Infosavvy

Learning-MAC-Addresses-infosavvy

Learning MAC Addresses

Learning MAC Addresses Thankfully, the networking staff doesn’t need to type altogether those MAC table entries. Instead, the switches do their second main function: to learn the MAC addresses and interfaces to place into its address table. With an entire MAC address table, the switch can make accurate forwarding and filtering decisions as just discussed. Switches build the address table by listening to incoming frames and examining the source MAC address within the frame. If …

Learning MAC Addresses Read More »

Verifying and Analyzing Ethernet Switching

Verifying and Analyzing Ethernet Switching A Cisco Catalyst switch comes from the factory able to switch frames. All you’ve got to do is connect the facility cable, connect the Ethernet cables, and therefore the switch starts switching incoming frames. Connect multiple switches together, and that they are able to forward frames between the switches also . and therefore the big reason behind this default behavior has to do with the default settings on the switches. Cisco Catalyst switches …

Verifying and Analyzing Ethernet Switching Read More »

A.9.3-User-Responsibilities

A.9.3 User Responsibilities

A.9.3 User Responsibilities Its objective is the Responsibility of users for safeguarding their authentication information. A.9.3.1 Use of Secret Authentication Information Control- Use of secret authentication information should be allowed for users to follow the organization’s practices. Implementation Guidance- It is recommended that all users: maintain confidential information on secure authentication to ensure that it is not leaked to the other parties, including people of authority; Avoid maintaining a record of confidential authentication details (e.g. …

A.9.3 User Responsibilities Read More »

A.9.2.5-Review-of-User-Access-Rights-&-A.9.2.6-Removal-or-Adjustment-of-Access-Rights

A.9.2.5 Review of User Access Rights & A.9.2.6 Removal or Adjustment of Access Rights

In this article A.9.2.5 Review of User Access Rights & A.9.2.6 Removal or Adjustment of Access Rights these two topic has been explained. A.9.2.5 Review of User Access Rights Control- Access rights of users should be reviewed regularly by asset owners. Implementation Guidance- The following should be considered while reviewing the access rights:- Access rights of users should be reviewed at regular intervals and after any changes, such as promotion, demotion or job termination; User …

A.9.2.5 Review of User Access Rights & A.9.2.6 Removal or Adjustment of Access Rights Read More »

a-9-2-3-management-of-privileged-access-rights-a-9-2-4-management-of-secret-authentication-information-of-users

A.9.2.3 Management of Privileged Access Rights & A.9.2.4 Management of Secret Authentication Information of Users

A.9.2.3 Management of Privileged Access Rights & A.9.2.4 Management of Secret Authentication Information of Users these two topic is explained in this article. A.9.2.3 Management of Privileged Access Rights Control- A.9.2.3 Management of Privileged Access Rights The allocation and usage of exclusive access privileges will be limited and controlled. Implementation guidance- A structured authorizing procedure in accordance with the appropriate access management policies should monitor the allocation and usage of delegated access privileges. Following steps …

A.9.2.3 Management of Privileged Access Rights & A.9.2.4 Management of Secret Authentication Information of Users Read More »

A.9.2-User-Access-Management

A.9.2 User Access Management

A.9.2 User Access Management Its objective is to ensure approved user access and avoid unauthorized access to systems and facilities. A.9.2.1 User registration and de-registration Control- In order to allow the assignment of access rights, a systematic process of user registration and de-registration should be enforced. Implementation guidance- The process to manage user IDs should include: Use unique user IDs to encourage users to be connected to and hold accountable for their actions; use of …

A.9.2 User Access Management Read More »

Accessing-the-Internet

Accessing the Internet

Accessing the Internet Many people begin their CCENT and CCNA Routing and Switching study never having heard of leased lines, but many of us have heard of two other WAN technologies wont to gain access to the Internet: digital subscriber line (DSL) and cable. These two WAN technologies don’t replace leased lines altogether cases, but they are doing play an important role within the specific case of making a WAN connection between a home or …

Accessing the Internet Read More »

Overview-of-Network-Layer Functions

Overview of Network Layer Functions

Overview of Network Layer Functions Many protocol models have existed over the years, but today the TCP/IP model dominates. And at the network layer of TCP/IP, two options exist for the most protocol around which all other network layer functions revolve: IP version 4 (IPv4) and IP version 6 (IPv6). Both IPv4 and IPv6 define the same sorts of network layer functions, but with different details. This chapter introduces these network layer functions for IPv4, …

Overview of Network Layer Functions Read More »

A.9.1.2-Access-to-Networks-and-Network-Services

A.9.1.2 Access to Networks and Network Services

Control- A.9.1.2 Access to Networks and Network Services Only network and network facilities which have expressly been approved for use will be made available to users. Implementation Guidance- A policy on the use of networks and network policy should be developed. Following points should be covered in this policy: networks and network infrastructure to which access is permitted; Authorization procedures for determining who is permitted to access which networks and Networking services; Management processes and …

A.9.1.2 Access to Networks and Network Services Read More »