CCNA Complete provides a comprehensive overview of foundational to advanced networking concepts, with an emphasis on theory and practical application.
RSE Lab Day
Welcome to your labs for Routing & Switching Essentials (RSE).
The primary purpose of lab days are for students to work on labs and build networking skills working directly with the hardware and software. Students are able to work on the curriculum, assessments, and any other course material to improve their awareness, learning, and understanding. Students are highly encouraged to work in teams, and share their learning.
Skills-based assessment(s) can also be practiced.
Make a goal to master the following labs!
The primary purpose of lab days are for students to work on labs and build networking skills working directly with the hardware and software. Students are able to work on the curriculum, assessments, and any other course material to improve their awareness, learning, and understanding. Students are highly encouraged to work in teams, and share their learning.
Skills-based assessment(s) can also be practiced.
Make a goal to master the following labs!
ITN 0.0.0.1 Lab - Initializing and Reloading a Router and Switch | *2.1.1.6 Lab - Configuring Basic Switch Settings *2.2.4.11 Lab – Configuring Switch Security Features | *3.3.2.2 Lab – Implementing VLAN Security *3.2.2.5 Lab – Configuring VLANS and Trunking | *4.1.4.6 Lab – Configuring Basic Router Settings with IOS CLI | *5.1.3.7 Lab – Configuring 802.1Q Trunk-Based Inter-VLAN Routing | *8.2.4.5 Lab – Configuring Basic Single-Area OSPFv2 | *9.2.3.4 Configuring and Verifying VTY Restrictions | *10.1.2.5 Lab – Configure Basic DHCPv4 on a router | *11.2.2.6 Lab – Configure dynamic and static NAT |
DTP: How do I know the functionality of a switch port?
Dynamic Trunking Protocol
- Access
- Dynamic Auto
- Dynamic Desireable
- Trunk
Native VLAN Explained
Here is the scoop! Trunks ONLY CARRY TAGGED FRAMES, that's what trunks
were designed to do. the purpose of a trunk is to be able to TRANSFER DATA
FROM DIFFERENT VLANs. The reason the frames are tagged before they traverse
the trunk is so that when it gets to the other side of the trunk, the switch can
READ THE TAG AND DETERMINE WHICH VLAN THE FRAME BELONGS TO and then
forward it on to that VLAN.
Now the native VLAN. The purpose of the native VLAN is so that if untagged data finds its way traversing the trunk (usually because it entered the trunk somewhere in the middle, most likely from a connected hub so that the frame could not be tagged by the switch before entering the trunk), when that untagged frame gets to either end of the trunk, the switch then reads the frame sees that it is an untagged frame that ended up on the trunk and sends that untagged frame to the VLAN that has been assigned as the native VLAN.
Remember, TRUNKS ONLY CARRY TAGGED FRAMES, all untagged frames goes to the native vlan. So to answer your question, if VLAN1 hits the trunk, it too will be tagged, so that the switch on the other side of the trunk can determine which VLAN the frame belongs to and forward the frame to the appropriate VLAN.
For more discussion on this topic, take a look at https://learningnetwork.cisco.com/thread/2217.
Now the native VLAN. The purpose of the native VLAN is so that if untagged data finds its way traversing the trunk (usually because it entered the trunk somewhere in the middle, most likely from a connected hub so that the frame could not be tagged by the switch before entering the trunk), when that untagged frame gets to either end of the trunk, the switch then reads the frame sees that it is an untagged frame that ended up on the trunk and sends that untagged frame to the VLAN that has been assigned as the native VLAN.
Remember, TRUNKS ONLY CARRY TAGGED FRAMES, all untagged frames goes to the native vlan. So to answer your question, if VLAN1 hits the trunk, it too will be tagged, so that the switch on the other side of the trunk can determine which VLAN the frame belongs to and forward the frame to the appropriate VLAN.
For more discussion on this topic, take a look at https://learningnetwork.cisco.com/thread/2217.
Equipment for Sale
If you are in the market for networking equipment, take a look at this list of items and see Derek for more information. While Packet Tracer is an incredible and worthwhile tool, nothing beats hands on with the actual devices.
Sr. No. | Equipmment List | Qty. | Used | New |
1 | Cisco 2620 with 10/100TX and WIC | 1 | x | |
2 | Cisco 2620 with no LAN/WAN card | 1 | x | |
3 | Cisco 2610 with 10/100TX and WIC | 1 | x | |
4 | Cisco WS-3550-24 FX SMI | 1 | x | |
5 | Cisco Aironet AP 350 | 3 | x | |
6 | Cisco AIR-1231G-A-K9 | 3 | x | |
7 | Cisco WS-C3524-XL-EN | 2 | x | |
8 | Cisco WS-C2924-XL-EN | 1 | x | |
9 | Cisco WS-C3524-PWR-XL-EN | 1 | x | |
10 | Cisco WS-C3524-PWR-XL-EN | 1 | x | |
11 | Cisco WS-3550-48-EMI | 1 | x | |
12 | Cisco 1720 router | 2 | x | |
13 | Cisco CAT5509 with 3 WS-X5224 + 2 sup modules | 1 | x | |
14 | Nokia IP 330 Firewall | 3 | x | |
15 | Nokia IP 440 Firewall | 2 | x | |
16 | Netscreen 10 Firewall | 1 | x | |
17 | Zyplex MaxServer - 1620-20TX | 11 | x | |
18 | Bay Networks 350T | 1 | x | |
19 | Bay Networks 450T | 2 | x | |
20 | Bay Networks ARN-1 | 2 | x | |
21 | Fore Systems ES-1200 | 3 | x | |
22 | Fore Systems/Marconi Communications Accelar-1200 | 4 | x | |
23 | Fore Systems/Marconi Communications ES2810 | 1 | x | |
24 | Fore Systems/Marconi Communications ESX-24-24TX+2OC12-MM | 1 | x | |
25 | Fore Systems/Marconi Communications ASX-2008X | 2 | x | |
26 | Fore Systems/Marconi Communications Power Hub-7000 | 1 | x | |
27 | Fore Systems/Marconi Communications ASX-1000 | 1 | x | |
28 | Fore Systems/Marconi Communications ESX-NAC-1 | 2 | x |
How Encryption Works
http://computer.howstuffworks.com/encryption3.htm
Public Key Encryption
One of the weaknesses some point out about symmetric key encryption is that two users attempting to communicate with each other need a secure way to do so; otherwise, an attacker can easily pluck the necessary data from the stream. In November 1976, a paper published in the journal IEEE Transactions on Information Theory, titled "New Directions in Cryptography," addressed this problem and offered up a solution: public-key encryption.
Also known as asymmetric-key encryption, public-key encryption uses two different keys at once -- a combination of a private key and a public key. The private key is known only to your computer, while the public key is given by your computer to any computer that wants to communicate securely with it. To decode an encrypted message, a computer must use the public key, provided by the originating computer, and its own private key. Although a message sent from one computer to another won't be secure since the public key used for encryption is published and available to anyone, anyone who picks it up can't read it without the private key. The key pair is based on prime numbers (numbers that only have divisors of itself and one, such as 2, 3, 5, 7, 11 and so on) of long length. This makes the system extremely secure, because there is essentially an infinite number of prime numbers available, meaning there are nearly infinite possibilities for keys. One very popular public-key encryption program is Pretty Good Privacy (PGP), which allows you to encrypt almost anything.
The sending computer encrypts the document with a symmetric key, then encrypts the symmetric key with the public key of the receiving computer. The receiving computer uses its private key to decode the symmetric key. It then uses the symmetric key to decode the document.
To implement public-key encryption on a large scale, such as a secure Web server might need, requires a different approach. This is where digital certificates come in. A digital certificate is basically a unique piece of code or a large number that says that the Web server is trusted by an independent source known as acertificate authority. The certificate authority acts as a middleman that both computers trust. It confirms that each computer is in fact who it says it is, and then provides the public keys of each computer to the other.
Subscribe to:
Posts (Atom)
Do You Have A Problem? :)
technically speaking, that is :)