Cisco CCNA 200-301 – ACLs – Access Control Lists Part 2

ACL Syntax In this lecture, you’ll learn about the syntax of our Access Control List commands and the meanings of the different options. So we go to Global Config to create an access list. Here we’ve said Access list 100. So as you learned in the last lecture, you know that this is going to be an extended ACL. Then if we use the context sensitive help up. So I’ve put in a question mark after that to see what my options are. I can deny or I can permit….

Cisco CCNA 200-301 – ACLs – Access Control Lists

Introduction Section you’ll learn about ACLs access control lists. What an ACL does is it identifies traffic that’s going through the router, and the router can then take an action based on that. The kind of things that it will look at to identify the traffic is source and destination, IP addresses or port numbers. And what ACLs have traditionally been used for is for securing traffic going through the router. For example, let’s say that we have got the sales IP subnet 10100 and they’re in VLAN ten, and…

Cisco CCNA 200-301 – Switch Security Part 3

Preventing Unauthorised Devices with Port Security Lab Demo In this lecture you’ll learn about how to configure port security to prevent unauthorized devices like switches and wireless access points on your network. And we’ll use our lab demo to show this. So I’ve got packet tracer open here. I’ve got switch one with a couple of PCs plugged in, PC One and PC Two, they’ve got IP addresses, ten 1010 and 1010. 1011, they’re on ports fast, zero one and zero two. Ignore PC three for now. That’s the villain….

Cisco CCNA 200-301 – Switch Security Part 2

802.1X Identity Based Networking In this lecture, you’ll learn about 802 one x identity based networking. When 802 one x is enabled, only authentication traffic is allowed on switch ports until the host and user are authenticated. Authentication traffic is sending a username and password. When the user has entered a valid username and password, the switch port transitions to a normal axis port in the relevant VLAN. So it’s easier to explain this with a picture. So you see the diagram here. This gives us the terminology as well….

Cisco CCNA 200-301 – Switch Security

Introduction You’ll learn about the access layer. Switch security mechanisms. That DHCP Snooping Dai, which is dynamic. ARP inspection eight one X. Identity based networking and port security. For the CCNA exam, cisco expect you to have detailed knowledge of port security, what it does, how it works and how to configure it. But for the other three mechanisms, you just need to have an understanding of what they are, why we have them and how they work. You don’t actually need to know how to configure and troubleshoot them…

Cisco CCNA 200-301 – EtherChannel Part 3

StackWise, VSS and vPC This lecture you’ll learn about Cisco’s multishass Ether Channel options of stack wise VPC and VSS. Matching Ether Channel settings have to be configured on the switches on both sides of the link. You know that already. You can configure separate port channels from a switch to redundant upstream switches like you see in the diagram here. I’ve got my access layer, access Three switch and it has got a port channel with bundled links going up to CD One. And it’s got another separate port…

Cisco CCNA 200-301 – EtherChannel Part 2

EtherChannel Protocols and Configuration In this lecture, you’ll learn about the different Ether Channel protocols and how to configure and verify them. So there’s three available protocols that’s LACP and PAGP and Static. So first one is LACP, the link aggregation control protocol. This is an open standard, so it’s supported on all vendors switches. With LACP, the switches on both sides negotiate the port channel creation and maintenance. And of the three available methods, this is the preferred one to use. Next one we have is PAGP, which is…

Cisco CCNA 200-301 – EtherChannel

Introduction You’ll learn about Ether Channel, which can be used to bundle multiple physical interfaces into a single logical interface. I’ll cover why we need Ether Channel, and spoiler alert, it’s because of spanning tree. I’ll also cover how the Ether Channel load balancing and redundancy works. You’ll learn what all the different protocols are that are available for Ether Channel, how to configure and how to verify them. And then, finally, we’ll talk about another problem where if your switch is uplinking to two different switches for redundancy, even…

Cisco CCIE Security 350-701 – VPN foundations

Virutal Private Network – Introduction The next thing we’ll talk about VPN Overview VPN Introduction now if you talk about before we go ahead we need to understand the traditional router networks like these lines. So these are not really used in today’s networks. Lease lines are like dedicated lines which are connecting between the two sides. So if you have a site A you have a dedicated line to site B, side C and side D. So if you want to have one more line you can also have…

Cisco CCIE Security 350-701 – Site to Site IPSEC VPN Part 2

Step-3 – IKE Phase 2 Now the next step is phase two. The phase two the actual IPC is applied or the actual your traffic is secured. In the phase two we can say. Now in order to do that, it has to decide which protocol will be used for securing your data. Like there are two major protocols supported in the phase two. Like I phase two protocols we can say and these two protocols are responsible for encapsulating your packet with some encapsulating a packet, adding some Ipsic…

img