En la práctica de grupo me tocó la parte de Vlan.
Tuve que formatear la rom del switch para comenzar a configurar, para eso tuve que seguir estos pasos:
1. Antes de nada tuve que deshabilitar los servicios dhpc (service NetworkManager stop) y el
firewall de linux ("service iptables stop").
2. Inicié sesión con "minicom -s" dentro del terminal para comprobar la configuración del switch.
3. Al tener configurada una ip en la vlan nativa tuve que cambiarla a otra distinta
y meter el pc que usé para entrar en modo gráfico dentro de la misma red porque desde el minicom
no flasheaba la rom.
4. Al entrar en el switch fui a "security" y dentro de ahi a la parte donde carga la rom y cambiarla
a la de fábrica para reestablecer los valores de fábrica y después seleccionar el otro archivo de configuración
que teńia y copiar esos valores.
5.Dentro del switch entré en la configuración global(configure) para cambiar el usuario,la contraseña de
acceso y la contraseña de acceso a modo privilegiado.
6. Dentro de la configuración global cree la interfaz de vlan nativa 1 y le asigné una ip para
acceder a la interfaz gráfica cuando sea necesario.
7. Dentro de la configuración global escribí "Vlan database" para configurar las Vlan.
8. Creé las Vlan 10(Servidor),20(Router1) y 30(Informática) escribiendo
"vlan (numero) name (nombre) media ethernet state active"
9. Para configurar los puertos del switch, entré dentro de la interfaz del puerto escribiendo
"interface ethernet 1/nº" para asignar la vlan poniendo "switchport native vlan nº" porque con
la otra forma que se supone que sería la correcta "switchport allowed vlan add nº untagged" no
funcionaba. *untagged=para que no se etiquete
10. Para configurar el modo trunk tuve que entrar en la interfaz a configurar y poner lo siguiente:
- "switchport mode trunk"
- "switchport allowed vlan add (nº de todas las vlans separadas por coma) tagged"
11. Después de configurar todos los puertos del switch, asignamos un filtro de seguridad por MAC
a todos los puertos menos al del enlace troncal con el comando
"port security max-mac-count (nº MACs permitidas)"
--------------------------------------- Compañeros -----------------------------------
Rafa y Héctor me ayudaron a configurar la interfaz de red desde la terminal porque no recordaba como hacerlo.
Héctor estuvo probando configuraciones de Vlan para aprender y colocar alguna Vlan a los puertos.
Rafa me ayudó a encontrar información sobre las Vlans.
Ayudé a Antonio a configurar los privilegios de impresión y de ciertos usuarios de los departamentos.
También ayudé a Antonio a configurar el DHCP.
sábado, 11 de junio de 2011
viernes, 20 de mayo de 2011
Unit 7 Text
TEXT OF UNIT 7
· About routing:
Dynamic routing protocols are classified into two major categories: (1) distance vector protocols and link-state protocols.
Routers running distance vector routing protocols share network information with directly connected (2) routers. The neighbor routers then (3) advertise the information to their neighbors, until all routers in the enterprise learn the information. A router running a distance vector protocol does not know the entire (4) path to a destination; it only knows the distance to the remote network and the direction, or vector. Its knowledge comes through information from directly connected neighbors.
Like all routing protocols, distance vector protocols use a (5) metric to determine the best route. Distance vector protocols calculate the best route based on the distance from a router to a network. An example of a metric used is (6) hop count, which is the number of (7) loops, or hops, between the router and the destination.
· About RIP:
The RIP distance vector routing protocol is easy to configure and (8) requires minimal amounts of router resources in order to function.
However, the simple hop count metric used by RIP is not an (9) accurate way to determine the best path in complex networks. Additionally, the RIP limitation of 15 hops can mark distant networks as unreachable.
RIP issues periodic updates of its routing table, which consumes (10) bandwidth even when no network changes have occurred. Routers must accept these (11) updates and process them to see if they contain updated route information.
Updates passed from router to router take time to reach all areas of the network. As a result, routers may not have an accurate picture of the network. Routing (12) neighbors can develop due to slow (13) convergence time, which wastes valuable bandwidth.
These characteristics limit the usefulness of the RIP routing protocol within the enterprise environment.
Words: advertise , routers , accurate , neighbors , bandwidth , convergence , loops , metric , updates , distance , path , hop , requires
viernes, 6 de mayo de 2011
Vocabulary and questions about Google data center
QUESTIONS:
In today's activity, you have to watch this 7-minute video about security on Google Data Centers. Follow these suggestions:
the use of subtitles are strongly recommended.
write down all the words that you don't understand.
go slowly, trying to understand each sentence and the overall meaning of the speech.
Once you have carefully watched the video, the following set of questions:
1) What are the main security measures showed by the video when accessing the building?
· Restricted barrier for vehicle access
· Security fencing around the perimeter
· Security personal 24h/7w
· Monitoring cameras
2) What is the security technology related to "sight" that Google uses for accessing the core part of the facility?Biometric devices and badges.
3) According to the video, what type of device is indispensable to Google's usual day-to-day activity?
Hard drives
4) What two actions do Google's technicians do when a hard drive fails?
It’s reformatted, retested and overwritten
5) What two actions do Google's technicians do when those hard drive that have ended their "life cycle"?
Google have a crusher for making hard drives unreadable and a shredder for complete this process.
6) How does Google manages to have permanent connectivity to the internet backbone?, what is the concept that is referred to in the video?
Google have his data centers connected via high speed fiber-optic cable with redundant connections to fix a single connection down.
7) How does Google manages to guarantee the safety of stored data?
Google maintains an extra backup and robust fire detections and suppression capabilities.
8) How does Google manages to guarantee the continuous power supply?
Using emergency backup generators
9) What does Google want specifically to check by using video cameras?
It wants to detect anomalies such as potential intruders
10) What kind of "raw material" is Google committed not to use?
Carbon
Vocabulary:
Comprehensive: exhaustivo
Roster: lista
Measures: medidas
Shredder: trituradora
Crusher: machacador
Badge: Tarjeta
viernes, 1 de abril de 2011
Text of unit 6
TEXT OF UNIT 6
Spanning Tree Protocol (STP) provides a mechanism for (1) disabling redundant links in a switched network. STP provides the redundancy required for (2) trunking without creating switching loops. STP is an open standard protocol, used in a switched environment to create a loop-free logical (3) topology. STP is relatively self-sufficient and requires little configuration. When switches are first powered up with STP enabled, they (4) check the switched network for the existence of loops. Switches detecting a potential loop block some of the connecting ports, while leaving other ports active to forward frames.
As a switch powers on, each port cycles through a series of four states: blocking, listening, learning, and (5forwarding . A fifth state, disabled, indicates that the administrator has (6) shut down the switch port. As the port cycles through these states, the LEDs on the switch change from (7)flashing orange to steady green. It can take as long as 50 seconds for a port to cycle through all of these states and be ready to forward frames.
When a switch powers on, it first goes into a blocking state to immediately prevent the formation of a (8) loop. It then changes to listening mode, so that it receives BPDUs from neighbor switches. After processing this information the switch determines which ports can forward frames without creating a loop. If the port can forward frames, it changes to learning mode, and then to forwarding mode. Access ports do not create loops in a switched network and always transition to forwarding if they have a host attached. (9) Reliability ports potentially create a looped network and transition to either a forwarding or blocking state.
Words: reliability, forwarding, shut down, flashing, topology, disabling, loop, check, trunking
Suscribirse a:
Comentarios (Atom)