I haven't published a document for a long time. It's really embarrassing. Some time ago, I got sick and stayed in a hospital for a month. I didn't come out for activities recently. In addition, I had to take time out to discuss with them in addition
Recently, the group has relocated its new campus and needs to re-build the MDT service. Due to the large number of workers in the environment, the network port of the employee's computer MDT network installation service is enabled in all stations
Inspired by the oneStack script:
It turns out that the script can be executed with a certain user permission easily.
The script content is as follows:
#! /Bin/bash # filename: test. sh # email: wangxiaoyu@Live.com # date: 2013-09-02user = "root"
In terms of voice, how does one calculate the bandwidth consumed by codec?By default, after the analog voice is converted to a digital voice, it is cut in 20 ms segments for 20 ms segments, encapsulated with rtp, and then wrapped with udp header, ip
H3CNE V6.0 build official training material PPT for Small and Medium-sized Enterprises
Click to download
Http://blog.csdn.net/u011501221/article/details/10565227
X00010001 Chapter 1 Computer Network overview .ppt
X00010002 Chapter 2 OSI reference
Simulate Site-to-Site VPN ExperimentFirst, let's talk about the experiment background. Remote users want to use VPN technology to securely access internal servers of the headquarters. The topology of the experiment is as follows: the three Cisco 2811
1. Create an account and set the type
Aaa
Local-user hello password cipher xxxxxxxxxxxxxxxxx
Local-user hello privilee level 15
Local-user hello sevice-type ssh
2. generate an RSA key
Rsa local-key-pair create
1024
3. enable the Service
# Define the IP address for the Vlan and configure its work in the server mode interface Vlan-interface1ip address 192.168.1.1 255.255.255.0dhcp select server global-pool # define the DHCP Instance name, address pool, gateway address, DNS address
VTY authentication is telnet AUTHENTICATION. telnet AUTHENTICATION can also be divided into: 1. Password Authentication 2. User Name + Password Authentication
Topology:
650) this. width = 650; "src ="
Static Routing is the most commonly used routing protocol. It does not have complicated configurations and often works very well. Let's take a look at the Static Routing Configuration:
Topology:
650) this. width = 650; "src ="
Lab environment: Windows XP and Cisco 3825 Routers
Create a VPN Server on the vro and connect the VPN Server with the VPN Client that comes with Windows.
The experiment topology is roughly as follows:
650) this. width = 650; "onclick = 'window.
Through a comprehensive experiment, we will enhance the basic settings of routing and switching, remote management, VLAN division, VTP protocol, STP protocol, Dynamic and Static Routing Protocol configuration, and DHCP, configure NAT, PPP, and ACL.
Use a Huawei simulator to create VLANs, add vlan group members, and relay ports
1. Target.
1 ]. Create a vlan and divide the host into vlan group members to reduce the broadcast storm.
2 ]. Set the relay port to allow pc1 to connect pc2 and pc3
The company has multiple internal websites that provide external services at the same time, such as Web1 and Web2, and users who want the public network to access them through port 80, generally, the vro can only map 80 to Web1, while Web2 cannot
I. Security of the TRUNK interface and VTP Protocol
Security of the TRUNK interface:
The switch port has two working statuses: Access, which is the port status required for Access to the user's host, and Trunk, it is mainly used for VLAN
IPSec introduction:
IPSecInternetProtocolSecurity) is the long-term direction of secure networking. It provides active protection through end-to-end security to prevent attacks on private networks and the Internet. In communication, only the sender
DTE is a Data Terminal Equipment Data Terminal device. It has certain Data processing capabilities and Data sending and receiving capabilities;
DCE is a Data Communications Equipment Data communication device. It provides signal transformation
In HSRP, You can monitor the UP/Down status of the uplink port to implement redundant gateway switching.
EOT provides more monitoring functions for interfaces:
Whether IP routing is enable. For example, ip routing is disabled globally)
Port
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service