Sunday, November 24, 2019

Unit 3 Discussion Example

Unit 3 Discussion Example Unit 3 Discussion – Coursework Example Cisco Powered Network Discussion The Cisco networking system, also commonly referred to as the IOS controls various Cisco switchesand routers as well as providing an interface for the configuration of the Cisco devices. The Cisco Security personnel provide its users regularly with safety guidelines and measure to counter the daily threats. The IOS also comes up with various network management models functions which may include; Fault, security, configuration and performance management. Under fault management any faults detected are isolated from the network; security management provides access only to authorized people to access the network and other corporate resources (Liu, 2009). The configuration team is in charge of managing configuration files, inventories as well as software and finally the performance team monitors the overall performance and ensures it is maintained at a high level.The other best practices that can be put across in administering a Cisco powered network incl ude: Coming up with a telnet password. This can be arrived at by: router (config) #line vty con 0 router (config-line) #log in. router (config-line) #password Cisco. This telnet protocol will connect several devices to the internet and get access to various resources. It will also provide a command line interface. It is also necessary to enable the interface so as to provide the administrators with a flexible ground for accessing other physical networks. It can be enabled through router (config-if) # no shutdown, at the same time it can be controled by disabling it through router (config-if) # shut down. The flexibility may at times add complexity to the task of the administrators. Finally, it is important for the administrators to consider setting or coming up with a secret password (Tetz, 2011). This practice will always enable them override the enabling password feature and help them encrypt it within the config file. This will be arrived at by router (config) enable secret (desi red name one wishes to use as a secret password).ReferencesLiu, D. 2009.  Cisco router and switch forensics: Investigating and analyzing malicious network activity. Burlington, MA: Syngress.Tetz, E. 2011.  Cisco ® networking all-in-one for dummies ®. Hoboken, NJ: John Wiley & Sons, Inc.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.