Wednesday, November 28, 2012


Dynamic Routing Protocol :

1. RIP
2. IGRP
3. EIGRP
4. OSPF
5. BGP

RIP :
   Routing Information Protocol is a true distance vector Routing protocol which sends complete routing table  to its neighbours over a periodic time of 30 seconds. RIP is a broadcasting protocol. The maximum HOP count is 15 which means that RIP protocol will not suitable for a network where the no of router exceeds 16.
RIP protocol comes in two versions

1. RIP v1
2. RIP v2


Dear Readers kindly post your valuable suggestions and comments below which will initiate me to make this blog with more information.

Thursday, November 15, 2012

Steps to Configure Site to Site VPN



R1(config)#crypto isakmp enable
R1(config)#crypto isakmp policy 1
R1(config-isakmp)#authentication pre-share 
R1(config-isakmp)#encryption aes
R1(config-isakmp)#hash sha
R1(config-isakmp)#group 2
R1(config-isakmp)#exit
R1(config)#crypto isakmp key 0 address 10.0.0.1 0.0.0.0
R1(config)#crypto ipsec transform-set yasser esp-aes esp-sha-hmac 
R1(config)#crypto ipsec security-association lifetime seconds 86400
R1(config)#ip access-list extended ramzy
R1(config-ext-nacl)#permit ip 172.16.0.0 0.0.255.255 192.168.10.0 0.0.0.255
R1(config-ext-nacl)#exit
R1(config)#

Friday, November 9, 2012

BGP ( Border gateway Protocol )

             The Border Gateway Protocol is the routing protocol of the Internet. Actually internet is comprised of Many Autonomous Systems ( AS ).BGP’s task is to maintain lists of efficient paths between ASes.


             A set of computers and routers under a single administration, such as a university or company network, is known as an autonomous system (AS)


How BGP Works : 
      
             BGP Works by Establishing a Network Connection with another BGP Router using TCP 
protocol on port no 179. Once the connection is established between two routers then those routers are said to be BGP Neighbours. 

            After BGP peering finishes then two routers will exchange their Routing Information eachother and each router will buid up their forwarding information base based on Routing Information base and local policy rules.

            Each AS will have many routers for internal communication, and one or more routers for communications outside the local network.Internal routers use internal BGP (iBGP) to communicate with each other, and external routers use external BGP (eBGP). (iBGP and eBGP are the same protocol, but use different routing rules; iBGP does not advertise third-party, outside routes.)


The BGP standard defines four message types:
•  OPEN
•  UPDATE
•  NOTIFICATION
•  KEEPALIVE.



OPEN Message Format :
                Field  
    Length (bytes)
BGP version
1
Autonomous system number
2
Hold time
2
BGP identifier (IP address)
4
Optional parameters length
1
Optional parameters
variable: 0..255 bytes




UPDATE Message Format
                 Field
Length (bytes)
Withdrawn routes length
2
Withdrawn routes
variable
Path attributes length
2
Path attributes
variable
Network layer reachability information
variable






Dear Readers kindly post your valuable suggestions and comments below which will initiate me to make this blog with more information.












Tuesday, November 6, 2012

Install And Configuration of CSMARS


Steps to Install and Configure CSMARS:

  1. Insert the CSMARS Software CD into the CD Drive and boot the CSMARS Device.
  2. Select the type of Controller you want to install for example Global Controller or Local Controller.
  3. After Selecting, the installation process starts and goes for 10 to 15 minutes.
  4. After installation is completed u will get see the login prompt of CSMARS device.
  5. The default username is pnadmin and password is pnadmin.
  6. Pnadmin username is the administrative user account.
  7. Now lets start to configure CSMARS device to monitor your network and Network Devices for any Security Threats
  8. CSMARS device comes with two Gigabit  Ethernet Interfaces and one interface will be assigned with default ipaddress ( i.e 192.168.0.X series )
  9. Now assign the ipaddress , subnet mask and the default gateway address according to your organization  rules
  10. After assigning Ipaddress only you are really ready to configure CSMARS devices to play a vital role in securing your network.
  11. Take your CSMARS device remotely using web browser.
  12. Login through the Logon Credentials.
  13. You will be asked to upload licence file document which you got while purchase.
  14. That’s  all you almost configured the CSMARS device basically.
           Don’t take a breath there are lots to configure ,that will be updated very shortly .


Monday, November 5, 2012

Cybersecurity breach stories

One true story that shows what mainstream generative technology leads to in terms of online security breaches is the story of the Internet's first worm.In 1988, 60000 computers were connected to the Internet, but not all of them were PCs. Most were mainframes, minicomputers and professional workstations. On November 2, 1988, the computers acted strangely. They started to slow down, because they were running a malicious code that demanded processor time and that spread itself to other computers. The purpose of such software was to transmit a copy to the machines and run in parallel with existing software and repeat all over again. It exploited a flaw in a common e-mail transmission program running on a computer by rewriting it to facilitate its entrance or it guessed users' password, because, at that time, passwords were simple (e.g. username 'harry' with a password '...harry') or were obviously related to a list of 432 common passwords tested at each computer.The software was traced back to 23 year old Cornell University graduate student Robert Tappan Morris, Jr.. When questioned about the motive for his actions, Morris said 'he wanted to count how many machines were connected to the Internet. His explanation was verified with his code, but it turned out to be buggy, nevertheless.