Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
281 views2 pages

Ccna Notes

NTP uses a hierarchy of stratums to synchronize time accuracy, with stratum 0 being the most accurate like GPS or atomic clocks. Cisco routers can take on different roles in an NTP network like server, client, or peer. They can operate at stratum 8 when synchronized or 16 when unsynchronized. Root Guard is configured at the port level and prevents switches downstream from becoming the root or secondary root, instead placing the port in a root-inconsistent state until superior BPDUs stop coming in. Authentication verifies if a user should access the network, and VPNs allow private and secure connections between endpoints like different company sites through tunnels. Configuring a site-to-site VPN is a five-step process involving

Uploaded by

Ahmad Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
281 views2 pages

Ccna Notes

NTP uses a hierarchy of stratums to synchronize time accuracy, with stratum 0 being the most accurate like GPS or atomic clocks. Cisco routers can take on different roles in an NTP network like server, client, or peer. They can operate at stratum 8 when synchronized or 16 when unsynchronized. Root Guard is configured at the port level and prevents switches downstream from becoming the root or secondary root, instead placing the port in a root-inconsistent state until superior BPDUs stop coming in. Authentication verifies if a user should access the network, and VPNs allow private and secure connections between endpoints like different company sites through tunnels. Configuring a site-to-site VPN is a five-step process involving

Uploaded by

Ahmad Ali
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

NTP is set up as a hierarchy, and the levels/layers are called stratums.

The lower the number, the more accurate the time.


Top stratum layer is 0-those are GPS clocks or atomic clock.
Cisco routers cannot serve a stratum 0 devices.
Cisco routers can take on one of there roles in out NTP network Server, client,
peer.NTP use UDP port 123.By default, cisco rotuer take 8 stratums when NTP is
sychronized when unsynchronized 16 stratums.
0-Emergencies (Lot of trouble)
1-Alerts (Take care of this now)
2-Critical (Really Important)
3-Errors (Should know about this)
4-Warnings (You have to know about this)
5-Notifications (Look at this )
6-Information (Interesting)
7-Debugging (Stuff behind commands)
Root Guard is configured at the port level, and disqualifies any switch
downstream from that port from becoming the root OR secondary root.
The port is not disabled but placed into root-inconsistent state. When those
superior BPDUs stop coming in, the port will return to normal operation.
Authenication is the process of deciding of a given user should be allowed to
access the network or a network serivce in the first place.
time-rang <Name-of-Time)
vpn
Virtual -Doesn't exist physically, its a tunnel between two endpoints
Private- open only to the two parties at the endpoints
Network- its a network
VPN are basically a point to point WAN
A site-to-site VPN allows users at one compnay site to connect securely to anoth
er company site.
VPN good points are Scalability, cost and Security
Authentication: ciphers and keys
Data Integrity: hashes
Confidentiality:
there are two major classess of encryption algorithms Asymmetric & Symmetric
Symmetric uses one single key for both encryption and decryption. In VPN only go
ing to take place if both ends possess the key.Faster than asymmetric.
Symmetric algorithms includes DES,3DES, AES,RC4,Blowfish and IDEA.
Aysmmetric uses one key to encrypt data and a separate key to decrypt the same d
ata. One key is the public key and the other is private key.Aysmmetric algorithm
s includes Diffie-Hellman,RSA, DSS.
RSA uses two keys one public and other private key, Slow operation
DES is the key size its only 56 bits
IPSec short for IP Security, IPSec allows use to authenticate encrypt every IP p
acket in a particular data stream.Runs at layer 3.IPSec uses checksums and hashi
ng algorithms such as MD5 and SHA1 to assure data integrity.
Authentication Header (AH), defines a method for authencation and securing data.
AH doesnt provide data confidentiality
Encapsulating Security Payload (ESP), defines a method for authencating, securit
y and encrypting data. provide data confidentiality
Internet Key Echange (IDE), negotiates the security parameters and authenticatio
n keys

Configuring a site-to-site VPN is a five-step process:


Process initializaiton via intresting traffic
IKE Phase 1 (IKE SA Negotiation)
IKE Phase 2 (IPSec SA Negotiation)
Data Transfer
Tunnel Termination

You might also like