NTP uses a hierarchy of stratums to synchronize time accuracy, with stratum 0 being the most accurate like GPS or atomic clocks. Cisco routers can take on different roles in an NTP network like server, client, or peer. They can operate at stratum 8 when synchronized or 16 when unsynchronized. Root Guard is configured at the port level and prevents switches downstream from becoming the root or secondary root, instead placing the port in a root-inconsistent state until superior BPDUs stop coming in. Authentication verifies if a user should access the network, and VPNs allow private and secure connections between endpoints like different company sites through tunnels. Configuring a site-to-site VPN is a five-step process involving
NTP uses a hierarchy of stratums to synchronize time accuracy, with stratum 0 being the most accurate like GPS or atomic clocks. Cisco routers can take on different roles in an NTP network like server, client, or peer. They can operate at stratum 8 when synchronized or 16 when unsynchronized. Root Guard is configured at the port level and prevents switches downstream from becoming the root or secondary root, instead placing the port in a root-inconsistent state until superior BPDUs stop coming in. Authentication verifies if a user should access the network, and VPNs allow private and secure connections between endpoints like different company sites through tunnels. Configuring a site-to-site VPN is a five-step process involving
NTP uses a hierarchy of stratums to synchronize time accuracy, with stratum 0 being the most accurate like GPS or atomic clocks. Cisco routers can take on different roles in an NTP network like server, client, or peer. They can operate at stratum 8 when synchronized or 16 when unsynchronized. Root Guard is configured at the port level and prevents switches downstream from becoming the root or secondary root, instead placing the port in a root-inconsistent state until superior BPDUs stop coming in. Authentication verifies if a user should access the network, and VPNs allow private and secure connections between endpoints like different company sites through tunnels. Configuring a site-to-site VPN is a five-step process involving
NTP uses a hierarchy of stratums to synchronize time accuracy, with stratum 0 being the most accurate like GPS or atomic clocks. Cisco routers can take on different roles in an NTP network like server, client, or peer. They can operate at stratum 8 when synchronized or 16 when unsynchronized. Root Guard is configured at the port level and prevents switches downstream from becoming the root or secondary root, instead placing the port in a root-inconsistent state until superior BPDUs stop coming in. Authentication verifies if a user should access the network, and VPNs allow private and secure connections between endpoints like different company sites through tunnels. Configuring a site-to-site VPN is a five-step process involving
Download as TXT, PDF, TXT or read online from Scribd
Download as txt, pdf, or txt
You are on page 1of 2
NTP is set up as a hierarchy, and the levels/layers are called stratums.
The lower the number, the more accurate the time.
Top stratum layer is 0-those are GPS clocks or atomic clock. Cisco routers cannot serve a stratum 0 devices. Cisco routers can take on one of there roles in out NTP network Server, client, peer.NTP use UDP port 123.By default, cisco rotuer take 8 stratums when NTP is sychronized when unsynchronized 16 stratums. 0-Emergencies (Lot of trouble) 1-Alerts (Take care of this now) 2-Critical (Really Important) 3-Errors (Should know about this) 4-Warnings (You have to know about this) 5-Notifications (Look at this ) 6-Information (Interesting) 7-Debugging (Stuff behind commands) Root Guard is configured at the port level, and disqualifies any switch downstream from that port from becoming the root OR secondary root. The port is not disabled but placed into root-inconsistent state. When those superior BPDUs stop coming in, the port will return to normal operation. Authenication is the process of deciding of a given user should be allowed to access the network or a network serivce in the first place. time-rang <Name-of-Time) vpn Virtual -Doesn't exist physically, its a tunnel between two endpoints Private- open only to the two parties at the endpoints Network- its a network VPN are basically a point to point WAN A site-to-site VPN allows users at one compnay site to connect securely to anoth er company site. VPN good points are Scalability, cost and Security Authentication: ciphers and keys Data Integrity: hashes Confidentiality: there are two major classess of encryption algorithms Asymmetric & Symmetric Symmetric uses one single key for both encryption and decryption. In VPN only go ing to take place if both ends possess the key.Faster than asymmetric. Symmetric algorithms includes DES,3DES, AES,RC4,Blowfish and IDEA. Aysmmetric uses one key to encrypt data and a separate key to decrypt the same d ata. One key is the public key and the other is private key.Aysmmetric algorithm s includes Diffie-Hellman,RSA, DSS. RSA uses two keys one public and other private key, Slow operation DES is the key size its only 56 bits IPSec short for IP Security, IPSec allows use to authenticate encrypt every IP p acket in a particular data stream.Runs at layer 3.IPSec uses checksums and hashi ng algorithms such as MD5 and SHA1 to assure data integrity. Authentication Header (AH), defines a method for authencation and securing data. AH doesnt provide data confidentiality Encapsulating Security Payload (ESP), defines a method for authencating, securit y and encrypting data. provide data confidentiality Internet Key Echange (IDE), negotiates the security parameters and authenticatio n keys
Configuring a site-to-site VPN is a five-step process:
Process initializaiton via intresting traffic IKE Phase 1 (IKE SA Negotiation) IKE Phase 2 (IPSec SA Negotiation) Data Transfer Tunnel Termination