internet, shopping, and gaming to create new revenue streams and
help attract and retain subscribers.


Cisco 7200 Series Routers

The Cisco 7200 series router is ideally suited as WAN edge devices for enterprises and service
providers. The modularity of Cisco 7200 series routers makes them ideal for enterprises seeking to build scalable solutions based on differing requirements for density, performance, and availability. In addition, Cisco 7200 series routers include a Multiservice Interchange (MIX)-enabled backplane to enable integration of data, voice, and video functions previously performed by separate devices into a single
platform.

Gadget Advisor

There are many technology and gadget related blogs out there, but Gadget Advisor is different. They filter out all the minor and uninteresting news and stories, posting only the coolest. The idea is great, but can they keep it up?


Although it’s still quite a new blog, there are already a lot of great posts about many new and cool gadgets, from universal remote controls to network media players and online backup services.


How to: Disable unwanted programs at startup

You probably need only half the programs that have been set to be loaded at startup. Having too many programs drastically slows down your startup. It’s very easy to specify which ones you want to start automatically. It’s wise to leave all the anti virus and system tools.

Here’s what you need to do:


  • Go to Run from the Start menu
  • Open “msconfig” (without the quotes!) and click OK
  • In the windows that opens, choose the Startup tab
  • Make your choices by unchecking the programs you don’t need to load at startup
  • Hit OK and restart your PC.
  • After starting a box appears. Check the option that the dialog box won’t display at restart.

That’s all!

Check back tomorrow for configuring display settings to speed up your PC.

More Cool Windows XP tips & tricks HERE

How to: change the start button text on Windows XP

Haven’t posted many Windows XP tricks recently, so here’s one: How to change the start button on your Windows XP.

Tired of the boring old “start” button at the bottom left corner of your Windows XP’s monitor? Want something new to replace iit? Well here’s how to change it.

With a few modifications in the Windows Registry, you can replace the “start” text with anything you like. Great for achieving a new, custom look for your Windows XP. So let’s get started.

Warning: this tutorial is more for advanced users, and I'm notresponsible if your system gets messed up. Only attempt the followingat your own risk.

The “Hibernate” function on Windows XP

The hibernate function on Windows XP is basically the same as stand by, but with one difference. The files and programs you have open will temporarily be saved onto a specific location on the hard drive, instead of RAM.
This means that the computer can be switched off while hibernating and it will consume no power. When you turn your Windows XP on again, everything will open instantly, just like after a standby. No startup screens and waste of time.
But there is one problem with hibernate - you can only do it once. For some unexplained reason, Windows can’t hibernate severeral times in a row. The temporary hibernate file on your hard drive can’t be overwritten and you need to do a normal shutdown before you can hibernate again. I hope this problem will be fixed in future versions of Windows. (Not sure if it already is on Vista…)
How to hibernate
Another mystery is why the hibernate button isn’t shown on the shutdown menu by default. After all, hibernating is a lot better than standing by -no power consumption, longer than standby, computer can be turned off and makes no noise…

Anyway, to hibernate, go to the shutdown menu as usual: Start -> Turn Off Computer and hold down the shift key to relpace “stand by” with “hibernate”, It’s as easy as that.

Stay tuned for tomorrow’s post about the next Windows - Windows 7, soon to be Vista’s sucessor. You might find it handy to bookmark our site (Ctrl + D) or preferably subscribe to our RSS feed. If you don’t know, then here’s what a feed is and how to subscribe to it.

Learn Ethical Hacking Part-2


Terminologies

Hackers

Access computer system or network without authorization through skills, tactics and detailed knowledge. Also known as “Black hat” (a malicious or criminal hacker).He breaks the law and can go to prison.

Ethical hacker

Also known as “Black hat“.Performs most of the same activities as hackers performs but with
owner’s or organization permission.

Crackers

Illegally break into systems to steal or destroy data.

Script kiddies or packet monkeys

Young inexperienced hackers.Copy codes and techniques from knowledgeable hackers

Script

Set of instructions that runs in sequence

Learn Ethical Hacking Part-1


Terminologies

Ethical hackers

Employed by companies also known as white hat to perform penetration tests or computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit.

Penetration test or Ethical hacking

Legal attempt to break into a company’s network to find its weakest link , also known as ethical
hacking,intrusion testing, and red teaming.Tester only reports findings, does not solve problems i-e but report problems instead of taking advantage of them

Security test

More than an attempt to break in; also includes analyzing company’s security policy and procedures Tester offers solutions to secure or protect the network..

Windows Server 2008


Windows Server 2008 Standard is the most robust Windows Server operating system to date. Built with enhanced Web and virtualization capabilities, it is designed to increase the reliability and flexibility of your server infrastructure while helping save time and reduce costs. Powerful tools give you greater control over your servers and streamline configuration and management tasks. Plus, enhanced security features work to harden the operating system to
help protect your data and network and provide a solid, highly-dependable foundation for your business.

Windows Server 2008 Enterprise delivers an enterprise-class platform for deploying
business-critical applications. Improve availability with failover clustering. Improve security with consolidated identity management features. Reduce infrastructure costs by consolidating applications with virtualization licensing rights. Windows Server 2008 Enterprise provides the foundation for a highly dynamic, scalable IT infrastructure. Designed to be used specifically as a single-purpose Web server,
Windows Web Server 2008 delivers on a rock solid foundation of Web infrastructure capabilities in the next generation Windows Server 2008. Integrated with the newly
re-architected IIS 7.0, ASP.NET, and the Microsoft .NET Framework, Windows Web Server 2008 enables any organization to rapidly deploy Web pages, Web sites, Web applications, and Web services.

Windows Server 2008 Datacenter delivers an enterprise-class platform for deploying business-critical applications and large-scale virtualization on small and large servers. Improve
availability with clustering and dynamic hardware partitioning capabilities. Reduce infrastructure costs by consolidating applications with unlimited virtualization licensing rights. Scale from 2 to 64 processors. Windows Server 2008 Datacenter provides a foundation on which to build enterprise-class virtualization and scale-up solutions.

Windows Server 2008 for Itanium-based Systems is optimized for large databases, line of business and custom applications providing high availability and scalability up to 64 processors to meet the needs of demanding and mission critical solutions.


Windows Server 2008 Standard without Hyper-V™ is the most robust Windows Server operating system to date. It is designed to increase the reliability and flexibility of your server infrastructure while helping save time and reduce costs. Powerful tools give you greater control over your servers and streamline configuration and management tasks. Plus, enhanced security features work to harden the operating system to help protect your data and network and provide a solid, highly-dependable foundation for your business. This product does not include the Hyper-V™ server role.

Windows Server 2008 Enterprise without Hyper-V™ delivers an enterprise-class platform for deploying business-critical applications. Improve availability with failover clustering. Improve security with consolidated identity management features. Reduce infrastructure costs by consolidating applications with virtualization licensing rights. Windows Server 2008 Enterprise without Hyper-V provides the foundation for a highly dynamic, scalable IT infrastructure. This product does not include the Hyper-V™ server role.

Windows Server 2008 Datacenter without Hyper-V™ delivers an enterprise-class platform for deploying business-critical applications and large-scale virtualization on small and large servers. Improve availability with clustering and dynamic hardware partitioning capabilities. Reduce infrastructure costs by consolidating applications with unlimited virtualization licensing rights. Scale from 2 to 64 processors. Windows Server 2008 Datacenter without Hyper-V provides a foundation on which to build enterprise-class virtualization and scale-up solutions. This product does not include Hyper-V™ server role

How to Create Roaming & Mandatory Profiles


Creating a roaming profile:

On Domain Controller
  • Create a user account
  • Create a folder And share it and give full control permission for everyone
  • Start >Program Files >Active Directory User & Computers
  • Double click the user Go to Profile tab
  • Enter Profile path For example :
    \\sys1\profile\username
  • Apply then click ok
  • To verify Move on to your member server
  • Log in as user
  • My computer then Properties
  • Advanced-Profile settings-you should notice the status change to “roaming profile”.

Creating a mandatory profile:


  • Open the profiles folder you’ve created for roaming.There will be a user folder
  • Take the ownership of the folder of the user
  • Right click on the folder properties Security –
    ok – advanced Owner – administrators Replace owner on sub >apply – ok
  • Open the folder
  • Rename the file Ntuser.dat to ntuser.man
  • Back Give back the permission (ownership)
  • Folder Properties Security – advanced Check the box Allow inheritable Check - Replace permission entries on all
  • Apply – ok

Verifying:

  • Move on to client machine
  • Login as user
  • Make some desktop changes
  • Create a folder or delete a folder
  • For removing mandatory profile just rename ntuser.man to ntuser.dat

MCSE 70-290 Part-6

Local profile: It is a profile loaded for the user and saved in the local hard drive where the
user works. And profile will be saved when a user logs off .Local profiles are limited only to the machine where they are saved.A user with a local profile will not be loaded with a network profile when he logs on from another machine.

Verifying the type of the profile:

My computer—>Properties—>Advanced —>User profile —> Settings

Roaming Profile: It is a profile, which is saved in the shared folder on the server. Hence
available in the entire network. Roaming profile is a network profile which is available in the entire network. As a result when a user logs in from any machine in the network he will be loaded with a roaming.

Mandatory Profile: Mandatory Profile is a profile used for controlling desktop environment
setting especially used for restricting user from saving user data, setting, and configuration on the desktop. It is a type of roaming profile but settings are not saved when a user logs off. Changes will be available only for the session where user is active. (Active session)

MCSE 70-290 Part-5

Profiles

Profiles are used for providing basic user environment needs Environment needs can be

  • Desktop settings
  • Startup applications
  • Network connectivity.


Profile is responsible for providing the initial desktop environment needs with the help of desktop folder, favorites, cookies, my documents, start menu, and Internet settings, n/w connections and etc.

When a user logs in for the first time the user will be loaded with a default user profile.

Default user profile is located under
C:\documents and settings\default user

Types of profiles:

  • Local profile
  • Roaming profile
  • Mandatory profile

Cisco CCNA Security 640-553 IINS Tutorials Part-11

Intrusion prevention system (IPS) Provides end-to-end protection for the network via a
network-based defense that can identify, classify, and stop known and unknown threats, including worms, network viruses, application threats, system intrusion attempts, and application misuse.

IP spoofing An attack in which an attacker falsifies packets’ source IP address (for example,causing the source IP address to be a trusted IP address).


IP telephony Similar to VoIP, sends voice traffic over an IP network. However, the primary distinction from a VoIP network is that an IP telephony environment contains endpoints that natively communicate using IP.

Isolated VLAN Ports belonging to an isolated VLAN lack Layer 2 connectivity between one another. However, they can communicate with a promiscuous post.

key pair In terms of a PKI, the key pair is composed of one public key and one private key.
These two keys work together to provide a means to both encrypt and decrypt data. The public key may be widely distributed publicly, but the private key should be closely held by its owner. Data encrypted with the public key can be decrypted only by the matching private key.

keyspace The keyspace of an algorithm represents a defined set of all possible key
values. For each key of n bits, a keyspace is produced that has 2n possible key values. This means that if 1 bit were added to the key, this would effectively double the size of the keyspace

Lightweight Extensible Authentication Protocol (LEAP) Uses a username/password
combination to perform authentication. Typically is found in a Cisco wireless LAN (WLAN) implementation.

LUN masking A Logical Unit Number is an address used by the SCSI protocol to differentiate an individual disk drive that makes up a common SCSI target device. LUN masking represents a defense against attacks. In this authorization process, a LUN is made available to some hosts and unavailable to other hosts.

Management Information Base (MIB) Information about a managed device’s resources and activity is defined by a series of objects. The structure of these management objects is defined by a managed device’s MIB.

Media Gateway Control Protocol (MGCP) Originally developed by Cisco and considered to be a client/server protocol. The client (such as an analog port in a voice-enabled router) can communicate with a server (such as a Cisco Unified Communications Manager server) via a series of events and signals. For example, the server could tell the client that if an attached
phone goes off-hook, play the signal of dial tone to that phone.

Cisco CCNA Security 640-553 IINS Tutorials Part-10

Host-based intrusion prevention system (HIPS)
An IPS in which the intrusion-prevention application resides on that specific host, typically a single computer. The IPS monitors system activities for malicious or unwanted behaviors. It can react in real time to block or prevent those activities. The key benefit is that HIPS is behavior-based as opposed to signature-based.

Host Bus Adapter (HBA) Connects a host system to other network and storage devices. This term primarily refers to devices for connecting SCSI, Fibre Channel, and eSATA devices, but devices for connecting to IDE, Ethernet, FireWire, USB, and other systems may also be called host adapters.

Hot site A completely redundant site that has equipment very similar to that at the original site.Data is routinely copied from a primary site to a hot site. As a result, a hot site can be up and functioning within a few minutes (or even seconds) after a catastrophe at the primary site.


IEEE 802.1x A standards-based approach for providing port-based network access.Specifically, 802.1x is a Layer 2 protocol that defines how Extensible Authentication Protocol (EAP) frames are encapsulated, typically between a user’s network device (such as a PC) and a switch or wireless access point.

IKE proposal Internet Key Exchange proposal. A collection of security protocols and algorithms that can be used to establish an IKE Phase 1 (ISAKMP) tunnel.

In-band management An approach that allows management traffic to be transmitted across a production network.

Inline mode Inline mode operation requires at least two monitoring interfaces on an IPS sensor, because the sensor resides inline with the traffic. (In other words, traffic enters the sensor on one monitoring interface and exits the sensor on another monitoring interface.) Therefore, a sensor running in inline mode supports IPS operation and can drop malicious traffic before it reaches its intended target.

Integrated Services Router (ISR) As its name suggests, this kind of Cisco router integrates
various services (such as voice and security services) into a router’s architecture

Integrity Data integrity ensures that data is not modified in transit. For example, routers at each end of a tunnel could calculate checksum values or hash values for the data. If both routers
calculate the same values, the data most likely was not modified in transit.

Intrusion detection system (IDS) Can recognize network attacks by analyzing a copy of network traffic. Can deliver a comprehensive, pervasive security solution for combating unauthorized intrusions, malicious Internet worms, and bandwidth and e-business application attacks.

Free Microsoft Active Directory Migration Tool v3.0

The Active Directory Migration Tool version 3 (ADMT v3) simplifies the process of restructuring your operating environment to meet the needs of your organization. You can use ADMT v3 to migrate users, groups, and computers from Microsoft® Windows NT® 4.0 domains to Active Directory® directory service domains; between Active Directory domains in different forests (interforest migration); and between Active Directory domains in the same forest (intraforest migration). ADMT v3 also performs security translation from Windows NT 4.0 domains to Active Directory domains and between Active Directory domains in different forests.

Download Link

Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats


Overview

Users of the Microsoft Office XP and 2003 programs Word, Excel, or PowerPoint—please install all High-Priority updates from Microsoft Update before downloading the Compatibility Pack.
By installing the Compatibility Pack in addition to Microsoft Office 2000, Office XP, or Office 2003, you will be able to open, edit, and save files using the file formats new to Word, Excel, and PowerPoint 2007. The Compatibility Pack can also be used in conjunction with the Microsoft Office Word Viewer 2003, Excel Viewer 2003, and PowerPoint Viewer 2003 to view files saved in these new formats. For more information about the Compatibility Pack, see Knowledge Base article 924074.


WinXP Manager 6.0.0

WinXP Manager is a tool for setting, optimizing, diagnosing and tweaking Windows XP. It bundles more than 30 different utilities in one and help your system faster and more stable, secure and personal! WinXP Manager helps you optimize, tweak, and clean up Windows XP. It will increase your system speed, improve system security, and meet all of your expectations
You can tweak memory and CPU settings, customize IE settings, find and remove junk files, check and repair your registry, control startup programs, optimize your connection speed, validate your Favorites and much more. It also includes an Auto-Optimization option, that allows less experienced users to easily optimize certain settings, using a wizard. The interface is easy to use and all available options are categorized into sections. Includes basic documentation and an annoying nag screen that pops up every few minutes. It's compatible with Windows XP SP3 entirely!
  • Changes in WinXP Manager 6.0.0, 11/17/2008:-
  • IE Manager updated to v4.7-
  • Junk File Cleaner updated to v5.6-
  • Registry Cleaner updated to v9.5-
  • Duplicate Files Finder updated to v2.1-
  • Smart Uninstaller updated to v3.9.Download :
WinXP Manager 6.0.0

Keep in mind the Following Points before performing Disk Defragmenter

Perform Analyze before defragmenting a volume
  • Analyze volumes before defragmenting them.
  • It tells you the percentage of fragmented files and folders on the volume
  • Recommends whether to defragment the volume or not .

Analyze after adding large numbers of files

It is best practice to analyze Volumes because it becomes excessively fragmented when users add a large number of files or folders.

Ensure the volume has at least 15% free space

  • To perform defragmention in complete and adequate manner a volume must have at least 15% free space .
  • Uses this space as a sorting area for file fragments.
  • If a volume has less than 15% free space, Disk Defragmenter will only partially defragment it.

Defragment during low-usage periods

  • Defragment file server volumes during low-volume usage periods to minimize the effect that the defragmentation process has on file server performance.
  • The time that Disk Defragmenter takes to defragment a volume depends on several factors, like
  1. The size of the volume
  2. The number of files on the volume
  3. The number of fragmented files
  4. Available system resources.

After installing software or installing Windows

Defragment volumes after installing software or after performing an upgrade or clean install of Windows.

How To Block Websties Without using any Software

1. Browse C:\WINDOWS\system32\drivers\etc
2. Find the file named "HOSTS"
3. Open it in notepad
4. Under "127.0.0.1 localhost" Add 127.0.0.2
www.sitenameyouwantblocked.com , and that site will no longer be accessable.
5. Done!

Change your Windows XP Boot Screen


This is a very simple trick to do if you have done the same for the logon screen and the start button. There are 2 ways to do this trick that I know about one is doing it manually and the other is using a program called bootxp. I am going to tell you the manual way to do it, but if you want to know the other way just let me know, so I can do an update to the guide. Now once you have downloaded your ntoskrnl.exe file save it a general location so that you will have easy access to it, like my folder.

Once you have ntoskrnl.exe file in an easy access folder, restart your pc into safe mode. Once into safe mode go to the folder where your files are located.
Now that you are there copy the file that you want to change your boot screen too. Once you have copied that file, hit the window key + r or type %windir%\system32 in the run command, so that folder as follows.

Once there paste your new file into the folder and overwrite the existing folder.
Now that you have your new file in the folder restart your pc as you normally would and your new boot screen should appear.

You can download this bootscreen here. ALWAYS BACKUP EVERYTHING YOU EDIT OR DELETE. I'M NOT RESPONSIBLE IF YOU MESS YOUR COMPUTER UP BY DOING THIS HACK OR ANY TYPE OF HACK. DO IT AT YOUR OWN RISK.

Password recovery 2950 switch

Use the power switch in order to turn off the router, and then turn the router back on.
Press Break on the terminal keyboard within 60 seconds of power up in order to put the router into ROMMON.
Type confreg 0×2142 at the rommon
  1. prompt in order to boot from Flash.
  2. Type reset at the rommon
  3. prompt. [This step bypasses the startup configuration where the passwords are stored.]
  4. Press Ctrl−C in order to skip the initial setup procedure. Type enable at the Router> prompt.
  5. You are in enable mode and should see the Router# prompt.
  6. Type configure memory or copy startup− config running− config in order to copy the nonvolatile RAM (NVRAM) into memory.
  7. [Important: Do not type copy running− config startup− config or write. These commands erase your startup configuration. ]
  8. Type configure terminal.
  9. The hostname (config) # prompt appears.
  10. Type enable secret in order to change the enable secret password.
  11. For example: hostname(config) #enable secret cisco
  12. Issue the no shutdown command on every interface that you use.
  13. If you issue a show ip interface brief command, every interface that you want to use should display up up.
  14. Type config− register 0×2102
  15. Press Ctrl−z [to leave the configuration mode.]
  16. Type write memory or copy running− config startup− config in order to commit the changes

List of Mostly used TCP/IP Protocols

Data Link Layer

ARP/RARP Address Resolution Protocol/Reverse Address

DCAP Data Link Switching Client Access Protocol

Network Layer

DHCP Dynamic Host Configuration Protocol

DVMRP Distance Vector Multicast Routing ProtocolICMP/ICMPv6 Internet Control Message Protocol

IGMP Internet Group Management Protocol
IP Internet Protocol version 4
IPv6 Internet Protocol version 6
MARS Multicast Address Resolution Server
PIM Protocol Independent Multicast-Sparse Mode (PIM-SM)
RIP2 Routing Information Protocol
RIPng for IPv6 Routing Information Protocol for IPv6
RSVP Resource ReSerVation setup Protocol
VRRP Virtual Router Redundancy Protocol
Transport Layer

ISTP Internet Signaling Transport Protocol for PacketCable PSTN signaling gatways

Mobile IP Mobile IP Protocol

RUDP Reliable UDP

TALI Transport Adapter Layer Interface

TCP Transmission Control Protocol

UDP User Datagram Protocol

Van Jacobson compressed TCP

XOT X.25 over TCP

Session Layer

BGMP Border Gateway Multicast Protocol

Diameter Provides an Authentication, Authorization and Accounting (AAA) framework

DIS Distributed Interactive Simulation

DNS Domain Name Service

ISAKMP/IKE Internet Security Association and Key Management Protocol and Internet Key Exchange Protocol

iSCSI Small Computer Systems Interface

LDAP Lightweight Directory Access Protocol

MZAP Multicast-Scope Zone Announcement Protocol

NetBIOS/IP NetBIOS/IP for TCP/IP
Environment

Application Layer

COPS Common Open Policy Service

FANP Flow Attribute Notification Protocol

Finger User Information Protocol

FTP File Transfer Protocol

HTTP Hypertext Transfer Protocol

IMAP4 Internet Message Access Protocol rev 4

IMPPpre/IMPPmes Instant Messaging and Presence Protocols

IPDC IP Device Control

IRC ·Internet Relay Chat Protocol

ISAKMP Internet Message Access Protocol version 4rev1

NTP Network Time Protocol

POP3 Post Office Protocol version 3

Radius Remote Authentication Dial In User Service

RLOGIN Remote Login

RTSP Real-time Streaming Protocol

SCTP Stream Control Transmision Protocol

S-HTTP Secure Hypertext Transfer Protocol

SLP Service Location Protocol

SMTP Simple Mail Transfer Protocol

SNMP Simple Network Management Protocol

SOCKS Socket Secure (Server)

TACACS+ Terminal Access Controller Access Control System

TELNET TCP/IP Terminal Emulation Protocol

TFTP Trivial File Transfer Protocol

WCCP Web Cache Coordination Protocol

X-Window X Window

Routing

BGP-4 Border Gateway Protocol

EGP Exterior Gateway Protocol

EIGRP Enhanced Interior Gateway Routing Protocol

HSRP Cisco Hot Standby Router Protocol

IGRP Interior Gateway Routing

NARP NBMA Address Resolution Protocol

NHRP Next Hop Resolution Protocol

OSPF Open Shortest Path First

TRIP Telephony Routing over IP

Tunneling

ATMP Ascend Tunnel Management Protocol

L2F The Layer 2 Forwarding Protocol

L2TP Layer 2 Tunneling Protocol

PPTP Point to Point Tunneling Protocol

Security

AH Authentication Header

ESP Encapsulating Security Payload

TLS Transport Layer Security Protocol

Cisco Cabling

Straight-through cable

A straight-through cable is the same at both ends. A straight-through cable uses pins 1, 2, 3, and 6. The send and receive wires are not crossed. You should use a straight-through cable when connecting dissimilar devices. Examples include connecting PCs to switches or hubs or a router to a switch or a hub.
Crossover cable
A crossover cable is a cable that has the send and receive wires crossed at one of the ends. On a Category 5 cable, the 1 and 3 wires and the 2 and 6 wires are switched on one of the cable’s ends. You should use a crossover cable when connecting similar devices, such as connecting a router to a router, a switch to a switch or hub, a hub to a hub, or a PC to a PC.Important tip — Router (think of it as a PC) to PC via 10BaseT (NIC) uses a “crossover cable”. (contradicts the rule)
Rolled Cable
In a rolled cable, the colored wires at one end of the cable are in the reverse sequence of the colored wires at the other end of the cable.

Cisco IOS Commands

EXEC modes upported in the Cisco IOS are

User EXEC mode (user mode)
Privileged EXEC mode (enable or privileged mode)

User EXEC mode

User EXEC mode is the first mode you enter when you log into the IOS. This mode is limited and is mostly used to view statistics. You cannot change a router’s configuration in this mode. By default, the greater-than sign (>) indicates that you are in user mode.It is also a stepping-stone for logging into more privileged mode Router>
Privileged EXEC mode
In privileged EXEC mode, you can view and change the configuration in a router. To enter privileged mode, enter the enable command while in user mode. The pound symbol (#) indicates that you are in privileged mode. This mode is usually protected with a password. You also see the output of the prompt:
Router>
enablePassword:
Router#
How to go into privileged (enable) mode
If there is a password in user mode please enter it. The prompt will like Router>. Type now
enable or en
After a succesfull login the prompt will have changed to Router# To end Priviliged mode type:
disable

TCP/IP Notes

TCP/IP Model has four layer:
  • Application (Process)
  • Host-to-host (Transport)
  • Internet
  • Network Access (Physical and Data link)

Free Microsoft Malicious Software Removal Tool

The Microsoft Windows Malicious Software Removal Tool checks Windows Vista, Windows XP, Windows 2000, and Windows Server 2003 computers for and helps remove infections by specific, prevalent malicious software—including Blaster, Sasser, and Mydoom. When the detection and removal process is complete, the tool displays a report describing the outcome, including which, if any, malicious software was detected and removed. The tool creates a log file named mrt.log in the %WINDIR%\debug folder

Free Microsoft Security Assessment Tool 4.0

The Microsoft Security Assessment Tool 4.0 is the revised version of the original Microsoft Security Risk Self-Assessment Tool (MSRSAT), released in 2004 and the Microsoft Security Assessment Tool 2.0 released in 2006. Security issues have evolved since 2004 so additional questions and answers were needed to ensure you had a comprehensive toolset to become more aware of the evolving security threat landscape that could impact your organization.

The tool employs a holistic approach to measuring your security posture by covering topics across people, process, and technology. Findings are coupled with prescriptive guidance and recommended mitigation efforts, including links to more information for additional industry guidance. These resources may assist you in keeping you aware of specific tools and methods that can help change the security posture of your IT environment.

There are two assessments that define the Microsoft Security Assessment Tool:
  • Business Risk Profile Assessment
  • Defense in Depth Assessment (UPDATED)

Download Link

Cisco CCNA Certification Information










What is Cisco?

Cisco is a networking solutions company that
comprises over 80% of the Internet backbone. Cisco technology includes the designing and building of networks used in today's business world.

What is Drake State Technical College's
Role in Cisco?



DSTC is currently the only authorized regional training academy in northern Alabama. DSTC offers four semesters of comprehensive training that will enable you to take the CCNA exam

What is CCNA Certification?

The Cisco certified Network Associate (CCNA) credential is the premium certification for professionals who design and develop custom business solutions with Cisco routers and switches.
Cisco Certifications focus on both routing and switching, as well as WAN switching solutions in network design and network support, providing you with flexible options for career development. One may advance to CCIE status by first achieving Associate certification in these tracks.

What are the benefits of Cisco Certification?

To demonstrate to your customers and colleagues that you have attained an unparalleled level of expertise in the network design and support arenas in today's technology industry. CCNAs receive the following benefits:

  • Industry recognition of your knowledge and proficiency with Cisco products and technologies.
  • CCNA logo to enable you to identify your status to colleagues or clients.

  • Affiliation with more than 10,000 CCNAs worldwide.

Who Should Attend Cisco Training?



Network administrators, technicians, and anyone who needs to configure and support multiprotocol networks and get started with basic Cisco IOS software



What are the prerequisites for taking Cisco?

To attend this course you must have a basic knowledge of computer hardware and windows

Does the curriculum teach students things that will be useful for maintaining non-Cisco networks?
u

on-Absolutely. Cisco attempts to be a vendor-neutral curriculum. Cisco equipment is used to practice and reinforce certain concepts. Students gain broad-based knowledge of the operation of networks, the differences between various types of networking products, how to design and troubleshoot networks, and other general topics. Emphasis is placed in a "hands-on" environmentCisco networks?

Where is the CCNA test given?

The CCNA is currently given only at Sylvan Testing Centers. See http://www.cisco.com/

Course Outline

Semester One :

OSI model and industry standards, Network topologies, IP addressing, including subnet masks, Networking component, and Basic network design.

Semester Two :

Introduction to router configuration and routers and routing protocols.

Semester Three

Advanced router configurations, LAN switching theory and VLANs, advanced LAN and LAN switched design, Novell IPX, and Threaded case study.

Semester Four

WAN theory and design, WAN technology, PPP, Frame Relay, and ISDN, Network troubleshooting, National SCANS skills, and Threaded case study.

http://www.cisco.com
for more Cisco information.



Data Link Switch (DLSw) - A look at Cisco's implementation of data link switch

I have spent the last few weeks writing about topics that appear on the

CCIE
qualification (written) exam that I do not
have much exposure to. The last three weeks I wrote about Token Ring and
Source-Route Bridging (SRB). This week I would like to write about how Cisco
handles transporting SNA traffic over the WAN, or their implementation of data
link switch (DLSw).


DLSw was developed in the early 1990s as a method to transport IBM Systems
Network Architecture (SNA) and NetBIOS traffic (RFC 1434, 1993). Version 1 of
DLSw was introduced in 1995 with the release of RFC 1795 (superceding RFC 1434).
SNA operates at the data link layer of the OSI model, or the SNA data link layer
of the SNA architecture (conveniently layer 2 in both models). Traditional
routing protocols operate at the OSI network layer, so DLSw is said to switch
the SNA traffic. DLSw uses the Switch-to-Switch protocol (SSP) to forward
traffic between DLSw endpoints, or peers. To route traffic over WAN links, or
the Internet, DLSw encapsulates the SNA or NetBIOS traffic in IP.


Initializing a DLSw connection involves a three-stage process. First, a peer
connection must be established. DLSw switches (routers in DLSw can be referred
to as switches--this can be confusing) set up a TCP connection. Once the peer
connection is established, the DLSw switches exchange their capabilities.
Typically exchanged are DLSw version number, initial pacing window size (receive
window size), NetBIOS support, list of supported link SAPs (LSAPs), number of
TCP sessions supported. Optionally, MAC address lists and NetBIOS name lists can
be exchanged to limit broadcasts and type of search frames supported can be
passed to limit the amount of discovery traffic. The final stage of DLSw
communication is to establish the connection circuit. Circuit establishment is
dependant on the type of traffic, but involves locating the target (destination)
end station and opening a data link connection between each endpoints and its
DLSw switch.


Cisco's implementation of DLSw is known as DLSw+. DLSw+ adds many enhancements
to DLSw. It is important to note that DLSw+ is fully compliant with RFC 1795;
only new functionality is added. Features added to standard DLSw by DLSw+ are:


- Peer groups and border peers

- Backup peers

- Promiscuous and on-demand peers

- Explorer firewalls and location learning

- NetBIOS dial-on-demand routing feature support

- UDP unicast support

- Load balancing

- Support for LLC1 circuits

- Support for multiple bridge groups

- Support for RIF Passthru

- SNA type of service feature support

- Local acknowledgment for Ethernet-attached devices and media conversion for
SNA PU 2.1 andPU 2.0 devices

- Conversion between LLC2 to SDLC between PU 4 devices

- Local or remote media conversion between LANs and either the SDLC Protocol or
QLLC

It is important to note that both connection peers must support DLSw+ (Cisco
devices only). A DLSw+ device can automatically detect if the remote peer
supports DLSw+ and can change to standards compliance mode if it is not.

DLSw switches can be grouped into peer groups where all the DLSw switches peer
with each other. Each peer group has one or more border peers that communicate
with each other. This eliminates the need for every DLSw switch to peer with
every other DLSw switch on a network and reduce explorer traffic and broadcasts.

DLSw+ allows SNA and NetBIOS traffic to be encapsulated in the standard TCP/IP
frames. DLSw+ will also transport SNA and NetBIOS traffic point-to-point WAN
links using HDLC or Frame Relay.

If you want to learn more about Cisco's implementation of DLSw, the links below
are an excellent start. You should also take the time to become familiar with
IBM's SNA. There is still quite a bit of SNA out there, so the information might
just help you in the real world (and not just on the test).

The DLSw RFC 1795

DLSw
documentation from Cisco


Cisco DLSw+ design guide

Circuit Switching vs. Packet Switching

Some exam study guides would have
you believe there is only one way to send data through a network: packet
switching. Fact is, there’s at least one other way, circuit switching.

While the majority of switched networks today get data across the network

through packet switching, the concept of circuit switching should be no

mystery to the average tech, let alone the tech wannabe. There are at least

two good reasons to learn the difference. First of all, there is plenty of
legacy

hardware out there to support. Second, and perhaps more or at least very

important, it could well turn up on the test. If one question stands between you


and passing, don’t make this the one you miss.


In principle, circuit switching and packet switching both are used in
high-capacity networks. In circuit-switched networks, network resources are
static, set in “copper” if you will, from the sender to receiver before the
start of the transfer, thus creating a “circuit”. The resources remain dedicated
to the circuit during the entire transfer and the entire message follows the
same path. In packet-switched networks, the message is broken into
packets,
each of which can take a different route to the destination where the packets
are recompiled into the original message.


All the above can be handled by a router or a switch but much of IT today is
going toward flat switched networks. So when we’re talking about circuit
switching or packet switching, we are more and more talking about doing it on a
switch.


Switched Networks


First, let’s be sure we understand what we mean by a switched network. A
switched network goes through a switch instead of a router. This actually is the
way most networks are headed, toward flat switches on VLANs instead of routers.
Still, it’s not always easy to tell a router from a switch. It’s commonly
believed that the difference between a switched network and a routed network is
simple binary opposition. T’ain’t so.


A router operates at Layer 3 of the

OSI Model
and can create and connect several logical networks, including
those of different network topologies, such as
Ethernet
and

Token Ring
. A router will provide multiple paths (compared to only one on a
bridge) between segments and will map nodes on a segment and the connecting
paths with a routing protocol and internal routing tables.


Being a Layer 3 device, the router uses the destination IP address to decide
where a frame should go. If the destination IP address is on a segment directly
connected to the router, then the router will forward the frame out the
appropriate port to that segment. If not, the router will search its routing
table for the correct destination, again, using that IP address.


Having talked about a router as being a Layer 3 device, think about what I’m
about to say next as a general statement. I know there are exceptions, namely
the Layer 3 switch. We’re not going to get into that, not in this article.


A switch is very like a bridge in that is usually a layer 2 device that looks
to MAC addresses to determine where data should be directed. A switch has other
applications in common with a bridge. Like a bridge, a switch will use
transparent and source-route methods to move data and Spanning Tree Protocol (STP)
to avoid loops. However, switches are superior to bridges because they provide
greater port density and they can be configured to make more intelligent
decisions about where data goes.


The three most common switch methods are:


1. Cut-through - Streams data so that the first part of a packet exits
the switch before the rest of the packet has finished entering the switch,
typically within the first 12 bytes of an Ethernet frame.


2. Store-and-Forward - The entire frame is copied into the switch's
memory buffer and it stays there while the switch processes the Cyclical
Redundancy Check (CRC) to look for errors in the frame. If the frame contains no
errors, it will be forwarded. If a frame contains an error, it will be dropped.
Obviously, this method has higher latency than cut-through but there will be no
fragments or bad frames taking up bandwidth.


3. Fragment-free Switching - Think of this as a hybrid of cut-through
and store-and-forward. The switch reads only the first 64 bytes of the frame
into buffer before forwarding it (think of a truck...