Una entrada de ruta para una dirección de red específica (prefijo y longitud de prefijo) solo puede aparecer una vez en la tabla de enrutamiento. Sin embargo, es posible que la tabla de enrutamiento aprenda sobre la misma dirección de red de más de una fuente de enrutamiento. Excepto en circunstancias muy específicas, solo se […]
Archive for August, 2020
Answer Network| Packet Tracer 7.3.1
Posted: 27th August 2020 by ccna7guru in ENSA, ITN, Packet Tracer, SRWETags: Packet Tracer Activity Wizard Answer Network
In the Answer Network panel, you construct the answer network, and mark the elements of the network on which you want to assess the students. Click on the Show Answer Network button to view the workspace for the answer network. If you chose to convert the existing workspace to the answer network when you first entered the […]
Tecnologías de Virtualización de Red SDN
Posted: 11th August 2020 by ccna7guru in SRWETags: Tecnologías de Virtualización
Se han desarrollado dos arquitecturas de red principales para admitir la virtualización de la red: •Redes definidas por software (SDN) : una arquitectura de red que virtualiza la red, ofreciendo un nuevo enfoque para la administración y administración de redes que busca simplificar y optimizar el proceso de administración. •Infraestructura centrada en aplicaciones (ACI) de […]
Use above activity to check your understanding of how a switch learns and forwards frames.
Configure SSH
Posted: 4th August 2020 by ccna7guru in SRWETags: crypto key, generate rsa, remote access, rsa, ssh, telnet
Before configuring SSH, the switch must be minimally configured with a unique hostname and the correct network connectivity settings Step 1 Verify SSH support. Use the show ip ssh command to verify that the switch supports SSH. If the switch is not running an IOS that supports cryptographic features, this command is unrecognized. Step 2 Configure the […]
Disable Unused Services
Posted: 1st August 2020 by ccna7guru in ITNTags: show control-plane host open-ports
Cisco routers and switches start with a list of active services that may or may not be required in your network. Disable any unused services to preserve system resources, such as CPU cycles and RAM, and prevent threat actors from exploiting these services. The type of services that are on by default will vary depending […]