Free Essay

Using Ios Cli with Switch Mac Address Tables

In:

Submitted By techgirl
Words 1819
Pages 8
L - Us Lab sing IOS CLI wit Switch MAC A S th Address Tables s s
T Topology

A Addressing Table g
Device R1 S1 S2 2 PC C-A PC C-B Interface G0/1 G VLAN 1 V VLAN 1 V NIC N NIC N IP Ad ddress 192.168 8.1.1 192.168 8.1.11 192.168 8.1.12 192.168 8.1.3 192.168 8.1.2 Subnet Mas sk 25 55.255.255.0 0 25 55.255.255.0 0 25 55.255.255.0 0 25 55.255.255.0 0 25 55.255.255.0 0 Default Gateway N/A 192.168.1.1 192.168.1.1 192.168.1.1 192.168.1.1

O Objectives
Part 1: Bu and Con uild nfigure the Network   Cable the network according to the topology diagram. e Config gure the netw work devices according to the Addressin Table. a t ng

Part 2: Ex xamine the Switch MAC Address Tab S A ble  the Use show commands to observ the proces of building t switch MA address ta s ve ss AC able.

B Backgroun / Scenar nd rio
The purpo of a Layer 2 LAN switc is to deliver Ethernet fra ose ch ames to host d devices on th local netwo The he ork. switch rec cords host MA addresses that are visible on the ne twork, and m AC s maps those MA addresses to its AC s own Ethernet switch po orts. This proc cess is called building the MAC address table. When a switch rec d n ceives a m amines the fra ame’s source and destinat tion MAC add dresses. The s source MAC address frame from a PC, it exa

© 2013 Cisco and its affiliates. All rights reserve This docume is Cisco Publiic. d/or ed. ent

Page 1 of 5

Lab - Using IOS CLI with Switch MAC Address Tables is recorded and mapped to the switch port from which it arrived. Then the destination MAC address is looked up in the MAC address table. If the destination MAC address is a known address, then the frame is forwarded out of the corresponding switch port of the MAC address. If the MAC address is unknown, then the frame is broadcast out of all switch ports, except the one from which it came. It is important to observe and understand the function of a switch and how it delivers data on the network. The way a switch operates has implications for network administrators whose job it is to ensure secure and consistent network communication. Switches are used to interconnect and deliver information to computers on local area networks. Switches deliver Ethernet frames to host devices identified by network interface card MAC addresses. In Part 1, you will build a multi-switch and router topology with a trunk linking the two switches. In Part 2, you will ping various devices and observe how the two switches build their MAC address tables. Note: The routers used with CCNA hands-on labs are Cisco 1941 Integrated Services Routers (ISRs) with Cisco IOS Release 15.2(4)M3 (universalk9 image). The switches used are Cisco Catalyst 2960s with Cisco IOS Release 15.0(2) (lanbasek9 image). Other routers, switches and Cisco IOS versions can be used. Depending on the model and Cisco IOS version, the commands available and output produced might vary from what is shown in the labs. Refer to the Router Interface Summary Table at the end of this lab for the correct interface identifiers. Note: Make sure that the routers and switches have been erased and have no startup configurations. If you are unsure contact your instructor.

Required Resources
     1 Router (Cisco 1941 with Cisco IOS Release 15.2(4)M3 universal image or comparable) 2 Switches (Cisco 2960 with Cisco IOS Release 15.0(2) lanbasek9 image or comparable) 2 PCs (Windows 7, Vista, or XP with terminal emulation program, such as Tera Term) Console cables to configure the Cisco IOS devices via the console ports Ethernet cables as shown in the topology

Note: The Fast Ethernet interfaces on Cisco 2960 switches are autosensing and an Ethernet straight-through cable may be used between switches S1 and S2. If using another model Cisco switch, it may be necessary to use an Ethernet crossover cable.

Part 1: Build and Configure the Network
Step 1: Cable the network according to the topology. Step 2: Configure PC hosts. Step 3: Initialize and reload the routers and switches as necessary. Step 4: Configure basic settings for each switch.
a. Configure device name as shown in the topology. b. Configure IP address and default gateway as listed in Addressing Table. c. Assign cisco as the console and vty passwords.

d. Assign class as the privileged EXEC password.

© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.

Page 2 of 5

Lab - Using IOS CLI with Switch MAC Address Tables

Step 5: Configure basic settings for the router.
a. Disable DNS lookup. b. Configure IP address for the router as listed in Addressing Table. c. Configure device name as shown in the topology.

d. Assign cisco as the console and vty passwords. e. Assign class as the privileged EXEC password.

Part 2: Examine the Switch MAC Address Table
A switch learns MAC addresses and builds the MAC address table, as network devices initiate communication on the network.

Step 1: Record network device MAC addresses.
a. Open a command prompt on PC-A and PC-B and type ipconfig /all. What are the Ethernet adapter physical addresses? PC-A MAC Address: PC-B MAC Address: b. Console into router R1 and type the show interface G0/1 command. What is the hardware address? R1 Gigabit Ethernet 0/1 MAC Address: c. Console into switch S1 and S2 and type the show interface F0/1 command on each switch. On the second line of command output, what is the hardware addresses (or burned-in address [bia])? S1 Fast Ethernet 0/1 MAC Address: S2 Fast Ethernet 0/1 MAC Address:

Step 2: Display the switch MAC address table.
Console into switch S2 and view the MAC address table, both before and after running network communication tests with ping. a. Establish a console connection to S2 and enter privileged EXEC mode. b. In privileged EXEC mode, type the show mac address-table command and press Enter. S2# show mac address-table Even though there has been no network communication initiated across the network (i.e., no use of ping), it is possible that the switch has learned MAC addresses from its connection to the PC and the other switch. Are there any MAC addresses recorded in the MAC address table?

What MAC addresses are recorded in the table? To which switch ports are they mapped and to which devices do they belong? Ignore MAC addresses that are mapped to the CPU.

© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.

Page 3 of 5

Lab - Using IOS CLI with Switch MAC Address Tables If you had not previously recorded MAC addresses of network devices in Step 1, how could you tell which devices the MAC addresses belong to, using only the output from the show mac address-table command? Does it work in all scenarios?

Step 3: Clear the S2 MAC address table and display the MAC address table again.
a. In privileged EXEC mode, type the clear mac address-table dynamic command and press Enter. S2# clear mac address-table dynamic b. Quickly type the show mac address-table command again. Does the MAC address table have any addresses in it for VLAN 1? Are there other MAC addresses listed?

Wait 10 seconds, type the show mac address-table command, and press Enter. Are there new addresses in the MAC address table?

Step 4: From PC-B, ping the devices on the network and observe the switch MAC address table.
a. From PC-B, open a command prompt and type arp -a. Not including multicast or broadcast addresses, how many device IP-to-MAC address pairs have been learned by ARP?

b. From the PC-B command prompt, ping the router/gateway R1, PC-A, S1, and S2. Did all devices have successful replies? If not, check your cabling and IP configurations.

c.

From a console connection to S2, enter the show mac address-table command. Has the switch added additional MAC addresses to the MAC address table? If so, which addresses and devices?

From PC-B, open a command prompt and retype arp -a. Does the PC-B ARP cache have additional entries for all network devices that were sent pings?

Reflection
On Ethernet networks, data is delivered to devices by their MAC addresses. For this to happen, switches and PCs dynamically build ARP caches and MAC address tables. With only a few computers on the network this process seems fairly easy. What might be some of the challenges on larger networks?

© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.

Page 4 of 5

Lab - Using IOS CLI with Switch MAC Address Tables

Router Interface Summary Table
Router Interface Summary Router Model 1800 1900 2801 2811 2900 Ethernet Interface #1 Fast Ethernet 0/0 (F0/0) Gigabit Ethernet 0/0 (G0/0) Fast Ethernet 0/0 (F0/0) Fast Ethernet 0/0 (F0/0) Gigabit Ethernet 0/0 (G0/0) Ethernet Interface #2 Fast Ethernet 0/1 (F0/1) Gigabit Ethernet 0/1 (G0/1) Fast Ethernet 0/1 (F0/1) Fast Ethernet 0/1 (F0/1) Gigabit Ethernet 0/1 (G0/1) Serial Interface #1 Serial 0/0/0 (S0/0/0) Serial 0/0/0 (S0/0/0) Serial 0/1/0 (S0/1/0) Serial 0/0/0 (S0/0/0) Serial 0/0/0 (S0/0/0) Serial Interface #2 Serial 0/0/1 (S0/0/1) Serial 0/0/1 (S0/0/1) Serial 0/1/1 (S0/1/1) Serial 0/0/1 (S0/0/1) Serial 0/0/1 (S0/0/1)

Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many interfaces the router has. There is no way to effectively list all the combinations of configurations for each router class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device. The table does not include any other type of interface, even though a specific router may contain one. An example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be used in Cisco IOS commands to represent the interface.

© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.

Page 5 of 5

Similar Documents

Free Essay

It 242

...Switches and Router Christina Bennett IT242 Switches and Router One of the main reasons that Cisco is number one in the enterprise networking market place is their Internetwork Operating System (IOS).The IOS provides a similar function to Microsoft Windows or Linux: it controls and manages the hardware it is running on. Basically, the IOS provides the interface between you and the hardware, enabling you to execute commands to configure and manage your Cisco device. “Originally, the IOS was developed for Cisco routers, but over the last few years, Cisco has been porting the IOS to it so there platforms, including the Catalyst switches”. (Cisco.com) There are actually many ways of accessing a Cisco device, including the following: console, auxiliary (only certain Cisco routers), telnet, web browser, and an SNMP management station .A console interface provides serial connection access to a router— with console access, you can enter commands in a text-based mode. In order to access your Cisco device from a remote station, however, you first need to create a basic configuration, including IP addressing. Therefore, to perform your initial configurations, you need access to the console port of your Cisco device. Before you can actually begin configuring your Cisco device, you first have to connect it to your network and set up a terminal connection to its console interface. No two routers are setup in the same manner; however, the command modes they use are pretty much alike...

Words: 968 - Pages: 4

Premium Essay

Ios Commands

...|Chapter |Task |Commands | |11.02: Command-Line Interface |Privilege EXCE Mode (Enable & Disable)|IOS> enable | |(CLI) | |IOS# | | | | | | | |IOS# disable | | | |IOS> | | |Login Out |IOS# logout | | | |-or- | | | |IOS# exit | |11.03: IOS Basics |Context-Sensitive Help |Router> ? | | | | | | | |Router#...

Words: 2715 - Pages: 11

Premium Essay

Computer Engineer

...Ethernet Technologies and Cabling * 1-6 Cisco 3 Layer Model * 1-7 Summary * Chapter 2 – IP Addressing and Subnets * 2-1 IP Addresses – Composition, Types and Classes * 2-2 Private and Public IP addresses * 2-3 Subnetting * 2-4 Variable Length Subnet Masks (VLSM) * 2-5 Route Summarization * 2-6 Troubleshooting IP Addressing * Chapter 3 Introduction to Cisco Routers, Switches and IOS * 3-1 Introduction to Cisco Routers, Switches, IOS & the Boot Process * 3-2 Using the Command-Line Interface (CLI) * 3-3 Basic Configuration of Router and Switches * 3-4 Configuring Router Interfaces * 3-5 Gathering Information and Verifying Configuration * 3-6 Configuring DNS & DHCP * 3-7 Saving, Erasing, Restoring and Backing up Configuration & IOS File * 3-8 Password Recovery on a Cisco Router * 3-9 Cisco Discovery Protocol (CDP) * 3-10 Using Telnet on IOS * 3-11 CCNA Lab #1 * Chapter 4 Introduction to IP Routing * 4-1 Understanding IP Routing * 4-2 Static, Default and Dynamic Routing * 4-3 Administrative Distance and Routing Metrics * 4-4 Classes of Routing Protocols * 4-5 Routing Loops * 4-6 Route Redistribution * 4-7 Static and Default Route Lab * Chapter 5 Routing Protocols * 5-1 RIPv1 & RIPv2 * 5-2 Configuring...

Words: 95744 - Pages: 383

Premium Essay

Alksdjf

...CCNA Portable Command Guide Second Edition Scott Empson Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA ii CCNA Portable Command Guide, Second Edition Scott Empson Copyright© 2008 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing July 2007 Library of Congress Cataloging-in-Publication Data Empson, Scott. Portable command reference / Scott Empson. -- 2nd ed. p. cm. ISBN 978-1-58720-193-6 (pbk.) 1. Computer networks--Examinations--Study guides. 2. Internetworking (Telecommunication)--Examinations--Study guides. 3. Electronic data processing personnel--Certification. I. Title. TK5105.5.E4352 2007 004.6--dc22 2007023863 ISBN-13: 978-1-5872-0193-6 ISBN-10: 1-58720-193-3 Warning and Disclaimer This book is designed to provide information about the Certified Cisco Networking Associate (CCNA) exam and the commands needed at this level of network administration. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The author...

Words: 64092 - Pages: 257

Premium Essay

Ccna

...CCNA Portable Command Guide Second Edition Scott Empson Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA ii CCNA Portable Command Guide, Second Edition Scott Empson Copyright© 2008 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing July 2007 Library of Congress Cataloging-in-Publication Data Empson, Scott. Portable command reference / Scott Empson. -- 2nd ed. p. cm. ISBN 978-1-58720-193-6 (pbk.) 1. Computer networks--Examinations--Study guides. 2. Internetworking (Telecommunication)--Examinations--Study guides. 3. Electronic data processing personnel--Certification. I. Title. TK5105.5.E4352 2007 004.6--dc22 2007023863 ISBN-13: 978-1-5872-0193-6 ISBN-10: 1-58720-193-3 Warning and Disclaimer This book is designed to provide information about the Certified Cisco Networking Associate (CCNA) exam and the commands needed at this level of network administration. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided...

Words: 64092 - Pages: 257

Premium Essay

Ethics

...Initializing and Re g eloading a Rout and S g ter Switch (Instructo or Version) V Instructor No Red font color or Gray highlights ind ote: y dicate text tha appears in the instructor copy only. at Topology T Objectives O Part 1: Se Up Device in the Netw et es work as Show in the To wn opology Part 2: Initialize the Router and Reload R Part 3: Initialize the Switch and Reload S Backgroun / Scenar B nd rio Before sta arting a CCNA hands-on la that makes use of either a Cisco rout or switch, ensure that t A ab s ter the devices in use have be erased an have no st n een nd tartup configu urations prese Otherwise the results of your ent. e, lab may b unpredictab This lab p be ble. provides a de etail procedure for initializin and reload e ng ding a Cisco ro outer and a Cisco sw witch. Note: The routers used with CCNA hands-on lab are Cisco 1 e d bs 1941 Integrate Services R ed Routers (ISRs with s) Cisco IOS Release 15. S .2(4)M3 (univ versalk9 image). The switches used are Cisco Cataly 2960s with Cisco yst h IOS Relea 15.0(2) (lanbasek9 ima ase age). Other ro outers, switch hes, and Cisc IOS version can be use co ns ed. Depending on the mod and Cisco IOS version, the comman available a output pr del nds and roduced migh vary ht from what is shown in the labs. t t Required R R Resources • • • • 1 Rou (Cisco 19 with Cisco IOS softwar Release 15.2(4)M3 universal image or comparab uter 941 o re, ble) 1 Switch (Cisco 29 with Cisco IOS Release 15.0(2) lanb 960 o basek9 image or...

Words: 45682 - Pages: 183

Premium Essay

Nt2640

...NT2640 IP Networking INSTRUCTOR GUIDE Onsite Credit hours: 4.5 Contact /Instructional hours: 34 Theory, 22 Lab Prerequisite: NT1210 Introduction to Networking or equivalent Course Revision Table Change Date Updated Section Change Description Change Rationale Implementation Quarter 07/18/2011 All New Curriculum New Curriculum September 2011 02/19/2013 All Updated labs across the course to map the 2nd edition of lab manual Immediately 02/27/2013 Midterm and Final Examination Answer Keys Added examination keys Immediately 03/18/2013 Answer Keys for Midterm and Final Updated some answers to address the accuracy March 2013 04/19/2013 Assignment labels on Pages 43, 52, 61, 78, 87, 97, 106 and 132. Added labels to identify additional assignments in affected units Clarification of additional assignments March 2013 Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network, Transport...

Words: 22068 - Pages: 89

Premium Essay

Freecd

...Static secure MAC addresses-These are manually configured by using the switchport port-security mac-address mac-address interface configuration command, stored in the address table, and added to the switch running configuration. Dynamic secure MAC addresses-These are dynamically configured, stored only in the address table, and removed when the switch restarts. Sticky secure MAC addresses-These are dynamically configured, stored in the address table, and added to the running configuration. If these addresses are saved in the configuration file, when the switch restarts, the interface does not need to dynamically reconfigure them. You can configure an interface to convert the dynamic MAC addresses to sticky secure MAC addresses and to add them to the running configuration by enabling sticky learning. To enable sticky learning, enter the switchport port-security mac-address sticky interface configuration command. When you enter this command, the interface converts all the dynamic secure MAC addresses, including those that were dynamically learned before sticky learning was enabled, to sticky secure MAC addresses. The interface adds all the sticky secure MAC addresses to the running configuration. The sticky secure MAC addresses do not automatically become part of the configuration file, which is the startup configuration used each time the switch restarts. If you save the sticky secure MAC addresses in the configuration file, when the switch restarts, the interface does not need...

Words: 9957 - Pages: 40

Premium Essay

Ccna

...prepare for either exam, the notes are geared towards passing the single exam. I recommend you study all of the material and take the single exam option rather than taking two exams. Cisco Device Icons  The following table lists the specific icons Cisco uses to represent network devices and connections. Represents Icon Hub Bridge Switch Router Access point Network cloud Ethernet connection Serial Line connection Wireless connection Virtual Circuit The OSI Model As you study this section, answer the following questions:       What is the OSI model and why is it important in understanding networking? How does the third OSI model layer relate to administering routers? Which OSI model layer is concerned with MAC addresses? What protocols correspond to the Presentation and Session layers? What is the difference between the TCP and UDP protocols? What is the EIA/TIA 232 protocol concerned with? This section covers the following exam objectives:    103. Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network 105. Describe the purpose and basic operation of the protocols in the OSI and TCP models 110. Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach OSI Model Facts The OSI model classifies and organizes the tasks that hosts perform to prepare data for transport across the network. You should be familiar with the OSI model because it...

Words: 73801 - Pages: 296

Premium Essay

Liao

...Volume 1 FACULTY OF INFORMATION TECHNOLOGY Computer Network Systems Department Computer Networks 1 Lab Manual V 2.0 P R E P A R E D D R . A S U B Y H I J J A W I M O H A M M A D 2 0 1 2 R E V I E W E D B Y D R . M O H A M M A D H I J J A W I Applied Science Private University – Jordan http://FIT.asu.edu.jo Table of Contents Lab 1: Network Components ....................................................................................... 7 Introduction ........................................................................................................ 7 Objectives: ........................................................................................................ 13 Lab Steps: ......................................................................................................... 13 Lab 2: Cable Construction ......................................................................................... 14 Introduction: ...................................................................................................... 14 Objectives: ........................................................................................................ 20 Lab Steps: ......................................................................................................... 21 Preparation ....................................................................................................... 21 Main Steps .................................................

Words: 20902 - Pages: 84

Premium Essay

Ccna 3 Pt Lab Manual

...This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Exploration: LAN Switching and Wireless course as part of an official Cisco Networking Academy Program. PT Activity 1.2.4: Build a Hierarchical Topology Topology Diagram Learning Objectives • • Add devices to a topology. Connect the devices. Introduction Packet Tracer is integrated throughout this course. You must know how to navigate the Packet Tracer environment to complete this course. Use the tutorials if you need a review of Packet Tracer fundamentals. The tutorials are located in the Packet Tracer Help menu. This activity focuses on building a hierarchical topology, from the core to the distribution and access layers. All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 3 CCNA Exploration LAN Switching and Wireless: LAN Design PT Activity 1.2.4: Build a Hierarchical Topology Task 1: Add Devices to the Topology Step 1. Add the missing distribution layer routers. The routers you need are located in Custom Made Devices. R1 and R3 are 1841 routers. Ctrl-click the 1841 router to add more than one. Press ESC to cancel. R2 is a 2621XM router. Step 2. Add the remaining access layer switches. Following the topology diagram, add nine 2960-24TT switches to complete the rest of the access...

Words: 48601 - Pages: 195

Free Essay

Capstone

...offers a complimentary follow up, one month after your network is complete. We want to make sure you love your network. Each of our eight core employee's graduated from the prestigious ITT Tech, San Diego. Each has a passion for networking, and genuine love for problem solving. From the cabling in the walls to workstations on the desks, a trained professional will be on the job. Based on the request for proposal from TTI, we have created what may be, our masterpiece work. The following pages detail our plan of action for TTI's success, and subsequent expansions. We are confident that our network provides the best return on investment for TTI's four additional campuses, and will be easily scaled to meet the demands of continued success. table of contents: Staff …………………………………………………………………………………………………………………………………………. 3 Network Requirements ……………………………………………………………………………………………………………. 4 WAN Design …………………………………………………………………………………………………………………………… 12 LAN Design ……………………………………………………………………………………………………………………………. 26 Structured Cabling …………………………………………………………………………………………………………………. 28 Hardware...

Words: 18593 - Pages: 75

Free Essay

Information Security

...information for the commands used in this chapter, see the online Cisco IOS Interface Command Reference, Release 12.2. * Understanding VLANs * Creating and Modifying VLANs * Displaying VLANs * Configuring VLAN Trunks * Configuring VMPS Understanding VLANs A VLAN is a switched network that is logically segmented by function, project team, or application, without regard to the physical locations of the users. VLANs have the same attributes as physical LANs, but you can group end stations even if they are not physically located on the same LAN segment. Any switch module port can belong to a VLAN, and unicast, broadcast, and multicast packets are forwarded and flooded only to end stations in the VLAN. Each VLAN is considered a logical network, and packets destined for stations that do not belong to the VLAN must be forwarded through a router, as shown in Figure 11-1. Because a VLAN is considered a separate logical network, it contains its own bridge MIB information and can support its own implementation of spanning tree. See Chapter 17, “Configuring STP” in the Cisco CGS 2520 Software Configuration Guide . Figure 11-1 shows an example of VLANs segmented into logically defined networks. Figure 11-1 VLANs as Logically Defined Networks     VLANs are often associated with IP subnetworks. For example, all the end stations in a particular IP subnet belong to the same VLAN. Interface VLAN membership on the switch module is assigned manually on an interface-by-interface basis. When...

Words: 11170 - Pages: 45

Free Essay

Yeszcxzxxvzxcvxzc

...Cisco Router Guide For teleworkers, small offices, small to medium-sized businesses, and enterprise branch and head offices Cisco Integrated Services Routers: Cisco 860, 880, 890, 1800 (fixed), 1800 (modular), 1900, 2800, 2900, 3800, 3900 Series; Cisco Aggregation Routers: Cisco 7200, 7301, 7304, ASR 1000, 7600, Catalyst 6500 Series Summer 2010 V.6 Cisco Router Guide For Medium-sized Businesses, Enterprise Branches, Head Offices, and the Service Provider Edge This is your guide to Cisco® Services Aggregation Routers and Cisco Integrated Services Routers, the broadest and most versatile portfolio of products for enabling the deployment of multiple advanced services. Cisco is the worldwide leader in networking systems for organizations of all sizes, offering solutions that fully support enterprise-wide deployment of networked business applications. A foundation of the Intelligent Information Network, Cisco routers provide high availability, comprehensive security, integrated wireless, ease of management, and advanced Quality of Service (QoS) for today’s most demanding network services, including IP communications, video, customer relationship management, financial transactions, and other real-time applications. This guide shows how Cisco Services Aggregation Routers and Cisco Integrated Services Routers enable you to meet your current and future needs with modular designs, allowing incremental migration as your business and network requirements change. In this guide,...

Words: 32978 - Pages: 132

Premium Essay

Hello

...Securing Cisco Routers (SECR) Glossary A AAA ABEND Access Access attacks Authentication, Authorization, Accounting. Allows all facets of user security to be defined on a central server. Abnormal END. Abnormal termination of software. 1.) In dealing with network security it is an all-encompassing term that refers to unauthorized data manipulation, system access, or privileged escalation. An all-encompassing term that refers to unauthorized data manipulation, system access, or privileged escalation. Unauthorized data retrieval is simply reading, writing, copying, or moving files that are not intended to be accessible to the intruder. Limiting the flow of information from the resources of a system to only the authorized persons or systems in the network. See ACE. access control Access Control Entry access control list See ACL. access device access layer Access Method Hardware component used in your signaling controller system: access server or mux. The point at which local end users are allowed into the network. 1.) Generally, the way in which network devices access the network medium. 2.) Software within an SNA processor that controls the flow of information through a network. Defines access rights and privileges for the network users. The access policy should provide guidelines for connecting external networks, connecting devices to a network, and adding new software to systems. The remote computer system which connects a personal computer to the Internet. Access Virtual...

Words: 23221 - Pages: 93