© 2015 Mohamed Samir YouTube channel All rights reserved. www.mohamedsamir.comMohamed Samir CCNP-SWITCHING 300-115 Mohamed Samir YouTube channel Double.

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Advertisements

Copyright © 2014 EMC Corporation. All Rights Reserved. Basic Network Configuration for File Upon completion of this module, you should be able to: Configure.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—4-1 Managing IP Traffic with ACLs Configuring IP ACLs.
Implementing a Highly Available Network
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—6-1 Implementing Layer 3 High Availability Configuring Layer 3 Redundancy with HSRP.
Part III Working with Redundant Links
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir CCNP-SWITCHING Mohamed Samir YouTube channel.
Part III Working with Redundant Links
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir CCNP-SWITCHING Mohamed Samir YouTube channel Double.
Part III Working with Redundant Links
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir CCNP-SWITCHING Mohamed Samir YouTube channel.
Part IV: Multilayer Switching
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod5_L8 1 Implementing Secure Converged Wide Area Networks (ISCW)
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir CCNP-SWITCHING Mohamed Samir YouTube channel Double.
1 © 2013 Cisco Systems, Inc. All rights reserved. Cisco confidential.Cisco Networking Academy, U.S./Canada Equipping Today’s Instructors for Tomorrow’s.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-1 Minimizing Service Loss and Data Theft Securing Network Services.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
AfChix 2011 Blantyre, Malawi Log management. Log management and monitoring ■ What is log management and monitoring ? ● It's about keeping your logs in.
Network Management Workshop intERlab at AIT Thailand March 11-15, 2008 Log management.
© 2011 Internetwork All rights reserved. Cell: Samir CCNP-SWITCHING Mohamed Samir YouTube.
Part V: Monitoring Campus Networks
2010 Cisco Configuration Elements APRICOT 2010 Kuala Lumpur, Malaysia.
CLI modes Accessing the configuration Basic configuration (hostname and DNS) Authentication and authorization (AAA) Log collection Time Synchronization.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir CCNP-SWITCHING Mohamed Samir YouTube channel.
© 1999, Cisco Systems, Inc Chapter 10 Controlling Campus Device Access Chapter 11 Controlling Access to the Campus Network © 1999, Cisco Systems,
CLI modes Accessing the configuration Basic configuration (hostname and DNS) Authentication and authorization (AAA) Log collection Time Synchronization.
© 2007 – 2010, Cisco Systems, Inc. All rights reserved. Cisco Public TSHOOT v6 Chapter 1 1 Chapter 1: Planning Maintenance for Complex Networks CCNP TSHOOT:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Part VI: Implementing High Availability
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 9 Basic Router Troubleshooting.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 1 – Chapter 9 Ethernet Switch Configuration 1.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir CCNP-SWITCHING Mohamed Samir YouTube channel Double.
APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008 Cisco configuration elelements.
Cisco Configuration Elements Network Monitoring and Management Tutorial.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 7 – Secure Network Architecture and Management.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Part III Working with Redundant Links.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Part V: Monitoring Campus Networks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 6 City College.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Enterprise Network.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Agenda Instructor introduction 1. Introduction toEldarin 2.
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
Managing Networks and Network Devices
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir CCNP-SWITCHING Mohamed Samir YouTube channel Double.
Configuring AAA requires four basic steps: 1.Enable AAA (new-model). 2.Configure security server network parameters. 3.Define one or more method lists.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 2 v3.1 Module 8 TCP/IP Suite Error and Control Messages.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir CCNP-SWITCHING Mohamed Samir YouTube channel Double.
Carlos Armas Roundtrip Networks Hervey Allen NSRC.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Lesson 3b © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—3-1 Getting Started with Cisco Security Appliances.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—5-1 Lesson 5 Getting Started with the Cisco PIX Firewall.
ITIS 3110 IT INFRASTRUCTURE II Tony Kombol. NTP "Does Anybody Really Know What Time It Is?"*  Time keeping is one of most fundamental aspects of computer.
 Router Configurations part1 2 nd semester
ITIS 3110 IT INFRASTRUCTURE II Tony Kombol. NTP "Does Anybody Really Know What Time It Is?"*  Time keeping is one of most fundamental aspects of computer.
CISCO CONFIGURATION ELEMENTS 1. Overview Basic things that we need to make sure are configured on a Cisco router (and switch) to do proper network management.
Cisco configuration elelements
CCNA Routing and Switching Routing and Switching Essentials v6.0
ITIS 3110 IT Infrastructure II
Infrastructure II NTP.
Chapter 10: Device Discovery, Management, and Maintenance
Cisco configuration elements
CCNA Routing and Switching Routing and Switching Essentials v6.0
Chapter 2: Basic Switching Concepts and Configuration
NAT , Device Discovery Chapter 9 , chapter 10.
Chapter 10: Device Discovery, Management, and Maintenance
Chapter 8: Monitoring the Network
Presentation transcript:

© 2015 Mohamed Samir YouTube channel All rights reserved. Samir CCNP-SWITCHING Mohamed Samir YouTube channel Double CCIEs #27042(R/S&SP)

© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Part V: Monitoring Campus Networks

© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Logging Switch Activity

© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Syslog Messages Each message contains the following fields: Timestamp: Facility Code:categorizes the switch function or module that has Generated generated the message; the facility code always begins with a percent sign Severity: A number from 0 to 7 that indicates Mnemonic: categorizes the event within the facility code. Message Text

© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Syslog will send to console or syslog message

© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Logging to the Switch Console Switch(config)# logging console severity switch(config)#logging console 3 Configures console logging at level 3 (error). Logging messages with a severity level of 3 or above are displayed on the console. switch(config)# no logging console (default is 2) Telnet or Secure Shell (SSH) “terminal Monitor”

© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Logging to the Internal Buffer By default, the internal logging buffer is disabled Switch(config)# logging buffered severity If you depend on logging buffer you need to increase it Switch(config)# logging buffered size (4096 to ) bytes Too big is effect your memory show logging

© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Logging to a Remote Syslog Server syslog server over the network using UDP port 514 Switch(config)# logging host ip-address “ you can have multiple logging server “ Switch(config)# logging trap severity

© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Adding Time Stamps to Syslog Messages 20w2d: %LINK-3-UPDOWN: Interface FastEthernet1/0/27, changed state to down 21w3d: %SYS-5-CONFIG_I: Configured from console by vty0 ( ) Setting the Internal System Clock Switch# show clock *00:54: UTC Mon Mar Switch(config)# clock timezone EST -5 Switch(config)# clock summer-time EDT recurring Switch(config)# exit Switch# clock set 15:23:00

© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Using NTP to Synchronize with an External Time Source Network Time Protocol (NTP). With NTP, time sources or servers are arranged in a hierarchical fashion Each layer of the hierarchy is known as a stratum,

© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Switch(config)# ntp server prefer Switch(config)# ntp server

© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Switch# show ntp status Clock is synchronized, stratum 1, reference is nominal freq is Hz, actual freq is Hz, precision is 2**18 reference time is D74EEAB6.8408DB3D (13:15: EDT Wed Aug ) clock offset is msec, root delay is 0.82 msec root dispersion is msec, peer dispersion is 0.03 msec Switch# show ntp associations address ref clock st when poll reach delay offset disp *~ GPS ~ ACTS * master (synced), # master (unsynced), + selected, - candidate, ~ configured

© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Securing NTP Switch(config)# ntp authentication-key key-number md5 key- string Switch(config)# ntp authenticate Switch(config)# ntp trusted-key key-number Switch(config)# ntp server ip-address key key-number Switch(config)# access-list acl-num permit ip-address mask Switch(config)# ntp access-group {serve-only | serve | peer | query-only} acl-num

© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Using SNTP to Synchronize Time the Simplified Network Time Protocol (SNTP) Switch(config)# sntp authentication-key key-number md5 key-string Switch(config)# sntp authenticate Switch(config)# sntp trusted-key key-number Switch(config)# sntp server ip-address key key-number

© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Any questions ?

© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Thank you for your time ! شكرا جزاكم الله خير