I. Source of information:
Now CCIE Security Lab are all V4, but did not find the relevant books on the Internet, can only see the V3, honestly said that the translation of people is not very good, but did not find the corresponding English version available for downloading, can only make up to see.
A.pdf Book
http://file1.51cto.com/?mod=getCoden=6055rB+G69I9PU
I accidentally saw an article on the internet shortly before, it was about CCIE salary problem, I think it is very reasonable, so come out here to discuss with you. > Note: This view represents only Span style= "font-family: ' Microsoft Jas Black ', ' Microsoft Yahei '; line-height:25px;font-size:13pt;" > " G-lab Director Guo " Personal position, if there is a similarity, is purely coincid
Problems that should be paid attention to when configuring OSPF Experiment (CCIE-LAB) 1 When configuring NBMA in FR, You need to manually specify the neighbor on the center point, write the ip ospf pri 0 to ensure that the center is DR. 2. If you can PING yourself, you only need to configure your MAP on the vro. 3. There are two types of authentication: link authentication and regional authentication. The c
Experiment 2 network scanning Experiment
Lab Objectives
L use network scanning software to understand the opening of the target host port and service, so as to further obtain information and identify system security vulnerabilities. Capture sensitive data (such as passwords) by using the packet capture software ). Through this experiment, we can learn about the risks of port and service opening, and enhance
display the results, when they are connected, the server results will appear, but will be overwritten by the client results, but can quickly intercept the results, and the results are correct.Vi. SolutionsThe encryption and decryption of data is transmitted on a single computer.Vii. Time of statistics
steps
time-consuming
percent
Demand analysis
3h
27.3%
design
1h
9.1%
Experiment 1 sniffer packet capture
Lab Objectives
L master Serv-U configuration FTP.
L master the basic Telnet usage methods.
L through experiments, master the installation and use of common sniffing tools, and understand the data structure of IP, TCP, UDP, and other protocols in the TCP/IP protocol stack, understand the features of FTP, HTTP, and other protocols for plaintext transmission, establish security
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.