Skip to content

2011

Access Control Lists

Understanding Access Control Lists is an important role for moving up into the CCNA area. ACLs can get confusing and cause network problems if not implemented correctly. I think what I outlined below explains in a nutshell of what you can expect from ACLs.

IPv4 Meet IPv6

IPv4 maybe on its last leg with only a few blocks of IPv4 addresses available, computer estimates say that the IANA address depletion was January 27, 2011. Also the calculations for all central IPv4 pool addresses will be depleted by July 25, 2012.

Common Weaknesses Cybercriminals Exploit

While reading the Cisco Annual Report they came up with seven common social engineering attacks that cybercriminals use. Now these types of attacks are common and are not unheard of. You should be familiar with most if not all these weaknesses that cybercriminals use.

Basic Router Configuration

One of the things you do first when setting up a Cisco router in lab environments and production environments is basic router configuration. By having a good understanding of basic router configuration you will have the essential building blocks and be able to apply additional knowledge upon router configuration. This tutorial is assuming that  you are in a lab environment, additional security measures for production environments are recommended and are not discussed in this tutorial. Also this tutorial is assuming a terminal emulator session is on and ready. (Hyper-Terminal, Putty, etc).

Cybercriminals Focusing on Mobile Platforms

If I were to tell you four years ago that cybercriminals were going to focus on mobile phones instead of computers would you believe me? This shift in focusing on mobile devices and platforms instead of computers means one thing, it’s easier. What does that mean? Well think of it this way if I was hacker wanting to gain access to somebody’s personal information, and I had a choice between their computer or their mobile phone which one would I choose?  Now before I give my answer think of this, computer operating systems like Windows, and Mac have been around for a while so they both have had their share of virus, worms, and trojans especially Windows as it’s a widely and commonly used operating system.

Configuring NAT (One to One Mapping)

In this simple tutorial we are going to be configuring a static NAT which is a one-to-one mapping between an inside IP address and an outside IP address. (One private to one permanent address) Using this type of NAT would be helpful for outside devices accessing your inside devices. (Like a web server) Let's get started!!

Configuring PAT

This tutorial will help you configure PAT (Port Address Translation), or sometimes called NAT (Network Address Translation) with overload on a Cisco router. PAT uses multiple private IP addresses and translates them into a single or very few public IP addresses. This is possible because the private IP addresses are mapped to the port number of the PC. Let's get started!!!

Basic PPP Configuration

This tutorial will be going over Basic Configuration of PPP (Point-to-Point Protocol). This tutorial includes Basic Configuration tasks on a router, Configuring OSPF routing protocol, and Configuring PPP PAP and CHAP authentication. Let's get started!

The OSI Layer

It is the foundation that makes understanding networks possible the wonderful OSI layer. While studying for the CCENT exam I had a basic understanding of the OSI Model but when reviewing the material I found myself saying over and over, "Oh ya I remember that"! meaning I totally forgot about a certain protocol or how and what services where in each layer. So I wrote down the basics on the  ITS forum and decided why not post it here as well.