Patrick Denis > Cisco > Security
Security
admin
December 2, 2018
Switch Data Plane Controls SWITCH SECURITY BASELINE VLAN HOPPING ATTACK – Static Access n Port COnfiguration – disable DTP – No Native VLAN on trunk Port STP Spoofing – BPDU and Root Guard MAC Spoofing – Port Security and Static…
Read more
admin
September 28, 2015
This checklist is a collection of all the hardening steps that are presented in this guide. Administrators can use it as a reminder of all the hardening features used and considered for a Cisco IOS device, even if a feature…
Read more
admin
September 24, 2015
Took a Course from Coursera.org and will post everything that i have learn here . Because behind all that technology there is history 🙂 So i will try to make a resume of everything related to that here .But i…
Read more
admin
September 14, 2015
Diffie-hellman Modulo Given two numbers, a (the dividend) and n (the divisor), a modulo n (abbreviated as a mod n) is the remainder from the division of a by n. For instance, the expression “7 mod 5” would evaluate…
Read more
admin
September 14, 2015
To make it simple as for the configuration you need 5 things : Crypto Policy Transform-set Access-list Defining your crypto map Applying it to the interface Example of configuration : Key Components of creating an IPSec tunnel in chronological order:…
Read more
admin
September 14, 2015
Ce document utilise la configuration réseau suivante : Remarque: Les schémas d’adressage d’IP utilisés dans cette configuration ne sont pas légalement routables sur Internet. Ce sont des adresses RFC 1918 qui ont été utilisées dans un environnement de laboratoire. Exécutez ces étapes afin…
Read more
admin
August 21, 2015
VTP Pruning reduce the unnecessary flooded traffic by forwarding the unknown unicast frames on a VLAN over trunk links only if the receiving end of the trunk has ports in that VLAN. VTP Pruning is disabled by default and can be…
Read more
admin
August 21, 2015
When you put a switchport into trunking mode, it will trunk and it will try to negotiate. Dynamic auto will wait for a request to trunk, so if the other side is set to trunk, a trunk will form. If…
Read more
admin
July 8, 2015
To create a Prefix-List you need tobe in global configuration mode : ip prefix-list ( option ) ( name ) seq (sequence number ) ( permit or deny ) (x.x.x.x )/(x) then you can use le and ge or a…
Read more
admin
March 21, 2015
ACLs can consist of multiple access list statements. Packets are compared to each statement in sequence until a match is found. The permit and deny keywords are used to indicate whether matching packets should be forwarded or dropped, respectively. If…
Read more