[ Pobierz całość w formacie PDF ]

Access Control Lists (ACLs)
" What are ACLs
" Reasons to create ACLs
" Testing packets with ACLs
" How ACLs work
" Flowchart of the ACL test matching process
ACL Configuration Tasks
" Creating ACLs
" The purpose and function of wildcard mask bits
" The any command
" The host command
Standard ACLs
" What are standard ACLs
" Writing a valid standard ACL command using all available parameters
" How to verify access control lists
" Writing a standard ACL to permit traffic from a source network
" Writing a standard ACL to deny a specific host
" Writing a standard ACL to deny a specific subnet
Extended ACLs
" What are extended ACLs
" Extended ACL parameters
" UDP and TCP port numbers
" Writing an ACL for denying FTP on an Ethernet interface
" Writing an ACL which denies Telnet out of an Ethernet port and permits all other traffic
Named ACLs
" Configuring named ACLs
" The deny command
" The permit command
Using ACLs with Protocols
" Protocols for which ACLs can be created
Placing ACLs
" Rule: "Putting the ACL as close as possible to the source of the traffic denied"
" Using ACLs in firewall routers
" A firewall architecture to protect you from intruders
Verifying ACLs
" How to verify ACLs and interpret the output
CHAPTER 7
Upon completion of this chapter, students will be able to perform tasks related to:
Cisco Routers in Netware Networks
" The Novell IPX protocol suite
" IPX features
" IPX addressing
Novell Encapsulation
" NetWare Ethernet encapsulation terms
" The IOS encapsulation names for Ethernet, FDDI, and Token Ring
" The IPX packet format
Novell Routing
" Novell RIP
" Service advertising protocol
" Get nearest Server protocol
Novell IPX Configuration
" Novell Configuration Tasks
" Writing a valid IOS command sequence to assign IPX network numbers to interfaces
" Writing a valid IOS command for monitoring and troubleshooting IPX
Monitoring and Managing an IPX Network
" Writing a valid IOS command for monitoring the status of an IPX interface
" Writing a valid IOS command sequence to monitor IPX routing tables
" Writing a valid IOS command sequence for monitoring Novell IPX servers
" Writing a valid IOS command to monitor IPX traffic, and describe some of the field options for
that command
" Writing a valid IOS command for troubleshooting IPX routing
" Writing a valid IOS command for troubleshooting IPX SAP
" Using the privileged IPX ping command
" Using the user IPX IPX ping command
CHAPTER 8
Upon completion of this chapter, students will be able to perform tasks related to:
Network Documentation
" Cut sheet diagrams
" MDF & IDF layouts
" Server and workstation configuration details
" Software listings
" Maintenance records
" Security measures
" User policies
Network Security
" Network access
" Data recovery
" Backup operations
" Redundancy techniques
Planning Structured Cabling: Identifying Potential Wiring Closets
" Static, dust, dirt, and heat
" Power conditioning
" EMI and FRI
" Software viruses
Network Performance
" Network baseline, updates, and change verification
Server Administration
" Peer-to-peer
" Clilent-srver
" Network control
Network Troubleshooting
" Scientific method
" Analyze network troubleshooting [ Pobierz całość w formacie PDF ]

  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • zsf.htw.pl