Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

652 total results found

Discovery Protocols

Documentation

An enumeration of some common host discovery protocols. Cisco Discovery Protocol Used in all Cisco devices. Link Layer Discovery Protocol IEEE maintained protocol similar to CDP. Neighbor Discovery IPv6 host discovery protocol.

Cisco Discovery Protocol

Documentation

A proprietary host discovery protocol used in all Cisco network appliances. CDP uses Data Link layer multicast messaging to second status announcements over local interfaces every minute. It uses the multicast v6 address 01:00:0c:cc:cc:cc. Each device keeps a ...

Secure Erase

Documentation

A command that sanitizes storage drives. SE has been a part of the SATA and SAS specifications since 2011. For HDDs SE performs a single zero-fill pass. For SSDs Marks all blocks as empty. Instead of wiping each block directly, SE relies on the drives automati...

Logging Levels

Documentation

An enumeration of the eight logging levels commonly used in computers. Name Description Level Emergency System is unusable (kernel panic) 0 Alert Condition requiring immediate correction. 1 Critical A fault that will require immediate correction is ...

Syslog

Documentation

Application protocol and event logging format enabling different appliances and software applications to transmit logs or event records to a central server. Syslog collectors operate on 514/udp. Messaging Syslog messages can be generated by Cisco routers and s...

Simple Network Management Protocol

Documentation

A commonly used framework for remote management and monitoring of servers and network appliances. SNMP uses a agent-monitor system. SNMP runs on 161/udp and 162/udp for queries and alerts. Agents SNMP agents are processes (this can be either software or hardwa...

Management Information Base

Documentation

A database that stores an SNMP agent's activity records and other parameters. Parameters are identified by a numeric Object Identifier that are stored in a tree-like structure. Part of the storage tree is generic, while part can be device/vendor specific.

TCPDump

Documentation

A Linux command-line packet capture utility. Basic Syntax tcpdump -i [eth0|any] Flags -w Write output to a file -r Read the contents of a capture file -v[v[v]] Select the three levels of detail shown about each frame -e Show the Ethernet header Filter Expressi...

Random Early Detection

Documentation

A packet dropping algorithm designed to avoid congestion and buffer filling using predictive models based on the packets data.

Quality of Service

Documentation

A traffic shaping mechanism that allows for fine-grained control over traffic parameters in a network. QoS is mostly known for being used to prioritize telecommunications protocol for better performance when on audio/video calling sessions. However, it allows ...

IEEE 802.1p

Documentation

A three-bit CoS priority field within the greater 802.1Q format running at layer 2. 802.1p can be used independently or in conjunction with Differentiated-Service-Framework to classify and prioritize traffic passing over a switch or WAP. The three bit priority...

Multiprotocol Label Switching

Documentation

A routing technique that directs data based on labels rather than network addresses. Often used in QoS implementations.

Differentiated Service Framework

Documentation

A header field used to indicate a priority value for an IP packet for QoS or CoS scheduling. DiffServ can be configured on routers to classify packets based on set policies. It uses the Type of Service field in the IPv4 header and the Traffic Class field in IP...

Honeypot

Documentation

A host system or network (called a honeynet) to bait attackers into trying to exploit it. The attack is then studied and countermeasures are made. Honeypots are usually located in a protected but untrusted area between the Internet and the private network, or ...

General Data Protection Regulation

Documentation

Provisions and requirements protecting the personal data of EU citizens, disallowing the transfer of data outside of EU or European Economic Area borders.

John the Ripper Lab

Documentation

Complete this lab as follows: Crack the root password on Support. From the Favorites bar, select Terminal. At the prompt, type cd /usr/share/john and press Enter to change directories to the folder containing the John the Ripper password file. Type ls and pr...

Zeroconf

Documentation

A standards-based approach to technologies that allows hosts to obtain a usable network configuration and perform discovery without the use of a DNS server or DHCP. Linux hosts use the range 169.254.0.0/16 (look familiar...?) for address selection if they hav...

Terminal Access Controller Access Control System Plus

Documentation

AAA protocol developed by Cisco used to authenticate to administrator accounts for network appliance management. TACACS+ splits the AAA triad into three seperate protocols, which allows each core function to be ran on a separate server (unlike RADIUS). TACACS+...