Advanced Search
Search Results
652 total results found
Discovery Protocols
An enumeration of some common host discovery protocols. Cisco Discovery Protocol Used in all Cisco devices. Link Layer Discovery Protocol IEEE maintained protocol similar to CDP. Neighbor Discovery IPv6 host discovery protocol.
Cisco Discovery Protocol
A proprietary host discovery protocol used in all Cisco network appliances. CDP uses Data Link layer multicast messaging to second status announcements over local interfaces every minute. It uses the multicast v6 address 01:00:0c:cc:cc:cc. Each device keeps a ...
Secure Erase
A command that sanitizes storage drives. SE has been a part of the SATA and SAS specifications since 2011. For HDDs SE performs a single zero-fill pass. For SSDs Marks all blocks as empty. Instead of wiping each block directly, SE relies on the drives automati...
Logging Levels
An enumeration of the eight logging levels commonly used in computers. Name Description Level Emergency System is unusable (kernel panic) 0 Alert Condition requiring immediate correction. 1 Critical A fault that will require immediate correction is ...
Syslog
Application protocol and event logging format enabling different appliances and software applications to transmit logs or event records to a central server. Syslog collectors operate on 514/udp. Messaging Syslog messages can be generated by Cisco routers and s...
Simple Network Management Protocol
A commonly used framework for remote management and monitoring of servers and network appliances. SNMP uses a agent-monitor system. SNMP runs on 161/udp and 162/udp for queries and alerts. Agents SNMP agents are processes (this can be either software or hardwa...
Management Information Base
A database that stores an SNMP agent's activity records and other parameters. Parameters are identified by a numeric Object Identifier that are stored in a tree-like structure. Part of the storage tree is generic, while part can be device/vendor specific.
TCPDump
A Linux command-line packet capture utility. Basic Syntax tcpdump -i [eth0|any] Flags -w Write output to a file -r Read the contents of a capture file -v[v[v]] Select the three levels of detail shown about each frame -e Show the Ethernet header Filter Expressi...
Random Early Detection
A packet dropping algorithm designed to avoid congestion and buffer filling using predictive models based on the packets data.
Quality of Service
A traffic shaping mechanism that allows for fine-grained control over traffic parameters in a network. QoS is mostly known for being used to prioritize telecommunications protocol for better performance when on audio/video calling sessions. However, it allows ...
IEEE 802.1p
A three-bit CoS priority field within the greater 802.1Q format running at layer 2. 802.1p can be used independently or in conjunction with Differentiated-Service-Framework to classify and prioritize traffic passing over a switch or WAP. The three bit priority...
Multiprotocol Label Switching
A routing technique that directs data based on labels rather than network addresses. Often used in QoS implementations.
Differentiated Service Framework
A header field used to indicate a priority value for an IP packet for QoS or CoS scheduling. DiffServ can be configured on routers to classify packets based on set policies. It uses the Type of Service field in the IPv4 header and the Traffic Class field in IP...
Honeypot
A host system or network (called a honeynet) to bait attackers into trying to exploit it. The attack is then studied and countermeasures are made. Honeypots are usually located in a protected but untrusted area between the Internet and the private network, or ...
General Data Protection Regulation
Provisions and requirements protecting the personal data of EU citizens, disallowing the transfer of data outside of EU or European Economic Area borders.
John the Ripper Lab
Complete this lab as follows: Crack the root password on Support. From the Favorites bar, select Terminal. At the prompt, type cd /usr/share/john and press Enter to change directories to the folder containing the John the Ripper password file. Type ls and pr...
Zeroconf
A standards-based approach to technologies that allows hosts to obtain a usable network configuration and perform discovery without the use of a DNS server or DHCP. Linux hosts use the range 169.254.0.0/16 (look familiar...?) for address selection if they hav...
Terminal Access Controller Access Control System Plus
AAA protocol developed by Cisco used to authenticate to administrator accounts for network appliance management. TACACS+ splits the AAA triad into three seperate protocols, which allows each core function to be ran on a separate server (unlike RADIUS). TACACS+...