Time

Sunday, August 31, 2008

E-BOOKS

Technology Best Sellers
1. Solar Power Your Home For Dummies
2. How to Repair Briggs and Stratton Engines
3. Fuel Cell Projects for the Evil Genius
4. Dictionary of Science and Technology
5. Electricity and Electronics for HVAC
6. BizTalk Unleashed
7. Biomimetic Sensor Technology
8. Hydrodynamics of High-Speed Marine Vehicles
9. TI-89 Graphing Calculator For Dummies®
10. Fundamental Solutions in Elastodynamics
11. Blackboard For Dummies®
12. Student Solution Manual for Mathematical Methods for Physics and Engineering Third Edition
13. Drafting Engineering Contracts
14. Broadband Services
15. Alternative Energy Demystified




Best free Digital Libraries - Australia

Best free Digital Libraries - New Zealand
Best free Digital Libraries - World

Other Free Australian Books

Other Free Book Sites/Pages in English

Free Audio Books

World - Other Languages, Regional and National

Individual Topics/Miscellaneous

Sacred Texts & Religion


Best free Digital Libraries - Australia

Adelaide University Electronic Texts Collection This growing collection of e-texts - currently more than 700 - includes classic works of Literature, Philosophy, Science, and Medicine. Their own web editions, in HTML.
http://etext.library.adelaide.edu.au

ANU E-Print Repository From the Australian National University in Canberra, ACT (Australian Capital Territory). Holding over 43,000 items as of January 2007. Material from 1967 on, mostly, is included. User registration (there is no charge) is required for some parts of the site.
http://dspace.anu.edu.au/handle/1885/39729

Looking for ANU PhD theses? Go to: http://thesis.anu.edu.au

Australian e-Humanities Gateway is an initiative of the Australian e-Humanities Network, a group funded by the Australian Research Council.The network includes representatives from the Australian Academy of the Humanities, the University of Sydney and the University of Newcastle. A portal for digital resources in humanities disciplines in Australia.
http://www.ehum.edu.au

Cochrane Library Contains helpful, authoritative information on the effectiveness of different health care treatments and interventions. This scientific medical site has limited free access for Australians through a national subscription, and may be readily accessed by anyone surfing the Web from the 'au" domain. A good place to start your research.
http://www.nicsl.com.au/cochrane/index.asp

Curtin University of Technology Institutional Repository espace@Curtin provides access to research produced by Curtin University of Technology staff and postgraduate students. More than 900 items were available as at January 2007 covering material from 1978 onwards.
http://espace.lis.curtin.edu.au/

eprints unimelb The University of Melbourne eprint collection. More than 1,500 items available.The oldest item dates back to 1945. In order to access some areas of the archive, you'll need a user registration (no charge).
http://eprints.unimelb.edu.au

eprints @UQ The University of Queensland's digital repository. Set up in 2002, it covers material created since 1983, although most dates from 1998 on. Includes e-books, e-chapters, online journals, various articles, working papers, conference papers and proceedings, posters, miscellaneous research output, and pre-publication (draft) material. OAI-compliant, the repository includes research output of UQ academic staff and postgraduate students, both before and after peer-reviewed publication. Formats used are HTML, ASCII text, PDF & Postscript.
http://eprint.uq.edu.au

Monash University ePrint Repository The Monash University ePrint Repository showcases and archives quality research output of Monash University staff. This site has been under redevelopment.
http://eprint.monash.edu.au/

OZLIT Electronic Texts
Not a library as such, rather an Australian portal to an array of free e-book resources. Includes a limited number of Australian e-texts. Courtesy of the leading state portal VicNet.
http://home.vicnet.net.au/~ozlit/chapt4.html

Project Gutenberg of Australia produces books in electronic form and makes them freely available to the public in accordance with Australian copyright law. NB: Under Australian copyright law, literary, dramatic, & musical work published, performed, communicated, or recorded and offered for sale in an author's lifetime are protected for the life of the author plus fifty years from the end of the year of the author's death. After this time they enter into the public domain. Some e-books available here may still be under copyright in the United States (where local laws have several times extended copyright to levels not accepted within Australian jurisdiction). Such works are therefore not available from the US site of Project Gutenberg.
http://gutenberg.net.au/

QUT ePrints An institutional archive of research papers produced at Queensland University of Technology by QUT staff and postgraduate students. Items now deposited span from 1984 to date, and this fast-growing new collection already offers over a thousand of them. Since 2004 it has been QUT policy that publicly available research and scholarly output of the University should be deposited here.
http://eprints.qut.edu.au/

SETIS (The Scholarly Electronic Text and Image Service at the University of Sydney Library) Regarded as the leading University digital collection in Australia. Plans are under way to further enlarge the size & scope of SETIS. Includes also the University of Sydney digital theses collection (currently around two hundred theses available).
NB: While you may access many texts from the Web, a large number are commercially licensed and available only to users at the University of Sydney.
http://setis.library.usyd.edu.au/

UTasER The University of Tasmania ePrint Repository. Research materials covering as far back as 1968 have now been deposited here. There were approaching 2 thousand items by January 2007.
http://eprints.utas.edu.au/


Best free Digital Libraries - NZ

Early New Zealand Books . Works about traditional Maori society and culture and the earliest British settlements. In chapters online, includes enlargeable images. Please note conditions of use. Provided by the University of Auckland.
http://www.enzb.auckland.ac.nz/

New Zealand Digital Library Collections available include historical documents, humanitarian and development information, computer science technical reports and bibliographies, literary works, and magazines. A project of the University of Waikato, variously in HTML and PDF.
http://www.nzdl.org/cgi-bin/library

New Zealand Electronic Text Centre Online archive of New Zealand and Pacific Islands texts and heritage materials - full-text books, manuscripts and journals, plus images. You may download and print text and images for your own personal and non-commercial use only. XML-based; a variety of formats may be available.
http://www.nzetc.org/

Routers ,Switches,Firewalls

Routers, Switches & Firewalls :
Routers:
A router is a hardware device and has the function of routing packets between networks. A router works at Layer 3 of the OSI model – the Network Layer. This is the layer that the IP protocol works at. Most routers today are IP routers that examine the source and destination IP addresses of each packet, look up the destination of the packet in the router’s IP routing table, and route that packet on its way. In the event that the destination is not listed in the routing table, the router will either send the packet to a default router (if it has one) or drop the packet. Routers are usually used to connect a local area network to a wide-area network (a LAN to a WAN) but can also be used to segment large local area networks (LAN’s).
Routers prevent broadcasts. Another way of saying this is that routers form a broadcast domain. So, if your network is being deluged by IP broadcasts, you need to subnet your network into two or more smaller networks. Those networks would be connected by a router and that router wouldn’t allow broadcast traffic to flow between subnets.
Routers use routing dynamic protocols like OSPF, RIP, or BGP to learn routes from other routers. Router can also use static routes that are entered by the administrator.
Routers replace the Ethernet MAC address of the source device with their own MAC address when they send a packet out an interface. When the response to that packet comes back, the new source of the packet is sending the response to the destination of the router. The router receives this, replaces the source address, changes the destination address to the original address, and sends the packet back to the original sender. This is a complex topic that we could spend a whole article covering so this is only meant to provide the most basic understanding of how this works.
To show the routing table on the router, use the show ip route command.
Switch:
A switch is a hardware device that works at Layer 2 of the OSI model – data link. The data link layer is where the Ethernet protocol works.
A switch switches Ethernet frames by keeping a table of what MAC addresses have been seen on what switch port. The switch uses this table to determine where to send all future frames that it receives. In Cisco terminology, this table is called the CAM table (content addressable memory). In general, the proper term for this table is the bridge forwarding table. If a switch receives a frame with a destination MAC address that it does not have in its table, it floods that frame to all switch ports. When it receives a response, it puts that MAC address in the table so that it won’t have to flood next time.
A switch is a high-speed multiport bridge. This is why bridges are no longer needed or manufactured. Switches do what bridges did faster and cheaper. Most routers can also function as bridges.
You might be asking how a hub fits into this mix of devices. A hub is a multiport repeater. In other words, anything that comes in one port of a hub is duplicated and sent out all other ports of the hub that have devices attached. There is no intelligence to how a hub functions. A switch is a vast improvement over a hub in terms of intelligence, for many reasons. The most important of those reasons is how the bridge forwarding table works. Intelligent (smart) switches have made hubs obsolete because they can do more at the same cost of a dumb hub. For this reason, hubs are rarely used or sold any longer.
To see this bridge forwarding table (CAM table) on a Cisco switch just type: show mac-address-table
Firewall:
A firewall is used to protect more secure network from a less secure network. Generally, firewalls are used to protect your internal/private LAN from the Internet.
A firewall generally works at layer 3 and 4 of the OSI model. Layer 3 is the Network Layer where IP works and Layer 4 is the Transport Layer, where TCP and UDP function. Many firewalls today have advanced up the OSI layers and can even understand Layer 7 – the Application Layer.
There are a variety of different types of firewalls and we won’t go into that in this article so let’s just talk about the most popular type of firewall – a stateful packet inspection (SPI) hardware firewall. An example of a SPI hardware firewall is a Cisco PIX firewall. This is a dedicated appliance and it looks a lot like a Cisco router.
A SPI firewall is stateful because it understands the different states of the TCP (transmission control protocol) protocol. It knows what is coming and what it going and keeps track of it all. Thus, if a packet tried to come in but it wasn’t requested, the firewall knows that and drops it.

Router operations

Basic Router Operations:

To get to User Mode Press ENTER and a password if required.
To get to Privileged Mode Router>enable
To get back to User Mode Router#disable
To Exit the Router
Router>exit or logoff
Break Key<>++6‘x’
To move to the beginning of the command line Ctrl+A
To move to the end of the command line Ctrl+E
To move forward one character Ctrl+F [or right arrow key]
To move back one character Ctrl+B [or left arrow key]
To repeat the previous command Ctrl+P [or up arrow key]
To repeat the most recent (last) command Ctrl+N [or down arrow key]
To move back one word Esc+B
To move forward one word Esc+F
To erase a word Ctrl+W
To erase a line Ctrl+U
To redisplay a line Ctrl+R
Ends configuration mode and returns to privileged mode Router#Ctrl+Z
To auto complete a command
To show the command buffer Router>show history
To set the command buffer size Router>terminal history size
To disable advanced editing features Router>terminal no editing
To re-enable advanced editing features Router>terminal editing
Viewing Router Information:
View IOS version Router#show version
View current configuration file (RAM) Router#show running-config
View saved configuration file (NVRAM) Router#show startup-config
View IOS version, size of IOS, and free space in FLASH Router#show flash
View CPU utilization Router#show processes cpu
View info about programs in RAM Router#show processes
Display interfaces on router and their status Router#show interface
Display the ip interfaces on router and their status Router#show ip interface
Display which protocols are configured on the router Router#show protocol

VPN ...

VPN Protocols

The term "VPN" has taken on many different meanings in recent years. VPNC has a white paper about VPN technologies that describes many of the terms used in the VPN market today. In specific, it differentiates between secure VPNs and trusted VPNs, which are two very different technologies.

For secure VPNs, the technologies that VPNC supports are

  • IPsec with encryption
  • L2TP inside of IPsec
  • SSL with encryption
For trusted VPNs, the technologies that VPNC supports are:
  • MPLS with constrained distribution of routing information through BGP ("layer 3 VPNs")
  • Transport of layer 2 frames over MPLS ("layer 2 VPNs")

IPsec is the most dominant protocol for secure VPNs. SSL gateways for remote-access users are also popular for secure VPNs. L2TP running under IPsec has a much smaller but significant deployment. For trusted VPNs, the market is split on the two MPLS-based protocols. Companies want to do their own routing thend to use layer 2 VPNs; companies that want to outsource their routing tend to use layer 3 VPNs.

The various VPN protocols are defined by a large number of standards and recommendations that are codified by the Internet Engineering Task Force (IETF). There are many flavors of IETF standards, recommendations, statements of common practice, and so on. Some of the protocols used in IPsec are full IETF standards; however, the others are often useful and stable enough to be treated as standard by people writing IPsec software. Neither of the trusted VPN technologes are IETF standards yet, although there is a great deal of work being done on them to get them to become standards.

RFCs

The IETF codifies the decisions it comes to in documents called "Requests For Comments". These are almost universally called by their acronym "RFCs". Many RFCs are the standards on which the Internet is formed.

The level of standardization that an RFC reaches is determined not only by "how good" the RFC is, but by how widely it is implemented and tested. Some RFCs are not solid standards, but they nonetheless document technologies that are of great value to the Internet and thus should be used as guidelines for implementing VPNs.

For the purpose of defining VPNs, any protocol that has become an IETF Request For Comments (RFC) document can be treated as somewhat of a standard. Certainly, any IPsec-related RFC that has been deemed to be on the IETF "standards track" should certainly be considered a standard.

Internet Drafts

Before a document becomes an RFC, it starts out as an Internet Draft (often called "IDs" or "I-Ds"). IDs are rough drafts, and are sometimes created for no other benefit than to tell the Internet world what the author is thinking. On the other hand, there is often very good information in some IDs, particularly those that cover revisions to current standards.

Some Internet Drafts go along for years, but are then dropped or abandoned; others get on a fast track to becoming RFCs, although this is rare. Internet Drafts are given names when they first appear; if they become RFCs, the I-D name disappears and an RFC number is assigned.

It should be emphasized here that it is unwise to make any programming decisions based on information in Internet Drafts. Most IDs go through many rounds of revisions, and some rounds make wholesale changes in the protocols described in a draft. Further, many IDs are simply abandoned after discussion reveals major flaws in the reasoning that lead to the draft.

That being said, it is worthwhile to know which IDs pertain to areas of interest. The following is a list of the IDs that are related to Internet mail. Some of these drafts will likely become RFCs in the months or years to come, possibly with heavy revision; some will be merged with other drafts; others will be abandoned.

Protocol listings

The relevant IETF Working Groups for the protocols used by secure VPNs and trusted VPNs are:

Note that the IPsec Working Group was disbanded in April, 2005.

The documents are arranged by the general categories they apply to. These categories are:

For secure VPNs:

For trusted VPNs:


General IPsec




RFC 4301Security Architecture for the Internet ProtocolProposed standard
RFC 2401Security Architecture for the Internet Protocol Obsoleted by RFC 4301
RFC 2411IP Security Document RoadmapInformational RFC
RFC 2521ICMP Security Failures MessagesExperimental RFC
RFC 2709Security Model with Tunnel-mode IPsec for NAT DomainsInformational RFC
RFC 2764Framework for IP Based Virtual Private NetworksInformational RFC
RFC 3102Realm Specific IP: FrameworkExperimental RFC
RFC 3103Realm Specific IP: Protocol SpecificationExperimental RFC
RFC 3104RSIP Support for End-to-end IPSECExperimental RFC
RFC 3554On the Use of SCTP with IPsecProposed standard
RFC 3884Use of IPsec Transport Mode for Dynamic RoutingInformational RFC
RFC 3723Securing Block Storage Protocols over IPProposed standard
RFC 3706Traffic-Based Method of Detecting Dead IKE PeersInformational RFC
RFC 3776Using IPsec to Protect Mobile IPv6 Signaling Between Mobile Nodes and Home AgentsProposed standard
RFC 3756IPv6 Neighbor Discovery trust models and threatsInformational RFC
RFC 4891Using IPsec to Secure IPv6-in-IPv4 TunnelsInformational RFC
RFC 5265Mobile IPv4 Traversal across IPsec-Based VPN GatewaysProposed standard
draft-ietf-pana-ipsecSecuring the first hop in PANA using IPsec
draft-vidya-ipsec-failover-psIPsec Gateway Failover and Redundancy - Problem Statement and Goals
draft-dondeti-ipsec-failover-solIPsec Gateway Failover and Redundancy Protocol
draft-sheffer-ike-session-resumptionStateless Session Resumption for the IKE Protocol
draft-hoffman-esp-null-protocolAn Authentication-only Profile for ESP with an IP Protocol Identifier
draft-grewal-ipsec-traffic-visibilityTraffic visibility using IPsec ESP NULL encryption
draft-nir-qcrA Quick Crash Recovery Method for IKE
draft-nir-ike-qcdA Quick Crash Detection Method for IKE




ESP and AH Headers




RFC 4302IP Authentication HeaderProposed standard
RFC 4303Encapsulating Security Payload (ESP)Proposed standard
RFC 4304Extended Sequence Number Addendum to IPsec DOI for ISAKMPProposed standard
RFC 4835Cryptographic Algorithm Implementation Requirements For ESP And AHProposed standard
draft-nikander-esp-beet-modeBound End-to-End Tunnel (BEET) mode for ESP
draft-ietf-rohc-ikev2-extensions-hcoipsecExtensions to IKEv2 to Support Header Compression over IPsec (HCoIPsec)




Key Exchange




RFC 4306Internet Key Exchange (IKEv2) ProtocolProposed standard
RFC 4718IKEv2 Clarifications and Implementation GuidelinesInformational RFC
draft-ietf-ipsecme-ikev2bisInternet Key Exchange (IKEv2) ProtocolReplacement for RFC 4306 and RFC 4718
RFC 4307Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2)Proposed standard
RFC 4308Cryptographic Suites for IPsecProposed standard
RFC 2407Internet IP Security Domain of Interpretation for ISAKMP Obsoleted by RFC 4306 (IKEv2)
RFC 2408Internet Security Association and Key Management Protocol (ISAKMP) Obsoleted by RFC 4306 (IKEv2)
RFC 2409Internet Key Exchange (IKE)Obsoleted by RFC 4306 (IKEv2)
RFC 4109Algorithms for IKEv1Proposed standard
RFC 3715IPsec-NAT Compatibility RequirementsInformational RFC
RFC 3948UDP Encapsulation of IPsec PacketsProposed standard
RFC 3947Negotiation of NAT-Traversal in the IKEProposed standard
RFC 3766Determining Strengths For Public Keys Used For Exchanging Symmetric KeysBest Current Practice (BCP 86)
RFC 2412OAKLEY Key Determination ProtocolInformational RFC
RFC 2367PF_KEY Key Management API, Version 2Informational RFC
RFC 2522Photuris: Session-Key Management ProtocolExperimental RFC
RFC 2523Photuris: Extended Schemes and AttributesExperimental RFC
RFC 3129Requirements for Kerberized Internet Negotiation of KeysInformational RFC
RFC 4025Method for storing IPsec keying material in DNSProposed standard
RFC 4595Use of IKEv2 in The Fibre Channel Security Association Management ProtocolInformational RFC
RFC 4806Online Certificate Status Protocol (OCSP) Extensions to IKEv2Proposed standard
RFC 5106EAP IKEv2 Method (EAP-IKEv2)Experimental RFC
RFC 4739Multiple Authentication Exchanges in the IKEv2 ProtocolExperimental RFC
draft-nourse-scepCisco Simple Certificate Enrollment Protocol (SCEP)
RFC 3547Group Domain of InterpretationProposed standard
RFC 4322Opportunistic Encryption using the Internet Key Exchange (IKE)Informational RFC
RFC 4809Requirements for an IPsec Certificate Management ProfileInformational RFC
RFC 4945IPsec PKI Profile of IKEv1/ISAKMP, IKEv2, and PKIXProposed standard
RFC 4478Repeated Authentication in IKEv2Experimental RFC
RFC 4869Suite B Cryptographic Suites for IPsecInformational RFC
draft-eronen-ipsec-ikev2-ipv6-configIPv6 Configuration in IKEv2




Cryptographic Algorithms




RFC 2405ESP DES-CBC Cipher Algorithm With Explicit IVProposed standard
RFC 2451ESP CBC-Mode Cipher AlgorithmsProposed standard
RFC 2104HMAC: Keyed-Hashing for Message AuthenticationInformational RFC
RFC 2202Test Cases for HMAC-MD5 and HMAC-SHA-1Informational RFC
RFC 2403Use of HMAC-MD5-96 within ESP and AHProposed standard
RFC 2404Use of HMAC-SHA-1-96 within ESP and AHProposed standard
RFC 2857Use of HMAC-RIPEMD-160-96 within ESP and AHProposed standard
RFC 2410NULL Encryption Algorithm and Its Use With IPsecProposed standard
RFC 1828IP Authentication using Keyed MD5 (may be moved to Historic)Proposed standard
RFC 1829ESP DES-CBC Transform (may be moved to Historic)Proposed standard
RFC 2085HMAC-MD5 IP Authentication with Replay PreventionProposed standard
RFC 3173IP Payload Compression Protocol (IPComp)Proposed standard
RFC 2394IP Payload Compression Using DEFLATEInformational RFC
RFC 2395IP Payload Compression Using LZSInformational RFC
RFC 3051IP Payload Compression Using ITU-T V.44 Packet MethodInformational RFC
RFC 3526More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE)Proposed standard
RFC 3566AES-XCBC-MAC-96 Algorithm and Its Use With IPsecProposed standard
RFC 3602AES-CBC Cipher Algorithm and Its Use With IPsecProposed standard
RFC 4434AES-XCBC-PRF-128 algorithm for IKEProposed standard
RFC 3686Using AES Counter Mode With IPsec ESPProposed standard
RFC 4309Using AES CCM Mode With IPsec ESPProposed standard
RFC 4196SEED Cipher Algorithm and Its Use With IPSecProposed standard
RFC 4894Use of Hash Algorithms in IKE and IPsecInformational RFC
RFC 4270Attacks on Cryptographic Hashes in Internet ProtocolsInformational RFC
RFC 4312The Camellia Cipher Algorithm and Its Use With IPsecProposed standard
RFC 4753ECP Groups For IKEInformational RFC
RFC 4106Use of Galois Message Authentication Code (GMAC) in IPsec ESPProposed standard
RFC 4359Use of RSA/SHA-1 Signatures within ESP and AHProposed standard
RFC 4493AES-CMAC AlgorithmInformational RFC
RFC 4494AES-CMAC-96 Algorithm and its use with IPsecProposed standard
RFC 4615AES-CMAC-PRF-128 Algorithm for IKEProposed standard
RFC 4634US Secure Hash Algorithms (SHA and and HMAC-SHA)Informational RFC
RFC 4231Identifiers and Test Vectors for HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512Proposed standard
RFC 4754IKE and IKEv2 Authentication Using ECDSAProposed standard
draft-ietf-ipsec-ike-ecc-groupsAdditional ECC Groups For IKE and IKEv2 In IETF Last Call
RFC 4868Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsecProposed standard
RFC 5282Using Authenticated Encryption Algorithms with the Encrypted Payload of IKEv2Proposed standard




IPsec policy handling




RFC 3585IPsec Configuration Policy Information ModelProposed standard
RFC 3586IP Security Policy RequirementsProposed standard
draft-ietf-l3vpn-ce-basedFramework for Provider Provisioned CE-based Virtual Private Networks using IPsec
RFC 4807IPsec Security Policy Database Configuration MIBProposed standard




Remote access




RFC 2661Layer Two Tunneling Protocol (L2TP)Proposed standard
RFC 2888Secure Remote Access with L2TPInformational RFC
RFC 3193Securing L2TP using IPsecProposed standard
RFC 3457Requirements for IPsec Remote Access ScenariosInformational RFC
RFC 3456Dynamic Host Configuration Protocol (DHCPv4) Configuration of IPsec Tunnel ModeProposed standard
RFC 4621Design of the MOBIKE ProtocolInformational RFC
RFC 4555IKEv2 Mobility and Multihoming Protocol (MOBIKE)Proposed standard




SSL and TLS




RFC 2246The TLS Protocol Version 1.0Proposed standard, being updated to version 1.1 by draft-ietf-tls-rfc2246-bis
RFC 2818HTTP Over TLSInformational RFC
RFC 3546TLS ExtensionsProposed standard, being updated by draft-ietf-tls-rfc3546bis
RFC 4279Pre-Shared Key Ciphersuites for TLSProposed standard




General MPLS




RFC 3031Multiprotocol Label Switching ArchitectureFull standard
RFC 3032MPLS Label Stack EncodingFull standard
RFC 3036Label Distribution Protocol (LDP) SpecificationFull standard
RFC 3037LDP ApplicabilityInformational RFC




MPLS constrained by BGP routing




RFC 4364BGP/MPLS IP VPNsProposed standard
RFC 4365Applicability Statement for BGP/MPLS IP VPNsInformational RFC
RFC 4381Analysis of the Security of BGP/MPLS IP VPNsInformational RFC
RFC 4026Provider Provisioned Virtual Private Network (VPN) TerminologyInformational RFC
RFC 4176Framework for PPVPN Operations and ManagementInformational RFC
RFC 4265Definition of Textual Conventions for Virtual Private Network (VPN) ManagementProposed standard
draft-ietf-l3vpn-ipsec-2547Use of PE-PE IPsec in RFC2547 VPNs
draft-ietf-l3vpn-gre-ip-2547Use of PE-PE GRE or IP in RFC2547 VPNs
RFC 4031Service requirements for Layer 3 Provider Provisioned Virtual Private NetworksInformational RFC
RFC 3809Generic Requirements for Provider Provisioned VPNs (PPVNP)Informational RFC
RFC 4110Framework for Layer 3 Provider Provisioned Virtual Private NetworksInformational RFC
draft-ietf-l3vpn-bgpvpn-autoUsing BGP as an Auto-Discovery Mechanism for Network-based VPNs
RFC 4111Security Framework for Provider Provisioned Virtual Private NetworksInformational RFC
draft-ietf-l3vpn-rt-constrainConstrained VPN route distribution Approved as a Proposed Standard




Transport of layer 2 frames over MPLS




draft-ietf-l2vpn-requirementsService Requirements for Layer 2 Provider Provisioned Virtual Private Networks
draft-ietf-l2vpn-vpls-bgpVirtual Private LAN Service Approved as a Proposed Standard
draft-ietf-l2tpext-l2vpnL2VPN Extensions for L2TP Approved as a Proposed Standard
RFC 3916Requirements for Pseudo-Wire Emulation Edge-to-Edge (PWE3)Informational RFC
RFC 3985PWE3 ArchitectureInformational RFC
RFC 4447Transport of Layer 2 Frames Over MPLSProposed standard
RFC 4448Encapsulation Methods for Transport of Ethernet Over MPLS NetworksProposed standard
draft-ietf-l2tpext-pwe3-ethernetTransport of Ethernet Frames over L2TPv3 Approved as a Proposed Standard
draft-ietf-pwe3-frame-relayFrame Relay over Pseudo-Wires




Virtual Routers




draft-ietf-l3vpn-as-vrApplicability Statement for Virtual Router-based Layer 3 PPVPN approaches
draft-ietf-l3vpn-vpn-vrNetwork based IP VPN Architecture using Virtual Routers
draft-ietf-l3vpn-vr-mibVirtual Router Management Information Base Using SMIv2



TCP -IP About this ...

TCP/IP Tutorial

picture

TCP/IP is the communication protocol for the Internet.

In this tutorial you will learn what TCP/IP is, and how it works.


TCP/IP is the Internet Communication Protocol

A communication protocol is a description of the rules computers must follow to communicate with each other. The Internet communication protocol defines the rules for computer communication over the Internet.

Your Browser and Your Server Use TCP/IP

Internet browsers and Internet servers use TCP/IP to connect to the Internet. Your browser uses TCP/IP to access Internet servers, and servers use TCP/IP to send HTML back to your browser.

Your E-Mail Uses TCP/IP

Your e-mail program uses TCP/IP to connect to the Internet for sending and receiving e-mails.

Your Internet Address is TCP/IP

Your Internet address "116.71.179.5" is a part of the standard TCP/IP protocol. (And so is your domain name "www.someonesplace.com")

TCP/IP is the communication protocol for the Internet.


Computer Communication Protocol

A computer communication protocol is a description of the rules computers must follow to communicate with each other.


What is TCP/IP?

TCP/IP is the communication protocol for communication between computers connected to the Internet.

TCP/IP stands for Transmission Control Protocol / Internet Protocol.

The standard defines how electronic devices (like computers) should be connected to the Internet, and how data should be transmitted between them.


Inside TCP/IP

Hiding inside the TCP/IP standard there are a number of protocols for handling data communication:

  • TCP (Transmission Control Protocol) communication between applications
  • UDP (User Datagram Protocol) simple communication between applications
  • IP (Internet Protocol) communication between computers
  • ICMP (Internet Control Message Protocol) for errors and statistics
  • DHCP (Dynamic Host Configuration Protocol) for dynamic addressing

You will learn more about these standards later in this tutorial.


TCP Uses a Fixed Connection

TCP is for communication between applications.

When an application wants to communicate with another application via TCP, it sends a communication request. This request must be sent to an exact address. After a "handshake" between the two applications, TCP will setup a "full-duplex" communication between the two applications.

The "full-duplex" communication will occupy the communication line between the two computers until it is closed by one of the two applications.

UDP is very similar to TCP, but is simpler and less reliable.


IP is Connection-Less

IP is for communication between computers.

IP is a "connection-less" communication protocol. It does not occupy the communication line between two communicating computers. This way IP reduces the need for network lines. Each line can be used for communication between many different computers at the same time.

With IP, messages (or other data) are broken up into small independent "packets" and sent between computers via the Internet.

IP is responsible for "routing" each packet to its destination.


IP Routers

When an IP packet is sent from a computer, it arrives at an IP router.

The IP router is responsible for "routing" the packet to its destination, directly or via another router.

The path the packet will follow might be different from other packets of the same communication. The router is responsible for the right addressing depending on traffic volume, errors in the network, or other parameters.


Connection-Less Analogy

Communicating via IP is like sending a long letter as a large number of small postcards, each finding its own (often different) way to the receiver.


TCP/IP

TCP/IP is TCP and IP working together.

TCP takes care of the communication between your application software (i.e. your browser) and your network software.

IP takes care of the communication with other computers.

TCP is responsible for breaking data down into IP packets before they are sent, and for assembling the packets when they arrive.

IP is responsible for sending the packets to the receiver.

TCP/IP uses 32 bits, or 4 numbers between 0 and 255 to address a computer.


IP Addresses

Each computer must have an IP address before it can connect to the Internet.

Each IP packet must have an address before it can be sent to another computer.

This is an IP address: 192.68.20.50.
This might be the same IP address: www.w3schools.com

You will learn more about IP addresses and IP names in the next chapter of this tutorial.


An IP Address Contains 4 Numbers.

This is your IP address: 116.71.179.5

TCP/IP uses 4 numbers to address a computer. Each computer must have a unique 4 number address.

The numbers are always between 0 and 255. Addresses are normally written as four numbers separated by a period like this: 192.168.1.50.


32 Bits = 4 Bytes

TCP/IP uses 32 bits addressing. One computer byte is 8 bits. So TCP/IP uses 4 computer bytes.

A computer byte can contain 256 different values:

00000000, 00000001, 00000010, 00000011, 00000100, 00000101, 00000110, 00000111, 00001000 .......and all the way up to 11111111.

Now you know why a TCP/IP address is 4 numbers between 0 and 255


Domain Names

12 digit numbers are hard to remember. Using a name is easier.

Names used for TCP/IP addresses are called domain names. w3schools.com is a domain name.

When you address a web site like http://www.w3schools.com, the name is translated to a number by a DNS process (Domain Name Server).

All over the world, a large number of DNS servers are connected to the Internet. DNS servers are responsible for translating domain names into TCP/IP addresses and update each other with new domain names.

When a new domain name is registered together with a TCP/IP address, DNS servers all over the world are updated with this information.

TCP/IP is a large collection of different communication protocols.


A Family of Protocols

TCP/IP is a large collection of different communication protocols based upon the two original protocols TCP and IP.


TCP - Transmission Control Protocol

TCP is used for transmission of data from an application to the network.

TCP is responsible for breaking data down into IP packets before they are sent, and for assembling the packets when they arrive.


IP - Internet Protocol

IP takes care of the communication with other computers.

IP is responsible for the sending and receiving data packets over the Internet.


HTTP - Hyper Text Transfer Protocol

HTTP takes care of the communication between a web server and a web browser.

HTTP is used for sending requests from a web client (a browser) to a web server, returning web content (web pages) from the server back to the client.


HTTPS - Secure HTTP

HTTPS takes care of secure communication between a web server and a web browser.

HTTPS typically handles credit card transactions and other sensitive data.


SSL - Secure Sockets Layer

The SSL protocol is used for encryption of data for secure data transmission.


SMTP - Simple Mail Transfer Protocol

SMTP is used for transmission of e-mails.


MIME - Multi-purpose Internet Mail Extensions

The MIME protocol lets SMTP transmit multimedia files including voice, audio, and binary data across TCP/IP networks.


IMAP - Internet Message Access Protocol

IMAP is used for storing and retrieving e-mails.


POP - Post Office Protocol

POP is used for downloading e-mails from an e-mail server to a personal computer.


FTP - File Transfer Protocol

FTP takes care of transmission of files between computers.


NTP - Network Time Protocol

NTP is used to synchronize the time (the clock) between computers.


DHCP - Dynamic Host Configuration Protocol

DHCP is used for allocation of dynamic IP addresses to computers in a network.


SNMP - Simple Network Management Protocol

SNMP is used for administration of computer networks.


LDAP - Lightweight Directory Access Protocol

LDAP is used for collecting information about users and e-mail addresses from the internet.


ICMP - Internet Control Message Protocol

ICMP takes care of error handling in the network.


ARP - Address Resolution Protocol

ARP is used by IP to find the hardware address of a computer network card based on the IP address.


RARP - Reverse Address Resolution Protocol

RARP is used by IP to find the IP address based on the hardware address of a computer network card.


BOOTP - Boot Protocol

BOOTP is used for booting (starting) computers from the network.


PPTP - Point to Point Tunneling Protocol

PPTP is used for setting up a connection (tunnel) between private networks.

Email is one of the most important uses of TCP/IP.


You Don't

When you write an email, you don't use TCP/IP.

When you write an email, you use an email program like Lotus Notes, Microsoft Outlook or Netscape Communicator.


Your Email Program Does

Your email program uses different TCP/IP protocols:

  • It sends your emails using SMTP
  • It can download your emails from an email server using POP
  • It can connect to an email server using IMAP

SMTP - Simple Mail Transfer Protocol

The SMTP protocol is used for the transmission of e-mails. SMTP takes care of sending your email to another computer.

Normally your email is sent to an email server (SMTP server), and then to another server or servers, and finally to its destination.

SMTP can only transmit pure text. It cannot transmit binary data like pictures, sounds or movies.

SMTP uses the MIME protocol to send binary data across TCP/IP networks. The MIME protocol converts binary data to pure text.


POP - Post Office Protocol

The POP protocol is used by email programs (like Microsoft Outlook) to retrieve emails from an email server.

If your email program uses POP, all your emails are downloaded to your email program (also called email client), each time it connects to your email server.


IMAP - Internet Message Access Protocol

The IMAP protocol is used by email programs (like Microsoft Outlook) just like the POP protocol.

The main difference between the IMAP protocol and the POP protocol is that the IMAP protocol will not automatically download all your emails each time your email program connects to your email server.

The IMAP protocol allows you to look through your email messages at the email server before you download them. With IMAP you can choose to download your messages or just delete them. This way IMAP is perfect if you need to connect to your email server from different locations, but only want to download your messages when you are back in your office.

Mobile devices...!



A portable navigation device including a GPRS modem with a powerful software framework. Ready for use as a navigation + messenging & tracking device, and very quickly adaptable to customer specific requirements, through it's java framework.


The most flexible and competitive tracking device, fully programmable in java.





M3FXS
All-in-one GPS & navigation + GSM/GPRS + bright 5.7" touch panel + multiple I/O's


T3L
same as T3FXS
with limited IO's









M3L
same as M3FXS with limited IO's

C4R (trailocator)
trailocator : trailers and containers tracking. Internal antennas, IP66




T3XS-E
same as T3FXS + many additional IO's (WiFi, RS485,...)











H4
multi I/O Hub extension for MD501 devices








H4




How Fiber-Optic Works...!

Yo­u hear ab­out fiber-optic cables whenever people ta­lk about the telephone system, the cable TV system or the Internet. Fiber-optic lines are strands of optically pure glass as thin as a human hair that carry digital information over long distances. They are also used in medical imaging and mechanical engineering inspection.


Parts of a single optical fiber

In this article, we will show you how these tiny strands of glass transmit light and the fascinating way that these strands are made.

Saturday, August 30, 2008

Using VOIP ..What is VOIP...!

VOIP...


Chances are good you're already making VoIP calls any time you place a long-distance call. Phone companies use VoIP to streamline their networks. By routing thousands of phone calls through a circuit switch and into an IP gateway, they can seriously reduce the bandwidth they're using for the long haul. Once the call is received by a gateway on the other side of the call, it's decompressed, reassembled and routed to a local circuit switch.

Although it will take some time, you can be sure that eventually all of the current circuit-switched networks will be replaced with packet-switching technology (more on packet switching and circuit switching later). IP telephony just makes sense, in terms of both economics and infrastructure requirements. More and more businesses are installing VoIP systems, and the technology will continue to grow in popularity as it makes its way into our homes. Perhaps the biggest draws to VoIP for the home users that are making the switch are price and flexibility.

voip phone

VoIP phone users can make calls from anywhere there's a broadband connection.

With VoIP, you can make a call from anywhere you have broadband connectivity. Since the IP phones or ATAs broadcast their info over the Internet, they can be administered by the provider anywhere there's a connection. So business travelers can take their phones or ATAs with them on trips and always have access to their home phone. Another alternative is the softphone. A softphone is client software that loads the VoIP service onto your desktop or laptop. The Vonage softphone has an interface on your screen that looks like a traditional telephone. As long as you have a headset/microphone, you can place calls from your laptop anywhere in the broadband-connected world.

Most VoIP companies are offering minute-rate plans structured like cell phone bills for as little as $30 per month. On the higher end, some offer unlimited plans for $79. With the elimination of unregulated charges and the suite of free features that are included with these plans, it can be quite a savings.

Most VoIP companies provide the features that normal phone companies charge extra for when they are added to your service plan. VoIP includes:

  • Caller ID
  • Call waiting
  • Call transfer
  • Repeat dial
  • Return call
  • Three-way calling
There are also advanced call-filtering options available from some carriers. These features use caller ID information to allow you make a choice about how calls from a particular number are handled. You can:
  • Forward the call to a particular number
  • Send the call directly to voice mail
  • Give the caller a busy signal
  • Play a "not-in-service" message
  • Send the caller to a funny rejection hotline
With many VoIP services, you can also check voice mail via the Web or attach messages to an e-mail that is sent to your computer or handheld. Not all VoIP services offer all of the features above. Prices and services vary, so if you're interested, it's best to do a little shopping.





Now that we've looked at VoIP in a general sense, let's look more closely at the components that make the system work. To understand how VoIP really works and why it's an improvement over the traditional phone system, it helps to first understand how a traditional phone system works.

How to use Proxy...!

How to use proxy to By pass Firewalls:


Keeping high anonymity on the web is really difficult these days but thanks to numeric Internet proxies we can keep ourselves secure and safe on the Internet for as long as we want. Also if your Internet Service Provider has blocked any sites like Orkut or MySpace you can bypass the firewall using proxy servers.

Use of Proxy Servers

Proxy Servers are in the format xxx.xxx.xxx.xxx:xxx where xxx is any numeric digit. They are in the form of an IP with a Port. Almost all browsers e.g Firefox or IE allow you to surf the Internet using proxy servers. Some of the wide uses of proxy servers are:

  • Surf the Internet anonymously
  • Browse the web safe and secure
  • Keep your online Identity hidden and secret
  • Bypass your ISP firewall to access blocked websites
  • Hop over your local or wireless network restrictions
  • Use Orkut MySpace or Hi5 etc at your school or work

Where To Find Proxy Servers

Though hunting for new fresh proxy servers is not a big deal but most of the proxy list providers online do not refine the proxies and most of the proxies are either dead, transparent, open or insecure.

Below is a list of the most reliable proxy server list providers online:

  1. Fresh Anonymous Proxy List
  2. Fresh Proxy List
  3. Proxy List
  4. Free Public Proxy Servers
  5. Public Proxy Servers
  6. Anonymity Checker
  7. Xroxy
  8. Online Checker
  9. Proxz
  10. Samair Proxy List

Here are some Free softwares that will help you hunt and fetch free proxy servers:

  1. Proxy Server List Hunter
  2. Proxy Bag
  3. Free Proxyway
  4. Proxy Finder

Using Proxy Server with Browsers

Now that you have your proxy server list. To use it with Firefox follow the trail:

Tools –> Options –> Advanced –> Network –> Settings

Select ‘Manual Proxy Configuration’ and enter the proxy server you would like to use along with its port.

For Internet Explorer:

Tools –> Internet Options –> Connections –> Lan Settings

Check ‘Use a Proxy Server for Your LAN’ and enter the address and port of your proxy server.



How Wi-Max Works...!

In practical terms, WiMAX would operate similar to WiFi but at higher speeds, over greater distances and for a greater number of users. WiMAX could potentially erase the suburban and rural blackout areas that currently have no broadband Internet access because phone and cable companies have not yet run the necessary wires to those remote locations.





A WiMAX system consists of two parts:

  • A WiMAX tower, similar in concept to a cell-phone tower - A single WiMAX tower can provide coverage to a very large area -- as big as 3,000 square miles (~8,000 square km).

  • A WiMAX receiver - The receiver and antenna could be a small box or PCMCIA card, or they could be built into a laptop the way WiFi access is today.
A WiMAX tower station can connect directly to the Internet using a high-bandwidth, wired connection (for example, a T3 line). It can also connect to another WiMAX tower using a line-of-sight, microwave link. This connection to a second tower (often referred to as a backhaul), along with the ability of a single tower to cover up to 3,000 square miles, is what allows WiMAX to provide coverage to remote rural areas.

What this points out is that WiMAX actually can provide two forms of wireless service:

  • There is the non-line-of-sight, WiFi sort of service, where a small antenna on your computer connects to the tower. In this mode, WiMAX uses a lower frequency range -- 2 GHz to 11 GHz (similar to WiFi). Lower-wavelength transmissions are not as easily disrupted by physical obstructions -- they are better able to diffract, or bend, around obstacles.

  • There is line-of-sight service, where a fixed dish antenna points straight at the WiMAX tower from a rooftop or pole. The line-of-sight connection is stronger and more stable, so it's able to send a lot of data with fewer errors. Line-of-sight transmissions use higher frequencies, with ranges reaching a possible 66 GHz. At higher frequencies, there is less interference and lots more bandwidth.

WiFi-style access will be limited to a 4-to-6 mile radius (perhaps 25 square miles or 65 square km of coverage, which is similar in range to a cell-phone zone). Through the stronger line-of-sight antennas, the WiMAX transmitting station would send data to WiMAX-enabled computers or routers set up within the transmitter's 30-mile radius (2,800 square miles or 9,300 square km of coverage). This is what allows WiMAX to achieve its maximum range.

Global Area Network
The final step in the area network scale is the global area network (GAN). The proposal for GAN is IEEE 802.20. A true GAN would work a lot like today's cell phone networks, with users able to travel across the country and still have access to the network the whole time. This network would have enough bandwidth to offer Internet access comparable to cable modem service, but it would be accessible to mobile, always-connected devices like laptops or next-generation cell phones.

How IPTV Works...!

For most of the twentieth century, the only ways to watch television were through over-the-air broadcasts and cable signals. With broadcast TV, an antenna picks up radio waves to transmit pictures and sound to your television set. With cable TV, wires connect to a set-top box or to your TV itself. These wires run from your house to the nearest cable TV station, which acts as one big antenna. Aside from a few options like satellite TV, broadcast and cable were -- and still are -- the main ways to watch television.

Interet TV could change the way we access information and entertainment.
© Photographer: Robert Mizerek | Agency: Dreamstime.com
Internet TV could change the way we access information
and entertainment.

New technology can change the way we receive news and entertainment, though. Radio challenged newspapers in the early 1900s, and television challenged radio. Now, it looks as though traditional television has its own competitor, but it's not one that's easily separated from television. It even has television in its name -- it's what we're now calling Internet TV.

Internet TV, in simple terms, is video and audio delivered over an Internet connection. It's also known as Internet protocol television, or IPTV. You can watch Internet TV on a computer screen, a television screen (through a set-top box) or a mobile device like a cell phone or an iPod.


It's almost the same as getting television through an antenna or a series of cable wires -- the difference is that information is sent over the Internet as data. At the same time, you can find even more variety on Internet TV than cable TV. Along with many of the same shows you find on the big networks, many Web sites offer independently produced programs targeted toward people with specific interests. If you wanted to watch a show on vegetarian cooking, for example, you could probably find it more easily over the Internet than on regular TV.

Because many sites offer on-demand services, you don't have to keep track of scheduling. For sites using webcasting or real-time streaming video, though, live broadcasting is still an option.

Internet TV is relatively new -- there are lots of different ways to get it, and quality, content and costs can vary greatly. Shows can be high-quality, professionally produced material, while others might remind you of Wayne and Garth broadcasting "Wayne's World" from their basement. Traditional TV networks are also easing into the technology and experimenting with different formats.

In this article, we'll go over the basics of Internet TV and talk about some of the current options for finding and watching it.



DIAGRAM ....


Saturday, August 23, 2008

Wan Diagrams (Campus Network,Security Network,Mobile Network)

Note:The Number of users/Nodes May be Vary(Sample Designs)

Security Network
















Mobile Network
















Campus Network Design


Problems Disscussions

Disscuss Your Network Problem Here...

Router Commands(For Wan Network)

Router Commands Overview

In this section you will learn about the router commands, configurations, privileged mode commands, routing protocols, cisco labs and network configurations.There are hundreds of basic and advance level commands of a router. It is not easy to remember all the commands. But some commands are frequently used and can be remembered with some practice. I have provided a list of the most commonly used commands based on their features and usage.You will find here some basic terminology of a router.Routing: Routing is a process of moving the data (packets) through an inter network. Routing performs the two basic tasks. Define the paths for a packet and then forward the packets on the basis of defined paths. Routing can also be defined as the communication between two or more logically and physical networks and this communication (packet transfer) is brought by a router.

First of all you should remember the keyboard shortcuts of a router.

Keyboard Shortcuts
CTRL-N - show next command
CTRL-P - show previous command
SHIFT-CTRL-6 – Break

Configuring the Router

You will be able to learn the basic commands for configuring a router.
sh running-config - details the running configuration file (RAM)
sh startup-config - displays the configuration stored in NVRAM
setup - Will start the the automatic setup; the same as when you first boot the router
config t - use to execute configuration commands from the terminal
config mem - executes configuration commands stored in NVRAM; copies startup-config to running-config

config net - used to retrieve configuration info from a TFTP server
copy running-config startup-config - copies saved config in running config (RAM) to NVRAM or "write memory" for IOS under ver.11
copy startup-config running-config - copies from non-volatile (NVRAM) to current running config (RAM)
boot system flash - tells router which IOS file in flash to boot from
boot system tftp - tells router which IOS file on the tftp server to boot from
boot system rom - tell router to boot from ROM at next boot
copy flash tftp - Copies flash to tftp server
copy tftp flash - Restores flash from tftp server
copy run tftp - Copies the current running-config to tftp server
copy tftp run - Restores the running-config from tftp server

General Commands

Here is a list of the general commands. These are the basic level commands and most commonly used
no shutdown - (enables the interface)
reload - restarts the router
sh ver - Cisco IOS version, uptime of router, how the router started, where system was loaded from, the interfaces the POST found, and the configuration register
sh clock - shows date and time on router
sh history - shows the history of your commands
sh debug - shows all debugging that is currently enabled
no debug all - turns off all debugging
sh users - shows users connected to router
sh protocols - shows which protocols are configured
banner motd # Your customized message here # - Set/change banner
hostname - use to configure the hostname of the router
clear counters - clear interface counters

Privileged Mode commands of a router

Learn how to work in the privileged mode of a router.
enable - get to privileged mode
disable - get to user mode
enable password - sets privileged mode password
enable secret - sets encrypted privileged mode password
Setting Passwords on router
Here you will be able to learn how to set the password on a router.
enable secret - set encrypted password for privileged access
enable password - set password for privileged access (used when there is no enable secret and when using older software)
Setting the password for console access:
(config)#line console 0
(config-line)#login
(config-line)#password
Set password for virtual terminal (telnet) access (password must be set to access router through telnet):
(config)#line vty 0 4
(config-line)#login
(config-line)#password
Set password for auxiliary (modem) access:
(config)#line aux 0
(config-line)#login
(config-line)#password

Router Processes & Statistics

By these command you can see the statistics and different processes of the router.
sh processes - shows active processes running on router
sh process cpu - shows cpu statistics
sh mem - shows memory statistics
sh flash - describes the flash memory and displays the size of files and the amount of free flash memory
sh buffers - displays statistics for router buffer pools; shows the size of the Small, Middle, Big, Very Big, Large and Huge Buffers
sh stacks - shows reason for last reboot, monitors the stack use of processes and interrupts routines

IP Commands

Here is a list of the IP Commands
Configure IP on an interface:
int serial 0
ip address 157.89.1.3 255.255.0.0
int eth 0
ip address 2008.1.1.4 255.255.255.0

Other IP Commands:

sh ip route - view ip routing table
ip route [administrative_distance] - configure a static IP route
ip route 0.0.0.0 0.0.0.0 - sets default gateway
ip classless - use with static routing to allow packets destined for unrecognized subnets to use the best possible route
sh arp - view arp cache; shows MAC address of connected routers
ip address 2.2.2.2 255.255.255.0 secondary - configure a 2nd ip address on an interface
sh ip protocol

CDP Commands (Cisco Discovery Protocol uses layer 2 multicast over a SNAP-capable link to send data):

sh cdp neighbor - shows directly connected neighbors
sh cdp int - shows which interfaces are running CDP
sh cdp int eth 0/0 - show CDP info for specific interface
sh cdp entry - shows CDP neighbor detail
cdp timer 120 - change how often CDP info is sent (default cdp timer is 60)
cp holdtime 240 - how long to wait before removing a CDP neighbor (default CDP holdtime is 180)
sh cdp run - shows if CDP turned on
no cdp run - turns off CDP for entire router (global config)
no cdp enable - turns off CDP on specific interface

IPX Commands

Enable IPX on router:
ipx routing
Configure IPX + IPX-RIP on an int:
int ser 0
ipx network 4A

Other Commands:

sh ipx route - shows IPX routing table
sh ipx int e0 - shows ipx address on int
sh ipx servers - shows SAP table
sh ipx traffic - view traffic statistics
debug ipx routing activity - debugs IPS RIP packets
debug ipx sap - debugs SAP packets

Routing Protocols

RIP, IGPR and OSPF are the routing protocols and here is a list of the commands for the working on the routing protocols.
Configure RIP:
router rip
network 157.89.0.0
network 208.1.1.0
Other RIP Commands:
debug ip rip - view RIP debugging info
Configure IGRP:
router IGRP 200
network 157.89.0.0
network 208.1.1.0
Other IGRP Commands:
debug ip igrp events - view IGRP debugging info
debug ip igrp transactions - view IGRP debugging info
Access Lists
Here is a list of the Access list command of a router.
sh ip int ser 0 - use to view which IP access lists are applies to which int
sh ipx int ser 0 - use to view which IPX access lists are applies to which int
sh appletalk int ser 0 - use to view which AppleTalk access lists are applies to which int
View access lists:
sh access-lists
sh ip access-lists
sh ipx access-lists
sh appletalk access-lists
Apply standard IP access list to int eth 0:
access-list 1 deny 200.1.1.0 0.0.0.255
access-list 1 permit any
int eth 0
ip access-group 1 in
Apply Extended IP access list to int eth 0:
access-list 100 deny tcp host 1.1.1.1 host 2.2.2.2 eq 23
access-list 100 deny tcp 3.3.3.0 0.0.0.255 any eq 80
int eth 0
ip access-group 100 out
Apply Standard IPX access list to int eth 0:
access-list 800 deny 7a 8000
access-list 800 permit -1
int eth 0
ipx access-group 800 out
Apply Standard IPX access list to int eth 0:
access-list 900 deny sap any 3378 -1
access-list 900 permit sap any all -1
int eth 0
ipx access-group 900 out

WAN Configurations Commands

Networking over WAN is the main functionality of a router. The most common use of a router is for the WAN connectivity. Here is a list of the commands for the different methods of the WAN connectivity.

PPP Configuration

Point to point protocol is a method for the WAN connectivity and you will find here some commands of PPP.
encapsulation pppppp authentication
ppp chap hostname
ppp pap sent-username
sh int ser 0 - use to view encapsulation on the interface

Frame-Relay Configuration

One of the methods for the WAN connectivity is the Frame Relay. Find here some basic commands for the WAN connectivity through Frame Relay.
encapsulation frame-relay ietf - use IETF when setting up a frame-relay network between a Ciscorouter and a non-Cisco router
frame-relay lmi-type ansi - LMI types are Cisco, ANSI, Q933A; Cisco is the default; LMI type is auto-sensed in IOS v11.2 and up
frame-relay map ip 3.3.3.3 100 broadcast - if inverse ARP won't work, map Other IP to Your DLCI # (local)
keep alive 10 - use to set keep alive
sh int ser 0 - use to show DLCI, LMI, and encapsulation info
sh frame-relay pvc - shows the configured DLCI's; shows PVC traffic stats
sh frame-relay map - shows route mapssh frame-relay lmi - shows LMI info

Miscellaneous Commands

In the last but not least here is a list of the some miscellaneous and useful commands
sh controller t1 - shows status of T1 lines
sh controller serial 1 - use to determine if DCE or DTE device
(config-if)#clock rate 6400 - set clock on DCE (bits per second)
(config-if)#bandwidth 64 - set bandwidth (kilobits)

Live contact Available..

Ask an Expert - Visit my Virtual Office at LivePerson Ask an Expert - Visit my Virtual Office at LivePerson