NETWORKING IN GNS3
INTRODUCTION
GNS3 is a simulator which provide you a real environment as you are going to see in this tutorial .It gives you a feel of real router , PC’s etc .
The requirement of this tutorial is real operating system installed on virtual box . This tutorial is just for your knowledge , what you can do if you know networking .
- In this tutorial you are going to learn how to work in GNS3 .
- We create a small network by just adding 1 Router , 1 Switch and 1 PC.
TFTP BACKUP AND RESTORE
- If you learning CCNA , then you must familiar with TFTP Server.
- TFTP stands for Trivial File Transfer protocol .
- This TFTP is used to take backup of a router running and startup configuration files.
- In this tutorial , we take a backup of a router config files and then we restore a config file from TFTP to router .
PING ON GNS3
INTRODUCTION
- The main purpose of this tutorial is to understand more about the ping utility. If you read this tutorial carefully you will learn more about ping tool which help you in network layer3 troubleshooting . I wish my study on this topic help you to learn more about ping and troubleshooting.
- This tutorial is good for computer learners , system administrators , network security professionalist and many other who are searching for ping on the google .
TELNET SECURITY
INTRODUCTION
- In this tutorial , we focus on the security of Router .
- Two things you should know -
- SSH : Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices.
- TELNET:A network protocol that allows a user on one computer to log on to another computer that is part of the same network.
- In this tutorial we see how a MITM attack can easily be done when we configure telnet .
- And also we see that what happen when we use SSH .
INTRODUCTION
Objective : To safe router from bruteforce attack on telnet .
BRIEFING
In this tutorial we are going to –
- Create a network , use 1 Router , 1 Ethernet Switch , 2 PC’s ( Bugtraq and Windows Xp ).
- See the below image for more details –
- Once your network is connected , open It .
STOP BRUTEFORCE ATTACK
INTRODUCTION
AIM : To save the router from bruteforce attack .
- In this tutorial you will learn how to stop the bruteforce attack by block the number of attempts on router.
- This tutorial helps security professional and interested people in network security .
0 comments:
Post a Comment