 CHAPTER 4  Getting Familiar with CME Administration.

Slides:



Advertisements
Similar presentations
DMZ (De-Militarized Zone)
Advertisements

DMZ (De-Militarized Zone)
/30 Host Name : R1 Serial 0/0/0.1.2 Host Name : R2 Router Lab 3 : 2 - Routers Connection DTE DCE.
CCNA2-1 Chapter 1 Introduction to Routing and Packet Forwarding CLI Configuration and Addressing.
What to expect.  Linux  Windows Server (2008 or 2012)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 Troubleshooting Working at a Small-to-Medium Business or ISP – Chapter 9.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Using the Cisco SDM.
Instructor & Todd Lammle
C ISCO W ORKSHOPS Ya Bao T714/T718. Tasks Construct a network on Cisco devices (team work) Cisco Package Tracer simulation (individual work)
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Configuring a Network Operating System Introduction to Networks.
Andrew Smith 1 NAT and DHCP ( Network Address Translation and Dynamic Host Configuration Protocol )
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—7-1 Minimizing Service Loss and Data Theft Securing Network Services.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Initial Switch Configuration Internetworking Fundamentals Instructor: Abdirahman I. Abdi.
Privilege Levels Cisco IOS provides for 16 different privilege levels ranging from 0 to 15. Cisco IOS comes with 2 predefined user levels. User mode.
SERVER INTEGRATION. OVERVIEW In our project we are integrating Widows server to facilitate interaction between diverse operating systems and applications.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Using a Cisco Router as a DHCP Server.
Router Hardening Nancy Grover, CISSP ISC2/ISSA Security Conference November 2004.
Introduction to OSPF Campus Networking Workshop These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 2: Configuring a Network Operating System Introduction to Networks.
ICND2 – OSPF – Mark Lab Reset for lab 4 Configure 2 loopback interfaces on both routers –RTR1 – 10.X.X.2/32 and 10.X.X.3/32 (area X) –RTR2 – 10.X.X.4/32.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 Module Summary  Cisco routers operate at Layer 3, and their function is path determination.
Exterior Gateway Protocol Border Gateway Protocol (BGP) Interior Gateway Protocol Routing Information Protocol (RIP) Enhanced Interior Gateway Protocol.
Configuring a network os
Author: Bill Buchanan. Module Descriptor Author: Bill Buchanan.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 1 Scaling IP Addresses.
Day 4 Security ( ACL ) , Standard Access Lists , Extended Access Lists, Named ACLs Network Address Translation (NAT), Static NAT , Dynamic NAT , PAT (Overloading)
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
© 1999, Cisco Systems, Inc Chapter 10 Controlling Campus Device Access Chapter 11 Controlling Access to the Campus Network © 1999, Cisco Systems,
Copyright 2003 CCNA 3 Chapter 7 Switch Configuration By Your Name.
Chapter 2: Basic Router Configuration
CCNA Configuration Journal Sample. Index Basic Ethernet Serial Router Rip …
/24 Host Name :R1 Model : 1841 WIC-1T Serial 0/0/0 Basic Configuration.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Site Report HEPiX/HEPNT 17 April 2002 Catania Paul Kuipers.
Basic Router Configuration 1.1 Global configuration Cisco allows us to configure the router to support various protocols and interfaces. The router stores.
User Access to Router Securing Access.
 CHAPTER 3 & 4  Understanding the Cisco IP Phone Concepts and Registration  Getting Familiar with CME Administration.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 6 City College.
Chapter 3: Authentication, Authorization, and Accounting
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 1 Scaling IP Addresses.
Chapter 10 Security. A typical secured network Recognizing Security Threats 1- Application-layer attacks Ex: companyname.com/scripts/..%5c../winnt/system32/cmd.exe?/c+dir+c:\
Cisco 1 - Networking Basics Perrine. J Page 16/5/2016 Chapter 11 At which layer of the TCP/IP model does Telnet operate? 1.application 2.presentation 3.session.
Module 3 Configuring a Router.
NETWORK ADMINISTRATION CPIT 470 Instructor: Mrs Aisha Ehsan.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Implementing IP Addressing Services Accessing the WAN – Chapter 7.
Networking in Linux: a brief overview. TCP/IP  TCP/IP concepts we have seen are applicable to Linux (a version of UNIX, where TCP/IP started)  Some.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Basic Switch Configurations.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.1 Module 1 Scaling IP Addresses.
Chapter 9: Implementing the Cisco Adaptive Security Appliance
Will learn to use router modes and configuration methods to update a router's configuration file with current and prior versions of Cisco Internetwork.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 6 Switch Configuration.
Configuration Modes and TFTP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Dynamic Host Configuration Protocol DHCP Every device that connects to a network needs a unique IP address. Network administrators assign static IP addresses.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Understanding Cisco Router Security.
Cisco S2 C6 Router Configuration 1. Router Boot Up Router uses following from config-startup when it boots –Cisco IOS software version –Router identification.
Chapter 17 Windows NT/2000 Domains Cisco Learning Institute Network+ Fundamentals and Certification Copyright ©2005 by Pearson Education, Inc. Upper Saddle.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID Dynamic Host Configuration Protocol v6.
Chapter 6.  Upon completion of this chapter, you should be able to:  Configure switches  Configure VLANs  Verify configuration settings  Troubleshoot.
DHCP CONFIGURATION Routing & Switching. DHCPV4 OPERATION CONFIGURING A DHCPV4 SERVER A Cisco router running the Cisco IOS software can be configured to.
By Abdul Wahhab Khalid UEL ID
Cisco Switching Basics
Introduction to Networking
GeoMesh Blockchain Networking - Slide Presentation
– Chapter 3 – Device Security (B)
Routing and Switching Essentials v6.0
– Chapter 3 – Device Security (B)
Review - week 4 Basic device access security
Presentation transcript:

 CHAPTER 4  Getting Familiar with CME Administration

Voice_HM(config)#ip http server Voice_HM(config)#ip http secure-server Voice_HM(config)# *Sep 23 17:35:30.149: %PKI-4-NOAUTOSAVE: Configuration was modified. Issue "writ e memory" to save new certificate Voice_HM(config)#username Admin privilege 15 secret cisco Voice_HM(config)#ip http authentication local Voice_HM(config)#line vty 0 4 Voice_HM(config-line)#login local Voice_HM(config-line)#transport input telnet ssh Voice_HM(config-line)#int fa0/0 Voice_HM(config-if)#ip address Voice_HM(config-if)#ip dhcp excluded-address Voice_HM(config)#ip dhcp pool OUTSIDE Voice_HM(dhcp-config)#network Voice_HM(dhcp-config)#default-router Voice_HM(dhcp-config)#exit Voice_HM(config)# Setting up HTTP/HTTPS access for Cisco Configuration Professional:

End of Chapter 4