Posts

Showing posts from February, 2020

WAN PAP configuration and authentication ccna 200-301 exam

Image
Purpose 1. Specify a unique host name for the router; 2. List the remote host name and password used when authenticating the router; 3.  Encapsulation of the PPP protocol on the WAN interface; 4.  cisco1 is the server, cisco2 is the client, the client actively sends an authentication request to the server, and the password is set to ccna Topology Topology Configuration steps 1. Configure the server settings of Cisco1 Router (config) #hostname cisco1 NOTE: Configure a unique host name. cisco1 (config) #username cisco password ccna Note: Make a list of local usernames and passwords. cisco1 (config) #interface serial 0 cisco1 (config-if) #ip address 192.168.12.1 255.255.255.0 cisco1 (config-if) #encapsulation ppp Note: Start the PPP encapsulation protocol. HDLC is used for encapsulation by default. cisco1 (config-if) #ppp authentication pap cisco1 (config-if) #no shutdown Note: The server is set up and the PAP authentication

ccna 200-301 pdf By 2020, the number of people using Wi-Fi 6 will exceed 5G

Image
The network is no longer the network of the past. The focus of the network began to change a few years ago. It moved from the company's data center to the cloud. Cisco sees the hottest trends in networking in 2020 as SD-WAN, Wi-Fi 6, multi-domain control, virtual networks, and the role of network engineers. Anand Oswal, senior vice president of Cisco's Enterprise Networks Business Unit, detailed his views on these five areas in his blog. Wi-Fi 6 and 5G Compared with the previous generation Wi-Fi technology standard, the data transmission speed of Wi-Fi 6 is increased by 40%, and it can support augmented and virtual reality (AR / VR), which has expanded the network capacity. Wi-Fi 6 has greatly improved in terms of transmission rate, power consumption, space, and performance. Apple, Samsung and many other products all claim to support Wi-Fi 6, and 5G mobile phones have not yet been widely spread. Cisco predicts that by 2020, the number of people using Wi-Fi 6 wi

ccna 200-301 dumps Linux learning suggestions

Image
1. Attitude suggestions If you are new to Linux, you may find it difficult at first, but you must stick to it and follow the existing learning plan to achieve success. Remember to stop halfway! 2. system selection suggestions Redhat \ centos \ ubuntu, redhat and centos are more commonly used as server operating systems in business. If it is a desktop linux operating system, select ubuntu. 3. installation recommendations If you just start the installation, you can directly install it using a virtual machine. You can install it without using a real machine. When you become more proficient at the back, you will be more secure if you install real Linux. The selected virtual machine can be VMWARE / VIRTUALBOX to install. You can start with the graphical interface at the beginning, not necessarily using a text terminal from the beginning. 4. Practice suggestions Learning Linux should be practiced more. If you just listen to it, it is difficult to digest it. It is better to u

ccna 200-301 pdf What does the operation and maintenance engineer do every day?

Image
When it comes to operation and maintenance engineers, most people think they repair computers. In fact, the operation and maintenance engineer's job is not so simple. Operation and maintenance literally understand that operation is operation and maintenance is maintenance. Then the function of the operation and maintenance engineer is to ensure the normal operation of the business and maintain it in time when problems occur. Use professional terms to explain that the operation and maintenance engineer is responsible for maintaining and ensuring the high availability of the entire service system, while continuously optimizing the system architecture to improve deployment efficiency, optimize resource utilization and improve the overall ROI. Operation and maintenance engineer is a collective name, which has many classifications. Including: desktop operation and maintenance engineer, network operation and maintenance engineer, system operation and maintenance engineer, basic operat

100% pass 200-301 exam How to prevent IPv6 VPN breakthrough?

Image
Today I will tell you how to prevent IPv6 VPN breakthroughs. Without a properly configured remote access VPN, IPv6 traffic from remote devices may escape corporate security controls. This vulnerability occurs because some of these remote access VPNs are configured to inspect and apply security controls only to IPv4 traffic as it passes through the VPN concentrator, without enabling similar protection for IPv6 traffic. This allows IPv6 traffic to access the Internet directly without the need to apply these controls. This problem is known as the IPv6 VPN breakthrough and is well known, but often overlooked. Why Ignore IPv6 VPN Breakthrough Many businesses don't know how often IPv6 is used on devices that access their network through a VPN. Phones, tablets and laptops used to remotely access corporate networks typically support IPv6, and broadband and cellular services may also support IPv6 for Internet access. As a result, companies generally do not consider IPv6 as a se

CCNA 200-301 Dumps Network security and AI, cloud computing faults?

The annual GeekPwn International Security Geek Contest is held in Shanghai. In the past two years, the attack on AI is the most eye-catching of all projects, and the risks of cloud computing are equally compelling. Can players crack the image recognition systems of well-known manufacturers and let AI make wrong decisions? If the players on the field can deceive AI, so can hackers, which will cause incalculable losses to manufacturers and users. The potential security hazards brought by the development of AI and cloud computing have caused thinking. Participants in the GeekPwn competition are geeks known as white hat hackers. They are highly skilled and will remind the company to fix when they find loopholes. Geekpwn's Cloud Security Challenge is the world's first cloud security offensive and defensive competition based on the restoration of real cloud environments. At the competition site, Tencent Security Yunding Lab built a real full-stack cloud environment that can full