Overview of Routers and Routing

Routers are devices that direct traffic between hosts. They build routing tables that contain collected information on all the best paths to all the destinations that they know how to reach. The steps for basic routing are as follows: Step 1. Routers run programs referred to as routing protocols ...

Layer 3 Security

The Cisco SAFE Blueprint also lists several best practices for Layer 3 security. The following list summarizes the key Layer 3 security recommendations from the SAFE Blueprint. 1. Enable secure Telnet access to a router user interface, and consider using Secure Shell (SSH) instead of Telnet. 2. ...

Calculating Network Ranges Using Subnet Masks

Subnetting is the action of taking the assigned network and breaking it up into smaller pieces. Because the prefix length can no longer be classfully assumed just by looking at the address, the prefix length is now specified. For instance, an address might be written 172.20.1.5/23. This slash notati...

Basic Single Area IS-IS Configuration

This section examines the process of configuring a single IS-IS area using the network in Figure 7-11. Figure 7-11. Single Area IS-IS Network [View full size image] The steps for a basic single area IS-IS configuration are as follows: Step 1. Configure a loopback interface on each OSP...

Controlling Neighborships Using EIGRP Authentication

EIGRP authentication causes routers to authenticate every EIGRP message. To do so, the routers should use the same preshared key (PSK), generating an MD5 digest for each EIGRP message based on that shared PSK. If a router configured for EIGRP authentication receives an EIGRP message, and the mess...

Contact Us

86-136-2222-6316
CALL ME NOW

© 2011 CathaySchool, an ANDA Technology Group company, All Rights Reserved Privacy Policy | Refund Policy | Disclaimer | Sitemap | Resources Tags