CCNA 7.2: Troubleshoot network connectivity issues using ICMP echo-based IP SLA

Overview: The ICMP Echo operation measures end-to-end response time between a Cisco router and any devices using IP   Study Notes: The ICMP Echo operation measures end-to-end response time between a Cisco router and a device using IP ICMP Echo is useful for troubleshooting network connectivity issues An IP SLA (Service Level Agreement) is configured […]

CCNA 7.1.c: Syslog

Overview: Syslog is a way for network devices to send event messages to a logging server, usually known as a Syslog server.   Study Notes: Syslog – System Message Logging Syslog uses port 514 Controls the distribution of logging messages to various destinations based on the configuraiton Logging buffer Terminal lines Syslog server When disabled, […]

CCNA 7.1.b: SNMPv3

Overview: SNMPv3 contains significant changes to SNMPv2 including options for message integrity, authentication and encryption   Study Notes: SNMPv3 does not use community-strings SNMPv3 provides message integrity, authentication, encryption Security model (Auth) is an authentication strategy for groups and users within those groups Security level (Priv) is the permitted level of security within a security […]

CCNA 7.1.a: SNMPv2

Overview: SNMPv2 improves upon the limitations in SNMPv1   Study Notes: SNMPv2 improves upon SNMPv1 (SNMPv1 was criticized for poor security) SNMPv2 includes these improvements Performance – GetBulkRequest in addition to the iterative GetNextRequest Security – party-based security system (obsoleted later due to complexity) Confidentiality Manager-to-manager communications SNMPv2 still uses the less secure community-string The […]

CCNA 7.1: Configure and verify device-monitoring protocols

Overview: SNMP is a layer 7 application layer protocol consisting of an SNMP manager, an SNMP agent and MIBs. Syslog is a way for network devices to send event messages to a logging server, usually known as a Syslog server.   Study Notes: The SNMP manager can be a standalone server or part of a […]

CCNA 6.6: Describe device security using AAA with TACACS+ and RADIUS

Overview: A device can be secured by using AAA with TACACS+, RADIUS or a combination of both.  The use of TACACS+ and/or RADIUS allows a client to be authenticated against a remote server versus local authentication on the device.   Study Notes: AAA AAA Authentication, Authorization, Accounting Access control is the way you control who […]

CCNA 6.5: Configure, verify, and troubleshoot basic device hardening

Overview: Basic device hardening consists of setting user authentication passwords, enable passwords, restricting access to the device through telnet/SSH and displaying login banners.   Study Notes: Device hardening helps to restrict access to different command modes on routers and switches Command Mode Access Method Prompt Exit Method User EXEC Log in Router> Use the logout […]

CCNA 6.4: Verify ACLs using the APIC-EM Path Trace ACL Analysis tool

Overview: The Cisco Application Policy Infrastructure Controller – Enterprise Module (APIC-EM) is Cisco’s Software Defined Networking (SDN) Controller for Enterprise Networks (Access, Campus, WAN and Wireless).    Study Notes: Performing an ACL-Based Path Trace You can perform a path trace between two nodes in your network. The two nodes may be two hosts and/or Layer […]

CCNA 6.3: Configure, verify, and troubleshoot IPv4 and IPv6 access list for traffic filtering

Overview: Access-lists are used to permit and deny different traffic based on the filtering criteria specified in the list   Study Notes: Access-lists are evaluated top down from first entry to last entry Once the traffic matches an entry in the list an action is taken – permit or deny Therefore, put more specific entries […]

s2Member®
Built by TrailSix