Learn Ethical Hacking Part-2


Terminologies

Hackers

Access computer system or network without authorization through skills, tactics and detailed knowledge. Also known as “Black hat” (a malicious or criminal hacker).He breaks the law and can go to prison.

Ethical hacker

Also known as “Black hat“.Performs most of the same activities as hackers performs but with
owner’s or organization permission.

Crackers

Illegally break into systems to steal or destroy data.

Script kiddies or packet monkeys

Young inexperienced hackers.Copy codes and techniques from knowledgeable hackers

Script

Set of instructions that runs in sequence

Learn Ethical Hacking Part-1


Terminologies

Ethical hackers

Employed by companies also known as white hat to perform penetration tests or computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit.

Penetration test or Ethical hacking

Legal attempt to break into a company’s network to find its weakest link , also known as ethical
hacking,intrusion testing, and red teaming.Tester only reports findings, does not solve problems i-e but report problems instead of taking advantage of them

Security test

More than an attempt to break in; also includes analyzing company’s security policy and procedures Tester offers solutions to secure or protect the network..

Windows Server 2008


Windows Server 2008 Standard is the most robust Windows Server operating system to date. Built with enhanced Web and virtualization capabilities, it is designed to increase the reliability and flexibility of your server infrastructure while helping save time and reduce costs. Powerful tools give you greater control over your servers and streamline configuration and management tasks. Plus, enhanced security features work to harden the operating system to
help protect your data and network and provide a solid, highly-dependable foundation for your business.

Windows Server 2008 Enterprise delivers an enterprise-class platform for deploying
business-critical applications. Improve availability with failover clustering. Improve security with consolidated identity management features. Reduce infrastructure costs by consolidating applications with virtualization licensing rights. Windows Server 2008 Enterprise provides the foundation for a highly dynamic, scalable IT infrastructure. Designed to be used specifically as a single-purpose Web server,
Windows Web Server 2008 delivers on a rock solid foundation of Web infrastructure capabilities in the next generation Windows Server 2008. Integrated with the newly
re-architected IIS 7.0, ASP.NET, and the Microsoft .NET Framework, Windows Web Server 2008 enables any organization to rapidly deploy Web pages, Web sites, Web applications, and Web services.

Windows Server 2008 Datacenter delivers an enterprise-class platform for deploying business-critical applications and large-scale virtualization on small and large servers. Improve
availability with clustering and dynamic hardware partitioning capabilities. Reduce infrastructure costs by consolidating applications with unlimited virtualization licensing rights. Scale from 2 to 64 processors. Windows Server 2008 Datacenter provides a foundation on which to build enterprise-class virtualization and scale-up solutions.

Windows Server 2008 for Itanium-based Systems is optimized for large databases, line of business and custom applications providing high availability and scalability up to 64 processors to meet the needs of demanding and mission critical solutions.


Windows Server 2008 Standard without Hyper-V™ is the most robust Windows Server operating system to date. It is designed to increase the reliability and flexibility of your server infrastructure while helping save time and reduce costs. Powerful tools give you greater control over your servers and streamline configuration and management tasks. Plus, enhanced security features work to harden the operating system to help protect your data and network and provide a solid, highly-dependable foundation for your business. This product does not include the Hyper-V™ server role.

Windows Server 2008 Enterprise without Hyper-V™ delivers an enterprise-class platform for deploying business-critical applications. Improve availability with failover clustering. Improve security with consolidated identity management features. Reduce infrastructure costs by consolidating applications with virtualization licensing rights. Windows Server 2008 Enterprise without Hyper-V provides the foundation for a highly dynamic, scalable IT infrastructure. This product does not include the Hyper-V™ server role.

Windows Server 2008 Datacenter without Hyper-V™ delivers an enterprise-class platform for deploying business-critical applications and large-scale virtualization on small and large servers. Improve availability with clustering and dynamic hardware partitioning capabilities. Reduce infrastructure costs by consolidating applications with unlimited virtualization licensing rights. Scale from 2 to 64 processors. Windows Server 2008 Datacenter without Hyper-V provides a foundation on which to build enterprise-class virtualization and scale-up solutions. This product does not include Hyper-V™ server role

How to Create Roaming & Mandatory Profiles


Creating a roaming profile:

On Domain Controller
  • Create a user account
  • Create a folder And share it and give full control permission for everyone
  • Start >Program Files >Active Directory User & Computers
  • Double click the user Go to Profile tab
  • Enter Profile path For example :
    \\sys1\profile\username
  • Apply then click ok
  • To verify Move on to your member server
  • Log in as user
  • My computer then Properties
  • Advanced-Profile settings-you should notice the status change to “roaming profile”.

Creating a mandatory profile:


  • Open the profiles folder you’ve created for roaming.There will be a user folder
  • Take the ownership of the folder of the user
  • Right click on the folder properties Security –
    ok – advanced Owner – administrators Replace owner on sub >apply – ok
  • Open the folder
  • Rename the file Ntuser.dat to ntuser.man
  • Back Give back the permission (ownership)
  • Folder Properties Security – advanced Check the box Allow inheritable Check - Replace permission entries on all
  • Apply – ok

Verifying:

  • Move on to client machine
  • Login as user
  • Make some desktop changes
  • Create a folder or delete a folder
  • For removing mandatory profile just rename ntuser.man to ntuser.dat

MCSE 70-290 Part-6

Local profile: It is a profile loaded for the user and saved in the local hard drive where the
user works. And profile will be saved when a user logs off .Local profiles are limited only to the machine where they are saved.A user with a local profile will not be loaded with a network profile when he logs on from another machine.

Verifying the type of the profile:

My computer—>Properties—>Advanced —>User profile —> Settings

Roaming Profile: It is a profile, which is saved in the shared folder on the server. Hence
available in the entire network. Roaming profile is a network profile which is available in the entire network. As a result when a user logs in from any machine in the network he will be loaded with a roaming.

Mandatory Profile: Mandatory Profile is a profile used for controlling desktop environment
setting especially used for restricting user from saving user data, setting, and configuration on the desktop. It is a type of roaming profile but settings are not saved when a user logs off. Changes will be available only for the session where user is active. (Active session)

MCSE 70-290 Part-5

Profiles

Profiles are used for providing basic user environment needs Environment needs can be

  • Desktop settings
  • Startup applications
  • Network connectivity.


Profile is responsible for providing the initial desktop environment needs with the help of desktop folder, favorites, cookies, my documents, start menu, and Internet settings, n/w connections and etc.

When a user logs in for the first time the user will be loaded with a default user profile.

Default user profile is located under
C:\documents and settings\default user

Types of profiles:

  • Local profile
  • Roaming profile
  • Mandatory profile

Cisco CCNA Security 640-553 IINS Tutorials Part-11

Intrusion prevention system (IPS) Provides end-to-end protection for the network via a
network-based defense that can identify, classify, and stop known and unknown threats, including worms, network viruses, application threats, system intrusion attempts, and application misuse.

IP spoofing An attack in which an attacker falsifies packets’ source IP address (for example,causing the source IP address to be a trusted IP address).


IP telephony Similar to VoIP, sends voice traffic over an IP network. However, the primary distinction from a VoIP network is that an IP telephony environment contains endpoints that natively communicate using IP.

Isolated VLAN Ports belonging to an isolated VLAN lack Layer 2 connectivity between one another. However, they can communicate with a promiscuous post.

key pair In terms of a PKI, the key pair is composed of one public key and one private key.
These two keys work together to provide a means to both encrypt and decrypt data. The public key may be widely distributed publicly, but the private key should be closely held by its owner. Data encrypted with the public key can be decrypted only by the matching private key.

keyspace The keyspace of an algorithm represents a defined set of all possible key
values. For each key of n bits, a keyspace is produced that has 2n possible key values. This means that if 1 bit were added to the key, this would effectively double the size of the keyspace

Lightweight Extensible Authentication Protocol (LEAP) Uses a username/password
combination to perform authentication. Typically is found in a Cisco wireless LAN (WLAN) implementation.

LUN masking A Logical Unit Number is an address used by the SCSI protocol to differentiate an individual disk drive that makes up a common SCSI target device. LUN masking represents a defense against attacks. In this authorization process, a LUN is made available to some hosts and unavailable to other hosts.

Management Information Base (MIB) Information about a managed device’s resources and activity is defined by a series of objects. The structure of these management objects is defined by a managed device’s MIB.

Media Gateway Control Protocol (MGCP) Originally developed by Cisco and considered to be a client/server protocol. The client (such as an analog port in a voice-enabled router) can communicate with a server (such as a Cisco Unified Communications Manager server) via a series of events and signals. For example, the server could tell the client that if an attached
phone goes off-hook, play the signal of dial tone to that phone.

Cisco CCNA Security 640-553 IINS Tutorials Part-10

Host-based intrusion prevention system (HIPS)
An IPS in which the intrusion-prevention application resides on that specific host, typically a single computer. The IPS monitors system activities for malicious or unwanted behaviors. It can react in real time to block or prevent those activities. The key benefit is that HIPS is behavior-based as opposed to signature-based.

Host Bus Adapter (HBA) Connects a host system to other network and storage devices. This term primarily refers to devices for connecting SCSI, Fibre Channel, and eSATA devices, but devices for connecting to IDE, Ethernet, FireWire, USB, and other systems may also be called host adapters.

Hot site A completely redundant site that has equipment very similar to that at the original site.Data is routinely copied from a primary site to a hot site. As a result, a hot site can be up and functioning within a few minutes (or even seconds) after a catastrophe at the primary site.


IEEE 802.1x A standards-based approach for providing port-based network access.Specifically, 802.1x is a Layer 2 protocol that defines how Extensible Authentication Protocol (EAP) frames are encapsulated, typically between a user’s network device (such as a PC) and a switch or wireless access point.

IKE proposal Internet Key Exchange proposal. A collection of security protocols and algorithms that can be used to establish an IKE Phase 1 (ISAKMP) tunnel.

In-band management An approach that allows management traffic to be transmitted across a production network.

Inline mode Inline mode operation requires at least two monitoring interfaces on an IPS sensor, because the sensor resides inline with the traffic. (In other words, traffic enters the sensor on one monitoring interface and exits the sensor on another monitoring interface.) Therefore, a sensor running in inline mode supports IPS operation and can drop malicious traffic before it reaches its intended target.

Integrated Services Router (ISR) As its name suggests, this kind of Cisco router integrates
various services (such as voice and security services) into a router’s architecture

Integrity Data integrity ensures that data is not modified in transit. For example, routers at each end of a tunnel could calculate checksum values or hash values for the data. If both routers
calculate the same values, the data most likely was not modified in transit.

Intrusion detection system (IDS) Can recognize network attacks by analyzing a copy of network traffic. Can deliver a comprehensive, pervasive security solution for combating unauthorized intrusions, malicious Internet worms, and bandwidth and e-business application attacks.

Free Microsoft Active Directory Migration Tool v3.0

The Active Directory Migration Tool version 3 (ADMT v3) simplifies the process of restructuring your operating environment to meet the needs of your organization. You can use ADMT v3 to migrate users, groups, and computers from Microsoft® Windows NT® 4.0 domains to Active Directory® directory service domains; between Active Directory domains in different forests (interforest migration); and between Active Directory domains in the same forest (intraforest migration). ADMT v3 also performs security translation from Windows NT 4.0 domains to Active Directory domains and between Active Directory domains in different forests.

Download Link

Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats


Overview

Users of the Microsoft Office XP and 2003 programs Word, Excel, or PowerPoint—please install all High-Priority updates from Microsoft Update before downloading the Compatibility Pack.
By installing the Compatibility Pack in addition to Microsoft Office 2000, Office XP, or Office 2003, you will be able to open, edit, and save files using the file formats new to Word, Excel, and PowerPoint 2007. The Compatibility Pack can also be used in conjunction with the Microsoft Office Word Viewer 2003, Excel Viewer 2003, and PowerPoint Viewer 2003 to view files saved in these new formats. For more information about the Compatibility Pack, see Knowledge Base article 924074.


WinXP Manager 6.0.0

WinXP Manager is a tool for setting, optimizing, diagnosing and tweaking Windows XP. It bundles more than 30 different utilities in one and help your system faster and more stable, secure and personal! WinXP Manager helps you optimize, tweak, and clean up Windows XP. It will increase your system speed, improve system security, and meet all of your expectations
You can tweak memory and CPU settings, customize IE settings, find and remove junk files, check and repair your registry, control startup programs, optimize your connection speed, validate your Favorites and much more. It also includes an Auto-Optimization option, that allows less experienced users to easily optimize certain settings, using a wizard. The interface is easy to use and all available options are categorized into sections. Includes basic documentation and an annoying nag screen that pops up every few minutes. It's compatible with Windows XP SP3 entirely!
  • Changes in WinXP Manager 6.0.0, 11/17/2008:-
  • IE Manager updated to v4.7-
  • Junk File Cleaner updated to v5.6-
  • Registry Cleaner updated to v9.5-
  • Duplicate Files Finder updated to v2.1-
  • Smart Uninstaller updated to v3.9.Download :
WinXP Manager 6.0.0

Keep in mind the Following Points before performing Disk Defragmenter

Perform Analyze before defragmenting a volume
  • Analyze volumes before defragmenting them.
  • It tells you the percentage of fragmented files and folders on the volume
  • Recommends whether to defragment the volume or not .

Analyze after adding large numbers of files

It is best practice to analyze Volumes because it becomes excessively fragmented when users add a large number of files or folders.

Ensure the volume has at least 15% free space

  • To perform defragmention in complete and adequate manner a volume must have at least 15% free space .
  • Uses this space as a sorting area for file fragments.
  • If a volume has less than 15% free space, Disk Defragmenter will only partially defragment it.

Defragment during low-usage periods

  • Defragment file server volumes during low-volume usage periods to minimize the effect that the defragmentation process has on file server performance.
  • The time that Disk Defragmenter takes to defragment a volume depends on several factors, like
  1. The size of the volume
  2. The number of files on the volume
  3. The number of fragmented files
  4. Available system resources.

After installing software or installing Windows

Defragment volumes after installing software or after performing an upgrade or clean install of Windows.

How To Block Websties Without using any Software

1. Browse C:\WINDOWS\system32\drivers\etc
2. Find the file named "HOSTS"
3. Open it in notepad
4. Under "127.0.0.1 localhost" Add 127.0.0.2
www.sitenameyouwantblocked.com , and that site will no longer be accessable.
5. Done!

Change your Windows XP Boot Screen


This is a very simple trick to do if you have done the same for the logon screen and the start button. There are 2 ways to do this trick that I know about one is doing it manually and the other is using a program called bootxp. I am going to tell you the manual way to do it, but if you want to know the other way just let me know, so I can do an update to the guide. Now once you have downloaded your ntoskrnl.exe file save it a general location so that you will have easy access to it, like my folder.

Once you have ntoskrnl.exe file in an easy access folder, restart your pc into safe mode. Once into safe mode go to the folder where your files are located.
Now that you are there copy the file that you want to change your boot screen too. Once you have copied that file, hit the window key + r or type %windir%\system32 in the run command, so that folder as follows.

Once there paste your new file into the folder and overwrite the existing folder.
Now that you have your new file in the folder restart your pc as you normally would and your new boot screen should appear.

You can download this bootscreen here. ALWAYS BACKUP EVERYTHING YOU EDIT OR DELETE. I'M NOT RESPONSIBLE IF YOU MESS YOUR COMPUTER UP BY DOING THIS HACK OR ANY TYPE OF HACK. DO IT AT YOUR OWN RISK.

Password recovery 2950 switch

Use the power switch in order to turn off the router, and then turn the router back on.
Press Break on the terminal keyboard within 60 seconds of power up in order to put the router into ROMMON.
Type confreg 0×2142 at the rommon
  1. prompt in order to boot from Flash.
  2. Type reset at the rommon
  3. prompt. [This step bypasses the startup configuration where the passwords are stored.]
  4. Press Ctrl−C in order to skip the initial setup procedure. Type enable at the Router> prompt.
  5. You are in enable mode and should see the Router# prompt.
  6. Type configure memory or copy startup− config running− config in order to copy the nonvolatile RAM (NVRAM) into memory.
  7. [Important: Do not type copy running− config startup− config or write. These commands erase your startup configuration. ]
  8. Type configure terminal.
  9. The hostname (config) # prompt appears.
  10. Type enable secret in order to change the enable secret password.
  11. For example: hostname(config) #enable secret cisco
  12. Issue the no shutdown command on every interface that you use.
  13. If you issue a show ip interface brief command, every interface that you want to use should display up up.
  14. Type config− register 0×2102
  15. Press Ctrl−z [to leave the configuration mode.]
  16. Type write memory or copy running− config startup− config in order to commit the changes

List of Mostly used TCP/IP Protocols

Data Link Layer

ARP/RARP Address Resolution Protocol/Reverse Address

DCAP Data Link Switching Client Access Protocol

Network Layer

DHCP Dynamic Host Configuration Protocol

DVMRP Distance Vector Multicast Routing ProtocolICMP/ICMPv6 Internet Control Message Protocol

IGMP Internet Group Management Protocol
IP Internet Protocol version 4
IPv6 Internet Protocol version 6
MARS Multicast Address Resolution Server
PIM Protocol Independent Multicast-Sparse Mode (PIM-SM)
RIP2 Routing Information Protocol
RIPng for IPv6 Routing Information Protocol for IPv6
RSVP Resource ReSerVation setup Protocol
VRRP Virtual Router Redundancy Protocol
Transport Layer

ISTP Internet Signaling Transport Protocol for PacketCable PSTN signaling gatways

Mobile IP Mobile IP Protocol

RUDP Reliable UDP

TALI Transport Adapter Layer Interface

TCP Transmission Control Protocol

UDP User Datagram Protocol

Van Jacobson compressed TCP

XOT X.25 over TCP

Session Layer

BGMP Border Gateway Multicast Protocol

Diameter Provides an Authentication, Authorization and Accounting (AAA) framework

DIS Distributed Interactive Simulation

DNS Domain Name Service

ISAKMP/IKE Internet Security Association and Key Management Protocol and Internet Key Exchange Protocol

iSCSI Small Computer Systems Interface

LDAP Lightweight Directory Access Protocol

MZAP Multicast-Scope Zone Announcement Protocol

NetBIOS/IP NetBIOS/IP for TCP/IP
Environment

Application Layer

COPS Common Open Policy Service

FANP Flow Attribute Notification Protocol

Finger User Information Protocol

FTP File Transfer Protocol

HTTP Hypertext Transfer Protocol

IMAP4 Internet Message Access Protocol rev 4

IMPPpre/IMPPmes Instant Messaging and Presence Protocols

IPDC IP Device Control

IRC ·Internet Relay Chat Protocol

ISAKMP Internet Message Access Protocol version 4rev1

NTP Network Time Protocol

POP3 Post Office Protocol version 3

Radius Remote Authentication Dial In User Service

RLOGIN Remote Login

RTSP Real-time Streaming Protocol

SCTP Stream Control Transmision Protocol

S-HTTP Secure Hypertext Transfer Protocol

SLP Service Location Protocol

SMTP Simple Mail Transfer Protocol

SNMP Simple Network Management Protocol

SOCKS Socket Secure (Server)

TACACS+ Terminal Access Controller Access Control System

TELNET TCP/IP Terminal Emulation Protocol

TFTP Trivial File Transfer Protocol

WCCP Web Cache Coordination Protocol

X-Window X Window

Routing

BGP-4 Border Gateway Protocol

EGP Exterior Gateway Protocol

EIGRP Enhanced Interior Gateway Routing Protocol

HSRP Cisco Hot Standby Router Protocol

IGRP Interior Gateway Routing

NARP NBMA Address Resolution Protocol

NHRP Next Hop Resolution Protocol

OSPF Open Shortest Path First

TRIP Telephony Routing over IP

Tunneling

ATMP Ascend Tunnel Management Protocol

L2F The Layer 2 Forwarding Protocol

L2TP Layer 2 Tunneling Protocol

PPTP Point to Point Tunneling Protocol

Security

AH Authentication Header

ESP Encapsulating Security Payload

TLS Transport Layer Security Protocol

Cisco Cabling

Straight-through cable

A straight-through cable is the same at both ends. A straight-through cable uses pins 1, 2, 3, and 6. The send and receive wires are not crossed. You should use a straight-through cable when connecting dissimilar devices. Examples include connecting PCs to switches or hubs or a router to a switch or a hub.
Crossover cable
A crossover cable is a cable that has the send and receive wires crossed at one of the ends. On a Category 5 cable, the 1 and 3 wires and the 2 and 6 wires are switched on one of the cable’s ends. You should use a crossover cable when connecting similar devices, such as connecting a router to a router, a switch to a switch or hub, a hub to a hub, or a PC to a PC.Important tip — Router (think of it as a PC) to PC via 10BaseT (NIC) uses a “crossover cable”. (contradicts the rule)
Rolled Cable
In a rolled cable, the colored wires at one end of the cable are in the reverse sequence of the colored wires at the other end of the cable.

Cisco IOS Commands

EXEC modes upported in the Cisco IOS are

User EXEC mode (user mode)
Privileged EXEC mode (enable or privileged mode)

User EXEC mode

User EXEC mode is the first mode you enter when you log into the IOS. This mode is limited and is mostly used to view statistics. You cannot change a router’s configuration in this mode. By default, the greater-than sign (>) indicates that you are in user mode.It is also a stepping-stone for logging into more privileged mode Router>
Privileged EXEC mode
In privileged EXEC mode, you can view and change the configuration in a router. To enter privileged mode, enter the enable command while in user mode. The pound symbol (#) indicates that you are in privileged mode. This mode is usually protected with a password. You also see the output of the prompt:
Router>
enablePassword:
Router#
How to go into privileged (enable) mode
If there is a password in user mode please enter it. The prompt will like Router>. Type now
enable or en
After a succesfull login the prompt will have changed to Router# To end Priviliged mode type:
disable

TCP/IP Notes

TCP/IP Model has four layer:
  • Application (Process)
  • Host-to-host (Transport)
  • Internet
  • Network Access (Physical and Data link)

Free Microsoft Malicious Software Removal Tool

The Microsoft Windows Malicious Software Removal Tool checks Windows Vista, Windows XP, Windows 2000, and Windows Server 2003 computers for and helps remove infections by specific, prevalent malicious software—including Blaster, Sasser, and Mydoom. When the detection and removal process is complete, the tool displays a report describing the outcome, including which, if any, malicious software was detected and removed. The tool creates a log file named mrt.log in the %WINDIR%\debug folder

Free Microsoft Security Assessment Tool 4.0

The Microsoft Security Assessment Tool 4.0 is the revised version of the original Microsoft Security Risk Self-Assessment Tool (MSRSAT), released in 2004 and the Microsoft Security Assessment Tool 2.0 released in 2006. Security issues have evolved since 2004 so additional questions and answers were needed to ensure you had a comprehensive toolset to become more aware of the evolving security threat landscape that could impact your organization.

The tool employs a holistic approach to measuring your security posture by covering topics across people, process, and technology. Findings are coupled with prescriptive guidance and recommended mitigation efforts, including links to more information for additional industry guidance. These resources may assist you in keeping you aware of specific tools and methods that can help change the security posture of your IT environment.

There are two assessments that define the Microsoft Security Assessment Tool:
  • Business Risk Profile Assessment
  • Defense in Depth Assessment (UPDATED)

Download Link

Cisco CCNA Certification Information










What is Cisco?

Cisco is a networking solutions company that
comprises over 80% of the Internet backbone. Cisco technology includes the designing and building of networks used in today's business world.

What is Drake State Technical College's
Role in Cisco?



DSTC is currently the only authorized regional training academy in northern Alabama. DSTC offers four semesters of comprehensive training that will enable you to take the CCNA exam

What is CCNA Certification?

The Cisco certified Network Associate (CCNA) credential is the premium certification for professionals who design and develop custom business solutions with Cisco routers and switches.
Cisco Certifications focus on both routing and switching, as well as WAN switching solutions in network design and network support, providing you with flexible options for career development. One may advance to CCIE status by first achieving Associate certification in these tracks.

What are the benefits of Cisco Certification?

To demonstrate to your customers and colleagues that you have attained an unparalleled level of expertise in the network design and support arenas in today's technology industry. CCNAs receive the following benefits:

  • Industry recognition of your knowledge and proficiency with Cisco products and technologies.
  • CCNA logo to enable you to identify your status to colleagues or clients.

  • Affiliation with more than 10,000 CCNAs worldwide.

Who Should Attend Cisco Training?



Network administrators, technicians, and anyone who needs to configure and support multiprotocol networks and get started with basic Cisco IOS software



What are the prerequisites for taking Cisco?

To attend this course you must have a basic knowledge of computer hardware and windows

Does the curriculum teach students things that will be useful for maintaining non-Cisco networks?
u

on-Absolutely. Cisco attempts to be a vendor-neutral curriculum. Cisco equipment is used to practice and reinforce certain concepts. Students gain broad-based knowledge of the operation of networks, the differences between various types of networking products, how to design and troubleshoot networks, and other general topics. Emphasis is placed in a "hands-on" environmentCisco networks?

Where is the CCNA test given?

The CCNA is currently given only at Sylvan Testing Centers. See http://www.cisco.com/

Course Outline

Semester One :

OSI model and industry standards, Network topologies, IP addressing, including subnet masks, Networking component, and Basic network design.

Semester Two :

Introduction to router configuration and routers and routing protocols.

Semester Three

Advanced router configurations, LAN switching theory and VLANs, advanced LAN and LAN switched design, Novell IPX, and Threaded case study.

Semester Four

WAN theory and design, WAN technology, PPP, Frame Relay, and ISDN, Network troubleshooting, National SCANS skills, and Threaded case study.

http://www.cisco.com
for more Cisco information.



Data Link Switch (DLSw) - A look at Cisco's implementation of data link switch

I have spent the last few weeks writing about topics that appear on the

CCIE
qualification (written) exam that I do not
have much exposure to. The last three weeks I wrote about Token Ring and
Source-Route Bridging (SRB). This week I would like to write about how Cisco
handles transporting SNA traffic over the WAN, or their implementation of data
link switch (DLSw).


DLSw was developed in the early 1990s as a method to transport IBM Systems
Network Architecture (SNA) and NetBIOS traffic (RFC 1434, 1993). Version 1 of
DLSw was introduced in 1995 with the release of RFC 1795 (superceding RFC 1434).
SNA operates at the data link layer of the OSI model, or the SNA data link layer
of the SNA architecture (conveniently layer 2 in both models). Traditional
routing protocols operate at the OSI network layer, so DLSw is said to switch
the SNA traffic. DLSw uses the Switch-to-Switch protocol (SSP) to forward
traffic between DLSw endpoints, or peers. To route traffic over WAN links, or
the Internet, DLSw encapsulates the SNA or NetBIOS traffic in IP.


Initializing a DLSw connection involves a three-stage process. First, a peer
connection must be established. DLSw switches (routers in DLSw can be referred
to as switches--this can be confusing) set up a TCP connection. Once the peer
connection is established, the DLSw switches exchange their capabilities.
Typically exchanged are DLSw version number, initial pacing window size (receive
window size), NetBIOS support, list of supported link SAPs (LSAPs), number of
TCP sessions supported. Optionally, MAC address lists and NetBIOS name lists can
be exchanged to limit broadcasts and type of search frames supported can be
passed to limit the amount of discovery traffic. The final stage of DLSw
communication is to establish the connection circuit. Circuit establishment is
dependant on the type of traffic, but involves locating the target (destination)
end station and opening a data link connection between each endpoints and its
DLSw switch.


Cisco's implementation of DLSw is known as DLSw+. DLSw+ adds many enhancements
to DLSw. It is important to note that DLSw+ is fully compliant with RFC 1795;
only new functionality is added. Features added to standard DLSw by DLSw+ are:


- Peer groups and border peers

- Backup peers

- Promiscuous and on-demand peers

- Explorer firewalls and location learning

- NetBIOS dial-on-demand routing feature support

- UDP unicast support

- Load balancing

- Support for LLC1 circuits

- Support for multiple bridge groups

- Support for RIF Passthru

- SNA type of service feature support

- Local acknowledgment for Ethernet-attached devices and media conversion for
SNA PU 2.1 andPU 2.0 devices

- Conversion between LLC2 to SDLC between PU 4 devices

- Local or remote media conversion between LANs and either the SDLC Protocol or
QLLC

It is important to note that both connection peers must support DLSw+ (Cisco
devices only). A DLSw+ device can automatically detect if the remote peer
supports DLSw+ and can change to standards compliance mode if it is not.

DLSw switches can be grouped into peer groups where all the DLSw switches peer
with each other. Each peer group has one or more border peers that communicate
with each other. This eliminates the need for every DLSw switch to peer with
every other DLSw switch on a network and reduce explorer traffic and broadcasts.

DLSw+ allows SNA and NetBIOS traffic to be encapsulated in the standard TCP/IP
frames. DLSw+ will also transport SNA and NetBIOS traffic point-to-point WAN
links using HDLC or Frame Relay.

If you want to learn more about Cisco's implementation of DLSw, the links below
are an excellent start. You should also take the time to become familiar with
IBM's SNA. There is still quite a bit of SNA out there, so the information might
just help you in the real world (and not just on the test).

The DLSw RFC 1795

DLSw
documentation from Cisco


Cisco DLSw+ design guide

Circuit Switching vs. Packet Switching

Some exam study guides would have
you believe there is only one way to send data through a network: packet
switching. Fact is, there’s at least one other way, circuit switching.

While the majority of switched networks today get data across the network

through packet switching, the concept of circuit switching should be no

mystery to the average tech, let alone the tech wannabe. There are at least

two good reasons to learn the difference. First of all, there is plenty of
legacy

hardware out there to support. Second, and perhaps more or at least very

important, it could well turn up on the test. If one question stands between you


and passing, don’t make this the one you miss.


In principle, circuit switching and packet switching both are used in
high-capacity networks. In circuit-switched networks, network resources are
static, set in “copper” if you will, from the sender to receiver before the
start of the transfer, thus creating a “circuit”. The resources remain dedicated
to the circuit during the entire transfer and the entire message follows the
same path. In packet-switched networks, the message is broken into
packets,
each of which can take a different route to the destination where the packets
are recompiled into the original message.


All the above can be handled by a router or a switch but much of IT today is
going toward flat switched networks. So when we’re talking about circuit
switching or packet switching, we are more and more talking about doing it on a
switch.


Switched Networks


First, let’s be sure we understand what we mean by a switched network. A
switched network goes through a switch instead of a router. This actually is the
way most networks are headed, toward flat switches on VLANs instead of routers.
Still, it’s not always easy to tell a router from a switch. It’s commonly
believed that the difference between a switched network and a routed network is
simple binary opposition. T’ain’t so.


A router operates at Layer 3 of the

OSI Model
and can create and connect several logical networks, including
those of different network topologies, such as
Ethernet
and

Token Ring
. A router will provide multiple paths (compared to only one on a
bridge) between segments and will map nodes on a segment and the connecting
paths with a routing protocol and internal routing tables.


Being a Layer 3 device, the router uses the destination IP address to decide
where a frame should go. If the destination IP address is on a segment directly
connected to the router, then the router will forward the frame out the
appropriate port to that segment. If not, the router will search its routing
table for the correct destination, again, using that IP address.


Having talked about a router as being a Layer 3 device, think about what I’m
about to say next as a general statement. I know there are exceptions, namely
the Layer 3 switch. We’re not going to get into that, not in this article.


A switch is very like a bridge in that is usually a layer 2 device that looks
to MAC addresses to determine where data should be directed. A switch has other
applications in common with a bridge. Like a bridge, a switch will use
transparent and source-route methods to move data and Spanning Tree Protocol (STP)
to avoid loops. However, switches are superior to bridges because they provide
greater port density and they can be configured to make more intelligent
decisions about where data goes.


The three most common switch methods are:


1. Cut-through - Streams data so that the first part of a packet exits
the switch before the rest of the packet has finished entering the switch,
typically within the first 12 bytes of an Ethernet frame.


2. Store-and-Forward - The entire frame is copied into the switch's
memory buffer and it stays there while the switch processes the Cyclical
Redundancy Check (CRC) to look for errors in the frame. If the frame contains no
errors, it will be forwarded. If a frame contains an error, it will be dropped.
Obviously, this method has higher latency than cut-through but there will be no
fragments or bad frames taking up bandwidth.


3. Fragment-free Switching - Think of this as a hybrid of cut-through
and store-and-forward. The switch reads only the first 64 bytes of the frame
into buffer before forwarding it (think of a truck...

Anatomy of a Router

I am of the opinion that all routers are female. Must be. Look
at the relatively high male to female tech ratio in IT. Gotta be the routers.
Obviously, I could be wrong, but a router's anatomy is interesting all the same.
Let's take a closer look.


The first thing you should know about a router is she has a lot in common
with the PC on your desk. Sure, it's got some neat toys but a router (Cisco
or otherwise) is nothing more than a very specialized network computer. Just
looking at the two, especially side by side, and they look very different.

Looks CAN be deceiving. OK, they don't have the same external
components but, on the functional level, routers and computers are very
similar. In fact, a server can be set up to act as a router. This goes back
to the early days of networking, when ordinary computers performed all
routing. The computers were, and still can be, equipped with at least two

NIC
s, each going out to a different segment. A routing program would
have to be loaded onto the computer and this program would operate alongside
all its other applications. Click

here
for routing setup in Windows NT and

here
for routing setup in Window 2000.

Another point of similarity between routers and computers are their boot
sequences.


Let's look at them:

Computer Boot Sequence

1) POST

2) System initialization, CMOS and BIOS check.

3) Load the Disk Operating System

4) Load configurations (config.sys)

5) Run programs at startup (autoexec.bat)

6) Load Windows

Router Boot Sequence


1) The router performs the POST.

2) The bootstrap searches for and loads the Cisco IOS software.

3) The IOS software looks in NVRAM for a valid configuration file.

4) If there is a valid configuration file in NVRAM, then this file will be
loaded and executed.

Not exactly the same but the similarities are there. Like a PC, a router has
unique hardware and an operating system. Both PC and router have a
CPU,
memory, and
input/output ports
. Like a PC, a router boots by loading its OS into
memory, and reading a configuration file. Of course, the differences are
rather glaring. A router has no keyboard, mouse or monitor and must be
accessed via terminal or a PC acting as a terminal..

I don't want you to get bogged down in router compared to PC, except to
realize that they are similar and that a router is just a very specialized
network computer. Having said that, and just BTW, here are two excellent
articles on the computer boot sequence:


http://www.mossywell.com/boot-sequence/

http://www.qvctc.commnet.edu/pcguide/boot.html

Prepare for Cisco CCNA certification exam With SemSim, the smart choice!

SemSim is internationally acclaimed Cisco CCNA exam router simulation
software that helps aspiring candidates prepare for the

Cisco Certified Network Associate
certification exam. Not only does it
provide an understanding of networking concepts – through router simulation
based virtual labs and practice tests, but also recreates an environment for
real-life network configuration practice. It opens new vistas in personal
flexibility and time management. SemSim provides you with a classroom
quality-learning environment at an affordable price. Start a successful career
as a Cisco certified network professional with SemSim now ! We even offer an
online free CCNA Study
center to provide some helpful articles on basic exam information.

Internet Explorer 8 beta

Microsoft Internet Explorer 8 Features:

Accelerators

In Private Browsing

Web Slices

Search suggestions

SmartScreen Filter

Automatic crash recovery

Browse privately


Accelerators:

Efficient browsing like


Mapping directions

Translating words

Emailing

Search

Word definitions

Blogging


InPrivate Browsing:

It helps the browser to prevent the


browsing history

temporary Internet files

form data

cookies,

and user names and passwords


from being retained by the browser, leaving no
evidence of your browsing or search history.

To start open a new tab and selecting Start