tag:blogger.com,1999:blog-64453506848957217482023-11-16T07:35:14.960+00:00Welcome to Most Wanted IT TechnologyUnknownnoreply@blogger.comBlogger86125tag:blogger.com,1999:blog-6445350684895721748.post-73230776657723894812010-05-24T22:24:00.002+01:002010-05-24T22:26:46.966+01:00Knowledgenet 642-611 MPLS with elabs and study guideThe MPLS exam is a qualifying exam for the CCIP certification (Cisco Certified Internetwork Professional). The 643-611 MPLS exam will test materials covered under the Implementing Cisco MPLS course. The exam will certify that the successful candidate has knowledge and skills necessary to gather information from the technology basics to some of the more updated features and functions such as Traffic Engineering, Fast Reroute and any Transport over MPLS (AToM). The exam covers topics on MPLS Concepts, MPLS Label Assignment and Distribution, Frame-Mode/Cell-Mode MPLS Implementation on Cisco IOS Platforms, MPLS Virtual Private Networks Technology, MPLS VPN Implementation, Complex MPLS VPNs, and Internet Access from a MPLS VPN<br /><br />The following information provides general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam.<br />* Explain basic core MPLS technology and concepts<br />* Explain the function of MPLS Labels and Label Stack<br />* Identify MPLS Applications<br /><br />MPLS Operation<br /><br />* Describe the characteristics and behaviors of Label Distribution in Frame-mode MPLS<br />* Explain Convergence in Frame-mode MPLS<br />* Describe the characteristics and behaviors of Label Distribution over LC-ATM Interfaces and VC Merge<br />* Describe the features of MPLS Label Allocation, Distribution, and Retention Modes<br />* Explain the process of LDP Neighbor Discovery<br /><br />Frame-Mode/Cell-Mode MPLS Implementation, Configuration and Troubleshooting<br /><br />* Identify the functions of CEF Switching<br />* Explain and configure Frame-mode MPLS on Cisco IOS platforms<br />* Monitor MPLS on Cisco IOS platforms - Frame-mode interfaces<br />* Troubleshoot Frame-Mode MPLS configurations on Cisco IOS Platforms<br />* Explain and configure Label-Controlled ATM MPLS<br />* Explain and configure LC-ATM MPLS over ATM Virtual Path<br />* Monitor LC-ATM MPLS on Cisco IOS platforms<br /><br />MPLS Virtual Private Networks Technology<br /><br />* Describe the characteristics and functions of Virtual Private Networks<br />* Describe Overlay and Peer-to-Peer VPNs<br />* Explain Major VPN Categorization<br />* Describe MPLS VPN Architecture<br />* Describe the MPLS VPN Routing Model<br />* Explain the process of MPLS VPN Packet Forwarding<br /><br />MPLS VPN Implementation, Configuration and Troubleshooting<br /><br />* Explain MPLS VPN Mechanisms supported on Cisco Platforms<br />* Configure VRF tables<br />* Configure MP-BGP Session between PE routers<br />* Configure Small Scale Routing Protocols<br />* Monitor MPLS VPN Operation<br />* Configure OSPF as the Routing Protocol<br />* Configure BGP as the Routing Protocol<br />* Troubleshoot basic MPLS VPN configuration errors<br /><br />Complex MPLS VPNs<br /><br />* Describe the advanced VRF Import/Export Features<br />* Explain the characteristics of Overlapping VPNs<br />* Explain the features of Central Services VPNs<br />* Describe Managed CE Router Service<br /><br />Internet Access from a MPLS VPN<br /><br />* Explain VPN Internet Access Topologies<br />* Describe VPN Internet Access Implementation Methods<br />* Describe the methods to Separate Internet Access from VPN Service<br />* Internet Access Backbone as a Separate VPN<br /><br /><br />For more information and download links check out commentsUnknownnoreply@blogger.com3tag:blogger.com,1999:blog-6445350684895721748.post-78055889157485542282010-05-24T22:16:00.001+01:002010-05-24T22:18:59.771+01:00Internetwork Expert Open Series Lectures MPLS TroubleshootingMPLS troubleshooting <br /><br />This release describes how to troubleshoot Multiprotocol Label Switching (MPLS).<br /><br />check out comments for more.Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-6445350684895721748.post-68438857657561423432010-02-08T06:43:00.003+00:002010-02-08T06:46:54.742+00:00Hot News:<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgL8gjjxKKCf9nZR0VSptNXAZ5b_G8PHh_YiHxZofTwXdCHd7H0xVZcB3p5nvQIz_DG-VuBCq7jG2pOD9N4bBwy8VYyCJPu-WmE_G3WXPWfWitDV7KYP2AZpvnQCy5Xaf21_hOsUX05wE0/s1600-h/ShowCover.jpg"><img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 253px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgL8gjjxKKCf9nZR0VSptNXAZ5b_G8PHh_YiHxZofTwXdCHd7H0xVZcB3p5nvQIz_DG-VuBCq7jG2pOD9N4bBwy8VYyCJPu-WmE_G3WXPWfWitDV7KYP2AZpvnQCy5Xaf21_hOsUX05wE0/s320/ShowCover.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5435760258233399362" /></a><br /><br />CCNP TSHOOT 642-832 Official Certification Guide has been released today! for more information check out this link below....:<br /><br />http://www.ciscopress.com/bookstore/product.asp?isbn=1587058448Unknownnoreply@blogger.com4tag:blogger.com,1999:blog-6445350684895721748.post-4893563981541190242010-01-26T11:17:00.002+00:002010-01-26T11:19:44.108+00:00CCNP Certification<h1 style="text-align: justify;" class="title-section">Career Certifications & Paths</h1><div> </div><h2 style="text-align: justify;" class="title-page">CCNP</h2><div style="text-align: justify;"> <a name="content"></a> <!-- CDC-DM: Main Col Start --> <!-- Begin Template Setup --> <code> <link rel="stylesheet" type="text/css" href="http://www.cisco.com/swa/c/sitecopy_setup_eot_hybrid.css"> </code> <!-- End Template Setup --> <!-- Begin Content Area --> <!-- Content Region 2-1mix Setup --> </div><h1 style="text-align: justify;">CCNP Certification</h1><div style="text-align: justify;"> </div><table style="float: right; margin-left: 0px; text-align: left; margin-right: 0px;" border="0" cellpadding="0" cellspacing="0"> <tbody><tr valign="top"> <td align="center"><img src="http://www.cisco.com/web/learning/images/training/CiscoPyramid_Revised.jpg" alt="" width="190" border="0" height="167" /></td> </tr> </tbody></table><div style="text-align: justify;"> </div><p style="text-align: justify;" class="expanded-spacing">Cisco Certified Network Professional (CCNP®) validates the ability to plan, implement, verify and troubleshoot local and wide-area enterprise networks and work collaboratively with specialists on advanced security, voice, wireless and video solutions. The CCNP certification is appropriate for those with at least one year of networking experience who are ready to advance their skills and work independently on complex network solutions. Those who achieve CCNP have demonstrated the skills required in enterprise roles such as network technician, support engineer, systems engineer or network engineer.</p><div style="text-align: justify;"> </div><p style="text-align: justify;" class="expanded-spacing">Find out more about <a onclick="'s_objectID="" href="https://learningnetwork.cisco.com/docs/DOC-6393">changes to CCNP certification announced on January 25, 2010</a> and use our <a onclick="'s_objectID="" href="http://www.cisco.com/web/learning/le3/le2/le37/le10/ccnp_exam_combo_tool.html">CCNP exam combination tool</a> to show which additional exams are required, based on the exams you've already passed.</p><div style="text-align: justify;"> </div><p style="text-align: justify;" class="expanded-spacing"><a onclick="'s_objectID="" view="overview_1" href="https://learningnetwork.cisco.com/community/certifications/ccnp/syllabus?view=overview" target="_blank">CCNP syllabus</a></p><div style="text-align: justify;"> </div><p style="text-align: justify;" class="expanded-spacing"><b>Partners:</b> Log in for Partner E-Learning Connection (PEC) learning map</p><div style="text-align: justify;"> </div><ul style="text-align: justify;" class="compact-bulleted"><li><a onclick="'s_objectID="" url="lmapdisp.asp?mapid="10113_1" href="http://cisco.partnerelearning.com/PEC/Direct.asp?URL=lmapdisp.asp?mapid=10113" target="_blank" class="modulecontentlink">CCNP Track I Learning Map<img src="http://www.cisco.com/images/training/icon_popup.gif" alt="" width="15" border="0" height="9" /></a></li><li><a onclick="'s_objectID="" url="lmapdisp.asp?mapid="10114_1" href="http://cisco.partnerelearning.com/PEC/Direct.asp?URL=lmapdisp.asp?mapid=10114" target="_blank" class="modulecontentlink">CCNP Track II Learning Map<img src="http://www.cisco.com/images/training/icon_popup.gif" alt="" width="15" border="0" height="9" /></a></li></ul><div style="text-align: justify;"> </div><div style="text-align: justify;" class="spotlight-magic"> </div><div style="text-align: justify;"> <!-- </div> </div> --> <!-- content-region-both-top --> <!-- <div class="content-region-both-bottom"> <div class="item"> --> </div><table style="text-align: left; margin-left: 0px; margin-right: 0px;" class="table-formatted-alt"> <tbody><tr class="primary-header"> <th colspan="2"> <div align="left">CCNP Prerequisites</div> </th> </tr> <tr valign="top"> <td colspan="2" class="td-content-left" style="border-right: 1px solid rgb(204, 204, 204);"> Valid <a onclick="'s_objectID="" view="overview_1" href="https://learningnetwork.cisco.com/community/certifications/ccna?view=overview" target="_blank">CCNA</a> certification or any CCIE Certification can act as a pre-requisite. </td> </tr> <tr valign="top"> <td colspan="2" class="td-content-left" style="border: medium none ;"> <p class="expanded-spacing">Until July 31, 2010 candidates have four different paths to CCNP certification:</p> <p class="expanded-spacing"><b>Path 1:</b> Candidates already in the process of certifying may use their passing scores on ISCW and ONT. This path is not recommended for candidates who have not yet attempted ISCW or ONT.</p> </td> </tr> <tr class="primary-header"> <th colspan="2"> <div align="left">CCNP Exams & Recommended Training</div> </th> </tr> <tr> <th width="33%"> <div align="left">Required Exam(s)</div> </th> <th width="67%"> <div align="left">Recommended Training</div> </th> </tr> <tr valign="top"> <td class="td-content-left" style="border-bottom: medium none;"> <a onclick="'s_objectID="" view="overview_1" href="https://learningnetwork.cisco.com/community/certifications/ccnp/bsci?view=overview" target="_blank">642-901 BSCI</a>
<br /> <span style="color: red;">Last day to test: July 31, 2010</span> </td> <td class="td-content-right" style="border-bottom: medium none;"> Building Scalable Cisco Internetworks (<a onclick="'s_objectID="" action="CourseDesc&COURSE_ID="4952_1" href="http://tools.cisco.com/E-Learning-IT/LPCM/LpcmLLController?action=CourseDesc&COURSE_ID=4952" target="_blank">BSCI</a>) </td> </tr> <tr valign="top"> <td class="td-content-left" style="border-bottom: medium none;">OR</td> <td class="td-content-right" style="border-bottom: medium none;"> </td> </tr> <tr valign="top"> <td class="td-content-left"> <a onclick="'s_objectID="" tab="overview_1" href="https://learningnetwork.cisco.com/community/certifications/ccnp/route?tab=overview">642-902 ROUTE</a>
<br /> Available March 10, 2010 </td> <td class="td-content-right">Implementing Cisco IP Routing (<a onclick="'s_objectID="" action="CourseDesc&COURSE_ID="5558_1" href="http://tools.cisco.com/E-Learning-IT/LPCM/LpcmLLController?action=CourseDesc&COURSE_ID=5558" target="_blank">ROUTE</a>)</td> </tr> <tr valign="top"> <td class="td-content-left" style="border-bottom: medium none;"> <a onclick="'s_objectID="" view="overview_1" href="https://learningnetwork.cisco.com/community/certifications/ccnp/bcmsn?view=overview" target="_blank">642-812 BCMSN</a>
<br /> <span style="color: red;">Last day to test: July 31, 2010</span> </td> <td class="td-content-right" style="border-bottom: medium none;"> Building Cisco Multilayer Switched Networks (<a onclick="'s_objectID="" action="CourseDesc&COURSE_ID="4951_1" href="http://tools.cisco.com/E-Learning-IT/LPCM/LpcmLLController?action=CourseDesc&COURSE_ID=4951" target="_blank">BCMSN</a>) </td> </tr> <tr valign="top"> <td class="td-content-left" style="border-bottom: medium none;">OR</td> <td class="td-content-right" style="border-bottom: medium none;"> </td> </tr> <tr valign="top"> <td class="td-content-left"> <a onclick="'s_objectID="" tab="overview_1" href="https://learningnetwork.cisco.com/community/certifications/ccnp/switch?tab=overview">642-813 SWITCH</a>
<br /> Available March 10, 2010 </td> <td class="td-content-right">Implementing Cisco IP Switched Networks (<a onclick="'s_objectID="" action="CourseDesc&COURSE_ID="5557_1" href="http://tools.cisco.com/E-Learning-IT/LPCM/LpcmLLController?action=CourseDesc&COURSE_ID=5557" target="_blank">SWITCH</a>)</td> </tr> <tr valign="top"> <td class="td-content-left"> <a onclick="'s_objectID="" view="overview_1" href="https://learningnetwork.cisco.com/community/certifications/ccnp/iscw?view=overview" target="_blank">642-825 ISCW</a>
<br /> <span style="color: red;">Last day to test: July 31, 2010</span> </td> <td class="td-content-right"> Implementing Secure Converged Wide Area Networks (<a onclick="'s_objectID="" action="CourseDesc&COURSE_ID="4954_1" href="http://tools.cisco.com/E-Learning-IT/LPCM/LpcmLLController?action=CourseDesc&COURSE_ID=4954" target="_blank">ISCW</a>) </td> </tr> <tr valign="top"> <td class="td-content-left"> <a onclick="'s_objectID="" view="overview_1" href="https://learningnetwork.cisco.com/community/certifications/ccnp/ont?view=overview" target="_blank">642-845 ONT</a>
<br /> <span style="color: red;">Last day to test: July 31, 2010</span> </td> <td class="td-content-right"> Optimizing Converged Cisco Networks (<a onclick="'s_objectID="" action="CourseDesc&COURSE_ID="4953_1" href="http://tools.cisco.com/E-Learning-IT/LPCM/LpcmLLController?action=CourseDesc&COURSE_ID=4953" target="_blank">ONT</a>) </td> </tr> <tr valign="top"> <td colspan="2" class="td-content-center" style="border: medium none ;" align="center"><h3>OR</h3></td> </tr> <tr valign="top"> <td colspan="2" class="td-content-left" style="border: medium none ;"> <p class="expanded-spacing"><b>Path 2:</b> Same as Path 1, except that the single COMP exam is used instead of the individual BSCI and BCMSN. Again, this path is not recommended for candidates who have not yet attempted ISCW or ONT.</p> </td> </tr> <tr> <th> <div align="left">Required Exam(s)</div> </th> <th> <div align="left">Recommended Training</div> </th> </tr> <tr valign="top"> <td class="td-content-left"> <a onclick="'s_objectID="" view="overview_1" href="https://learningnetwork.cisco.com/community/certifications/ccnp/composite?view=overview" target="_blank">642-892 Composite</a>
<br /> <span style="color: red;">Last day to test: July 31, 2010</span> </td> <td class="td-content-right"> Building Scalable Cisco Internetworks (<a onclick="'s_objectID="" action="CourseDesc&COURSE_ID="4952_2" href="http://tools.cisco.com/E-Learning-IT/LPCM/LpcmLLController?action=CourseDesc&COURSE_ID=4952" target="_blank">BSCI</a>)
<br />
<br /> Building Cisco Multilayer Switched Networks (<a onclick="'s_objectID="" action="CourseDesc&COURSE_ID="4951_2" href="http://tools.cisco.com/E-Learning-IT/LPCM/LpcmLLController?action=CourseDesc&COURSE_ID=4951" target="_blank">BCMSN</a>) </td> </tr> <tr valign="top"> <td class="td-content-left"> <a onclick="'s_objectID="" view="overview_2" href="https://learningnetwork.cisco.com/community/certifications/ccnp/iscw?view=overview" target="_blank">642-825 ISCW</a>
<br /> <span style="color: red;">Last day to test: July 31, 2010</span> </td> <td class="td-content-right"> Implementing Secure Converged Wide Area Networks (<a onclick="'s_objectID="" action="CourseDesc&COURSE_ID="4954_2" href="http://tools.cisco.com/E-Learning-IT/LPCM/LpcmLLController?action=CourseDesc&COURSE_ID=4954" target="_blank">ISCW</a>) </td> </tr> <tr valign="top"> <td class="td-content-left"> <a onclick="'s_objectID="" view="overview_2" href="https://learningnetwork.cisco.com/community/certifications/ccnp/ont?view=overview" target="_blank">642-845 ONT</a>
<br /> <span style="color: red;">Last day to test: July 31, 2010</span> </td> <td class="td-content-right"> Optimizing Converged Cisco Networks (<a onclick="'s_objectID="" action="CourseDesc&COURSE_ID="4953_2" href="http://tools.cisco.com/E-Learning-IT/LPCM/LpcmLLController?action=CourseDesc&COURSE_ID=4953" target="_blank">ONT</a>) </td> </tr> <tr valign="top"> <td colspan="2" class="td-content-center" style="border: medium none ;" align="center"><h3>OR</h3></td> </tr> <tr valign="top"> <td colspan="2" class="td-content-left" style="border: medium none ;"><div style="text-align: justify;"> </div><p style="text-align: justify;" class="expanded-spacing"><b>Path 3:</b> Candidates substitute the new TSHOOT exam (or TSHOOT beta exam) for ISCW and ONT, passing three exams to complete CCNP certification. This is the recommended path for candidates who have not yet taken the ISCW or ONT courses or exams and will become the only available path after July 31,2010.</p> </td> </tr> <tr> <th> <div align="left">Required Exam(s)</div> </th> <th> <div align="left">Recommended Training</div> </th> </tr> <tr valign="top"> <td class="td-content-left" style="border-bottom: medium none;"> <a onclick="'s_objectID="" view="overview_2" href="https://learningnetwork.cisco.com/community/certifications/ccnp/bsci?view=overview" target="_blank">642-901 BSCI</a>
<br /> <span style="color: red;">Last day to test: July 31, 2010</span> </td> <td class="td-content-right" style="border-bottom: medium none;"> Building Scalable Cisco Internetworks (<a onclick="'s_objectID="" action="CourseDesc&COURSE_ID="4952_3" href="http://tools.cisco.com/E-Learning-IT/LPCM/LpcmLLController?action=CourseDesc&COURSE_ID=4952" target="_blank">BSCI</a>) </td> </tr> <tr valign="top"> <td class="td-content-left" style="border-bottom: medium none;">OR</td> <td class="td-content-right" style="border-bottom: medium none;"> </td> </tr> <tr valign="top"> <td class="td-content-left"> <a onclick="'s_objectID="" tab="overview_2" href="https://learningnetwork.cisco.com/community/certifications/ccnp/route?tab=overview">642-902 ROUTE</a>
<br /> Available March 10, 2010 </td> <td class="td-content-right">Implementing Cisco IP Routing (<a onclick="'s_objectID="" action="CourseDesc&COURSE_ID="5558_2" href="http://tools.cisco.com/E-Learning-IT/LPCM/LpcmLLController?action=CourseDesc&COURSE_ID=5558" target="_blank">ROUTE</a>)</td> </tr> <tr valign="top"> <td class="td-content-left" style="border-bottom: medium none;"> <a onclick="'s_objectID="" view="overview_2" href="https://learningnetwork.cisco.com/community/certifications/ccnp/bcmsn?view=overview" target="_blank">642-812 BCMSN</a>
<br /> <span style="color: red;">Last day to test: July 31, 2010</span> </td> <td class="td-content-right" style="border-bottom: medium none;"> Building Cisco Multilayer Switched Networks (<a onclick="'s_objectID="" action="CourseDesc&COURSE_ID="4951_3" href="http://tools.cisco.com/E-Learning-IT/LPCM/LpcmLLController?action=CourseDesc&COURSE_ID=4951" target="_blank">BCMSN</a>) </td> </tr> <tr valign="top"> <td class="td-content-left" style="border-bottom: medium none;">OR</td> <td class="td-content-right" style="border-bottom: medium none;"> </td> </tr> <tr valign="top"> <td class="td-content-left"> <a onclick="'s_objectID="" tab="overview_2" href="https://learningnetwork.cisco.com/community/certifications/ccnp/switch?tab=overview">642-813 SWITCH</a>
<br /> Available March 10, 2010 </td> <td class="td-content-right">Implementing Cisco IP Switched Networks (<a onclick="'s_objectID="" action="CourseDesc&COURSE_ID="5557_2" href="http://tools.cisco.com/E-Learning-IT/LPCM/LpcmLLController?action=CourseDesc&COURSE_ID=5557" target="_blank">SWITCH</a>)</td> </tr> <tr valign="top"> <td class="td-content-left" style="border-bottom: medium none;"> <a onclick="'s_objectID="" tab="overview_1" href="https://learningnetwork.cisco.com/community/certifications/ccnp/tshoot?tab=overview" target="_blank">643-832 TSHOOT BETA</a>
<br /> Available: February 16-March 26, 2010 </td> <td class="td-content-right" style="border-bottom: medium none;"> Troubleshooting and Maintaining Cisco IP Networks (<a onclick="'s_objectID="" action="CourseDesc&COURSE_ID="5559_1" href="http://tools.cisco.com/E-Learning-IT/LPCM/LpcmLLController?action=CourseDesc&COURSE_ID=5559" target="_blank">TSHOOT</a>) </td> </tr> <tr valign="top"> <td class="td-content-left" style="border-bottom: medium none;">OR</td> <td class="td-content-right" style="border-bottom: medium none;"> </td> </tr> <tr valign="top"> <td class="td-content-left"> <a onclick="'s_objectID="" tab="overview_2" href="https://learningnetwork.cisco.com/community/certifications/ccnp/tshoot?tab=overview">642-832 TSHOOT</a>
<br /> Available: April 30, 2010 </td> <td class="td-content-right"> </td> </tr> <tr valign="top"> <td colspan="2" class="td-content-center" style="border: medium none ;" align="center"><h3>OR</h3></td> </tr> <tr valign="top"> <td colspan="2" class="td-content-left" style="border: medium none ;"><div style="text-align: justify;"> </div><p style="text-align: justify;" class="expanded-spacing"><b>Path 4:</b> This is the recommended path for candidates who have passed the COMP exam but not ISCW or ONT. This path can also be used by candidates who will be ready to take (and pass) the COMP exam before July 31, 2010. Please note that candidates who fail an exam attempt must wait five (5) calendar days, beginning the day after the failed attempt, before they may retest for the same exam.</p> </td> </tr> <tr> <th> <div align="left">Required Exam(s)</div> </th> <th> <div align="left">Recommended Training</div> </th> </tr> <tr valign="top"> <td class="td-content-left"> <a onclick="'s_objectID="" view="overview_2" href="https://learningnetwork.cisco.com/community/certifications/ccnp/composite?view=overview" target="_blank">642-892 Composite</a>
<br /> <span style="color: red;">Last day to test: July 31, 2010</span> </td> <td class="td-content-right"> Building Scalable Cisco Internetworks (<a onclick="'s_objectID="" action="CourseDesc&COURSE_ID="4952_4" href="http://tools.cisco.com/E-Learning-IT/LPCM/LpcmLLController?action=CourseDesc&COURSE_ID=4952" target="_blank">BSCI</a>)
<br />
<br /> Building Cisco Multilayer Switched Networks (<a onclick="'s_objectID="" action="CourseDesc&COURSE_ID="4951_4" href="http://tools.cisco.com/E-Learning-IT/LPCM/LpcmLLController?action=CourseDesc&COURSE_ID=4951" target="_blank">BCMSN</a>) </td> </tr> <tr valign="top"> <td class="td-content-left" style="border-bottom: medium none;"> <a onclick="'s_objectID="" tab="overview_3" href="https://learningnetwork.cisco.com/community/certifications/ccnp/tshoot?tab=overview" target="_blank">643-832 TSHOOT BETA</a>
<br /> Available: February 16-March 26, 2010 </td> <td class="td-content-right" style="border-bottom: medium none;"> Troubleshooting and Maintaining Cisco IP Networks (<a onclick="'s_objectID="" action="CourseDesc&COURSE_ID="5559_2" href="http://tools.cisco.com/E-Learning-IT/LPCM/LpcmLLController?action=CourseDesc&COURSE_ID=5559" target="_blank">TSHOOT</a>) </td> </tr> <tr valign="top"> <td class="td-content-left" style="border-bottom: medium none;">OR</td> <td class="td-content-right" style="border-bottom: medium none;"> </td> </tr> <tr valign="top"> <td class="td-content-left"> <a onclick="'s_objectID="" tab="overview_4" href="https://learningnetwork.cisco.com/community/certifications/ccnp/tshoot?tab=overview">642-832 TSHOOT</a>
<br /> Available: April 30, 2010 </td> <td class="td-content-right"> </td> </tr> </tbody></table><div style="text-align: justify;">
<br /> </div><table style="text-align: left; margin-left: 0px; margin-right: 0px;" class="table-formatted-alt"><tbody><tr class="primary-header" align="justify"> <th colspan="2"> CCNP Recertification </th> </tr> <tr align="justify" valign="top"> <td colspan="2" class="td-content-left" style="border-right: 1px solid rgb(204, 204, 204);" width="100%"> <p>Cisco professional level certifications (CCDA, CCNP, CCDP, CCSP, CCVP, and CCIP) are valid for three years. To recertify, pass any 642 exam that is part of the <a onclick="'s_objectID="" href="http://www.cisco.com/web/learning/le3/le2/le37/learning_certification_level_home.html">professional level</a> curriculum or any CCIE/CCDE written exam before the certification expiration date. </p> <p>Achieving or recertifying any of the certifications above automatically extends your active Associate and Professional level certification(s) up to the point of expiration of the last certification achieved. For more information, access the <a onclick="'s_objectID="" href="http://www.cisco.com/web/learning/le3/learning_about_recertification.html">Cisco About Recertification</a> page.</p> </td> </tr> <tr valign="top"> <td colspan="2" class="td-content-center" align="center"> </td> </tr> <tr> <th colspan="2">
<br /></th> </tr> <tr valign="top"> <td colspan="2" class="td-content-left" style="border-right: 1px solid rgb(204, 204, 204);" width="100%">
<br /></td></tr></tbody></table>Unknownnoreply@blogger.com4tag:blogger.com,1999:blog-6445350684895721748.post-50575534573095167662010-01-26T07:49:00.002+00:002010-01-26T08:05:39.440+00:00MSTP - Features and characteristics<div style="text-align: justify;"><span class="content"><h2><a name="where">Where to Use MST</a></h2> <p>This diagram shows a common design that features access Switch A with 1000 VLANs redundantly connected to two distribution Switches, D1 and D2. In this setup, users connect to Switch A, and the network administrator typically seeks to achieve load balancing on the access switch Uplinks based on even or odd VLANs, or any other scheme deemed appropriate.</p> <a name="dia1"> </a><p><a name="dia1"><img alt="147a.gif" src="http://www.cisco.com/image/gif/paws/24248/147a.gif" usemap="" border="0" /></a></p> <p><a name="dia1">These sections are example cases where different types of STP are used on this setup:</a></p> <h3><a name="pvst">PVST+ Case</a></h3> <p>In a Cisco Per-VLAN Spanning Tree (PVST+) environment, the spanning tree parameters are tuned so that half of the VLANs forward on each Uplink trunk. In order to easily achieved this, elect Bridge D1 to be the root for VLANs 501 through 1000, and Bridge D2 to be the root for VLANs 1 through 500. These statements are true for this configuration:</p> <ul><li> <p>In this case, optimum load balancing results.</p> </li><li> <p>One spanning tree instance for each VLAN is maintained, which means 1000 instances for only two different final logical topologies. This considerably wastes CPU cycles for all of the switches in the network (in addition to the bandwidth used for each instance to send its own Bridge Protocol Data Units (BPDUs)).</p> </li></ul> <h3><a name="standard">Standard 802.1q Case</a></h3> <p>The original IEEE 802.1q standard defines much more than simply trunking. This standard defines a Common Spanning Tree (CST) that only assumes one spanning tree instance for the entire bridged network, regardless of the number of VLANs. If the CST is applied to the topology of <a onclick="'s_objectID="" href="http://www.cisco.com/en/US/tech/tk389/tk621/technologies_white_paper09186a0080094cfc.shtml#dia1">this diagram</a>, the result resembles the diagram shown here:</p> <a name="dia2"> </a><p><a name="dia2"><img alt="147b.gif" src="http://www.cisco.com/image/gif/paws/24248/147b.gif" usemap="" border="0" /></a></p> <p><a name="dia2">In a network running the CST, these statements are true:</a></p> <ul><li> <p><a name="dia2">No load balancing is possible; one Uplink needs to block for all VLANs.</a></p> </li><li> <p><a name="dia2">The CPU is spared; only one instance needs to be computed.</a></p> </li></ul> <p><a name="dia2"><b>Note: </b>The Cisco implementation enhances the 802.1q in order to support one PVST. This feature behaves exactly as the PVST in this example. The Cisco per-VLAN BPDUs are tunneled by pure 802.1q bridges.</a></p> <h3><a name="mst">MST Case</a></h3> <p>MSTs (IEEE 802.1s) combine the best aspects from both the PVST+ and the 802.1q. The idea is that several VLANs can be mapped to a reduced number of spanning tree instances because most networks do not need more than a few logical topologies. In the topology described in the first diagram, there are only two different final logical topologies, so only two spanning tree instances are really necessary. There is no need to run 1000 instances. If you map half of the 1000 VLANs to a different spanning tree instance, as shown in this diagram, these statements are true:</p> <ul><li> <p>The desired load balancing scheme can still be achieved, because half of the VLANs follow one separate instance.</p> </li><li> <p>The CPU is spared because only two instances are computed.</p> </li></ul> <p><img alt="147c.gif" src="http://www.cisco.com/image/gif/paws/24248/147c.gif" usemap="" border="0" /></p> <p>From a technical standpoint, MST is the best solution. From an end-user's perspective, the main drawbacks associated with a migration to MST are:</p> <ul><li> <p>The protocol is more complex than the usual spanning tree and requires additional training of the staff.</p> </li><li> <p>Interaction with legacy bridges can be a challenge. For more information refer, to the Interaction Between MST Regions and the Outside World section of this document.</p> </li></ul> <h2><a name="mst_region">MST Region</a></h2> <p>As previously mentioned, the main enhancement introduced by MST is that several VLANs can be mapped to a single spanning tree instance. This raises the problem of how to determine which VLAN is to be associated with which instance. More precisely, how to tag BPDUs so that the receiving devices can identify the instances and the VLANs to which each device applies.</p> <p>The issue is irrelevant in the case of the 802.1q standard, where all instances are mapped to a unique instance. In the PVST+ implementation, the association is as follows:</p> <ul><li> <p>Different VLANs carry the BPDUs for their respective instance (one BPDU per VLAN).</p> </li></ul> <p>The Cisco MISTP sent a BPDU for each instance, including a list of VLANs that the BPDU was responsible for, in order to solve this problem. If by error, two switches were misconfigured and had a different range of VLANs associated to the same instance, it was difficult for the protocol to recover properly from this situation.</p> <p>The IEEE 802.1s committee adopted a much easier and simpler approach that introduced MST regions. Think of a region as the equivalent of Border Gateway Protocol (BGP) Autonomous Systems, which is a group of switches placed under a common administration.</p> <h2><a name="mst_config_region">MST Configuration and MST Region</a></h2> <p>Each switch running MST in the network has a single MST configuration that consists of these three attributes:</p> <ol type="1"><li> <p>An alphanumeric configuration name (32 bytes)</p> </li><li> <p>A configuration revision number (two bytes)</p> </li><li> <p>A 4096-element table that associates each of the potential 4096 VLANs supported on the chassis to a given instance</p> </li></ol> <p>In order to be part of a common MST region, a group of switches must share the same configuration attributes. It is up to the network administrator to properly propagate the configuration throughout the region. Currently, this step is only possible by the means of the command line interface (CLI) or through Simple Network Management Protocol (SNMP). Other methods can be envisioned, as the IEEE specification does not explicitly mention how to accomplish that step.</p> <p><b>Note: </b>If for any reason two switches differ on one or more configuration attribute, the switches are part of different regions. For more information refer to the Region Boundary section of this document.</p><p><a name="region_bound"><span class="content"><p>In order to ensure consistent VLAN-to-instance mapping, it is necessary for the protocol to be able to exactly identify the boundaries of the regions. For that purpose, the characteristics of the region are included in the BPDUs. The exact VLANs-to-instance mapping is not propagated in the BPDU, because the switches only need to know whether they are in the same region as a neighbor. Therefore, only a digest of the VLANs-to-instance mapping table is sent, along with the revision number and the name. Once a switch receives a BPDU, the switch extracts the digest (a numerical value derived from the VLAN-to-instance mapping table through a mathematical function) and compares this digest with its own computed digest. If the digests differ, the port on which the BPDU was received is at the boundary of a region.</p> <p>In generic terms, a port is at the boundary of a region if the designated bridge on its segment is in a different region or if it receives legacy 802.1d BPDUs. In this diagram, the port on B1 is at the boundary of region A, whereas the ports on B2 and B3 are internal to region B:</p> <p><img alt="147d.gif" src="http://www.cisco.com/image/gif/paws/24248/147d.gif" usemap="" border="0" /></p> <h3><a name="mst_instances">MST Instances</a></h3> <p>According to the IEEE 802.1s specification, an MST bridge must be able to handle at least these two instances:</p> <ul><li> <p>One Internal Spanning Tree (IST)</p> </li><li> <p>One or more Multiple Spanning Tree Instance(s) (MSTIs)</p> </li></ul> <p>The terminology continues to evolve, as 802.1s is actually in a pre-standard phase. It is likely these names will change in the final release of 802.1s. The Cisco implementation supports 16 instances: one IST (instance 0) and 15 MSTIs.</p> <h3><a name="ist_instances">IST Instances</a></h3> <p>In order to clearly understand the role of the IST instance, remember that MST originates from the IEEE. Therefore, MST must be able to interact with 802.1q-based networks, because 802.1q is another IEEE standard. For 802.1q, a bridged network only implements a single spanning tree (CST). The IST instance is simply an RSTP instance that extends the CST inside the MST region.</p> <p>The IST instance receives and sends BPDUs to the CST. The IST can represent the entire MST region as a CST virtual bridge to the outside world.</p> <p>These are two functionally equivalent diagrams. Notice the location of the different blocked ports. In a typically bridged network, you expect to see a blocked port between Switches M and B. Instead of blocking on D, you expect to have the second loop broken by a blocked port somewhere in the middle of the MST region. However, due to the IST, the entire region appears as one virtual bridge that runs a single spanning tree (CST). This makes it possible to understand that the virtual bridge blocks an alternate port on B. Also, that virtual bridge is on the C to D segment and leads Switch D to block its port.</p> <p><img alt="147e.gif" src="http://www.cisco.com/image/gif/paws/24248/147e.gif" usemap="" border="0" /></p> <p>The exact mechanism that makes the region appear as one virtual CST bridge is beyond the scope of this document, but is amply described in the IEEE 802.1s specification. However, if you keep this virtual bridge property of the MST region in mind, the interaction with the outside world is much easier to understand.</p> <h3><a name="misti">MSTIs</a></h3> <p>The MSTIs are simple RSTP instances that only exist inside a region. These instances run the RSTP automatically by default, without any extra configuration work. Unlike the IST, MSTIs never interact with the outside of the region. Remember that MST only runs one spanning tree outside of the region, so except for the IST instance, regular instances inside of the region have no outside counterpart. Additionally, MSTIs do not send BPDUs outside a region, only the IST does.</p> <p>MSTIs do not send independent individual BPDUs. Inside the MST region, bridges exchange MST BPDUs that can be seen as normal RSTP BPDUs for the IST while containing additional information for each MSTI. This diagram shows a BPDU exchange between Switches A and B inside an MST region. Each switch only sends one BPDU, but each includes one MRecord per MSTI present on the ports.</p> <p><img alt="147f.gif" src="http://www.cisco.com/image/gif/paws/24248/147f.gif" usemap="" border="0" /></p> <p><b>Note: </b>In this diagram, notice that the first information field carried by an MST BPDU contains data about the IST. This implies that the IST (instance 0) is always present everywhere inside an MST region. However, the network administrator does not have to map VLANs onto instance 0, and therefore this is not a source of concern.</p> <p>Unlike regular converged spanning tree topology, both ends of a link can send and receive BPDUs simultaneously. This is because, as shown in this diagram, each bridge can be designated for one or more instances and needs to transmit BPDUs. As soon as a single MST instance is designated on a port, a BPDU that contains the information for all instances (IST+ MSTIs) is to be sent. The diagram shown here demonstrates MST BDPUs sent inside and outside of an MST region:</p> <p><img alt="147g.gif" src="http://www.cisco.com/image/gif/paws/24248/147g.gif" usemap="" border="0" /></p> <p>The MRecord contains enough information (mostly root bridge and sender bridge priority parameters) for the corresponding instance to calculate its final topology. The MRecord does not need any timer-related parameters such as hello time, forward delay, and max age that are typically found in a regular IEEE 802.1d or 802.1q CST BPDU. The only instance in the MST region to use these parameters is the IST; the hello time determines how frequently BPDUs are sent, and the forward delay parameter is mainly used when rapid transition is not possible (remember that rapid transitions do not occur on shared links). As MSTIs depend on the IST to transmit their information, MSTIs do not need those timers.</p> <h3><a name="misconfigs">Common Misconfigurations</a></h3> <p>The independence between instance and VLAN is a new concept that implies you must carefully plan your configuration. The IST Instance is Active on All Ports, Whether Trunk or Access section illustrates some common pitfalls and how to avoid them.</p> <h2><a name="ist_active_ports">IST Instance is Active on All Ports, Whether Trunk or Access</a></h2> <p>This diagram shows Switches A and B connected with access ports each located in different VLANs. VLAN 10 and VLAN 20 are mapped to different instances. VLAN 10 is mapped to instance 0, while VLAN 20 is mapped to instance 1.</p> </span></a><a name="diag2"> </a></p><p><a name="diag2"><img alt="147h.gif" src="http://www.cisco.com/image/gif/paws/24248/147h.gif" usemap="" border="0" /></a></p> <p><a name="diag2">This configuration results in pcA 's inability to send frames to pcB. The <b>show</b> command reveals that Switch B is blocking the link to Switch A in VLAN 10, as shown in the this diagram:</a></p> <p><a name="diag2"><img alt="147i.gif" src="http://www.cisco.com/image/gif/paws/24248/147i.gif" usemap="" border="0" /></a></p> <p><a name="diag2">How is that possible in such a simple topology, with no apparent loop?</a></p> <p><a name="diag2">This issue is explained by the fact that MST information is conveyed with only one BPDU (IST BPDU), regardless of the number of internal instances. Individual instances do not send individual BPDUs. When Switch A and Switch B exchange STP information for VLAN 20, the switches send an IST BPDU with an MRecord for instance 1 because that is where VLAN 20 is mapped. However, because it is an IST BPDU, this BPDU also contains information for instance 0. This means that the IST instance is active on all ports inside an MST region, whether these ports carry VLANs mapped to the IST instance or not.</a></p> <p><a name="diag2">This diagram shows the logical topology of the IST instance:</a></p> <p><a name="diag2"><img alt="147j.gif" src="http://www.cisco.com/image/gif/paws/24248/147j.gif" usemap="" border="0" /></a></p> <p><a name="diag2">Switch B receives two BPDUs for instance 0 from Switch A (one on each port). It is clear that Switch B has to block one of its ports in order to avoid a loop.</a></p> <p><a name="diag2">The preferred solution is to use one instance for VLAN 10 and another instance for VLAN 20 to avoid mapping VLANs to the IST instance.</a></p> <p><a name="diag2">An alternative is to carry those VLANs mapped to the IST on all links (allow VLAN 10 on both ports, as in this </a>diagram).</p> <h2><a name="two_vlans_same">Two VLANs Mapped to the Same Instance Block the Same Ports</a></h2> <p>Remember that VLAN no longer means spanning tree instance. The topology is determined by the instance, regardless of the VLANs mapped to it. This diagram shows a problem that is a variant of the one discussed in the <a onclick="'s_objectID="" href="http://www.cisco.com/en/US/tech/tk389/tk621/technologies_white_paper09186a0080094cfc.shtml#ist_active_ports">IST Instance is Active on All Ports, Whether Trunk or Access</a> section:</p> <p><img alt="147k.gif" src="http://www.cisco.com/image/gif/paws/24248/147k.gif" usemap="" border="0" /></p> <p>Suppose that VLANs 10 and 20 are both mapped to the same instance (instance 1). The network administrator wants to manually prune VLAN 10 on one Uplink and VLAN 20 on the other in order to restrict traffic on the Uplink trunks from Switch A to distribution Switches D1 and D2 (an attempt to achieve a topology as described in the previous diagram). Shortly after this is completed, the network administrator notices that users in VLAN 20 have lost connectivity to the network.</p> <p>This is a typical misconfiguration problem. VLANs 10 and 20 are both mapped to instance 1, which means there is only one logical topology for both VLANs. Load-sharing cannot be achieved, as shown here:</p> <p><img alt="147l.gif" src="http://www.cisco.com/image/gif/paws/24248/147l.gif" usemap="" border="0" /></p> <p>Because of the manual pruning, VLAN 20 is only allowed on the blocked port, which explains the loss of connectivity. In order to achieve load balancing, the network administrator must map VLAN 10 and 20 to two different instances.</p> <p>A simple rule to follow to steer clear of this problem is to never manually prune VLANs off a trunk. If you decide to remove some VLANs off a trunk, remove all the VLANs mapped to a given instance together. Never remove an individual VLAN from a trunk and not remove all the VLANs that are mapped to the same instance.</p> <h2><a name="mst_region_world">Interaction Between the MST Region and the Outside World</a></h2> <p>With a migration to an MST network, the administrator is likely to have to deal with interoperability issues between MST and legacy protocols. MST seamlessly interoperates with standard 802.1q CST networks; however, only a handful of networks are based on the 802.1q standard because of its single spanning tree restriction. Cisco released PVST+ at the same time as support for 802.1q was announced. Cisco also provides an efficient yet simple compatibility mechanism between MST and PVST+. This mechanism is explained later in this document.</p> <p>The first property of an MST region is that at the boundary ports no MSTI BPDUs are sent out, only IST BPDUs are. Internal instances (MSTIs) always automatically follow the IST topology at boundary ports, as shown in this diagram:</p> <p><img alt="147m.gif" src="http://www.cisco.com/image/gif/paws/24248/147m.gif" usemap="" border="0" /></p> <p>In this diagram, assume VLANs 10 through 50 are mapped to the green instance, which is an internal instance (MSTI) only. The red links represent the IST, and therefore also represent the CST. VLANs 10 through 50 are allowed everywhere in the topology. BPDUs for the green instance are not sent out of the MST region. This does not mean that there is a loop in VLANs 10 through 50. MSTIs follow the IST at the boundary ports, and the boundary port on Switch B also blocks traffic for the green instance.</p> <p>Switches that run MST are able to automatically detect PVST+ neighbors at boundaries. These switches are able to detect that multiple BPDUs are received on different VLANs of a trunk port for the instance.</p> <p>This diagram shows an interoperability issue. An MST region only interacts with one spanning tree (the CST) outside of the region. However, PVST+ bridges run one Spanning Tree Algorithm (STA) per VLAN, and as a result, send one BPDU on each VLAN every two seconds. The boundary MST bridge does not expect to receive that many BPDUs. The MST bridge either expects to receive one or to send one, depending on whether the bridge is the root of the CST or not.</p> <p><img alt="147n.gif" src="http://www.cisco.com/image/gif/paws/24248/147n.gif" usemap="" border="0" /></p> <p>Cisco developed a mechanism to address the problem shown in this diagram. A possibility could have consisted of tunneling the extra BPDUs sent by the PVST+ bridges across the MST region. However, this solution has proven to be too complex and potentially dangerous when first implemented in the MISTP. A simpler approach was created. The MST region replicates the IST BPDU on all the VLANs to simulate a PVST+ neighbor. This solution implies a few constraints that are discussed in this document.</p> <h2><a name="recommended_configuration">Recommended Configuration</a></h2> <p>As the MST region now replicates the IST BPDUs on every VLAN at the boundary, each PVST+ instance hears a BPDU from the IST root (this implies the root is located inside the MST region). It is recommended that the IST root have a higher priority than any other bridge in the network so that the IST root becomes the root for all of the different PVST+ instances, as shown in this diagram:</p> <p><img alt="147o.gif" src="http://www.cisco.com/image/gif/paws/24248/147o.gif" usemap="" border="0" /></p> <p>In this diagram, Switch C is a PVST+ redundantly connected to an MST region. The IST root is the root for all PVST+ instances that exist on Switch C. As a result, Switch C blocks one of its Uplinks in order to prevent loops. In this particular case, interaction between PVST+ and the MST region is optimal because:</p> <ul><li> <p>Switch C's Uplink ports' costs can be tuned to achieve load balancing of the different VLANs across the Uplinks' ports (because Switch C runs one spanning tree per VLAN, this switch is able to chose which Uplink port blocks on a per-VLAN basis).</p> </li><li> <p>UplinkFast can be used on Switch C to achieve fast convergence in case of an Uplink failure.</p> </li></ul> <h3><a name="alternate_configuration">Alternate Configuration (Not Recommended)</a></h3> <p>Another possibility is to have the IST region be the root for absolutely no PVST+ instance. This means that all PVST+ instances have a better root than the IST instance, as shown in this diagram:</p> <p><img alt="147p.gif" src="http://www.cisco.com/image/gif/paws/24248/147p.gif" usemap="" border="0" /></p> <p>This case corresponds to a PVST+ core and an MST access or distribution layer, a rather infrequent scenario. If you establish the root bridge outside the region, there are these drawbacks as compared to the previously recommended configuration:</p> <ul><li> <p>An MST region only runs one spanning tree instance that interacts with the outside world. This basically means that a boundary port can only be blocking or forwarding for all VLANs. In other terms, there is no load balancing possible between the region's two Uplinks that lead to Switch C. The Uplink on Switch B for the instance will be blocking for all VLANs while Switch A will be forwarding for all VLANs.</p> </li><li> <p>This configuration still allows for fast convergence inside the region. If the Uplink on Switch A fails, a fast switchover to an Uplink on a different switch needs to be achieved. While the way the IST behaves inside the region in order to have the whole MST region resemble a CST bridge was not discussed in detail, you can imagine that a switchover across a region is never as efficient as a switchover on a single bridge.</p> </li></ul> <h3><a name="invalid_configuration">Invalid Configuration</a></h3> <p>While the PVST+ emulation mechanism provides easy and seamless interoperability between MST and PVST+, this mechanism implies that any configuration other than the two previously mentioned is invalid. These are the basic rules that must be followed to get a successful MST and PVST+ interaction:</p> <ol type="1"><li> <p>If the MST bridge is the root, this bridge must be the root for all VLANs.</p> </li><li> <p>If the PVST+ bridge is the root, this bridge must be the root for all VLANs (including the CST, which always runs on VLAN 1, regardless of the native VLAN, when the CST runs PVST+).</p> </li><li> <p>The simulation fails and produces an error message if the MST bridge is the root for the CST, while the PVST+ bridge is the root for one or more other VLANs. A failed simulation puts the boundary port in root inconsistent mode.</p> </li></ol> <p><img alt="147q.gif" src="http://www.cisco.com/image/gif/paws/24248/147q.gif" usemap="" border="0" /></p> <p>In this diagram, Bridge A in the MST region is the root for all three PVST+ instances except one (the red VLAN). Bridge C is the root of the red VLAN. Suppose that the loop created on the red VLAN, where Bridge C is the root, becomes blocked by Bridge B. This means that Bridge B is designated for all VLANs except the red one. An MST region is not able to do that. A boundary port can only be blocking or forwarding for all VLANs because the MST region is only running one spanning tree with the outside world. Thus, when Bridge B detects a better BPDU on its boundary port, the bridge invokes the BPDU guard to block this port. The port is placed in the root inconsistent mode. The exact same mechanism also leads Bridge A to block its boundary port. Connectivity is lost; however, a loop-free topology is preserved even in the presence of such a misconfiguration.</p> <p><b>Note: </b>As soon as a boundary port produces a root inconsistent error, investigate whether a PVST+ bridge has attempted to become the root for some VLANs.</p> <h2><a name="migration_strategy">Migration Strategy</a></h2> <p>The first step in the migration to 802.1s/w is to properly identify point-to-point and edge ports. Ensure all switch-to-switch links, on which a rapid transition is desired, are full-duplex. Edge ports are defined through the PortFast feature. Carefully decide how many instances are needed in the switched network, and keep in mind that an instance translates to a logical topology. Decide what VLANs to map onto those instances, and carefully select a root and a back-up root for each instance. Choose a configuration name and a revision number that will be common to all switches in the network. Cisco recommends that you place as many switches as possible into a single region; it is not advantageous to segment a network into separate regions. Avoid mapping any VLANs onto instance 0. Migrate the core first. Change the STP type to MST, and work your way down to the access switches. MST can interact with legacy bridges running PVST+ on a per-port basis, so it is not a problem to mix both types of bridges if interactions are clearly understood. Always try to keep the root of the CST and IST inside the region. If you interact with a PVST+ bridge through a trunk, ensure the MST bridge is the root for all VLANs allowed on that trunk.</p> <p>For sample configurations, refer to:</p> <ul><li> <p><a onclick="'s_objectID="" href="http://www.cisco.com/en/US/products/hw/switches/ps708/products_configuration_example09186a00807b075f.shtml">Configuration Example to Migrate the Spanning Tree from PVST+ to MST</a></p> </li><li> <p><a onclick="'s_objectID="" href="http://www.cisco.com/en/US/products/hw/switches/ps708/products_configuration_example09186a00807b0670.shtml">Spanning Tree from PVST+ to Rapid-PVST Migration Configuration Example</a></p> </li></ul> <h2><a name="conclusion">Conclusion</a></h2> <p>Switched networks must fulfill stringent robustness, resiliency, and high-availability requirements. With growing technologies such as Voice over IP (VoIP) and Video over IP, fast convergence around link or component failures is no longer a desirable characteristic: fast convergence is a must. However, until recently, redundant switched networks had to rely on the relatively sluggish 802.1d STP to achieve those goals. This often turned out to be the network administrator's most challenging task. The only way to get a few seconds off the protocol was to tune the protocol timers, but often at the detriment of the network's health. Cisco has released many 802.1d STP augmentations such as UplinkFast, BackboneFast and PortFast, features that paved the way toward faster spanning tree convergence. Cisco also answered large Layer 2 (L2)-based networks' scalability issues with the development of the MISTP. The IEEE recently decided to incorporate most of these concepts into two standards: 802.1w (RSTP) and 802.1s (MST). With the implementation of these new protocols, convergence times in the low hundreds of milliseconds can be expected while scaling to thousands of VLANs. Cisco remains the leader in the industry and offers these two protocols along with proprietary augmentations in order to facilitate the migration of and interoperability with legacy bridges.</p></span><p></p> <h2><a name="region_bound"></a></h2></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6445350684895721748.post-91068552953848804032009-11-26T07:47:00.001+00:002009-11-26T07:47:49.493+00:00CCNA Lan switching ---- Final exam1<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWXxjXIZVs85syrGtI9D3WEWxbip0_xGR8tkL8efjAVslQsEavJvbLGGRHI4D1coE9OR4t1FzrZPrEm2JdPWp7oL-pb0hgrrLOInMbR9S7CzS9R25YtgLnG4ToygXOlhkt5nFdZFhIvp71/s1600-h/1.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" id="BLOGGER_PHOTO_ID_5329577886166691042" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWXxjXIZVs85syrGtI9D3WEWxbip0_xGR8tkL8efjAVslQsEavJvbLGGRHI4D1coE9OR4t1FzrZPrEm2JdPWp7oL-pb0hgrrLOInMbR9S7CzS9R25YtgLnG4ToygXOlhkt5nFdZFhIvp71/s400/1.jpg" style="margin: 0pt 10px 10px 0pt; cursor: pointer; float: left; height: 185px; width: 400px;" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. The network administrator needs to setup Switch1 for remote access from HostA. The show ip interface brief is issued on Router1 and the show interfaces trunk command is issued on the Switch1 to verify the current status. The administrator applies the additional configuration shown in the exhibit to Switch1. However, the telnet from HostA fails. What additional commands need to be applied<br />to the switch?<br /><br />Switch(config)# interface vlan 1<br />Switch(config-if)# ip address 10.1.1.250 255.255.255.0<br />Switch(config-if)# no shutdown<br />Switch(config-if)# ip default-gateway 10.1.10.254<br /><br />Switch(config)# interface vlan 1<br />Switch(config-if)# ip address 10.1.50.250 255.255.255.0<br />Switch(config-if)# no shutdown<br />Switch(config-if)# ip default-gateway 10.1.50.254<br /><br />Switch(config)# interface vlan 10<br />Switch(config-if)# ip address 10.1.10.250 255.255.255.0<br />Switch(config-if)# no shutdown<br />Switch(config-if)# ip default-gateway 10.1.10.254<br /><br />==> Switch(config)# interface vlan 10<br />Switch(config-if)# ip address 10.1.1.250 255.255.255.0<br />Switch(config-if)# no shutdown<br />Switch(config-if)# ip default-gateway 10.1.10.254<br /><br />Switch(config)# interface vlan 50<br />Switch(config-if)# ip address 10.1.10.250 255.255.255.0<br />Switch(config-if)# no shutdown<br />Switch(config-if)# ip default-gateway 10.1.10.254<br /><br /><br />2<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdKS5hh9WdlyAOMiprdB0RrcOJkDkdajO5l8xS4K5HPE7nY1Km3OipdyPa1Vn2QA0hw1-WvA7IyXFi44SwkGnFI3TxwVJykURZPXVgs4wO_I7XAtZXiHn2NQMsU-uxacVoLfCk8hRuqfC2/s1600-h/2.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" id="BLOGGER_PHOTO_ID_5329578005430373346" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdKS5hh9WdlyAOMiprdB0RrcOJkDkdajO5l8xS4K5HPE7nY1Km3OipdyPa1Vn2QA0hw1-WvA7IyXFi44SwkGnFI3TxwVJykURZPXVgs4wO_I7XAtZXiHn2NQMsU-uxacVoLfCk8hRuqfC2/s400/2.jpg" style="margin: 0pt 10px 10px 0pt; cursor: pointer; float: left; height: 145px; width: 375px;" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. On the basis of the configuration shown, how will an Ethernet frame on port GigabitEthernet0/1 be modified?<br /><br />802.1Q encapsulation prepends a 4-byte tag field in front of the original Ethernet frame and recomputes the frame check sequence (FCS) on the modified frame.<br />==> 802.1Q encapsulation inserts a 4-byte tag field into the original Ethernet frame between the source address and type/length fields and recomputes the frame check sequence (FCS) on the modified frame.<br />802.1Q encapsulation prepends an 802.1p field in front of the original Ethernet frame and recomputes the frame check sequence (FCS) on the modified frame.<br />802.1Q encapsulation inserts an 802.1p field into the original Ethernet frame between the source address and type/length fields and recomputes the frame check sequence (FCS) on the modified frame.<br /><br /><br />3<br />What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?<br />==> All VLANs will be allowed across the trunk.<br />Only VLAN 1 will be allowed across the trunk.<br />Only the native VLAN will be allowed across the trunk.<br />The switches will negotiate via VTP which VLANs to allow across the trunk.<br /><br /><span class="fullpost"><br />4<br />Which parameter is used to uniquely identify one wireless network from another?<br />==> SSID<br />OFDM<br />WEP<br />DSSS<br /><br /><br />5<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoARk0-k2hCVt3KWWGm2RG005kmK2zyqQPFA5Pmey7ZpPQt2peRpjscXVVpoyBK06mGo0_ivyYvdJR0b2Gd67uGGPL0p46N-yEsZLLdxwaHmfoEpiy8zoLguwAl-MjcLoGFLgMJiFBj9L1/s1600-h/5.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" id="BLOGGER_PHOTO_ID_5329578092456960130" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoARk0-k2hCVt3KWWGm2RG005kmK2zyqQPFA5Pmey7ZpPQt2peRpjscXVVpoyBK06mGo0_ivyYvdJR0b2Gd67uGGPL0p46N-yEsZLLdxwaHmfoEpiy8zoLguwAl-MjcLoGFLgMJiFBj9L1/s400/5.jpg" style="margin: 0pt 10px 10px 0pt; cursor: pointer; float: left; height: 274px; width: 400px;" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. What is the consequence if SW1 port F0/1 is configured as an edge port?<br /><br />SW1 port F0/1 transitions to the learning state.<br />==> SW1 port F0/1 can generate a temporary loop.<br />SW1 port F0/1 becomes a non-designated port.<br />SW1 port F0/2 no longer passes BPDUs to SW4.<br /><br /><br />6<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitPNsneq3GMSsJRoLcoUKHjvhFnhe69KgTnO-2MeS58acv4Us6-jyx99eZqvRsxkOt5W4QMTGDM1AoDyjppZA6wqmZYNwzywZK0ixOacVWgJ7UyOvmp7SQ80_rxU-x5ofSVmoQl9uVjvbq/s1600-h/6.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" id="BLOGGER_PHOTO_ID_5329578169178549218" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitPNsneq3GMSsJRoLcoUKHjvhFnhe69KgTnO-2MeS58acv4Us6-jyx99eZqvRsxkOt5W4QMTGDM1AoDyjppZA6wqmZYNwzywZK0ixOacVWgJ7UyOvmp7SQ80_rxU-x5ofSVmoQl9uVjvbq/s400/6.jpg" style="margin: 0pt 10px 10px 0pt; cursor: pointer; float: left; height: 165px; width: 288px;" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. What will allow a host on VLAN 40 on switch X to communicate with a host in VLAN 40 on switch Y?<br /><br />QoS<br />routing<br />==> trunking<br />VPN<br /><br /><br />7<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkfScfoNGqC6RBcYrZZ8dV4_IBVISDaw7S4H-JmYynfc1NsqFXE6mUja5rrMPG7p9esiTpXfCgmZTSK0JyEF04bfhxwypHk_SPMMYI_WcE4kOyfRllM7ded8u6bAUAWyeXuwhyphenhyphen_VjHtZAu/s1600-h/7.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" id="BLOGGER_PHOTO_ID_5329578242049342994" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkfScfoNGqC6RBcYrZZ8dV4_IBVISDaw7S4H-JmYynfc1NsqFXE6mUja5rrMPG7p9esiTpXfCgmZTSK0JyEF04bfhxwypHk_SPMMYI_WcE4kOyfRllM7ded8u6bAUAWyeXuwhyphenhyphen_VjHtZAu/s400/7.jpg" style="margin: 0pt 10px 10px 0pt; cursor: pointer; float: left; height: 307px; width: 400px;" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. Spanning-tree port priorities are 128 for all interfaces. The network administrator enters the spanning-tree vlan 1 root primary command on S4. Which two port results are correct? (Choose two.)<br /><br />==> S1 Gi0/1 becomes a root port.<br />S2 Gi0/2 becomes a non-designated port.<br />S3 Gi0/1 becomes a non-designated port.<br />S4 Gi0/1 becomes a root port.<br />==> S4 Gi0/2 becomes a designated port.<br /><br /><br />8<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXtXo6Rn5U063aYBHl4xKVP8IDB54Sbqztbih9BZBUn9RtLrQNmM_PAFvhNVEyq_DwagtCfdKmQF-RZ1BW85nObqAYSEfiemhlJH4ObkfMu6BK5wLA6-acswncT1vZm9Qz_TaodJAbWc2P/s1600-h/8.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" id="BLOGGER_PHOTO_ID_5329578326248268290" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXtXo6Rn5U063aYBHl4xKVP8IDB54Sbqztbih9BZBUn9RtLrQNmM_PAFvhNVEyq_DwagtCfdKmQF-RZ1BW85nObqAYSEfiemhlJH4ObkfMu6BK5wLA6-acswncT1vZm9Qz_TaodJAbWc2P/s400/8.jpg" style="margin: 0pt 10px 10px 0pt; cursor: pointer; float: left; height: 200px; width: 340px;" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. Which two facts can be confirmed by this output? (Choose two.)<br /><br />This switch shows no configuration revision errors.<br />This switch has established two-way communication with the neighboring devices.<br />==> This switch is configured to advertise its VLAN configuration to other VTP-enabled switches in the same VTP domain.<br />This switch will drop all VTP advertisements that come from the switches that are configured in the same VTP domain.<br />==> This switch will cause no disruption in the VTP domain operations if the rest of the switches in the same VTP domain have a higher configuration revision number.<br /><br /><br />9<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQFTNTm-ZmlVYDFoPsj3XCD4Z7fXIXRRcnnPuMIkAnAC6068t9E0JnDN04AWtlT5gT05mPFh7sePQefx1F8pkHIj9V9l_bAU9yckTtlW_OX3JDPQ9zoFqW5qf2W3BaiAvtLhPwYT8uka3J/s1600-h/9.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" id="BLOGGER_PHOTO_ID_5329578575443178738" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQFTNTm-ZmlVYDFoPsj3XCD4Z7fXIXRRcnnPuMIkAnAC6068t9E0JnDN04AWtlT5gT05mPFh7sePQefx1F8pkHIj9V9l_bAU9yckTtlW_OX3JDPQ9zoFqW5qf2W3BaiAvtLhPwYT8uka3J/s400/9.jpg" style="margin: 0pt 10px 10px 0pt; cursor: pointer; float: left; height: 149px; width: 400px;" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. R1 is configured for traditional inter-VLAN routing. R1 can ping computer 3 but cannot ping computer 1. What is a possible cause for this failure?<br /><br />==> S1 port Fa0/11 is in the wrong VLAN.<br />R1 does not have an active routing protocol.<br />The IP address of computer 1 is in the wrong logical network.<br />Router interface Fa0/0 has the wrong trunk encapsulation type configured.<br /><br /><br />10<br /><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgS-fApxP8PfoHnT7KGydpov88i1urjypokZ8JSMeafWTmOl91oJu_V6g8fDl8chmN30kSEyC9LZAzZjHwNNt2jkyiCdMJzNqkvQl4-KJjjiFqBL0paUQYT7qxyserUVpXcchXYyZbap1MT/s1600-h/10.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" id="BLOGGER_PHOTO_ID_5329578675881651778" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgS-fApxP8PfoHnT7KGydpov88i1urjypokZ8JSMeafWTmOl91oJu_V6g8fDl8chmN30kSEyC9LZAzZjHwNNt2jkyiCdMJzNqkvQl4-KJjjiFqBL0paUQYT7qxyserUVpXcchXYyZbap1MT/s400/10.jpg" style="margin: 0pt 10px 10px 0pt; cursor: pointer; float: left; height: 400px; width: 281px;" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. Both switches are interconnected via a trunk link. Host A and host B are on the default VLAN but are not able to exchange traffic. What should be done to fix the problem?<br /><br />Allow all VLANs on the trunk link.<br />Remove the native VLAN from the trunk.<br />Include a router or switch with Layer 3 capabilities.<br />==> Configure the same native VLAN on both ends of the trunk.<br /><br /><br />11<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLwLcMMZNEvKiHHmbLBkOsD-elmh9oFeOAypWMVBIKK6vWZVHlN1qnE4HyDBHP_oKbuVLZir7tfDiAy5kht4EaUM53mZjHnN5Cd18P-Kg0P-7Fn924NQkNxd-Dto7e0X3ICAKPWsDL7j4F/s1600-h/11.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" id="BLOGGER_PHOTO_ID_5329578797392555538" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLwLcMMZNEvKiHHmbLBkOsD-elmh9oFeOAypWMVBIKK6vWZVHlN1qnE4HyDBHP_oKbuVLZir7tfDiAy5kht4EaUM53mZjHnN5Cd18P-Kg0P-7Fn924NQkNxd-Dto7e0X3ICAKPWsDL7j4F/s400/11.jpg" style="margin: 0pt 10px 10px 0pt; cursor: pointer; float: left; height: 400px; width: 283px;" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. The hosts connected to switch SW1 are not able to communicate with the hosts in the same VLANs connected to switch SW2. What should be done to fix the problem?<br /><br />Configure VLANs with different VLAN IDs on switch SW2.<br />==> Reconfigure the trunk port on switch SW2 with static trunk configuration.<br />Introduce a Layer 3 device or a switch with Layer 3 capability in the topology.<br />Apply IP addresses that are in the same subnet to the interfaces used to connect SW1 and SW2.<br /><br /><br />12<br />What happens when the crypto key zeroize rsa command is entered on a switch configured with the transport input ssh command on the vty lines?<br /><br />A new RSA key pair is created.<br />The switch defaults to allowing Telnet connections only.<br />The switch is no longer able to make SSH connections as an SSH client.<br />==> The switch allows remote connections only after a new RSA key pair is generated.<br /><br /><br />13<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnVmhrPDhS3e05dCeD4W00ZLeL2PeTKfdICZdK8oHUHjiCR1rZkqAa7Hiy7Mc8iJhsNaDt3D9OoERSMQ3MADZ24a5470i0YotC49k19ZuavHQr9vYXQUwBY9caKiZpNOo3K7GM-jEZtixm/s1600-h/13.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" id="BLOGGER_PHOTO_ID_5329578921551507410" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnVmhrPDhS3e05dCeD4W00ZLeL2PeTKfdICZdK8oHUHjiCR1rZkqAa7Hiy7Mc8iJhsNaDt3D9OoERSMQ3MADZ24a5470i0YotC49k19ZuavHQr9vYXQUwBY9caKiZpNOo3K7GM-jEZtixm/s400/13.jpg" style="margin: 0pt 10px 10px 0pt; cursor: pointer; float: left; height: 200px; width: 400px;" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. An Ethernet switch has developed the CAM table shown. What action will the switch take when it receives the frame shown at the bottom of the exhibit?<br /><br />==> forward the frame out all interfaces except Interface3<br />add station 00-00-3D-1F-11-05 to Interface2 in the forwarding table<br />forward the frame out Interface3<br />discard the frame<br />forward the frame out all interfaces<br />forward the frame out Interface2<br /><br /><br />14<br />Which two statements describe Spanning Tree Protocol? (Choose two.)<br /><br />==> It eliminates Layer 2 loops in network topologies.<br />It eliminates the need for redundant physical paths in network topologies.<br />==> It can only be used in networks in which Layer 2 switching is in use.<br />It can only be used in networks where both routers and switches are used together.<br />It can only be used in networks where routers are installed.<br /><br /><br />15<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCntx6HO4fhc_31mfmvI7tNPM-DnpEiYjPKUpy1i9GzYubIHdTmHlhIYFNAhqgMcsDsbORtDUsKw5KKapCkdeIdbrbb1gJ5d0onrTStCj5EfA7QUdZBRUjhLSV6wpkbcmMA4f39Vq_6kOx/s1600-h/15.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" id="BLOGGER_PHOTO_ID_5329579019680698274" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCntx6HO4fhc_31mfmvI7tNPM-DnpEiYjPKUpy1i9GzYubIHdTmHlhIYFNAhqgMcsDsbORtDUsKw5KKapCkdeIdbrbb1gJ5d0onrTStCj5EfA7QUdZBRUjhLSV6wpkbcmMA4f39Vq_6kOx/s400/15.jpg" style="margin: 0pt 10px 10px 0pt; cursor: pointer; float: left; height: 161px; width: 400px;" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. A new host needs to be connected to VLAN 1. Which IP addresses should be assigned to this new host?<br /><br />192.168.1.11 /28<br />==> 192.168.1.22 /28<br />192.168.1.33 /28<br />192.168.1.44 /28<br />192.168.1.55 /28<br /><br /><br />16<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNrm0a0Wi4DjIEoQ7VWbSax2eCbNmytlpMtZRpEULZeHBqN3d9zo3cFnIwRSMKQjSzhzb8Vu7YQzfi1wE7ZX2h1xcWrBaNJE149of8cleCecWZBpZhxdb-cez6EpCRqCdecoGO4An8fcpf/s1600-h/16.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" id="BLOGGER_PHOTO_ID_5329579101351080626" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNrm0a0Wi4DjIEoQ7VWbSax2eCbNmytlpMtZRpEULZeHBqN3d9zo3cFnIwRSMKQjSzhzb8Vu7YQzfi1wE7ZX2h1xcWrBaNJE149of8cleCecWZBpZhxdb-cez6EpCRqCdecoGO4An8fcpf/s400/16.jpg" style="margin: 0pt 10px 10px 0pt; cursor: pointer; float: left; height: 400px; width: 264px;" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. How does SW1 manage traffic coming from Host A?<br /><br />SW1 drops the traffic because it is untagged.<br />==> SW1 leaves the traffic untagged and forwards it over the trunk.<br />SW1 tags the traffic with the lowest VLAN ID value and forwards it over the trunk link.<br />SW1 encapsulates the traffic with 802.1Q encapsulation and forwards it over the trunk link.<br /><br /><br />17<br /><br />Refer to the exhibit. The switches are configured for VTP as shown. Which two statements correctly describe the operation of these switches? (Choose two.)<br /><br />A new VLAN can be added to Switch1 and that information will be added only to Switch2.<br />==> A new VLAN can be added to Switch1 and that information will be added to Switch2 and Switch4<br />==> An existing VLAN can be deleted from Switch4 and that VLAN will be deleted from Switch1 and Switch2<br />An existing VLAN can be deleted from Switch2 and that VLAN will be deleted from Switch1 and Switch4.<br />A new VLAN can be added to Switch4 and that information will be added to Switch1, Switch2, and Switch3.<br />A new VLAN can be added to Switch3 and that information will be added to Switch1, Switch2, and Switch4.<br /><br /><br />18<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQi0nQpL0PC75WLpxuLUQKoeNJp2VNhEee4h-vB-nZOMh3Fdi_UcuZAcDaDxSvR9PcacQX_nscP4FiqxTV20r3VJ-vTN1qZgUYYxQUJy97DVoQ4XQIlTH9EiYp6MXr63TWyjH3vXfovsBW/s1600-h/18.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" id="BLOGGER_PHOTO_ID_5329579195688532786" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQi0nQpL0PC75WLpxuLUQKoeNJp2VNhEee4h-vB-nZOMh3Fdi_UcuZAcDaDxSvR9PcacQX_nscP4FiqxTV20r3VJ-vTN1qZgUYYxQUJy97DVoQ4XQIlTH9EiYp6MXr63TWyjH3vXfovsBW/s400/18.jpg" style="margin: 0pt 10px 10px 0pt; cursor: pointer; float: left; height: 400px; width: 373px;" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. Computer A sends a broadcast message. Which devices will see the broadcast?<br /><br />computer B<br />computer B and Router1<br />==> computer C and Router1<br />computer B, computer D, computer E and Router1<br />computer B, computer C, computer D, computer E and Router1<br />computer A, computer B, computer C, computer D, computer E and Router1<br /><br /><br />19<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIigJs2taFPmJhSNmSzeAXzlyh2_UCcXzutffczP9GNx_UXuqiCLae5uXndM9I3_BBZdWQnOVgJVu3TKh7jT9_Mt1Hq7hgY-Q9UhFRljPvz0lKXRr8lJtNcNgvyvw9rniOremr4rYkZfVM/s1600-h/19.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" id="BLOGGER_PHOTO_ID_5329579295083562994" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIigJs2taFPmJhSNmSzeAXzlyh2_UCcXzutffczP9GNx_UXuqiCLae5uXndM9I3_BBZdWQnOVgJVu3TKh7jT9_Mt1Hq7hgY-Q9UhFRljPvz0lKXRr8lJtNcNgvyvw9rniOremr4rYkZfVM/s400/19.jpg" style="margin: 0pt 10px 10px 0pt; cursor: pointer; float: left; height: 176px; width: 400px;" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. The network administrator enters the configuration shown to allow both SSH and Telnet connections to the switch. The Telnet connections fail. What is the most likely cause of this problem?<br /><br />The SSH version number is wrong.<br />SSH has been configured on the wrong line.<br />Telnet and SSH cannot be configured simultaneously.<br />==> The transport input command is configured incorrectly.<br /><br /><br />20<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjESajGBrgJgxIiwkHQw96ac2AnhCI7QPeurz0h4SzUHln9vOGwyWQq3StZhJYJJJz7WkdxMbNYE1WT9qYq_SIZyF6asYSent0nx1K2sTRnRsXsvNcTxOBemSRpdoSp4euOTsrqQYbeRswx/s1600-h/20.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" id="BLOGGER_PHOTO_ID_5329579374998624946" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjESajGBrgJgxIiwkHQw96ac2AnhCI7QPeurz0h4SzUHln9vOGwyWQq3StZhJYJJJz7WkdxMbNYE1WT9qYq_SIZyF6asYSent0nx1K2sTRnRsXsvNcTxOBemSRpdoSp4euOTsrqQYbeRswx/s400/20.jpg" style="margin: 0pt 10px 10px 0pt; cursor: pointer; float: left; height: 172px; width: 400px;" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. Which switch will be elected as the root bridge of the spanning tree topology?<br />Cat-A<br />Cat-B<br />==> Cat-C<br />Cat-D<br /><br />21<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ7JEHSyA_ry3hyphenhyphenJDw-zC58q9ycitNxSiZMtyxNFXxswxs4XayGRm_iYs7CfqOyJ0FbN23AcPFwj6Rd2QFJQR3TjoXxPZSpk66E_-pfUn_8SJu07F0j84Z23JUX3upN0cAbA_qU1k2m2xU/s1600-h/21.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" id="BLOGGER_PHOTO_ID_5329579454588509842" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ7JEHSyA_ry3hyphenhyphenJDw-zC58q9ycitNxSiZMtyxNFXxswxs4XayGRm_iYs7CfqOyJ0FbN23AcPFwj6Rd2QFJQR3TjoXxPZSpk66E_-pfUn_8SJu07F0j84Z23JUX3upN0cAbA_qU1k2m2xU/s400/21.jpg" style="margin: 0pt 10px 10px 0pt; cursor: pointer; float: left; height: 266px; width: 400px;" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. The switches in the exhibit have VTP pruning enabled. Which VLANs will be pruned from switch SW3?<br /><br />==> VLAN 10 and VLAN 20<br />VLAN 1, VLAN 10, and VLAN 20<br />VLAN 1, VLAN 1002 through 1005<br />VLAN 1, VLAN 10, VLAN 20, VLAN 1002 through 1005<br /><br /><br />22<br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibqJ_pjvf2vEl8rOSDU8wpm5jmuihZvuc7FctT7eIcDpOdVMDNHJq8zU4yCg4lmEECh3VVkdnI0Ry25BECfHlSeuuO9cxeoDaIxVsqgGH808is77dUsUfxp4R-6ue_d3hjz1aVC_pWASxj/s1600-h/22.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" id="BLOGGER_PHOTO_ID_5329579532714488322" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibqJ_pjvf2vEl8rOSDU8wpm5jmuihZvuc7FctT7eIcDpOdVMDNHJq8zU4yCg4lmEECh3VVkdnI0Ry25BECfHlSeuuO9cxeoDaIxVsqgGH808is77dUsUfxp4R-6ue_d3hjz1aVC_pWASxj/s400/22.jpg" style="margin: 0pt 10px 10px 0pt; cursor: pointer; float: left; height: 194px; width: 389px;" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Refer to the exhibit. What does STATIC indicate in the output that is shown?<br /><br />The switch will not allow any other device to connect to port Fa0/15.<br />==> Traffic destined for MAC address 0000.c123.5432 will be forwarded to Fa0/15.<br />This entry will be removed and refreshed every 300 seconds to keep it in the table.<br />The switch learned this MAC address from the source address in a frame received on Fa0/15.<br />When processing a frame, the switch does not have to perform a lookup to determine the final destination port.</span>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-6445350684895721748.post-87451371251818568552009-10-29T12:10:00.002+00:002009-10-29T12:14:51.853+00:00vmware 7.0 final<h2 style="text-align: justify;">Most Advanced Virtualization Platform</h2><div style="text-align: justify;"> <br />VMware Workstation provides the most dependable, high performing, and secure virtual machine platform. It offers the broadest host and guest operating system support, the richest user experience, and the most comprehensive feature set.<br /> <br /><img src="http://www.vmware.com/files_inline/images/ww02_262x210.gif" alt="" title="" height="210" width="262" /><br /><strong></strong><br /> <br /><strong></strong><br /> <br /></div><h2 style="text-align: justify;">Run More Operating Systems</h2><div style="text-align: justify;"> <br />With support for over 200 operating systems including Windows 7, Windows Server 2008 R2 and over 20 other versions of Windows, along with Redhat, Ubuntu, OpenSuse and 26 additional versions of Linux. VMware Workstation delivers the broadest guest platform support for running multiple operating systems at the same time on your PC.</div><h2 style="text-align: justify;"><img src="http://www.vmware.com/files_inline/images/ww01_262x210.gif" alt="" title="" height="210" width="262" /></h2><div style="text-align: justify;"> <br /></div><h2 style="text-align: justify;">Indispensable Tool for Professionals</h2><div style="text-align: justify;"> <br />Automate and streamline tasks to save time and improve productivity. Run applications in Linux, Windows, and more at the same time on the same PC with no rebooting. Evaluate and test new operating systems, applications and patches in an isolated environment. Demonstrate complex software applications on a single laptop in a repeatable, reliable manner. Rich integration with Visual Studio, Eclipse, and the SpringSource Tool Suite make it incredibly easy to debug applications on multiple platforms.<br /> <img style="font-family: arial;" src="http://www.vmware.com/files_inline/images/ww03_262x210.gif" alt="" title="" height="210" width="262" /><br /><span style="font-family: arial;">Enjoy!</span></div>Unknownnoreply@blogger.com11tag:blogger.com,1999:blog-6445350684895721748.post-31072842095609992702009-10-15T17:41:00.004+01:002009-10-16T21:24:22.609+01:00Cisco 7200 IOS 12.4-13b<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUwZeb7h8ql4Q6qNL3TIDyXQlWNvq3ClffjgZ-6UjUD3bYqti9NUbUtqlP8jppb61NC7ZHb7Ep19a7FRpx6lgzwW0GIUSAzUkR2OHuMbddjUQRckYTVM8PT2PJ-Qs4JBHrLf4nOcUMWEQ/s1600-h/prod_large_photo0900aecd8031b4d9.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 279px; height: 223px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUwZeb7h8ql4Q6qNL3TIDyXQlWNvq3ClffjgZ-6UjUD3bYqti9NUbUtqlP8jppb61NC7ZHb7Ep19a7FRpx6lgzwW0GIUSAzUkR2OHuMbddjUQRckYTVM8PT2PJ-Qs4JBHrLf4nOcUMWEQ/s320/prod_large_photo0900aecd8031b4d9.jpg" alt="" id="BLOGGER_PHOTO_ID_5393296177507686290" border="0" /></a><br /><div style="text-align: justify;font-family:verdana;"><span class="content"><p class="expanded-spacing">Router 7200 general features<br /></p><p class="expanded-spacing">Protect your investments and meet new and future network needs with the modular Cisco 7200 Series, which supports a wide range of density, performance, and service requirements.</p> <p class="expanded-spacing">The industry’s most widely deployed universal services aggregation router for enterprise and service provider edge applications, the Cisco 7200 Series offers:</p> <ul class="compact-bulleted"><li>Exceptional price/performance: The new NPE-G2 Network Processing Engine aggregates services at up to 2 Mpps</li><li>A wide range of connectivity options and numerous features including serviceability and manageability</li><li>Increased VPN performance with the new VPN Services Adapter</li><li class="last-li">Increased scalability and flexibility with the new Port Adapter Jacket Card</li></ul> </span><br /><span class="content"><h2>Benefits:</h2> <ul class="compact-bulleted"><li>WAN edge: Award-winning quality of service (QoS) feature performance</li><li>Broadband aggregation: Up to 16,000 PPP sessions per chassis</li><li>Multiprotocol Label Switching (MPLS): Leading choice for provider-edge deployment</li><li>IP Security (IPsec) VPN: Scalable to 5000 tunnels per chassis</li><li>High-end customer premises equipment (CPE)</li><li>IP-to-IP gateway support: Provides a network-to-network interface point for signaling interworking (H.323, SIP), media interworking, address and port translations (privacy and topology hiding), billing and CDR normalization, and bandwidth management (QoS marking using TOS)</li><li>Voice, video, and data integration: TDM-enabled VXR chassis and voice port adapters</li><li>Modular design: 3RU footprint with broad range of flexible, modular interfaces (from DS0 to OC-3)</li><li class="last-li">Flexibility: Support for Fast Ethernet, Gigabit Ethernet, Packet over SONET and more</li></ul>Check comments for download links!<br /></span></div>Unknownnoreply@blogger.com17tag:blogger.com,1999:blog-6445350684895721748.post-45114298225158157132009-10-11T19:40:00.006+01:002009-10-11T19:47:02.626+01:00Looking for cisco Documents<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnRrVhADcCMwRHaCFKjmvadIzNMjOBIjcRaz4OhFApR6h4XrN_oP2lHb2ATEITDLpSIby3SDBUAscE6lwEmP55dpbzPEd0UHX2tIvn5EhcQAIE6AJ7Qs94FsGQiSSnTdwb865LCaapuH8/s1600-h/cisco.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 200px; height: 122px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnRrVhADcCMwRHaCFKjmvadIzNMjOBIjcRaz4OhFApR6h4XrN_oP2lHb2ATEITDLpSIby3SDBUAscE6lwEmP55dpbzPEd0UHX2tIvn5EhcQAIE6AJ7Qs94FsGQiSSnTdwb865LCaapuH8/s200/cisco.jpg" alt="" id="BLOGGER_PHOTO_ID_5391415798839993602" border="0" /></a><br /><img src="file:///C:/Users/netman/AppData/Local/Temp/moz-screenshot.png" alt="" /><img src="file:///C:/Users/netman/AppData/Local/Temp/moz-screenshot-1.png" alt="" /><img src="file:///C:/Users/netman/AppData/Local/Temp/moz-screenshot-2.png" alt="" /><img src="file:///C:/Users/netman/AppData/Local/Temp/moz-screenshot-3.png" alt="" /><br />All cisco docs collected till now:<br /><br /><br />Cisco.Building.Cisco.Multilayer.Switched.Networks.BCMSN.Student.Guide.V3.0.Vol.1.rar=5144086<br />Cisco.Building.Cisco.Multilayer.Switched.Networks.BCMSN.Student.Guide.V3.0.Vol.2.rar=8785552<br />Cisco.Building.Cisco.Multilayer.Switched.Networks.BCMSN.Student.Guide.V3.0.Volume.1.and.2.rar=13930151<br />Cisco.Building.Scalable.Cisco.Internetworks.BSCI.Student.Guide.v3.0.vol.1.rar=5966498<br />Cisco.Building.Scalable.Cisco.Internetworks.BSCI.Student.Guide.v3.0.vol.2.rar=5796489<br />Cisco.Building.Scalable.Cisco.Internetworks.BSCI.Student.Guide.v3.0.Volume.1.and.2.rar=11763707<br />Cisco.Implementing.Secure.Converged.Wide.Area.Networks.ISCW.Student.Guide.v1.0.Vol1.rar=8441604<br />Cisco.Implementing.Secure.Converged.Wide.Area.Networks.ISCW.Student.Guide.v1.0.Vol2.rar=4522781<br />Cisco.Implementing.Secure.Converged.Wide.Area.Networks.ISCW.Student.Guide.Volume.1.and.Volume.2.rar=12964557<br />Cisco.Networking.Academy.Program.Full.rar=246299633<br />Cisco.Networking.Academy.Program.IP.Telephone.v1.0.rar=13636309<br /><span id="more-11405"></span>Cisco.Optimizing.Converged.Cisco.Networks.ONT.Student.Guide.v1.0.vol.1.rar=8595964Cisco.Optimizing.Converged.Cisco.Networks.ONT.Student.Guide.v1.0.vol.2.rar=2934136<br /><p> Cisco.Optimizing.Converged.Cisco.Networks.ONT.Student.Guide.v1.0.Volume.1.and.2.rar=11529868<br />Cisco.OSPF.Design.Rv.1.1.rar=381872<br />Cisco.Press.2000.Voice.over.IP.Fundamentals.rar=4029458<br />Cisco.Press.802.11.Wireless.LAN.Fundamentals.chm=4179276<br />Cisco.Press.802.11.Wireless.Network.Site.Surveying.and.Installation.chm=17686775<br />Cisco.Press.ACS.User.Guide.V4.0.rar=4347365<br />Cisco.Press.Advanced.BGP.and.Troubleshooting.rar=998797<br />Cisco.Press.Advanced.Host.Intrusion.Prevention.with.CSA.rar=26123748<br />Cisco.Press.Advanced.IP.EIGRP.Troubleshooting.rar=836269<br />Cisco.Press.Advanced.MPLS.Design.and.Implementation.rar=7588998<br />Cisco.Press.Advanced.Optical.Technology.Concepts.rar=1185921<br />Cisco.Press.Aironet.Wireless.LAN.Fundamentals.AWLF.3.1.rar=6466179<br />Cisco.Press.Application.Acceleration.and.WAN.Optimization.Fundamentals.chm=7432582<br />Cisco.Press.ASA.All.in.One.Firewall.IPS.and.VPN.Adaptive.Security.Appliance.chm=21424088<br />Cisco.Press.ASA.and.PIX.Firewall.Handbook.chm=21415641<br />Cisco.Press.Authorized.Self.Study.Guide.Cisco.IP.Telephony.CIPT.2nd.Ed.chm=31513597<br />Cisco.Press.Authorized.Self.Study.Guide.Cisco.Voice.over.IP.CVoice.2nd.Ed.chm=10566546<br />Cisco.Press.Authorized.Self.Study.Guide.Cisco.Voice.over.IP.CVOICE.chm=10566546<br />Cisco.Press.BCMSN.2.1.rar=11773148<br />Cisco.Press.BCMSN.Official.Exam.642.812.Certification.Guide.4th.Ed.CD.rar=27741417<br />Cisco.Press.BCMSN.Official.Exam.642.812.Certification.Guide.4th.Ed.rar=6981403<br />Cisco.Press.BCRAN.2.1.rar=14554539<br />Cisco.Press.BGP.4.Command.and.Configuration.Handbook.chm=1698673<br />Cisco.Press.BGP.Commands.rar=346650<br />Cisco.Press.Build.the.Best.Data.Center.Facility.for.Your.Business.chm=4497811<br />Cisco.Press.Building.MPLS.Based.Broadband.Access.VPNs.chm=5945723<br />Cisco.Press.Building.Multiservice.Transport.Networks.chm=19412854<br />Cisco.Press.Building.Resilient.IP.Networks.chm=3917202<br />Cisco.Press.Business.Case.for.Network.Security.chm=4930328<br />Cisco.Press.CallManager.Fundamentals.A.Cisco.AVVID.Solution.2nd.Ed.chm=11368060<br />Cisco.Press.Campus.Network.Design.Fundamentals.chm=3609030<br />Cisco.Press.Campus.Network.Design.Fundamentals.rar=3325560<br />Cisco.Press.CANAC.Implementing.Cisco.NAC.Appliance.Lab.Guide.Ver.2.1.rar=690392<br />Cisco.Press.CANAC.Implementing.Cisco.NAC.Appliance.Student.Guide.Ver.2.1.Vol.1.rar=9491463<br />Cisco.Press.CANAC.Implementing.Cisco.NAC.Appliance.Student.Guide.Ver.2.1.Vol.2.rar=739797<br />Cisco.Press.Catalyst.LAN.Switching.HTML.rar=8792279<br />Cisco.Press.Catalyst.QoS.in.Campus.Networks.chm=2406995<br />Cisco.Press.CCDA Official.Exam.Certification.Guide.3rd.Ed.rar=5923650<br />Cisco.Press.CCDA.Exam.Certification.Guide.rar=3826342<br />Cisco.Press.CCDA.Official.Exam.Certification.Guide.3rd.Ed.chm=7803790<br />Cisco.Press.CCDA.Quick.Reference.Sheets.rar=941014<br />Cisco.Press.CCIE.Advanced.MPLS.Design.rar=7589029<br />Cisco.Press.CCIE.Practical.Studies.Security.rar=13352458<br />Cisco.Press.CCIE.Practical.Studies.Volume.I.chm=7416812<br />Cisco.Press.CCIE.Practical.Studies.Volume.I.rar=7453619<br />Cisco.Press.CCIE.Practical.Studies.Volume.II.rar=13434711<br />Cisco.Press.CCIE.Preparing.For.The.CCIE.Routing.and.Switching.Lab.2.1.Student.Guide.1.rar=6979885<br />Cisco.Press.CCIE.Professional.Development.Advanced.IP.Network.Design.rar=4259492<br />Cisco.Press.CCIE.Professional.Development.Cisco.LAN.Switching.rar=7483229<br />Cisco.Press.CCIE.Professional.Development.Inside.Cisco.IOS.Software.Architecture.rar=2478935<br />Cisco.Press.CCIE.Professional.Development.Large.Scale.IP.Network.Solutions.rar=6614657<br />Cisco.Press.CCIE.Professional.Development.Network.Security.Principles.and.Practices.chm=5083273<br />Cisco.Press.CCIE.Professional.Development.OSPF.Command.and.Configuration.Handbook.chm=1943313<br />Cisco.Press.CCIE.Professional.Development.Routing.and.Switching.Exam.Certification.Guide.2nd.Ed.rar=4003777<br />Cisco.Press.CCIE.Professional.Development.Routing.TCP.IP.Volume.1.2nd.Ed.chm=9809942<br />Cisco.Press.CCIE.Professional.Development.Routing.TCP.IP.Volume.2.chm=6948813<br />Cisco.Press.CCIE.Professional.Development.Routing.TCP.IP.Volume.2.rar=88311172<br />Cisco.Press.CCIE.Professional.Development.Routing.TCP.IP.Volume.I.chm=7789497<br />Cisco.Press.CCIE.Professional.Development.Routing.TCP.IP.Volume.I.rar=11749573<br />Cisco.Press.CCIE.Professional.Development.Routing.TCP.IP.Volume.II.chm=6948813<br />Cisco.Press.CCIE.Professional.Development.Series.Network.Security.Technologies.and.Solutions.chm=27270040<br />Cisco.Press.CCIE.Professional.Development.Troubleshooting.IP.Routing.Protocols.chm=10003351<br />Cisco.Press.CCIE.Professional.Development.Troubleshooting.IP.Routing.Protocols.rar=9261161<br />Cisco.Press.CCIE.Professional.Development.Troubleshooting.Remote.Access.Networks.rar=8910796<br />Cisco.Press.CCIE.Routing.and.Switching.Certification.Guide.rar=8858815<br />Cisco.Press.CCIE.Routing.and.Switching.Exam.Certification.Guide.rar=9547146<br />Cisco.Press.CCIE.Routing.and.Switching.Official.Exam.Certification.Guide.2nd.Ed.rar=4249436<br />Cisco.Press.CCIE.Routing.And.Switching.Official.Exam.Certification.Guide.3nd.Ed.rar=8253347<br />Cisco.Press.CCIE.Routing.and.Switching.Practice.Labs.chm=3209868<br />Cisco.Press.CCIE.Routing.TCP.IP.Volume.One.rar=11750598<br />Cisco.Press.CCIE.Routing.TCP.IP.Volume.Two.rar=88311149<br />Cisco.Press.CCIE.Security.Exam.Certification.Guide.rar=7781476<br />Cisco.Press.CCIE.Security.Exam.Certification.Guide.V2.0.rar=8401397<br />Cisco.Press.CCIE.Security.Practice.Labs.chm=4758838<br />Cisco.Press.CCIE.Security.Practice.Labs.rar=10704904<br />Cisco.Press.CCIE.Self.Study.CCIE.Practical.Studies.Volume.I.rar=7477055<br />Cisco.Press.CCIE.Self.Study.CCIE.Practical.Studies.Volume.II.rar=14929136<br />Cisco.Press.CCIE.Self.Study.CCIE.Security.Exam.Certification.Guide.CD.rar=17977865<br />Cisco.Press.CCIE.Self.Study.CCIE.Security.Exam.Certification.Guide.rar=6583621<br />Cisco.Press.CCIE.Self.Study.CCIE.Security.Practice.Labs.chm=4758838<br />Cisco.Press.CCIE.Self.Study.Practical.Studies.Secturity.ISO=22036480<br />Cisco.Press.CCIP.MPLS.and.VPN.Architectures.rar=6433469<br />Cisco.Press.CCNA.3.Companion.Guide.Switching.Basics.and.Intermediate.Routing.rar=50394134<br />Cisco.Press.CCNA.640.607.rar=6705838<br />Cisco.Press.CCNA.Exam.640.507.Certification.Guide.rar=4625109<br />Cisco.Press.CCNA.ICND.2004.rar=8782091<br />Cisco.Press.CCNA.ICND.Certification.Guide.rar=4960998<br />Cisco.Press.CCNA.ICND.Certification.Guide.zip=11245257<br />Cisco.Press.CCNA.INTRO.Exam.Certification.Guide.rar=5300432<br />Cisco.Press.CCNA.INTRO.Exam.Certification.Guide.zip=8268196<br />Cisco.Press.CCNA.Portable.Command.Guide.2nd.Ed.rar=4527777<br />Cisco.Press.CCNA.Portable.Command.Guide.chm=1348155<br />Cisco.Press.CCNA.Practical.Studies.chm=2661136<br />Cisco.Press.CCNA.Security.640.553.IINS.Official.Exam.Cert.Guide.rar=31225321<br />Cisco.Press.CCNA.Security.Official.Exam.Certification.Guide.Exam.640.553.rar=13779329<br />Cisco.Press.CCNA.Voice.Official.Exam.Certification.Guide.640.460.rar=25810441<br />Cisco.Press.CCNA.Wireless.Official.Exam.Certification.Guide.IUWNE.640.721.rar=12486798<br />Cisco.Press.CCNP BSCI Quick Reference Sheets_ Exam 642-901.rar=9234316<br />Cisco.Press.CCNP.640.503.Routing.Exam.Certification.Guide.rar=4204955<br />Cisco.Press.CCNP.BCMSN.Exam.Certification.Guide.2nd.CD.rar=25075383<br />Cisco.Press.CCNP.BCMSN.Exam.Certification.Guide.2nd.Ed.zip=28176304<br />Cisco.Press.CCNP.BCMSN.Exam.Certification.Guide.Exam.642-811.3rd.Ed.chm=2886232<br />Cisco.Press.CCNP.BCMSN.Official.Exam.Certification.Guide.4th.Ed.rar=6981776<br />Cisco.Press.CCNP.BCMSN.Official.Exam.Certification.Guide.642.812.4th.Ed.rar=7209897<br />Cisco.Press.CCNP.BCMSN.Portable.Command.Guide.rar=3786293<br />Cisco.Press.CCNP.BCMSN.Quick.Reference.Sheets.rar=1791321<br />Cisco.Press.CCNP.BCMSN.Self.Study.1st.Ed.rar=5840149<br />Cisco.Press.CCNP.BCRAN.Exam.Certification.Guide.2nd.CD.rar=25298866<br />Cisco.Press.CCNP.BCRAN.Exam.Certification.Guide.2nd.Ed.zip=25686173<br />Cisco.Press.CCNP.BCRAN.Self.Study.2nd.Ed.rar=6121866<br />Cisco.Press.CCNP.BSCI.Exam.Certification.Guide.3rd.CD.rar=36363535<br />Cisco.Press.CCNP.BSCI.Exam.Certification.Guide.3rd.Ed.chm=4169068<br />Cisco.Press.CCNP.BSCI.Exam.Certification.Guide.3rd.Ed.zip=36907287<br />Cisco.Press.CCNP.BSCI.Official.Exam.Certification.Guide.4th.Ed.chm=7099562<br />Cisco.Press.CCNP.BSCI.Portable.Command.Guide.642.901.rar=1208578<br />Cisco.Press.CCNP.BSCI.Quick.Reference.Sheets.rar=1703456<br />Cisco.Press.CCNP.BSCI.Self.Study.3rd.Ed.rar=11238075<br />Cisco.Press.CCNP.BSCI.v5.Student.Lab.Manual.rar=5651965<br />Cisco.Press.CCNP.Building.Scalable.Internetworks.BSCI.642.901.v5.0.Student.Lab.Manual.rar=2903970<br />Cisco.Press.CCNP.CIT.Exam.Certification.Guide.2nd.CD.rar=23351768<br />Cisco.Press.CCNP.CIT.Exam.Certification.Guide.2nd.Ed.zip=23774742<br />Cisco.Press.CCNP.CIT.Self.Study.2nd.Ed.rar=5015442<br />Cisco.Press.CCNP.ISCW.Official.Exam.Certification.Guide.rar=15552756<br />Cisco.Press.CCNP.ISCW.Portable.Command.Guide.rar=5381323<br />Cisco.Press.CCNP.ISCW.Quick.Reference.Sheets.rar=32262874<br />Cisco.Press.CCNP.ONT.Official.Exam.Certification.Guide.rar=10009642<br />Cisco.Press.CCNP.ONT.Portable.Command.Guide.chm=14603841<br />Cisco.Press.CCNP.ONT.Quick.Reference.Sheets.642.845.rar=1460781<br />Cisco.Press.CCNP.ONT.Quick.Reference.Sheets.rar=1548703<br />Cisco.Press.CCNP.Practical.Studies.Remote.Access.rar=5760204<br />Cisco.Press.CCNP.Practical.Studies.Routing.rar=2538306<br />Cisco.Press.CCNP.Practical.Studies.Routing.zip=2554536<br />Cisco.Press.CCNP.Practical.Studies.Troubleshooting.rar=13017973<br />Cisco.Press.CCNP.Quick.Reference.Jun.2008.rar=3371007<br />Cisco.Press.CCNP.Quick.Reference.rar=2234378<br />Cisco.Press.CCNP.Remote.Access.Exam.Certification.Guide.rar=7817676<br />Cisco.Press.CCNP.Routing.Exam.Certification.Guide.Appendix.rar=265616<br />Cisco.Press.CCNP.Routing.Exam.Certification.Guide.pdf.rar=5618453<br />Cisco.Press.CCNP.Routing.Exam.Certification.Guide.rar=4246253<br />Cisco.Press.CCNP.Self.Study.BCMSN.Official.Exam.Certification.Guide.642.812.4th.Ed.rar=7113268<br />Cisco.Press.CCNP.Self.Study.Certification.Library.3rd.Ed.rar=129685757<br />Cisco.Press.CCNP.Support.Exam.Certification.Guide.rar=3809656<br />Cisco.Press.CCNP.Switching.Exam.Certification.Guide.rar=2618796<br />Cisco.Press.CCSP.642.502.SNRS.Exam.Certification.Guide.chm=10421940<br />Cisco.Press.CCSP.642.502.SNRS.Exam.Certification.Guide.rar=14594928<br />Cisco.Press.CCSP.642.532.IPS.Exam.Certification.Guide.chm=12927447<br />Cisco.Press.CCSP.642.541.CSI.Exam.Certification.Guide.rar=3976116<br />Cisco.Press.CCSP.Cisco.Secure.PIX.Firewall.Advanced.Exam.Certification.Guide.2nd.Ed.chm=12030216<br />Cisco.Press.CCSP.Cisco.Secure.PIX.Firewall.Advanced.Exam.Certification.Guide.CD.rar=25298035<br />Cisco.Press.CCSP.Cisco.Secure.PIX.Firewall.Advanced.Exam.Certification.Guide.rar=8158618<br />Cisco.Press.CCSP.Cisco.Secure.PIX.Firewall.Advanced.Exam.Certification.Guide.zip=27431155<br />Cisco.Press.CCSP.Cisco.Secure.VPN.Exam.Certification.Guide.CD.rar=21774855<br />Cisco.Press.CCSP.Cisco.Secure.VPN.Exam.Certification.Guide.rar=16537689<br />Cisco.Press.CCSP.Cisco.Secure.VPN.Exam.Certification.Guide.zip=24641986<br />Cisco.Press.CCSP.CSI.Exam.Cert.Guide.rar=3976094<br />Cisco.Press.CCSP.CSI.Exam.Certification.Guide.2nd.Ed.chm=7465727<br />Cisco.Press.CCSP.CSI.Exam.Certification.Guide.rar=3976103<br />Cisco.Press.CCSP.CSI.Exam.Certification.Guide.zip=5723593<br />Cisco.Press.CCSP.Flash.Cards.and.Exam.Practice.Pack.bin=49606032<br />Cisco.Press.CCSP.Flash.Cards.And.Exam.Practice.Pack.chm=4700071<br />Cisco.Press.CCSP.IPS.Exam.Certification.Guide.rar=15796463<br />Cisco.Press.CCSP.SECUR.Exam.Certification.Guide.rar=5045436<br />Cisco.Press.CCSP.Secure.Exam.Certification.Guide.rar=5070123<br />Cisco.Press.CCSP.Secure.Exam.Certification.Guide.zip=7291677<br />Cisco.Press.CCSP.Self.Study.CCSP.CSI.Exam.Certification.Guide.2nd.Ed.chm=7465727<br />Cisco.Press.CCSP.SNPA.Exam.Certification.Guide.3rd.Ed.rar=4515058<br />Cisco.Press.CCSP.SNPA.Official.Exam.Certification.Guide.3rd.Ed.rar=5515080<br />Cisco.Press.CCSP.SNRS.Exam.Certification.Guide.rar=14335756<br />Cisco.Press.CCSP.SNRS.Quick.Reference.Sheets.rar=1130109<br />Cisco.Press.Cisco.802.11.Wireless.Networking.Quick.Reference.chm=4804836<br />Cisco.Press.Cisco.Access.Control.Security.AAA.Administration.Services.chm=16294845<br />Cisco.Press.Cisco.Access.Control.Security.AAA.Administration.Services.rar=15721702<br />Cisco.Press.Cisco.AS5.00.Case.Study.for.Basic.IP.Modem.Services.rar=973445<br />Cisco.Press.Cisco.ASA.all.In.One.Firewall.IPs.And.VPN.Adaptive.Security.Appliance.chm=21424088<br />Cisco.Press.Cisco.ASA.and.PIX.Firewall.Handbook.chm=21415641<br />Cisco.Press.Cisco.ASA.PIX.and.FWSM.Handbook.2nd.Ed.rar=7869602<br />Cisco.Press.Cisco.ASA.PIX.and.FWSM.Handbook.2nd.Edition.Aug.2007.rar=7870701<br />Cisco.Press.Cisco.AVVID.Network.Infrastructure.Enterprise.Wireless.LAN.Deisgn.rar=1435189<br />Cisco.Press.Cisco.BGP.4.Command.and.Configuration.Handbook.CCIE.Professional.Development.chm=1698673<br />Cisco.Press.Cisco.BGP.4.Command.and.Configuration.Handbook.CCIE.Professional.Development_.rar=2023290<br />Cisco.press.Cisco.BGP.4.Command.and.Configuration.Handbook.rar=49386274<br />Cisco.Press.Cisco.CallManager.Best.Practices.A.Cisco.AVVID.Solution.chm=7980653<br />Cisco.Press.Cisco.CallManager.Fundamentals.2nd.Ed.chm=11368060<br />Cisco.Press.Cisco.CallManager.Fundamentals.A.Cisco.AVVID.Solution.2nd.Ed.chm=11368060<br />Cisco.Press.Cisco.Catalyst.2950.Desktop.Switch.Software.Configuration.Guide.rar=3630886<br />Cisco.Press.Cisco.Catalyst.QoS.Quality.of.Service.in.Campus.Networks.rar=5414214<br />Cisco.Press.Cisco.CCNA.640.607.Flash.Card.Pratice.Kit.zip=51277711<br />Cisco.Press.Cisco.CCNP.Remote.Access.Exam.Certification.Guide.640.505.rar=7740230<br />Cisco.Press.Cisco.DQOS.Exam.Certification.Guide.rar=6590562<br />Cisco.Press.Cisco.Express.Forwarding.chm=5152013<br />Cisco.Press.Cisco.Express.Forwarding.rar=2734820<br />Cisco.Press.Cisco.Field.Manual.Catalyst.Switch.Configuration.chm=1455664<br />Cisco.Press.Cisco.Frame.Relay.Solutions.Guide.chm=4619867<br />Cisco.Press.Cisco.IP.Communications.Express.Callmanager.Express.with.Cisco.Unity.Express.2005.chm=35716612<br />Cisco.Press.Cisco.IP.Telephony.Network.Design.Guide.rar=4409217<br />Cisco.Press.Cisco.IP.Telephony.Planning.Design.Implementation.Operation.and.Optimization.chm=16130828<br />Cisco.Press.Cisco.IP.Telephony.Volume.1.CIPT1.Student.Guide.V4.1.rar=1380412<br />Cisco.Press.Cisco.ISP.Essentials.rar=2427322<br />Cisco.Press.Cisco.LAN.Switching.1st.Ed.rar=7475720<br />Cisco.Press.Cisco.LAN.Switching.Fundamentals.chm=4404599<br />Cisco.Press.Cisco.Lan.Switching.rar=11117814<br />Cisco.Press.Cisco.Multiservice.Switching.Networks.chm=3482909<br />Cisco.Press.Cisco.NAC.Appliance.Enforcing.Host.Security.with.Clean.Access.rar=37765526<br />Cisco.Press.Cisco.Nac.Appliance.rar=22362897<br />Cisco.Press.Cisco.Network.Admission.Control.Volume.2.NAC.Deployment.and.Troubleshooting.rar=11133386<br />Cisco.Press.Cisco.Network.Admission.Control.Volume.II.rar=11136425<br />Cisco.Press.Cisco.Network.Design.Solutions.for.Small.Medium.Businesses.chm=1609675<br />Cisco.Press.Cisco.Network.Security.Troubleshooting.Handbook.chm=12187567<br />Cisco.Press.Cisco.Networking.Simplified.2nd.Ed.rar=13980881<br />Cisco.Press.Cisco.OSPF.Command.and.Configuration.Handbook.CCIE.Professional.Development.rar=4122595<br />Cisco.Press.Cisco.Router.Firewall.Security.chm=6076961<br />Cisco.Press.Cisco.Router.Firewall.Security.rar=15022793<br />Cisco.Press.Cisco.Secure.Firewall.Services.Module.FWSM.rar=2030199<br />Cisco.Press.Cisco.Secure.Internet.Security.Solutions.rar=6352352<br />Cisco.Press.Cisco.Secure.Virtual.Private.Networks.Ver.4.7.Full.NFW.D.rar=19810718<br />Cisco.Press.Cisco.Security.Agent.chm=26980719<br />Cisco.Press.Cisco.Security.Appliance.Command.Line.Configuration.Guide.For.the.Cisco.ASA.5500.Series.and.Cisco.PIX.500.Series.rar=7302901<br />Cisco.Press.Cisco.Threat.Control.Multilanguage.v2007.rar=253138802<br />Cisco.Press.Cisco.Unity.Fundamentals.chm=7704697<br />Cisco.Press.Cisco.Voice.over.IP.CVOICE.3rd.Ed.rar=6595537<br />Cisco.Press.Comparing.Designing.and.Deploying.VPNs.chm=41464852<br />Cisco.Press.Configuring.BGP.StudentGuide.v.3.2.Vol.1.rar=3244311<br />Cisco.Press.Configuring.BGP.StudentGuide.v.3.2.Vol.2.rar=3976987<br />Cisco.Press.Configuring.Callmanager.and.Unity.a.Step.by.Step.Guide.2005.chm=32856846<br />Cisco.Press.Configuring.Callmanager.and.Unity.a.Step.by.Step.Guide.chm=32856846<br />Cisco.Press.Configuring.IPSec.Between.PIX.and.Cisco.VPN.Client.Using.Smartcard.Certificates.rar=621471<br />Cisco.Press.Content.Networking.Fundamentals.chm=15497591<br />Cisco.Press.CSPFA.Cisco.Secure.PIX.Firewall.Advanced.Student.Guide.v1.01.rar=3704988<br />Cisco.Press.Data.Center.Design.and.Implementation.rar=704141<br />Cisco.Press.Definitive.MPLS.Network.Designs.chm=20624697<br />Cisco.Press.Deploying.Cisco.Wide.Area.Application.Services.chm=13078244<br />Cisco.Press.Deploying.IP.v6.Networks.chm=9805967<br />Cisco.Press.Deploying.IPv6.Networks.chm=9805967<br />Cisco.Press.Deploying.License.Free.Wireless.Wide.Area.Networks.rar=4307690<br />Cisco.Press.Deploying.Voice.over.Wireless.LANs.chm=2236909<br />Cisco.Press.Designing.ATM.MPLS.Networks.rar=1147507<br />Cisco.Press.Designing.for.Cisco.Internetwork.Solutions.2nd.Ed.rar=6543878<br />Cisco.Press.Designing.for.Cisco.Internetwork.Solutions.DESGN.Exam.640.863.2nd.Ed.rar=7449500<br />Cisco.Press.Designing.Network.Security.rar=726168<br />Cisco.Press.Designing.Perimeter.Security.rar=4876024<br />Cisco.Press.Designing.VPN.Security.rar=7497632<br />Cisco.Press.Designing.VPN.Security.V1.0.rar=7497648<br />Cisco.Press.DQOS.Exam.Certification.Guide.rar=6345980<br />Cisco.Press.Enabling.Enterprise.Miltihoming.with.Cisco.IOS.Network.Address.Translation.rar=365430<br />Cisco.Press.End.to.End.Network.Security.Defense.in.Depth.rar=17292788<br />Cisco.Press.End.to.End.Network.Security.rar=11599079<br />Cisco.Press.End.to.End.QoS.Network.Design.Quality.of.Service.in.LANs.WANs.and.VPNs.chm=14253141<br />Cisco.Press.Enhanced.ip.services.for.cisco.networks.rar=42447679<br />Cisco.Press.Fault.Tolerant.IP.and.MPLS.Networks.chm=7859131<br />Cisco.Press.Fax.Modem.and.Text.for.IP.Telephony.rar=5049026<br />Cisco.Press.Firewall.Fundamentals.chm=10542083<br />Cisco.Press.Firewall.Fundamentals.rar=4101046<br />Cisco.Press.First.Mile.Access.Networks.and.Enabling.Technologies.chm=2330742<br />Cisco.Press.Frame.Relay.Solutions.Guide.chm=4619867<br />Cisco.Press.Global.IPv6.Strategies.for.Business.Analysis.to.Operatonal.Planning.rar=2101590<br />Cisco.Press.Global.IPv6.Strategies.From.Business.Analysis.to.Operational.Planning.rar=2105274<br />Cisco.Press.Home.Network.Security.Simplified.chm=14844984<br />Cisco.Press.iExec.Enterprise.Essentials.Companion.Guide.rar=2436530<br />Cisco.Press.IGRP.Commands.rar=33481<br />Cisco.Press.Implementing.Cisco.Unified.Communications.Manager.Part.1.CIPT1.rar=15310121<br />Cisco.Press.Implementing.MPLS.Student.Guide.v2.0.rar=11279066<br />Cisco.Press.Inside.Cisco.IOS.Software.Architecture.rar=2469047<br />Cisco.Press.Integrated.Cisco.and.Unix.Network.Architectures.chm=4804211<br />Cisco.Press.Interconnecting.Cisco.Network.Devices.Part.1.ICND1.2nd.Ed.rar=4487998<br />Cisco.Press.Interconnecting.Cisco.Network.Devices.Part.2.ICND2.3rd.Ed.rar=2307605<br />Cisco.Press.Interdomain.Multicast.Solutions.Guide.chm=2257955<br />Cisco.Press.Internet.Phone.Services.Simplified.chm=4950370<br />Cisco.press.Internet.Routing.Architectures.2nd.Ed.rar=4677257<br />Cisco.Press.Internet.Routing.Architectures.2nd.rar=4526048<br />Cisco.Press.Internet.Routing.Architectures.rar=4274639<br />Cisco.Press.Internetwork.Design.Guide.rar=3058176<br />Cisco.Press.Internetwork.Troubleshooting.Guide.rar=2455950<br />Cisco.Press.Internetworking.Basics.iso=150054912<br />Cisco.Press.Internetworking.Case.Studies.rar=1083287<br />Cisco.Press.Internetworking.Design.Guide.rar=2159346<br />Cisco.Press.Internetworking.Technologies.Handbook.4th.Ed.rar=14031243<br />Cisco.Press.Internetworking.Technology.Overview.rar=2491043<br />Cisco.Press.Internetworking.Terms.and.Acronyms.rar=1160237<br />Cisco.Press.Internetworking.Troubleshooting.Handbook.rar=1092805<br />Cisco.Press.Intrusion.Detection.Planning.Guide.rar=159493<br />Cisco.Press.Intrusion.Prevention.Fundamentals.chm=2211497<br />Cisco.Press.IOS.Reference.Guide.rar=365400<br />Cisco.Press.IOS.Software.Quality.of.Service.Solutions.rar=321418<br />Cisco.Press.IP.Enhanced.EIGRP.Commands.rar=146619<br />Cisco.Press.IP.Routing.Fundamentals.rar=1377226<br />Cisco.Press.IP.Services.Commands.rar=308798<br />Cisco.Press.IP.Telephony.CIPT.Authorized.Self.Study.Guide.2nd.Ed.chm=31513597<br />Cisco.Press.IP.Telephony.Unveiled.2004.rar=4664645<br />Cisco.Press.IPSec.VPN.Design.chm=9303240<br />Cisco.Press.IS.IS.Network.Design.Solutions.chm=3171278<br />Cisco.Press.IT.Essentials.PC.Hardware.and.Software.Companion.Guide.3rd.Ed.rar=26346358<br />Cisco.Press.IT.Essentials.PC.Hardware.and.Software.Labs.and.Study.Guide.3rd.Ed.rar=10774266<br />Cisco.Press.LAN.Switch.Security.rar=2781837<br />Cisco.Press.LAN.Switching.First.Step.chm=5544743<br />Cisco.Press.LAN.Switching.Fundamentals.chm=4404599<br />Cisco.Press.Layer.2.VPN.Architectures.chm=8323657<br />Cisco.Press.Metro.Ethernet.rar=3677271<br />Cisco.Press.MPLS.and.Next.Generation.Networks.chm=8128465<br />Cisco.Press.MPLS.and.Next.Generation.Networks.rar=4124934<br />Cisco.Press.MPLS.and.VPN.Architectures.chm=4245655<br />Cisco.Press.MPLS.and.VPN.Architectures.Volume.2.rar=5608522<br />Cisco.Press.MPLS.and.VPN.Architectures.Volume.I.chm=4245655<br />Cisco.Press.MPLS.and.VPN.Architectures.Volume.II.rar=5609203<br />Cisco.Press.MPLS.Configuration.on.Cisco.IOS.Software.chm=35355109<br />Cisco.Press.MPLS.Fundamentals.rar=3421271<br />Cisco.Press.MPLS.Implementing.Cisco.MPLS.v.2.1.Vol.1.rar=4453804<br />Cisco.Press.MPLS.Implementing.Cisco.MPLS.v.2.1.Vol.2.rar=4200010<br />Cisco.Press.MPLS.VPN.Security.chm=5545963<br />Cisco.Press.NAC.Appliance.Enforcing.Host.Security.with.Clean.Access.rar=22358420<br />Cisco.Press.Network.Consultants.Handbook.rar=7259758<br />Cisco.Press.Network.Management.Accounting.and.Performance.Strategies.chm=10698721<br />Cisco.Press.Network.Management.chm=10698721<br />Cisco.Press.Network.Management.Fundamentals.rar=4627086<br />Cisco.Press.Network.Security.Architectures.chm=5129082<br />Cisco.Press.Network.Security.Architectures.rar=12124518<br />Cisco.Press.Network.Security.Fundamentals.chm=19370935<br />Cisco.Press.Network.Security.Principles.and.Practices.chm=5083273<br />Cisco.Press.Network.Security.rar=10605247<br />Cisco.Press.Network.Security.Technologies.and.Solutions.chm=27270040<br />Cisco.Press.Network.Security.Troubleshooting.Handbook.chm=12187567<br />Cisco.Press.Network.Virtualization.chm=8448488<br />Cisco.Press.Next.Generation.Network.Services.chm=8505354<br />Cisco.Press.Optical.Network.Design.and.Implementation.chm=21848517<br />Cisco.Press.Optimal.Routing.Design.chm=6680531<br />Cisco.Press.Optimizing.Applications.on.Cisco.Networks.chm=3945735<br />Cisco.Press.OSPF.Command.and.Configuration.Handbook.chm=1943313<br />Cisco.Press.OSPF.Commands.rar=224876<br />Cisco.Press.OSPF.Network.Design.Solutions.2nd.Ed.rar=9860311<br />Cisco.Press.OSPF.Network.Design.Solutions.chm=7067224<br />Cisco.Press.Overview.of.Access.VPNs.and.Tunneling.Technologies.rar=503367<br />Cisco.Press.Overview.of.Token.Ring.Switching.rar=464647<br />Cisco.Press.PacketCable.Implementation.chm=60650041<br />Cisco.Press.Packetized.Voice.and.Data.Integration.rar=2208538<br />Cisco.Press.Penetration.Testing.and.Network.Defense.chm=15336025<br />Cisco.Press.Penetration.Testing.Network.Defense.chm=15330169<br />Cisco.Press.Performance.and.Fault.Management.chm=1987858<br />Cisco.Press.Practical.Service.Level.Management.Delivering.High.Quality.Web.Based.Services.chm=1245201<br />Cisco.Press.Practical.Study.Remote.Access.chm=2590549<br />Cisco.Press.QoS.for.IP.MPLS.Networks.chm=4385790<br />Cisco.Press.QOS.Implementing.Cisco.QoS.StudentGuide.v.2.2.Vol.I.II.rar=10803302<br />Cisco.Press.Router.Firewall.Security.chm=6076961<br />Cisco.Press.Router.Security.Strategies.Securing.IP.Network.Traffic.Planes.rar=2755799<br />Cisco.Press.Routing.and.Switching.rar=31715916<br />Cisco.Press.Routing.first.step.chm=5319301<br />Cisco.Press.Routing.TCP.IP. Volume.1.rar=11750587<br />Cisco.Press.Routing.TCP.IP. Volume.2.rar=88311138<br />Cisco.Press.Routing.TCP.IP.Vol.1.2nd.Ed.chm=9809942<br />Cisco.Press.Routing.TCP.IP.Volume.1.2nd.Ed.chm=9809942<br />Cisco.Press.Routing.TCP.IP.Volume.I.CCIE.Professional.Development.rar=11750621<br />Cisco.Press.Routing.TCP.IP.Volume.II.CCIE.Professional.Development.rar=6466853<br />Cisco.Press.SCND.StudentGuide.v.2.0.Vol.1.rar=6292020<br />Cisco.Press.SCND.StudentGuide.v.2.0.Vol.2.rar=5752305<br />Cisco.Press.Securing.Hosts.Using.CSA.StudentGuide.v.2.0.rar=6672783<br />Cisco.Press.Securing.Your.Business.with.Cisco.ASA.and.PIX.Firewalls.chm=4978423<br />Cisco.Press.Security.Monitoring.with.Cisco.Security.MARS.rar=19267527<br />Cisco.Press.Security.Threat.Mitigation.and.Response.chm=8926575<br />Cisco.Press.Security.Threat.Mitigation.And.Response.Understanding.Cisco.Security.Mars.chm=8926575<br />Cisco.Press.Selecting.MPLS.VPN.Services.chm=6688189<br />Cisco.Press.Self.Defending.Networks.The.Next.Generation.of.Network.Security.chm=17110639<br />Cisco.Press.Self.Defending.Networks.The.Next.Generation.of.Network.Security.rar=58260870<br />Cisco.Press.Self.Study.CCSP.Cisco.Secure.VPN.Exam.Certification.Guide.rar=14876350<br />Cisco.Press.SNA.Frame.Relay.rar=122015<br />Cisco.Press.SNA.Over.FrameRelay.rar=121979<br />Cisco.Press.SNPA.v.4.0.Vol.1.rar=9638712<br />Cisco.Press.SNRS.LabGuide.v2.0.rar=1264975<br />Cisco.Press.SNRS.StudentGuide.v2.0.Vol.1.rar=4088798<br />Cisco.Press.SNRS.StudentGuide.v2.0.Vol.2.rar=3883485<br />Cisco.Press.SNRS.StudentGuide.v2.0.Vol.3.rar=1532163<br />Cisco.Press.SSL.Remote.Access.VPNs.rar=12160514<br />Cisco.Press.Storage.Networking.Fundamentals.chm=10807182<br />Cisco.Press.Storage.Networking.Protocol.Fundamentals.chm=7025388<br />Cisco.Press.Student.Guide.Configuring.BGP.on.Cisco.Routers.Student.Guide.vol.1.and.vol.2.Ver.3.rar=8709860<br />Cisco.Press.TCP.IP.First.Step.chm=7670621<br />Cisco.Press.Telecommunications.Technologies.Reference.rar=3159580<br />Cisco.Press.The.Business.Case.for.E-Learning.chm=966492<br />Cisco.Press.The.Business.Case.for.Enterprise.Class.Wireless.Lans.chm=2490570<br />Cisco.Press.The.Business.Case.For.Network.Security.Advocacy.Governance. and.ROI.chm=4930328<br />Cisco.Press.The.Business.Case.for.Storage.Networks.chm=1273268<br />Cisco.Press.The.Complete.Cisco.VPN.Configuration.Guide.chm=15135724<br />Cisco.Press.The.Complete.Cisco.VPN.Configuration.Guide.rar=35006318<br />Cisco.Press.The.Definitive.BGP.Resource.Internet.Routing.Architectures.2nd.Edition.rar=4539291<br />Cisco.Press.The.Road.to.IP.Telephony.How.Cisco.Systems.Migrated.from.PBX.to.IP.Telephony.chm=2655032<br />Cisco.Press.Top.Down.Network.Design.2nd.Ed.chm=3000181<br />Cisco.Press.Top.Down.Network.Design.2nd.Ed.rar=5886345<br />Cisco.Press.Traffic.Engineering.with.MPLS.rar=4262483<br />Cisco.Press.Troubleshooting.IP.Routing.Protocols.CCIE.Professional.Development.chm=10003351<br />Cisco.Press.Troubleshooting.IP.Routing.Protocols.CCIE.Professional.Development.rar=15300246<br />Cisco.Press.Troubleshooting.Remote.Access.Networks.chm=3595286<br />Cisco.Press.Troubleshooting.Remote.Access.Networks.rar=6073238<br />Cisco.Press.Understanding.Cisco.Security.MARS.chm=8926575<br />Cisco.Press.User.Guide.for.Cisco.Security.MARS.rar=4673822<br />Cisco.Press.Voice.and.Video.Conferencing.Fundamentals.rar=4513962<br />Cisco.Press.Voice.Gateways.and.Gatekeepers.chm=9043008<br />Cisco.Press.Voice.Over.IP.First-Step.chm=4032822<br />Cisco.Press.Voice.Over.IP.Fundamentals.2nd.Ed.chm=4646834<br />Cisco.Press.Voice.over.IP.Fundamentals.rar=3972801<br />Cisco.Press.WAN.Quick.Start.Self.Paced.Course.Preparation.Guide.rar=1174927<br />Cisco.Press.Wi.Fi.Hotspots.chm=9144688<br />Cisco.Press.Wireless.LAN.Security.chm=6058499<br />Cisco.Press.Wireless.Networks.First.Step.chm=1224399<br />Cisco.Securing.Hosts.Using.Cisco.Security.Agent.HIPS.Student.Guide.V2.0.rar=6672794<br />Cisco.Security.Appliance.Command.Line.Configuration.Guide.For.the.Cisco.ASA.5500.Series.and.Cisco.PIX.500.Series.rar=7302889<br />Cisco.Unified.Communications.System.Engineer.UCSE.Student.Guide.V1.3.rar=6167298<br />Cisco.Voice.Student.Handbook.v1.0.rar=17889807<br />CNAP.CCNP.Semester.1.Advanced.Routing.3.0.rar=25295980<br />CNAP.CCNP.Semester.2.Remote.Access.3.0.rar=30484213<br />CNAP.CCNP.Semester.3.Switching.3.0.rar=23787707<br />CNAP.CCNP.Semester.4.Support.3.0.rar=26148118</p><p>Check comments, Enjoy!!!<br /></p>Unknownnoreply@blogger.com16tag:blogger.com,1999:blog-6445350684895721748.post-72045095468320138682009-10-10T17:24:00.004+01:002009-10-10T17:35:04.401+01:00Dynampis GNS 3.0<div style="text-align: justify;"><br /></div><h3 style="text-align: justify;">What is GNS3 ?</h3><div style="text-align: justify;"> </div><p style="text-align: justify;">GNS3 is a graphical network simulator that allows simulation of complex networks.</p><div style="text-align: justify;"> </div><p style="text-align: justify;">To allow complete simulations, GNS3 is strongly linked with :</p><div style="text-align: justify;"> </div><ul style="text-align: justify;"><li><a class="ext" href="http://www.ipflow.utc.fr/index.php/Cisco_7200_Simulator" target="_blank" title="Dynamips emulator">Dynamips</a>, the core program that allows Cisco IOS emulation.</li><li><a class="ext" href="http://www.dynagen.org/" target="_blank" title="Dynagen Console for Dynamips">Dynagen</a>, a text-based front-end for Dynamips.</li><li>Pemu, a Cisco PIX firewall emulator based on Qemu.</li><li><br /></li></ul><div style="text-align: justify;"> </div><p style="text-align: justify;">GNS3 is an <a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFrnu7oy-GnjqUG4vctEckCs8sngW6t8rv_QFoSH1Iegfy2kf4PjjXluLyNFTpxaa8l9dQ2md0GeQcrjbQXyrv4rwke2eEmP_nIKjV0n0I2Ij7hz6ig0yRI1AaUD_0Vz2wsNSXHUxnytw/s1600-h/logo.png"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 174px; height: 51px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFrnu7oy-GnjqUG4vctEckCs8sngW6t8rv_QFoSH1Iegfy2kf4PjjXluLyNFTpxaa8l9dQ2md0GeQcrjbQXyrv4rwke2eEmP_nIKjV0n0I2Ij7hz6ig0yRI1AaUD_0Vz2wsNSXHUxnytw/s320/logo.png" alt="" id="BLOGGER_PHOTO_ID_5391009103695914130" border="0" /></a>excellent complementary tool to real labs for Cisco network engineers, administrators and people wanting to pass certifications such as CCNA, CCNP, CCIP or CCIE.</p><div style="text-align: justify;"> </div><p style="text-align: justify;">It can also be used to experiment features of Cisco IOS or to check configurations that need to be deployed later on real routers.</p><div style="text-align: justify;"> </div><p style="text-align: justify;"> This project is an open source, free program that may be used on multiple operating systems, including Windows, Linux, and MacOS X. </p><div style="text-align: justify;"> </div><h3 style="text-align: justify;">Features overview</h3><div style="text-align: justify;"> </div><ul style="text-align: justify;"><li><span class="q">Design of high quality and complex network topologies.</span></li><li><span class="q">Emulation of many Cisco router platforms and PIX firewalls.</span></li><li><span class="q">Simulation of simple Ethernet, ATM and Frame Relay switches.</span></li><li><span class="q">Connection of the simulated network to the real world!</span></li><li><span class="q">Packet capture using Wireshark.</span></li></ul><div style="text-align: justify;"> <span class="highlight">Important notice: </span>users have to provide their own Cisco IOS to use with GNS3. check comments for more.<br /></div>Unknownnoreply@blogger.com8tag:blogger.com,1999:blog-6445350684895721748.post-10596881038132860082009-10-10T07:42:00.005+01:002009-10-10T07:57:31.490+01:00Babylon 8.0.0 pro r.20<div style="text-align: justify;"><strong>Babylon is the world's leading provider of quick online and offline dictionary and translation software in over 75 languages in one simple click and is being used by millions of private users and organizations in more than 200 </strong><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvQuW5mGORfu7YB1ZrF6vW5_2NVjP_4KBvn5-NkNG0VP0_HCMAQ0KemAj32SXohIfCp50qsSKw7WPjQ_unoLyXksdqn-fxLYBx5Yk81bfIn5APKL3TQ8stUVSY2Q8-yorUhFJ0nqFQgLM/s1600-h/babylon.png"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 325px; height: 183px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvQuW5mGORfu7YB1ZrF6vW5_2NVjP_4KBvn5-NkNG0VP0_HCMAQ0KemAj32SXohIfCp50qsSKw7WPjQ_unoLyXksdqn-fxLYBx5Yk81bfIn5APKL3TQ8stUVSY2Q8-yorUhFJ0nqFQgLM/s320/babylon.png" alt="" id="BLOGGER_PHOTO_ID_5390860292152226882" border="0" /></a><strong>countries.</strong><br /><br /><br />Babylon 8 maintains the lead with more languages, full web page and document<br />translation and seamless integration with Microsoft Office speller.<br /><br /><br />Babylon 8 does all the work for you with great new automatic features:<br /><strong><br /><br />Full web page and document translation, seamless integration with </strong><strong>Microsoft Office speller, easier access to dictionaries and encyclopedias </strong><strong>and much more. </strong><br />check comments for more.. :)<br /></div>Unknownnoreply@blogger.com4tag:blogger.com,1999:blog-6445350684895721748.post-83078189619868254382009-10-07T17:17:00.002+01:002009-10-07T17:21:31.988+01:00Rar.Password.Unlocker.v3.0.Win2KXP2003Vista.Cracked-YPOGEiOS<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIpAy4CSTHHYvzhiddZRaPndpQhHUFlj0xRpxMIbs98PUug3V9Z2dvMAupjD6ruu6JZM34mVej4ANhE_ce9nItWiHV8NJFw97sqa7ecez6vAVQklLTOLmEHLcFieaA_51d66I5nJ1E2_Q/s1600-h/rar_box.gif"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 172px; height: 182px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIpAy4CSTHHYvzhiddZRaPndpQhHUFlj0xRpxMIbs98PUug3V9Z2dvMAupjD6ruu6JZM34mVej4ANhE_ce9nItWiHV8NJFw97sqa7ecez6vAVQklLTOLmEHLcFieaA_51d66I5nJ1E2_Q/s320/rar_box.gif" alt="" id="BLOGGER_PHOTO_ID_5389893327172935362" border="0" /></a><br />some guys looking for an application to open rar docs with password locked in it.<br /><br /><strong></strong> RAR Password Unlocker 3.0 is to find the lost password for the RAR file for you to extract the files in the archive easily. This RAR password remover supports all versions of RAR archives. It can recover password no matter how long and how complex it is. Enhanced by brute-force attack, brute-force with mask attack, dictionary attack, it works effectively and efficiently. Moreover, it is the ever easiest-to-use program even a new user can get used to it in less than a minute.<br /><br />check comments for more...Unknownnoreply@blogger.com7tag:blogger.com,1999:blog-6445350684895721748.post-51684609829045873972009-10-05T12:05:00.002+01:002009-10-05T13:17:41.787+01:00Windows server 2008 r2<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGGtbppdrssi1zSll0uQuZng-QdROY9gmAa0okb_ip54WqgKruEkKvOUx8_x_S6N4bw3wBikH0x7cb1UdJApRyNoOp8BUzoAdLiFrGAyAXaePf6xc-GL05GPkwQvqYoatxW8JpqRRknuc/s1600-h/ws2008r2bloglogo.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 241px; height: 164px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGGtbppdrssi1zSll0uQuZng-QdROY9gmAa0okb_ip54WqgKruEkKvOUx8_x_S6N4bw3wBikH0x7cb1UdJApRyNoOp8BUzoAdLiFrGAyAXaePf6xc-GL05GPkwQvqYoatxW8JpqRRknuc/s320/ws2008r2bloglogo.jpg" alt="" id="BLOGGER_PHOTO_ID_5389088936940589394" border="0" /></a><br /><h3 style="text-align: justify;" class="cueSectionTitle">What is Windows Server 2008 R2?</h3><p style="text-align: justify;" class="cueParagraph">Windows Server 2008 R2 builds on the award-winning foundation of Windows Server 2008, expanding existing technology and adding new features to enable IT professionals to increase the reliability and flexibility of their server infrastructures. New virtualization tools, Web resources, management enhancements, and exciting Windows 7 integration help save time, reduce costs, and provide a platform for a dynamic and efficiently managed data center. Powerful tools such as Internet Information Services (IIS) version 7.5, updated Server Manager and Hyper-V platforms and Windows PowerShell version 2.0 combine to give customers greater control, increased efficiency and the ability to react to front-line business needs faster than ever before.</p><p style="text-align: justify;" class="cueParagraph">What's new:<br /></p><h3 style="font-weight: bold;" class="cueSectionTitle"><span style="font-size:100%;">Web Application Platform</span></h3><h3 style="font-weight: bold;" class="cueSectionTitle"><span style="font-size:100%;">Virtualization</span></h3><h3 style="font-weight: bold;" class="cueSectionTitle"><span style="font-size:100%;">Scalability and Reliability</span></h3><h3 style="font-weight: bold;" class="cueSectionTitle"><span style="font-size:100%;">Management</span></h3><h3 style="font-weight: bold;" class="cueSectionTitle"><span style="font-size:100%;">Better Together with Windows 7</span></h3>Check comments for more!Unknownnoreply@blogger.com4tag:blogger.com,1999:blog-6445350684895721748.post-29662928088530214472009-10-03T11:08:00.004+01:002009-10-03T11:22:01.077+01:00Packet tracer 5.2<p style="text-align: justify;"><b>Packet Tracer</b> is a powerful router simulator created by Cisco Systems and provided for free distribution to faculty, students, and alumni who are or have participated in the Cisco Academy program. The purpose of Packet Tracer is to offer students and teachers a tool to learn the principles of networking as well as develop Cisco Technology specific skills.</p><p style="text-align: justify;">Packet Tracer is current<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5xW-foXt9q8fpKolBAOIooQQjbaK6qIrJ3UnLW4SVNqtwZt4pV7SvJ6FCsN4idb018fwykp8CIVUzBZQt3Cngtz_68Rp2QODBlFvQgxCt0KOYoFDmxXtdmhSuPcpTBBttrQVY-u-bgbs/s1600-h/image17.png"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 207px; height: 168px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5xW-foXt9q8fpKolBAOIooQQjbaK6qIrJ3UnLW4SVNqtwZt4pV7SvJ6FCsN4idb018fwykp8CIVUzBZQt3Cngtz_68Rp2QODBlFvQgxCt0KOYoFDmxXtdmhSuPcpTBBttrQVY-u-bgbs/s320/image17.png" alt="" id="BLOGGER_PHOTO_ID_5388316857715518546" border="0" /></a>ly at version 5.2 and can be obtained from the <span class="external text">Packet Tracer website</span>. The software is only available to Cisco Netacad students, faculty, and alumni. Version 5.2 is available for Windows and Linux operating systems.</p> <h3><span class="editsection"></span> <span class="mw-headline" id="System_requirements">System requirements</span></h3> <ul><li>CPU: Intel Pentium 300 MHz or equivalent</li><li>OS: Microsoft Windows 2000, Windows XP, Vista Home Basic, Vista Home Premium, Fedora 7, or Ubuntu 7.10</li><li>RAM: 96 MB</li><li>Storage: 250 MB of free disk space</li><li>Screen resolution: 800 x 600 or higher</li><li>Macromedia Flash Player 6.0 or higher</li></ul>check comments for more!!Unknownnoreply@blogger.com9tag:blogger.com,1999:blog-6445350684895721748.post-52419920627762821292009-09-26T20:16:00.005+01:002009-09-26T21:00:25.064+01:002 birthday in one day<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFAb8jSj_LGHksbmmSisI8-4dJVcqN-4dgNB3icoDYmnTOBJNYuArZU2aqPYormG0MgNSrgerX6zz_w_NuOyoIgmYnTrxBuoq1WxoqPo6cqovZwSrKXgAwbifrKOO6Sl-moQhE6sP0rwU/s1600-h/knlogo2.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 110px; height: 105px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFAb8jSj_LGHksbmmSisI8-4dJVcqN-4dgNB3icoDYmnTOBJNYuArZU2aqPYormG0MgNSrgerX6zz_w_NuOyoIgmYnTrxBuoq1WxoqPo6cqovZwSrKXgAwbifrKOO6Sl-moQhE6sP0rwU/s320/knlogo2.jpg" alt="" id="BLOGGER_PHOTO_ID_5385859506057499922" border="0" /></a><br />26th september 1999 KAHKESHAN ins.of technology was born in Tehran!!! This is not just a place for me this is my fututre, my hope, friend and my home...<br />ater a decade, KAHKESHAN is the most famous and the best IT company in IRAN.<br /><br /><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKGj4kuOAt-dzxWjh6J2yKGDQnyEsmv1m1dbCydTh5WLYqOHYHUOiqVY7HZcE6gvx7fOMoCNBKhorMtvEBkUMkSBnYNTqJMQdscwQpA2ptl1t340tTPzY4CFWZatnrlIYjXDPWsrGjT8I/s1600-h/files.php.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 95px; height: 88px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKGj4kuOAt-dzxWjh6J2yKGDQnyEsmv1m1dbCydTh5WLYqOHYHUOiqVY7HZcE6gvx7fOMoCNBKhorMtvEBkUMkSBnYNTqJMQdscwQpA2ptl1t340tTPzY4CFWZatnrlIYjXDPWsrGjT8I/s320/files.php.jpg" alt="" id="BLOGGER_PHOTO_ID_5385859603318719410" border="0" /></a><br />26th september 1945 Esteghlal FC was born in Tehran, not just a fan of it am a lover and will be forver.<br /><br /><br /><br /><br />Happy birthday to both of you. Wish u the best and hope u ll be stay in the best place of the world always....Unknownnoreply@blogger.com21tag:blogger.com,1999:blog-6445350684895721748.post-16657155409113315712009-09-26T15:13:00.003+01:002009-09-26T15:18:39.426+01:00CCNA exploration<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXX7kD34Pby2tITHa46jePQ7ctLWqF665pF7MRcSGECXdQV12-4yAZwEvG-1IsRodV5ICVkqOODSaGO4lajOJmpkOTQ82MWxTQvOS_mPcKIRqn0xusbByk24-LEj96R7cvuIcFJRJaTHs/s1600-h/ccna_exploration.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 186px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXX7kD34Pby2tITHa46jePQ7ctLWqF665pF7MRcSGECXdQV12-4yAZwEvG-1IsRodV5ICVkqOODSaGO4lajOJmpkOTQ82MWxTQvOS_mPcKIRqn0xusbByk24-LEj96R7cvuIcFJRJaTHs/s320/ccna_exploration.jpg" alt="" id="BLOGGER_PHOTO_ID_5385780169029305298" border="0" /></a><br /><p style="text-align: justify;">The Cisco CCNA Exploration curriculum provides an integrated and comprehensive coverage of networking topics, from fundamentals to advanced applications and services, while providing opportunities for hands-on practical experience and soft-skills development. The curriculum teaches networking based on technology, covering networking concepts using a top-down, theoretical, and integrated approach – from network applications to the network protocols and services provided to those applications by the lower layers of the network.</p><p style="text-align: justify;">CCNA Exploration is designed for students with advanced problem solving and analytical skills. The curriculum offers a comprehensive and theoretical learning experience for analytical students, and uses language that aligns well with engineering concepts. Interactive activities are embedded in the curriculum, along with detailed, theoretical content. Advanced labs build critical thinking and problem solving skills and encourage exploration and research. </p><p style="text-align: justify;">CCNA Exploration can be delivered as an independent curriculum or integrated into a broader course of study, such as degree programs in IT, engineering, math, or science. While primarily designed for postsecondary institutions, CCNA Exploration is appropriate for students at many education levels if they have the required skills, and if the instructional approach complements their learning style and educational goals.</p><p style="text-align: justify;">CCNA Exploration helps prepare students for entry-level career opportunities, continuing education, and globally-recognized Cisco CCNA certification.</p>Unknownnoreply@blogger.com12tag:blogger.com,1999:blog-6445350684895721748.post-68303582073695279032009-09-24T17:38:00.002+01:002009-09-24T18:08:04.670+01:00Best way to Pass 70-620Most of the students pass with 950 or more, Be careful of simulation tests!!!<br /><br />http://www.examcollection.com/microsoft/Microsoft.Pass4Sure.70-620.v2009-05-19.by.LoneWolf.225q.vce.file.html<br /><br />Hopefuly that would be informative for u!!Unknownnoreply@blogger.com12tag:blogger.com,1999:blog-6445350684895721748.post-90684028839692838872009-09-15T10:12:00.004+01:002009-09-15T10:47:37.353+01:00IEEE stamps "approved" on 802.11n Wi-Fi standard<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-j6wlFiaaWNz72nEKI3FQYaxwYpkxGYpeFnXXEdJnEALa-WW59Q_GNsw-8Q2pIXT3Rsff8fHho5zSaBAB1nN0-tCcXy6ZlUxudRmUdIpW4NF6mcdxMi19cW48O25l3L_2Dj6xtICLCqI/s1600-h/logo_abgn_final.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 126px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-j6wlFiaaWNz72nEKI3FQYaxwYpkxGYpeFnXXEdJnEALa-WW59Q_GNsw-8Q2pIXT3Rsff8fHho5zSaBAB1nN0-tCcXy6ZlUxudRmUdIpW4NF6mcdxMi19cW48O25l3L_2Dj6xtICLCqI/s320/logo_abgn_final.jpg" alt="" id="BLOGGER_PHOTO_ID_5381627988165703442" border="0" /></a><br /><p style="text-align: justify;" class="first">The IEEE has finally approved the 802.11n high-throughput wireless LAN standard.</p><div style="text-align: justify;"> </div><p style="text-align: justify;">There’s been no public announcement yet by IEEE. But Bruce Kraemer, the long-time chairman of the 802.11n Task Group (part of the 802.11 Working Group, which oversees the WLAN standards), has sent out a notification to a listserv for task group members, which includes a wide range of Wi-Fi chip makers, software developers, and equipment vendors. </p><p style="text-align: justify;">The brief e-mail was sent just after 11 a.m. EST today. Kraemer announced that the Standards Board had approved both 11n and a companion standard: 11w, for protecting data in 802.11 management frames. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">“Although this e-mail vehicle falls far short of expressing the sentiment, thanks to the hundreds of 802.11members that contributed to these efforts, as well as the 802 EC and the IEEE Staff,” Kraemer wrote. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">The Task Group was formally launched on Sept. 11, 2003 . A “Study Group” had been formed a year earlier, to weigh the feasibility of creating a standard that would be the basis for wireless LANS with a minimum of 100Mbps throughput. Today’s Wi-Fi-certified WLAN products, based on draft 2.0 of the standard, typically deliver from 150Mbps to somewhat over 200Mbs, based on two spatial streams. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">The Wi-Fi Alliance has said it will update its Wi-Fi certification program on Sept. 30 to begin testing WLAN products that meet the full standard. Only a few additions have been made to the standard in the past 2 years, and these all involve optional features. According to the Alliance, users can expect future Wi-Fi products to be fully compatible with today’s products. </p>Unknownnoreply@blogger.com11tag:blogger.com,1999:blog-6445350684895721748.post-10431529596782810192009-09-12T19:17:00.003+01:002009-09-12T19:23:35.385+01:00Intel Core i5 And Core i7: Intel’s Mainstream Magnum Opus<p style="text-align: justify;">Intel’s emphasis right now is on Clarkdale, the Nehalem-based mainstream lineup centering on a 32nm process shrink. Clarkdale will be the foundation on which upcoming Core i5 and Core i3 CPUs are based. It’s a big deal for Intel. So big, in fact, that I was told jokingly two weeks before the Lynnfield launch that the whole company had been focusing on Clarkdale, not the Core i5 and Core i7 we’re seeing today. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">Of course, that’s only really funny for the folks who’ve already seen how the Lynnfield-based processors actually perform and know they’re not as anemic as an enthusiast might expect, given the fact that Intel is aggressively pursuing integration, aiming for a SoC-type design in the not-so-distant future. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">But Clarkdale is six months away, at least. Today is all about Lynnfield—the Core i5 and Core i7 CPUs for Intel’s LGA 1156 interface.</p><div style="text-align: justify;"> </div><p style="text-align: justify;"><span class="imgContent imgRight"><span class="iZoom"><img src="http://media.bestofmicro.com/intel-core-i5-750,L-M-222394-1.jpg" alt="" title="" /></span></span></p><div style="text-align: justify;"> </div><p style="text-align: justify;"><strong>The Venerable Core 2 Rides Off…Sort Of</strong></p><div style="text-align: justify;"> </div><p style="text-align: justify;">With the divulging of its Core i7, Core i5, and Core i3 branding, Intel quietly rang the death knell of its Core 2 family, which has been with us for more than three years now, gently massaging away memories of a day when the company ravenously chased after faster clocks. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">That transition won’t happen immediately, though—or even quickly for that matter. Well into the fourth quarter of next year, Intel’s Core 2 architecture will remain a value play. Even today it’s going to persist as a viable option for entry-level buyers. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">Core 2 Quads span from $163 to $316 in the company’s August 9<sup>th</sup> price list. Core 2 Duos range from $113 to $266. Does the trio of CPUs being launched today wreck a number of those price points? Absolutely. Do the three Lynnfield processors we’re seeing now, from $199 to $555 smother Core 2 Quad and Core 2 Duo to the point that everyone will spend at least $200 on their next CPU? Obviously not.</p><div style="text-align: justify;"> </div><div style="text-align: justify;"> </div><p style="text-align: right;"><span class="imgContent imgLeft"><span class="iZoom"><img src="http://media.bestofmicro.com/intel-core-i5-750,L-K-222392-1.jpg" alt="" title="" /></span></span></p><p style="text-align: justify;"><strong>Wait, Define Mainstream</strong></p><div style="text-align: justify;"> </div><p style="text-align: justify;">To make a long story a little shorter, Bloomfield sits at the top of Intel’s stack as Core i7 for LGA 1366. Lynnfield now occupies a space between the high-end and the mid-range segments. Yorkfield (Core 2 Quad) becomes this transitional family that tides Intel over until Clarkdale launches in Q1’ 2010. And Wolfdale continues on in the dual-core Pentium family through the course of 2010. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">If you would have considered a Core 2 Quad or Phenom II X4 previously, the lone Core i5 will be of interest to you. If you were previously pondering a Core i7 for LGA 1366, the Core i7-860 and -870 are now vying for your attention with price points disturbingly similar to the i7-920 and -950, respectively. How’re you supposed to choose between CPUs when architecture, functionality, and pricing are all so similar? </p>Unknownnoreply@blogger.com3tag:blogger.com,1999:blog-6445350684895721748.post-16252135450968356142009-09-10T07:57:00.002+01:002009-09-10T08:02:35.671+01:00Apple announces iPhone 3.1<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjo-AEQ0ig3PyNQnskAGn0aVPB5Dr4AbBQVv2efNhoVZNvvdSHvm78SYgQ7JZdslGWoizSgivmvlk9_qhfQc6DBgjCwBo65Ub-nboBeQaNiRvtW4ZHayWFpCRQmc7P6fZbiEbZCQFNBcs/s1600-h/iphone-31-os.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 140px; height: 140px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjo-AEQ0ig3PyNQnskAGn0aVPB5Dr4AbBQVv2efNhoVZNvvdSHvm78SYgQ7JZdslGWoizSgivmvlk9_qhfQc6DBgjCwBo65Ub-nboBeQaNiRvtW4ZHayWFpCRQmc7P6fZbiEbZCQFNBcs/s320/iphone-31-os.jpg" alt="" id="BLOGGER_PHOTO_ID_5379730263509694402" border="0" /></a><br /><div style="text-align: justify;">Apple on Wednesday released the iPhone 3.1 software update, as predicted. Apple CEO Steve Jobs introduced the update on stage at the Yerba Buena Center during the "Rock and Roll" event. The software includes a handful of new features and bug fixes.<br /><br />With over 75,000 apps in the App Store, it can be difficult to find new applications. Apple's extended its Genius media-recommendation algorithm to iPhone applications. It looks at the apps you already own and makes recommendations based on that information. </div><p style="text-align: justify;">In addition iPhone 3.1 beefs up the iPhone's ringtone capability, allowing you to download over 30,000 ringtones from major labels via a Ringtones section in the iPhone's iTunes application. Ringtones will cost $1.29 apiece, and automatically show up in the iPhone's Settings once they've been downloaded. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">iPhone 3.1 is free for all iPhone and iPod touch owners will be available on Wednesday via iTunes.</p><p style="text-align: justify;">Source: Macworld</p>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-6445350684895721748.post-23682311272274297632009-09-08T17:43:00.006+01:002009-09-08T18:00:41.028+01:00iPhone passcode bugs revealed<p style="text-align: justify;" class="first"><i>About the author: Jay Sartori, CISSP, Security+, CCSP, MCSE, is an IT security analyst with over 12 years of IT experience. He has a bachelor’s degree in computer engineering and a master’s in network security management.</i></p><div style="text-align: justify;"> </div><p style="text-align: justify;">As an IT security professional, I was tasked with evaluating the iPhone’s security features for the enterprise . Over the past few weeks, I have been testing different aspects of the new iPhone 3GS, particularly the interaction with Exchange ActiveSync (EAS) and device password policies. During my testing, I discovered some strange behaviors with how the iPhone handles device password policies, as well as passwords altogether.</p><p style="text-align: justify;"><b>iPhone security considerations</b></p><div style="text-align: justify;"> </div><p style="text-align: justify;">It has already been proven that the passcode on an iPhone can be removed. The purpose of this article is to point out the false sense of security delivered through Apple’s marketing of iPhone features for the enterprise. My testing has revealed that the enterprise security features do not behave correctly and I will point out three flaws with how passwords are handled with the iPhone and EAS.<br /></p><p style="text-align: justify;">The setup for my testing consisted of a 16GB iPhone 3GS running firmware 3.0.1. The iPhone was configured to use Exchange ActiveSync mail going through a proxy server. The proxy server was an F5 Firepass which provides similar functionality as an ISA server to proxy connections to EAS. The Exchange server was running Exchange 2003 SP2 with EAS enabled and configured with device password policies. I set up the device password policy on the Exchange server to enforce a password with a minimum of four characters and a 20 minute inactivity timeout. This means that any mobile device connected to Exchange that is idle for 20 minutes will automatically lock and require a password to access the device. </p><div style="text-align: justify;"> </div><p style="text-align: justify;"><b>Bug 1 – iPhone does not handle EAS Policies as expected</b></p><div style="text-align: justify;"> </div><p style="text-align: justify;">With Exchange ActiveSync, administrators can configure device password policies. According to Microsoft, the “Inactivity Time” option determines how long the device needs to be inactive before the user is prompted for the password. I first tested my EAS settings against a Windows Mobile Device. The results were as expected, with the device requiring me to set a password and after 20 minutes of inactivity, requiring me to enter my password. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">The iPhone behaved differently. First, you need to understand two settings on the iPhone which pertain to passwords: “Auto-Lock” and “Passcode Lock.” “Auto-Lock” sets the amount of time in minutes before the screen locks. The purpose of this is to save battery life by dimming the screen and to prevent accidental pocket dialing. “Passcode Lock” determines the amount of time in minutes after the Auto-Lock sets in, before a password needs to be entered. This can be configured at 1 min., 5 min., 15 min., 1 hour, 4 hours or never.<br /></p><p style="text-align: justify;">Upon successfully connecting to EAS, I was required to set a password as expected. After I set up my password, I reviewed the settings on the iPhone and saw that Auto-Lock was set to 5 minutes and Passcode Lock was set to 15 minutes. This appeared to be correct as the total adds up to 20 minutes before requiring a password to be entered. Surprisingly, however, I was able to change the “Passcode Lock” on the iPhone up to a maximum time of 1 hour. I did notice that I could not set the Passcode Lock to 4 hours or never as those options were apparently removed after connecting to EAS. This allowed me to change the Passcode Lock up to a maximum of 1 hour for a total of 65 minutes (5 for the Auto-Lock and 1hr for the Passcode Lock) before requiring a password.</p><p style="text-align: justify;">This means in a corporate environment, users are able to override inactivity timeout settings defined by administrators, as the iPhone does not respect the EAS policy. This gives a false sense of security to administrators and they need to be aware of this behavior. If Apple is going to advertise integration with EAS security policies, then they need to ensure the iPhone respects the settings and behaves accordingly. </p><div style="text-align: justify;"> </div><p style="text-align: justify;"><b>Bug 2 – Passcode Prompt Reveals Too Much Information</b></p><div style="text-align: justify;"> </div><p style="text-align: justify;">I’m really not<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbxA7R4lRs5AdI8CKiMrCp3j8_lQ5to8-06jzb3NU0kCt9HbAHkGPTjFLTWSzqTjdE1Q8RUfqiUgk4U-wWhjmp1oegb6WTJBw_R-Nbxp2QOWEZ0Wvhty-ukLXMmEfD0wN09TzpsbKREac/s1600-h/090209-iphone1.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 126px; height: 190px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbxA7R4lRs5AdI8CKiMrCp3j8_lQ5to8-06jzb3NU0kCt9HbAHkGPTjFLTWSzqTjdE1Q8RUfqiUgk4U-wWhjmp1oegb6WTJBw_R-Nbxp2QOWEZ0Wvhty-ukLXMmEfD0wN09TzpsbKREac/s320/090209-iphone1.jpg" alt="" id="BLOGGER_PHOTO_ID_5379140735498420306" border="0" /></a> sure how this next bug made it by the quality assurance team, specifically security testing. For this example, let’s assume you set your password to “abc123” and your device gets locked. You are prompted to enter your password with the iPhone keyboard and, as you type, asterisks are displayed across the screen .<br /></p><p style="text-align: justify;">This is typical and expected behavior. Note that the input box does not give any indication as to the length of the password or the complexity of the password as you can enter numbers, letters and special characters.<br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1mt2PJ4hN9BPPNhz7uQon3mUnAln9ubAYiXwByZRH4tcBq_VPH9A67DMdCJhJwrljwr9NNxlAE5YPQXwmPcVM8yLy7Lrbljj_Jqh6s9I6Iakd4iaes3g-MgWAkIQj75oOBMWhD4Lyokc/s1600-h/090209-iphone2.jpg"><img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 131px; height: 186px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1mt2PJ4hN9BPPNhz7uQon3mUnAln9ubAYiXwByZRH4tcBq_VPH9A67DMdCJhJwrljwr9NNxlAE5YPQXwmPcVM8yLy7Lrbljj_Jqh6s9I6Iakd4iaes3g-MgWAkIQj75oOBMWhD4Lyokc/s320/090209-iphone2.jpg" alt="" id="BLOGGER_PHOTO_ID_5379141244351442978" border="0" /></a></p><p style="text-align: justify;">But if you change your password to “1234” or any four-digit numeric password for that matter, from then on you lose the ability to enter any letters or special codes . This reveals two pieces of information about your password: 1) that it consists of only numbers, and 2) the password is only four digits long. From a brute-force perspective that is only 10,000 possible combinations, which would be trivial for any type of offline attack. Knowing this behavior of the iPhone, you may want to consider requiring passwords to require at a minimum both numbers and letters in your EAS policy. </p><div style="text-align: justify;"> </div><p style="text-align: justify;"><b>Bug 3 – Changing your iPhone Passcode</b></p><div style="text-align: justify;"> </div><p style="text-align: justify;">This next bug has some similarities to Bug 2. Let’s assume that you realize that your four-digit numeric password is weak and reveals too much information. You decide to change your password from numbers to something alphanumeric. What I discovered is you cannot do this. Once your password is changed to four digits, when you go to change the password, you are only given the option to change it to another four-digit numeric password. On the other hand, if your password is already alphanumeric, you can change it to any length and any combination of numbers, letters and special characters. This is clearly a bug with the iPhone OS.<br /></p><p style="text-align: justify;">The workaround to this was to remove the Exchange account from the iPhone and add it back. Upon adding the Exchange account back, I was prompted to enter a new password which allowed me to enter a complex password.<br /></p><p style="text-align: justify;"><b>Summary</b></p><div style="text-align: justify;"> </div><p style="text-align: justify;">The iPhone is a great device and is arguably the best mobile device from a usability perspective. Unfortunately, the security features are not quite ready for the enterprise and contain various bugs. In order to safeguard against such bugs, data encryption has to be considered for any type of data protection, but that is another article. Enterprises considering the iPhone for corporate use need to be aware of how the iPhone security features behave and the different ways that data can be breached in the event that the device is lost or stolen.<br /></p><p style="text-align: justify;">Source: iPhone Jailbraker<br /></p>Unknownnoreply@blogger.com2tag:blogger.com,1999:blog-6445350684895721748.post-26562741425915018682009-09-07T03:39:00.002+01:002009-09-07T03:47:00.793+01:00Cisco enhances routers, switches for collaboration<p style="text-align: justify;" class="first">Cisco this week is extending its branch routers and LAN switches in an effort to improve the collaboration capabilities of enterprise customers. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">Cisco is enhancing its Integrated Services Routers (ISR) and Catalyst 4500 and 6500 switches with new models, line cards and software to address mobility, sustainability and unified communications (UC) requirements.<br /></p><p style="text-align: justify;" class="first">Cisco this week is extending its branch routers and LAN switches in an effort to improve the collaboration capabilities of enterprise customers. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">Cisco is enhancing its Integrated Services Routers (ISR) and Catalyst 4500 and 6500 switches with new models, line cards and software to address mobility, sustainability and unified communications (UC<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3Cd5SeeMT6vvZlNZw1tlL1CN7AhMC84PCUFxRQ_hKTzZPXnDCLZvPkjhkwjPC9BW3NMzLhYRVWDKsYmiHxFvZoZLP_Q48xkDDWpNv5KhwUP6V_poZ44Fx1pXY09bRwXZwvhZsKujWwiA/s1600-h/catalyst_4500_eseries.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 256px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3Cd5SeeMT6vvZlNZw1tlL1CN7AhMC84PCUFxRQ_hKTzZPXnDCLZvPkjhkwjPC9BW3NMzLhYRVWDKsYmiHxFvZoZLP_Q48xkDDWpNv5KhwUP6V_poZ44Fx1pXY09bRwXZwvhZsKujWwiA/s320/catalyst_4500_eseries.jpg" alt="" id="BLOGGER_PHOTO_ID_5378551278702861906" border="0" /></a>) requirements. </p><p style="text-align: justify;">Cisco is now supporting High-Speed Packet Access (HSPA) on the ISR's 3G Wireless Wide Area Network module. HSPA boosts bandwidth and performance for the module in backup or disaster-recovery applications. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">Cisco also says applications from Singlewire Software now run on the ISR's Application Extension Platform (AXP) services module. Singlewire's InformaCast package simultaneously sends an audio stream or text message to multiple IP phones, IP speakers, desktop notification systems and overhead paging systems. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">The ISRs also now support the following UC features for collaboration and mobility:</p><div style="text-align: justify;"> </div><p style="text-align: justify;">* Cisco Unified SIP Proxy to reduce UC deployment costs.</p><div style="text-align: justify;"> </div><p style="text-align: justify;">* Voice signatures on the IP Security Network Module to make voice more secure.</p><div style="text-align: justify;"> </div><p style="text-align: justify;">* Mobility and video features on Cisco Unified Communications Manager Express.</p><div style="text-align: justify;"> </div><p style="text-align: justify;">* Timecard management capabilities on Cisco Unity Express to improve the productivity of branch employees.</p><div style="text-align: justify;"> </div><p style="text-align: justify;">The ISR's EtherSwitch Etnernet switching modules also now support Cisco EnergyWise power efficiency technology to help improve energy utilization in the LAN. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">For the Catalyst LAN switches, Cisco unveiled a supervisor module for the Catalyst 4500 series. The 6L-E is intended to bring media collaboration and increased energy efficiency to the wiring closet switches through support for Power over Ethernet (PoE) Plus at 30 watts. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">PoE Plus is an extension to the PoE standard for video and wireless access point support.</p><div style="text-align: justify;"> </div><p style="text-align: justify;">Cisco also rolled out a 48-port 10/100/1000Mbps line card that enables 30-watt PoE support for devices such as videophones, dual-band wireless access points, building service devices and video surveillance cameras. Cisco says it also extended its Smart Call Home support notification feature and EnergyWise capabilties to the Catalyst 4500. </p><p style="text-align: justify;">The Catalyst 4500, and all of Cisco's wiring closet switches, also now have a limited lifetime warranty, Cisco says.</p><p style="text-align: justify;">For the Catalyst 6500, Cisco enhanced its use in campus backbones by integrating the virtual switching system (VSS) and service module capabilities of the switch. This lets customers deploy firewall, network analysis module (NAM), and wireless service modules in their VSS campus core, for increased backbone scale and reliability, Cisco says. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">New NAM capabilities provide visibility into voice applications, traffic analysis and segmented MPLS networks, Cisco says.</p><div style="text-align: justify;"> </div><p style="text-align: justify;">Meanhwhile, Cisco says there's plenty of life left in the Catalyst 6500 even though the company rolled out the next-generation Nexus switch for data center unified fabric applications. The Nexus is optimized for those environments while the Catalyst 6500 will not likely attain FibreChannel over Ethernet (FCoE) unified I/O or lossless Data Center Ethernet capabilities, said Kumar Srikantan, vice president of product management for Cisco's campus switching systems technology group.<br /></p><p style="text-align: justify;">But that doesn't mean the 600,000 Catalyst 6500 chassis deployed are due for retirement, Srikantan says. For instance, the current Supervisor 720 with VSS only drives 40Gbps per slot on the system even though the Catalyst 6500 is capable of 80Gbps per slot, he says. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">Therefore, one might expect another supervisor engine to emerge soon to drive the Catalyst 6500 to 80Gbps per slot or higher. And given that most supervisor engines have a 10 to 12 year life cycle, according to Srikantan, and the Sup 720 came out in 2003, a new supervisor could extend the life of the Catalyst 6500 by another 10 to 12 years. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">"It's the B-52 of switching," Srikantan says of the Catalyst 6500, referring to the venerable U.S. military aircraft.</p><div style="text-align: justify;"> </div><p style="text-align: justify;">The Catalyst 6500 should attain EnergyWise power efficiency capabilities in the first half of 2010, Srikantan says.</p><div style="text-align: justify;"> </div><p style="text-align: justify;">Pricing for the 890 ISR starts at $1,295. The 1861W ISR starts at $4,295.</p><div style="text-align: justify;"> </div><p style="text-align: justify;">The Supervisor 6L-E for the Catalyst 4500 costs $11,995. The 48 port 10/100/1000 PoE Plus linecard costs $7,495. A 6000 watt power supply for the switch costs $4,995. Bundled pricing for the 4506-E and 4503-E is $18,000 and $11,000, respectively. </p><div style="text-align: justify;"> All products are available now except the 6000 watt power supply, which will ship in mid-June.<br /><br />Source: Some cisco's partner<br /></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-6445350684895721748.post-60227927016436619792009-09-04T21:15:00.004+01:002009-09-04T21:26:18.442+01:00Cisco IOS Guide<h2> <a name="topic1"></a></h2><span style="font-weight: bold;">Part One:<br /><br /></span><h2><a name="topic1">Cisco IOS Software Family</a> </h2> <p>Cisco IOS Software continues to evolve over time to meet the rapidly changing requirements of the most demanding Enterprise and Service Provider networks. As a family of releases, the feature richness and broad hardware support delivered in Cisco IOS Software is unmatched in the industry. </p> <p>Table 1 summarizes the latest releases that make up the Cisco IOS Software Family: </p> <p> <b>Table 1—Cisco IOS Software Family Types and Releases</b> </p> <table width="60%" bgcolor="#ffffff" border="1" cellpadding="3" cellspacing="1"> <tbody><tr> <th colspan="1" rowspan="1" width="" bgcolor="#ccccff" height=""> <p>Type</p> </th> <th colspan="1" rowspan="1" width="" bgcolor="#ccccff" height=""> <p>Release</p> </th> <th colspan="1" rowspan="1" width="" bgcolor="#ccccff" height=""> <p>Description</p> </th> </tr> <tr> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>IOS T </p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Maintenance Release 12.3 </p> <p>Maintenance Release 12.4 </p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>A comprehensive portfolio of Cisco IOS Software technologies and broad hardware adoption for Enterprise, Access, and Commercial networks. Incorporates new software features and hardware introduced in the earlier T release, and additional software fixes. Maintenance releases inherit new Cisco IOS Software functionality and hardware from T releases. This is typically new functionality. Hardware is not introduced in maintenance releases.</p> </td> </tr> <tr> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""><br /></td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Release 12.4T </p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Cisco IOS Software functionality and hardware advances for Security, Voice, and Wireless for Enterprise, Access, and Commercial networks.</p> </td> </tr> <tr> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>IOS S</p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Release 12.2SB </p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Cisco IOS Software functionality and hardware for Broadband and Leased-Line Aggregation, and MPLS Provider Edge (PE) on a comprehensive portfolio of mid-range routers for Service Provider edge networks.</p> </td> </tr> <tr> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""><br /></td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Release 12.2SX </p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Cisco IOS Software functionality and hardware for high-end Ethernet LAN switching for Enterprise access, distribution, Core and data center networks.</p> </td> </tr> <tr> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""><br /></td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Release 12.2SE </p> <p>Release 12.2SG </p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Cisco IOS Software functionality and hardware for mid-range and low-end Ethernet LAN switching for Enterprise access and distribution networks, and mid-range and low-end Metro Ethernet for Service Provider edge networks.</p> </td> </tr> <tr> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""><br /></td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Release 12.2SR</p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Cisco IOS Software functionality and hardware for high-end Metro Ethernet and MPLS PE for Service Provider edge networks.</p> </td> </tr> <tr> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>IOS XR</p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Release 3.2</p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Cisco IOS XR Software functionality and hardware for the Cisco CRS-1 Carrier Routing System and Cisco XR 12000 Series Routers for Service Provider Core networks. Designed to address the terabit scaling, secure virtualization, high availability, and distributed processing requirements of large IP next-generation networks.</p> </td> </tr> </tbody></table> <p> </p><h2> <a name="t2">Cisco IOS Software Family Hardware</a> </h2> <p>Table 2 correlates Cisco hardware to the recommended Cisco IOS Software Family release. </p> <p> <b>Table 2—Cisco IOS Software Family Hardware</b> </p> <table width="60%" bgcolor="#ffffff" border="1" cellpadding="3" cellspacing="1"><tbody><tr> <th colspan="1" rowspan="1" width="" bgcolor="#ccccff" height=""> <p>Hardware</p> </th> <th colspan="1" rowspan="1" width="" bgcolor="#ccccff" height=""> <p>Recommended IOS T, IOS S, IOS XR</p> </th> </tr> <tr> <td colspan="2" rowspan="1" width="" bgcolor="#ccccff" height=""> <p> <b>Access and Dial Routers</b> </p> </td> </tr> <tr> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Cisco 800, 1700, 2600, 2800 Series Routers </p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>12.4 </p> <p>12.4T</p> </td> </tr> <tr> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Cisco 3700 and 3800 Series Routers</p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>12.4 </p> <p>12.4T</p> </td> </tr> <tr> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Cisco AS5x50</p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>12.4 </p> <p>12.4T</p> </td> </tr> <tr> <td colspan="2" rowspan="1" width="" bgcolor="#ccccff" height=""> <p> <b>Switches</b> </p> </td> </tr> <tr> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Cisco Catalyst 2970, 3560 and 3750 Series</p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>12.2SE</p> </td> </tr> <tr> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Cisco Catalyst 4500 and 4900 Series Switch</p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>12.2SG</p> </td> </tr> <tr> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Cisco Catalyst 6500 Series Switch</p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>12.2SX</p> </td> </tr> <tr> <td colspan="2" rowspan="1" width="" bgcolor="#ccccff" height=""> <p> <b>Mid-Range Hardware</b> </p> </td> </tr> <tr> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Cisco 7200 Series and Cisco 7301 Routers</p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>12.4 </p> <p>12.4T </p> <p>12.2SB</p> </td> </tr> <tr> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Cisco 7304 Router</p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>12.2SB</p> </td> </tr> <tr> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Cisco 7500 Series Router</p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>12.4 </p> <p>12.0S</p> </td> </tr> <tr> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Cisco 10000 Series Router</p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>12.2SB</p> </td> </tr> <tr> <td colspan="2" rowspan="1" width="" bgcolor="#ccccff" height=""> <p> <b>High-End Hardware</b> </p> </td> </tr> <tr> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Cisco 7600 Series Internet Router</p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>12.2SR</p> </td> </tr> <tr> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Cisco 8550 MGX RPM-PR/XF Router</p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>12.4T</p> </td> </tr> <tr> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Cisco 12000 Series Router</p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>IOS-XR, 12.0S</p> </td> </tr> <tr> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>Cisco CRS-1 Carrier Routing System</p> </td> <td colspan="1" rowspan="1" width="" bgcolor="#ffffff" height=""> <p>IOS-XR </p></td></tr></tbody></table>Unknownnoreply@blogger.com2tag:blogger.com,1999:blog-6445350684895721748.post-84962664014214954752009-09-04T09:23:00.003+01:002009-09-04T09:34:55.710+01:00How to set short command in IOS to save time<div style="text-align: justify;"><span class="content"><h3 class="p_H_Head2"> Using Alia<span><span class="content"><span><span class="content"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMObvP_dMjuQW87OTLei5nglp1qFLUdFCf3PYgyBPkIJIlasmjaKvT_IBuW-ol11Xj5A3Ui0Q8bwLc61HMFj33z6T960mkYHHeW6hNqNzvJ0iFP5AzQqAdlmDp-c1VNykng9SHXxbcW8w/s1600-h/CiscoSystems.gif"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 133px; height: 83px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMObvP_dMjuQW87OTLei5nglp1qFLUdFCf3PYgyBPkIJIlasmjaKvT_IBuW-ol11Xj5A3Ui0Q8bwLc61HMFj33z6T960mkYHHeW6hNqNzvJ0iFP5AzQqAdlmDp-c1VNykng9SHXxbcW8w/s320/CiscoSystems.gif" alt="" id="BLOGGER_PHOTO_ID_5377527593122727426" border="0" /></a></span></span></span></span>ses for CLI Commands </h3> <a name="wp1013135"></a><p class="pB1_Body1">Category: Command line<br /></p><p class="pB1_Body1">To save time and the repetition of entering the same command multiple times, you can use a command alias. An alias can be configured to do anything that can be done at the command line, but an alias cannot move between modes, type in passwords, or perform any interactive functions. </p> <a name="wp1013139"></a> <a name="wp1013177"></a><p class="pTableAnchor"> </p> <div align="left"> <table id="wp1013146table1013140" width="80%" border="1" bordercolor="#808080" cellpadding="3" cellspacing="0"> <caption><a name="wp1013146"></a><a name="wpxref90869"></a> </caption> <tbody><tr align="left" valign="bottom"> <th scope="col"><a name="wp1013150"></a><div class="pCH1_CellHead1"> Command Alias </div> </th> <th scope="col"><a name="wp1013152"></a><div class="pCH1_CellHead1"> Original Command </div> </th> </tr> <tr align="left" valign="top"><td><a name="wp1013154"></a><p class="pB1_Body1"> <b class="cCN_CmdName">h</b> </p> </td> <td><a name="wp1013156"></a><p class="pB1_Body1"> help </p> </td> </tr> <tr align="left" valign="top"><td><a name="wp1013158"></a><p class="pB1_Body1"> <b class="cCN_CmdName">lo</b> </p> </td> <td><a name="wp1013160"></a><p class="pB1_Body1"> logout </p> </td> </tr> <tr align="left" valign="top"><td><a name="wp1013162"></a><p class="pB1_Body1"> <b class="cCN_CmdName">p</b> </p> </td> <td><a name="wp1013164"></a><p class="pB1_Body1"> ping </p> </td> </tr> <tr align="left" valign="top"><td><a name="wp1013166"></a><p class="pB1_Body1"> <b class="cCN_CmdName">s</b> </p> </td> <td><a name="wp1013168"></a><p class="pB1_Body1"> show </p> </td> </tr> <tr align="left" valign="top"><td><a name="wp1013170"></a><p class="pB1_Body1"> <b class="cCN_CmdName">u</b> or <b class="cCN_CmdName">un</b> </p> </td> <td><a name="wp1013172"></a><p class="pB1_Body1"> undebug </p> </td> </tr> <tr align="left" valign="top"><td><a name="wp1013174"></a><p class="pB1_Body1"> <b class="cCN_CmdName">w</b> </p> </td> <td><a name="wp1013176"></a><p class="pB1_Body1"> where </p> </td> </tr> </tbody></table> </div></span><br /><span class="content"> <p class="pTableAnchor"> </p> <a name="wp1013178"></a><p class="pB1_Body1"> To create a command alias, issue the <b class="cCN_CmdName">alias</b> command in global configuration mode. The syntax of the command is <b class="cCN_CmdName">alias</b> <em class="cArgument">mode</em> <em style="font-style: italic;" class="cArgument">command-alias</em><span style="font-style: normal; font-weight: bold;color:Black;" > </span><em style="font-weight: normal;" class="cArgument">original-command</em>. Following are some examples: </p> <a name="wp1013179"></a><p class="pBu1_Bullet1"> •<img src="http://www.cisco.com/en/US/i/templates/blank.gif" alt="" width="19" border="0" height="2" />Router(config)# <b class="cCN_CmdName">alias exec prt partition</b>—privileged EXEC mode </p> <a name="wp1013180"></a><p class="pBu1_Bullet1"> •<img src="http://www.cisco.com/en/US/i/templates/blank.gif" alt="" width="19" border="0" height="2" />Router(config)# <b class="cCN_CmdName">alias configure sb source-bridge</b>—global configuration mode </p> <a name="wp1013181"></a><p class="pBu1_Bullet1"> •<img src="http://www.cisco.com/en/US/i/templates/blank.gif" alt="" width="19" border="0" height="2" />Router(config)# <b class="cCN_CmdName">alias interface rl rate-limit</b>—interface configuration mode </p> <a name="wp1013182"></a><p class="pB1_Body1"> To view both default and user-created aliases, issue the <b class="cCN_CmdName">show alias</b> command. </p></span><br /><span class="content"><p class="pB1_Body1">For example :</p></span></div><p style="text-align: justify;">In configure mode enter:<br /><code>Router(config)#alias exec sib Show ip Int Brief</code></p><div style="text-align: justify;"> </div><p style="text-align: justify;">hit enter and exit config mode. Now type <em>sib</em> and you should get the output from the show ip interface brief command. Note that the odd capitalization isn’t needed, it’s just a thing I do to help me remember what the alias is doing.</p><div style="text-align: justify;"> </div><p style="text-align: justify;">You can pipe it just like you could normally, so <em>sib | i down</em> will show only lines with “down” in the text. If you type <em>sib</em>, add a SPACE and then hit TAB the alias will be expanded to <em>Show ip Int Brief</em>.</p><div style="text-align: justify;"> </div><p style="text-align: justify;">You could alias create aliases like:<br /><code></code></p><p style="text-align: justify;"><code>Router(config)#alias exec sibd Show ip Int Brief | include down *down</code></p><div style="text-align: justify;"> </div><p style="text-align: justify;">That will show you only interfaces that have “down”, some spaces, and “down” again. If you’ve got a router/switch with a hundred or more interfaces this is a quick way to look for the one with the problem.</p><div style="text-align: justify;"> Alias exec isn’t the only option, it’s also possible to create aliases that only work in config mode or config-interface mode.<span class="content"></span></div>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-6445350684895721748.post-23009746666173143842009-09-03T21:22:00.005+01:002009-09-03T21:34:08.100+01:00The Best New Features in Windows 7<p style="text-align: justify;" class="first">Windows 7, in a<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ1nVPCqZ96VCejK36Zbx_MfToZuViMrL5zXoQUwf2A6y_p40R5-5ipMqdDY8psWcW9lQ5zhousoMbywKu2mlhasV9nGxssonflFENmYLPdbD4AcTjp2hSX6wpUGTorKqo1Zjt7eeUK1o/s1600-h/windows7.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 208px; height: 156px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ1nVPCqZ96VCejK36Zbx_MfToZuViMrL5zXoQUwf2A6y_p40R5-5ipMqdDY8psWcW9lQ5zhousoMbywKu2mlhasV9nGxssonflFENmYLPdbD4AcTjp2hSX6wpUGTorKqo1Zjt7eeUK1o/s320/windows7.jpg" alt="" id="BLOGGER_PHOTO_ID_5377341945746560370" border="0" /></a>ll of its various flavors, won't be available in stores until October 22. But, Microsoft announced the availability of a 90-day free trial of Windows 7 Enterprise. That gives you an almost 2 month jumpstart to either start taking advantage of new features of Windows 7, or to test out Windows 7 to decide if you want to make the switch when it becomes available. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">Here are a few of the top new features that I think make it worth your time to take advantage of the Windows 7 90-day trial.</p><p style="text-align: justify;">Action Center. Microsoft introduced the Windows Security Center feature in Windows XP. Windows 7 renames it as the Action Center and expands the scope of information provided. The Windows 7 Action Center notifies you about security-related issues, but also provides a one-stop-shopping view of system status and maintenance concerns. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">Blu-Ray support. In case you haven't gotten the memo, the hi-def DVD war is over and Blu-Ray won. Blu-Ray drives aren't ubiquitous just yet, but more and more PC and laptop manufacturer are including Blu-Ray players and recorders in systems. Windows 7 provides native support for reading and writing to Blu-ray discs.<br /></p><p style="text-align: justify;">Device stage. Adding new hardware is often a frustrating and confusing exercise with Windows. Windows 7 includes a feature called Device Stage to simplify the process. Device Stage provides a single console for managing devices such as printers, webcams, and mobile phones. Device Stage can be customized by the device vendor, so the information and functionality available for a given device will vary from one vendor to another. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">BitLocker-to-Go. Microsoft introduced BitLocker Disk Encryption in Windows Vista .The initial version could only encrypt the drive volume that housed the Windows operating system, but with Service Pack 1 Microsoft extended BitLocker so that other drives and volumes on the system could be protected as well. With Windows 7 BitLocker goes one step farther by adding BitLocker-to-Go for encrypting data on USB thumb drives and other removable media. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">Aero Peek. At first I thought this was just silly eye candy. After using Windows 7 for awhile I have discovered just how useful Aero Peek can be. Rather than fishing through all of the tabs on the Taskbar trying to find the program or instance you need, you can view thumbnails of open instances by simply hovering over the item on the Taskbar. Moving the mouse to hover over a thumbnail image brings that instance up to full screen view for closer inspection. It may be a little thing, but it's a little thing that helps me work more efficiently.<br /></p><p style="text-align: justify;">Aero Snap. The same thing goes for Aero Snap. My initial response was 'cool gee-whiz factor, but who cares?' Now I find it invaluable for working with programs. I can quickly maximize and minimize windows just by dragging them. The part that really helps me is the ability to automatically resize a window to occupy only the left or right half of the screen by dragging it to one side or the other. I frequently work with two windows side by side and used to have to manually resize the windows to accomplish the same thing.<br /></p><p style="text-align: justify;">Jump Lists. Windows users are probably familiar with the concept of Recent Items. The Recent Items link is in the Start Menu and provides quick access to the last 10 or so files that had been accessed. I relied on Recent Items so I could easily re-open documents I was actively working on without having to navigate to them the long way. Recent Items only displayed certain programs or file types though and files would quickly cycle off of the Recent Items list. Jump Lists takes the Recent Items concept and applies it on a program by program basis. Now I have an easily accessible list of recently opened files for Word, Excel, Quicken, Windows Media Player, etc. Definite timesaver. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">DirectAccess. I haven't had a chance to play with this one personally, but I think it is a huge feature and arguably the most compelling reason for businesses to look at Windows 7. DirectAccess provides a bi-directional connection between the internal network and roaming Windows 7 clients as long as they have a live Internet connection. That means the user can access system resources, and IT admins can manage remote systems as if the Windows 7 system was on the internal network and without the need for a VPN connection. DirectAccess requires Windows Server 2008 R2 as well, but organizations that might be interested should take advantage of the 90-day trial to see what DirectAccess can do for them. </p><div style="text-align: justify;"> </div><p style="text-align: justify;">Tony Bradley is an information security and unified communications expert with more than a decade of enterprise IT experience. He tweets as @PCSecurityNews and provides tips, advice and reviews on information security and unified communications technologies on his site at tonybradley.com. </p>Unknownnoreply@blogger.com2