...2KFQnbNIdI.2KYOU encrypted names ! interface Ethernet0/0 switchport access vlan 2 ! interface Ethernet0/1 ! interface Ethernet0/2 ! interface Ethernet0/3 ! interface Ethernet0/4 ! interface Ethernet0/5 ! interface Ethernet0/6 ! interface Ethernet0/7 ! interface Vlan1 nameif inside security-level 100 ip address 192.168.100.1 255.255.255.224 ! interface Vlan2 nameif outside security-level 0 ip address dhcp setroute ! boot system disk0:/asa844-1-k8.bin ftp mode passive dns server-group DefaultDNS domain-name default.domain.invalid object network obj_any-01 subnet 0.0.0.0 0.0.0.0 object-group network obj_any pager lines 24 logging asdm informational mtu inside 1500 mtu outside 1500 icmp unreachable rate-limit 1 burst-size 1 asdm image disk0:/asdm-711.bin no asdm history enable arp timeout 14400 ! object network obj_any-01 nat (inside,outside) dynamic interface timeout xlate 3:00:00 timeout pat-xlate 0:00:30 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 timeout floating-conn 0:00:00 dynamic-access-policy-record DfltAccessPolicy user-identity default-domain LOCAL aaa authentication ssh console LOCAL http server enable http 192.168.100.0 255.255...
Words: 1220 - Pages: 5
...Cisco AnyConnect Secure Mobility Client Administrator Guide, Release 3.1 Document Revised: Document Published: November 25, 2013 August 9, 2012 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. Text Part Number: THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED...
Words: 126829 - Pages: 508
...Table of Contents Chapter 1 Evaluating the Cisco ASA VPN Subsystem .......................................3 Chapter 2 Deploying Cisco ASA IPsec VPN Solutions ............................. 42 Chapter 3 Deploying Cisco ASA AnyConnect Remote-Access SSL VPN Solutions..............................109 Chapter 4 Deploying Clientless RemoteAccess SSL VPN Solutions ................148 Chapter 5 Deploying Advanced Cisco ASA VPN Solutions .............................184 CCNP Security VPN 642-648 Quick Reference Cristian Matei ciscopress.com [2] CCNP Security VPN 642-648 Quick Reference About the Author Cristian Matei, CCIE No. 23684, is a senior security consultant for Datanet Systems, Cisco Gold Partner in Romania. He has designed, implemented, and maintained multiple large enterprise networks, covering the Cisco security, routing, switching, service provider, and wireless portfolios of products. Cristian started this journey back in 2005 with Microsoft technology and finished the MCSE Security and MCSE Messaging tracks. He then joined Datanet Systems, where he quickly obtained his Security and Routing & Switching CCIE, among other certifications and specializations, such as CCNP, CCSP, and CCDP. Cristian has been a Cisco Certified Systems Instructor (CCSI) since 2007, teaching CCNA, CCNP, and CCSP curriculum courses. In 2009, he received a Cisco Trusted Technical Advisor (TTA) award and became certified as a Cisco IronPort Certified Security Professional (CICSP) on E-mail...
Words: 52748 - Pages: 211
...the login.inc to be the File for Full Customization Test the Full Customization CLI Support Backup the Customizations Conclusion Troubleshoot Related Information Introduction Cisco Adaptive Security Appliance (ASA) 5500 series software version 8.0 introduces advanced customization features which enable the development of attractive web portals for clientless users. This document details the many options available to customize the login page, or welcome screen, and the web−portal page. Prerequisites Requirements Cisco recommends that you have knowledge of how to use the Cisco Adaptive Security Device Manager (ASDM) in order to configure group−policies and connection profiles on ASA. Refer to these documents for general information: • The Configuring Clientless SSL VPN section of Cisco Security Appliance Command Line Configuration Guide, Version 8.0 • ASDM 6.0 User Guide Prior to setting up a customized web−portal, you must complete some basic ASA configuration steps. See the Configuration Requirements section of this document for more information. Components Used The information in this document is based on these software and...
Words: 3116 - Pages: 13
...After completing ASDM assignment, the Multi-attribute value analysis approach (MAVA) is useful for many aspects of analysis. It is a scientific way to consider all aspects and criteria when a decision is going to be made. It prevents unnecessary emotional judgment and personal preferences and lets the data to tell. The first part of the assignment, it is mostly about data cleansing and analysis. The second part is about making decision. The decision value tree can help to list the criteria and weight them in different scores and weights. When there are many options available, V.I.S.A becomes really useful tool to analyze a very complicated case. Application on the work I am working in securities trading company. I think the MAVA approach can apply to our client risk analysis. When a new client comes to buy an investment product, we have to determine how much risk he/she could bear. The “Due diligence” includes the risk matching process. We could interview the client and ask him/her several questions. The questions are going to determine the weighting of each criterion (investment purpose). Finally, the result could show whether the client is risk adverse or not. It is very important for us to do the risk due diligence. If the client could bear high risk, then he can buy high risk investment products, such as derivatives, structural investment. If he is risk-adverse type, then he can only buy blue-chip stocks. Problems of the decision value tree During the weighting...
Words: 371 - Pages: 2
...Comparative Study on Agile software development methodologies A B M Moniruzzaman abm.mzkhan@gmail.com Dr Syed Akhter Hossain aktarhossain@daffodilvarsity.edu.bd Abstract Today‘s business environment is very much dynamic, and organisations are constantly changing their software requirements to adjust with new environment. They also demand for fast delivery of software products as well as for accepting changing requirements. In this aspect, traditional plan-driven developments fail to meet up these requirements. Though traditional software development methodologies, such as life cycle-based structured and object oriented approaches, continue to dominate the systems development few decades and much research has done in traditional methodologies, Agile software development brings its own set of novel challenges that must be addressed to satisfy the customer through early and continuous delivery of the valuable software. It‘s a set of software development methods based on iterative and incremental development process, where requirements and development evolve through collaboration between self-organizing, cross-functional teams that allows rapid delivery of high quality software to meet customer needs and also accommodate changes in the requirements. In this paper, we significantly indentify and describe the major factors, that Agile development approach improves software development process to meet the rapid changing business environments. We also provide a brief comparison of...
Words: 7127 - Pages: 29
...(A) DHCP and DNS information to suggest some controllers (B) Prior knowledge of WLCs (C) Broadcast on the local subnet to solicit controllers (D) Via a TFTP server on the local Network (E) Correct Answer(s) D Explanation The TFTP server on the local network is not a valid method for an AP to discover a WLC. TFTP servers are only used for file transfer; they cannot be used for WLC discovery. 4.5 Sub-Objective Name Operating a Wireless Network Objective Tested Identify wireless network and client management and configuration platform options Bloom Level 1 Question Stem Which Cisco infrastructure management system has the ability to offer Wireless Intrusion Protection System (wIPS)? Options (A) Cisco WLC (B) Cisco ASDM (C) CISCO ISE (D) Cisco Prime (E) Correct Answer(s) D Explanation The Cisco infrastructure management system that offers Wireless Intrusion Protection System is the Cisco Prime Infrastructure. The wIPS can recognize a rich set of hundreds of signatures, implementing customizable policies to blacklist clients or rogue devices and block SSIDs. 5.1 Sub-Objective Name Configuration of Client Connectivity Objective Tested Identify authentication mechanisms Bloom Level 1 Question Stem Which authentication method was developed by Cisco to address the limitation in WEP? Options (A) EAP-FAST (B) LEAP (C) PEAP (D) EAP-TLS (E) Correct Answer(s) Explanation The authentication method that was developed by Cisco to address...
Words: 1046 - Pages: 5
...Capstone Project Cover Sheet Capstone Project Title: ABC Inc. Firewall upgrade Report Student Name: Michael Wakefield Degree Program: BS- IT Security Mentor Name: Dave Huff Signature Block Student’s Signature Mentor’s Signature Table of Contents Capstone Summary 3 Review of Other Work 13 Rationale and Systems Analysis 19 Goals and Objectives 25 Project Deliverables 28 Project Plan and Timelines 30 Project Development…………………………………………………………………………………………………………………………….31 Additional Deliverables………………………………………………………………………………………………………………………….35 Conclusion…………………………………………………………………………………………………………………………………………….35 References 37 Appendix 1: Competency Matrix 38 Appendix 2: Cisco ASA 5555-X Firewall Specifications…………………………………………………………….40 Appendix 3: ABC Inc. Project Schedule…………………………………………………………………………………….44 Appendix 4: High-Availability Design Screenshots……………………………………………………………………45 Appendix 5: Screenshots of inside to outside access; outside to DMZ access; NAT rules and configurations; and performance graphs and performance results….........................................51 Capstone Report Summary Internet of Everything (IoE) and “Big Data” equates to competitive advantages to the modern business landscape. Numerous white papers are circulating on the Internet highlighting the business case supporting the IoE initiative. For instance, in a white paper conducted by Cisco Inc. on the Value Index of IoE in 2013 reported the following: ...
Words: 9337 - Pages: 38
...Table of Contents INTRODUCTION 2 DESIGNING AND IMPLEMENTING AN AUTOMATIC IP-ADDRESSING MECHANISM 3 AUTOMATIC IP-ADDRESSING SCHEME FOR THE UWS NETWORK 3 INSTALLING AND AUTHORIZING A DHCP SERVER 4 CREATING AND CONFIGURATION OF DHCP SCOPES 8 CREATING AND TESTING DHCP CLIENT RESERVATIONS 10 IMPLEMENTING DHCP RELAY AGENTS 12 DOMAIN NAMING STRATEGY 16 DOMAIN NAME SERVICE INSTALLATION 17 DOMAIN NAME SERVICE LOOK UP ZONES 18 ZONE AUTHORITY DELEGATION 23 DNS DYNAMIC UPDATES 25 DNS RESOURCE RECORDS 25 NETBIOS NAME RESOLUTION 27 INSTALLATION OF WINS 27 STATIC WINS RECORD 28 CONFIGURING REPLICATION PARTNERS 30 ALTERNATIVE IP ADDRESSING STRATEGY 31 ALTERNATE NAME RESOLUTION TECHNIQUES 32 NETWORK PLAN FOR THE UWS GLASGOW SITE 32 NETWORK PLAN FOR THE UWS CLYDE SITE 33 NETWORK PLAN FOR THE UWS HEAD OFFICE SITE 33 OVERVIEW OF THE UWS NETWORK INFRASTRUCTURE AS A WHOLE 34 TROUBLESHOOTING STRATEGY FOR UWS NETWORK 34 BACK UP AND FAULT TOLERANCE STRATEGY FOR NETWORK SERVICES 38 NETWORK HEALTH MONITORING AND ANALYSES 38 CONNECTIVITY SOLUTIONS FOR MULTI-VENDOR -ENVIRONMENT 40 REMOTE CONNECTIVITY TO UWS NETWORK USING VPN 41 CONFIGURING INBOUND VPN CONNECTION 41 CONFIGURING REMOTE ACCESS POLICIES 45 CONFIGURING OUTBOUND VPN CONNECTION 48 NETWORK COUNTERACTIVE APPROACHES WITH REGARDS TO SECURITY THREATS 50 IMPLEMENTATION OF CERTIFICATE SERVICES 51 IPSEC IMPLEMENTATION 56 References 62 INTRODUCTION This is a case study about a company...
Words: 5792 - Pages: 24
...Technical Writing Project Cover Sheet Capstone Proposal Project Name: Upgrading ABC Inc. Internet Edge Student Name: Michael Wakefield Degree Program: Bachelor of Science IT-Security Mentor Name: Signature Block Student’s Signature Mentor’s Signature Table of Contents Capstone Proposal Summary 1 Review of Other Work 8 Rationale and Systems Analysis 16 Goals and Objectives 22 Project Deliverables 26 Project Plan and Timelines 27 References 28 Appendix 1: Competency Matrix 4 Capstone Proposal Summary Internet of Everything (IoE) and “Big Data” equates to competitive advantages to the modern business landscape. Numerous white papers are circulating on the Internet highlighting the business case supporting the IoE initiative. For instance, in a white paper conducted by Cisco Inc. on the Value Index of IoE in 2013 reported the following: In February 2013, Cisco released a study predicting that $14.4 trillion of value (net profit) will be at stake globally over the next decade, driven by connecting the unconnected –people-to-people (P2P), machine-to-people (M2P), and machine-to-machine (M2M) - via the Internet of Everything (IoE). Cisco defines the Internet of Everything as the networked connection of people, process, data, and things. The IoE creates new “capabilities, richer experiences, and unprecedented economic opportunity for businesses, individuals, and countries” (The Internet of Everything, Cisco, Inc. 2014). With such a...
Words: 5523 - Pages: 23
...Manajemen Investasi Sektor-Sektor Pasar Modal Indonesia Oleh: Yosefina Selvy Arief(2012-012-093) SEKTOR-SEKTOR PASAR MODAL INDONESIA Semua perusahaan publik yang tercatat di Bursa Efek Indonesia atau BEI (dulu BEJ= Bursa Efek Jakarta) diklasifikasikan ke dalam 9 sektor BEI yang didasarkan pada klasifikasi industri yang ditetapkan oleh NEJ yang disebut JASICA (Jakarta Stock Exchange Industrial Classification). Kesembilan sektor tersebut adalah: A. Sektor Utama (Industri Penghasil Bahan Baku) 1. Sektor Pertanian 2.1. Sub sektor Tanaman Pangan Daftar perusahaan industri penghasil bahan baku, sektor pertanian, sub sektor tanaman pangan yang terdaftar di Bursa Efek Indonesia (BEI) adalah No | Kode | Nama | Tanggal | | Saham | Emiten | IPO | 1 | BISI | Bisi International Tbk | 28-Mei-2007 | (Diperbaharui 2 Oktober 2013) Catatan penting lainnya untuk sub sektor tanaman pangan : * 12 September 2013| CKRA (PT. Citra Kebun Raya Agri Tbk) pindah dari sektor tanaman pangan (kode sektor 1.1) ke sektor pertambangan logam dan mineral lainnya (kode sektor 2.3) 2.2. Sub sektor Perkebunan Daftar perusahaan industri penghasil bahan baku, sektor pertanian, sub sektor perkebunan yang terdaftar di Bursa Efek Indonesia (BEI) adalah No | Kode | Nama | Tanggal | | Saham | Emiten | IPO | 1 | AALI | PT. Astro Agro Lestari Tbk | 09-Des-1997 | 2 | ANJT | PT. Austindo Nusantara Jaya Tbk | 10-Mei-2013 | 3 | BWPT | PT. BW Plantation...
Words: 8376 - Pages: 34
...|Application Testing Checklist | |Tested By |Mark Tester |Date |8/11/12 | |Application Name |2008 SQL Management Studio | |Procedure |Expected Result Achieved |Pass/Fail |Actual Results/Comments | | | |(P/F) | | |Application Functionality | |Performs primary functionality and |Yes |P |Updating and maintaining databases with access | |maintains stability | | |to run commands as needed. | |Windows Fundamentals | |Installs under a user account |No |P |Does not install under student user account | |Installs under a power user account|Yes |P |Installs correctly | ...
Words: 17249 - Pages: 69
...WeMakeConnections TTI Multi Campus Network Executive Summary: WeMakeConnections is an up-and-coming networking and infrastructure company; we offer network solutions that are customized to each client, and their specific financial and technical needs. We provide a le82vel of service you would expect from a close friend, not a company. We service all network sizes, large and small, and have worked extensively with existing network upgrades, as well as total network creation. WeMakeConnections offers personalized services to match any budget. In this day and age competition is fierce, and money is tight. That is why we only hire people who love networking; they know what works, what doesn't, and where we can cut waste. That is why WeMakeConnections is the only company that offers a complimentary follow up, one month after your network is complete. We want to make sure you love your network. Each of our eight core employee's graduated from the prestigious ITT Tech, San Diego. Each has a passion for networking, and genuine love for problem solving. From the cabling in the walls to workstations on the desks, a trained professional will be on the job. Based on the request for proposal from TTI, we have created what may be, our masterpiece work. The following pages detail our plan of action for TTI's success, and subsequent expansions. We are confident that our network provides the best return on investment for TTI's four additional campuses, and will be easily scaled to...
Words: 18593 - Pages: 75
...MBA UK Course Handbook the Strathclyde 2014/15 The Strathclyde MBA 1 The University of Strathclyde's mission dates from our founder, Professor John Anderson, leaving instructions in his will for 'a place of useful learning' to be established in the city. By this he meant an institution open to everyone, regardless of gender, status or income. “ The Place of Useful Learning John Anderson 1796 ” We continue to be committed to 'useful learning' through our provision of relevant, high quality, educational opportunities, the global application of our research and our focus on knowledge exchange, all of which aim to benefit the wider economy and society. Our commitment to 'useful learning' is about: • • Offering a wide range of education opportunities in a flexible, innovative learning environment. Developing students who have the aptitudes and capacities to make significant contributions to their communities after graduation as employees, employers and citizens. Connecting research through knowledge exchange to make an impact on modern society. • 2 Contents Welcome ................................................................................................................. 5 The University of Strathclyde .................................................................................. 6 Strathclyde Business School ................................................................................... 6 About the Handbook and MyPlace ........
Words: 30889 - Pages: 124
...IDX STATISTICS 2012 The IDX Statistics Book includes comparative statistics on all aspects of trading and listing for January - December 2012 For more information please contact the Corporate Secretary at: Gedung Bursa Efek Indonesia (Indonesia Stock Exchange Building) Tower 1 Jln. Jend. Sudirman Kav. 52 - 53 Jakarta 12190 Indonesia Phone: (62-21) 515-0515 ext. 4302, 4320, 4322 Fax (62-21) 515-0330, 515-0118 Compiled by Research Division © 2012 Indonesia Stock Exchange. All rights reserved The facts and opinions stated or expressed in this publication are for information purposes only and are not necessarily and must not be relied upon as being those of the publisher or of the institutions for which the contributing authors work. Although every care has been taken to ensure the accuracy of the information contained within the publication, it should not be by any person relied upon as the basis for taking any action or making any decision. The Indonesia Stock Exchange cannot be held liable or otherwise responsible in anyway for any advice, action taken or decision made on the basis of the facts and opinions stated or expressed within this publication. Table of Contents IDX STATISTICAL HIGHLIGHTS ............................................................................................................................... 1 STOCK PRICE INDICES Composite Stock Price Index - Highlights ..........................................................
Words: 115498 - Pages: 462