Junos Cli Commands Reference
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Curso De Microinformatica.Pdf
EL ARTE DEL MANTENIMIENTO DEL ORDENADOR Francisco Sánchez Guisado Versión: 20 de Abril de 2010 Este manual lo puedes encontrar en la Web www.humantica.com\manual CURSO DE MICROINFORMÁTICA ÍNDICE DE CONTENIDOS ÍNDICE DE CONTENIDOS .............................................................................. 2 DEDICATORIA ................................................................................................. 5 PRÓLOGO ........................................................................................................ 6 INTRODUCCIÓN .............................................................................................. 7 I. HISTORIA DE LA INFORMÁTICA ........................................................ 10 1.1 – Los antecedentes de la informática ............................................................ 11 1.1.1 – Calculadores electrónicos .............................................................................. 13 1.1.2 – Almacenamiento de programas...................................................................... 13 1.2 – Generaciones de ordenadores ................................................................... 15 1.2.1 – Primera generación de ordenadores .............................................................. 15 1.2.2 – Segunda generación de ordenadores. ........................................................... 16 1.2.3 – Tercera generación de ordenadores .............................................................. 17 1.2.4 – Cuarta generación de ordenadores ............................................................... -
Extreme Networks EXOS V12.3.6.2 EAL3+ ST
Extreme Networks, Inc. ExtremeXOS Network Operating System v12.3.6.2 Security Target Evaluation Assurance Level: EAL3+ Document Version: 0.9 Prepared for: Prepared by: Extreme Networks, Inc. Corsec Security, Inc. 3585 Monroe Street 13135 Lee Jackson Memorial Hwy., Suite 220 Santa Clara, CA 95051 Fairfax, VA 22033 Phone: +1 408 579 2800 Phone: +1 703 267 6050 http://www.extremenetworks.com http://www.corsec.c om Security Target , Version 0.9 March 12, 2012 Table of Contents 1 INTRODUCTION ................................................................................................................... 4 1.1 PURPOSE ................................................................................................................................................................ 4 1.2 SECURITY TARGET AND TOE REFERENCES ...................................................................................................... 4 1.3 TOE OVERVIEW ................................................................................................................................................... 5 1.3.1 TOE Environment ................................................................................................................................................... 5 1.4 TOE DESCRIPTION .............................................................................................................................................. 6 1.4.1 Architecture ............................................................................................................................................................. -
GS2200 Series User's Guide
GS2200 Series Intelligent Layer 2 GbE Switch Version 4.00 Edition 2, 08/2012 Quick Start Guide User’s Guide Default Login Details IP Address https://192.168.1.1 User Name admin Passwordwww.zyxel.com 1234 Copyright © 2012 ZyXEL Communications Corporation IMPORTANT! READ CAREFULLY BEFORE USE. KEEP THIS GUIDE FOR FUTURE REFERENCE. This is a User’s Guide for a series of products. Not all products support all firmware features. Screenshots and graphics in this book may differ slightly from your product due to differences in your product firmware or your computer operating system. Every effort has been made to ensure that the information in this manual is accurate. Related Documentation • CLI Reference Guide The CLI Reference Guide explains how to use the Command-Line Interface (CLI) to configure the Switch. Note: It is recommended you use the Web Configurator to configure the Switch. 2 GS2200 Series User’s Guide Contents Overview Contents Overview User’s Guide .......................................................................................................................................15 Getting to Know Your Switch ...................................................................................................................17 Hardware Installation and Connection ....................................................................................................21 Hardware Panels .....................................................................................................................................25 Technical Reference -
Answer on Question #54811, Physics / Other Task: Describe in Brief Any Five High Level Networking Software Systems
Answer on Question #54811, Physics / Other Task: Describe in brief any five high level networking software systems. Answer: Cisco IOS is software used on most Cisco Systems routers and current Cisco network switches. IOS is a package of routing, switching, internetworking and telecommunications functions integrated into a multitasking operating system. In all versions of Cisco IOS, packet routing and forwarding (switching) are distinct functions. Routing and other protocols run as Cisco IOS processes and contribute to the Routing Information Base (RIB). This is processed to generate the final IP forwarding table (FIB, Forwarding Information Base), which is used by the forwarding function of the router. On router platforms with software-only forwarding (e.g., Cisco 7200) most traffic handling, including access control list filtering and forwarding, is done at interrupt level using Cisco Express Forwarding (CEF) or dCEF (Distributed CEF). This means IOS does not have to do a process context switch to forward a packet. Routing functions such as OSPF or BGP run at the process level. In routers with hardware-based forwarding, such as the Cisco 12000 series, IOS computes the FIB in software and loads it into the forwarding hardware (such as an ASIC or network processor), which performs the actual packet forwarding function.Cisco IOS has a "monolithic" architecture, which means that it runs as a single image and all processes share the same memory space. Juniper Junos is the FreeBSD-based operating system used in Juniper Networks hardware routers. It is an operating system that is used in Juniper's routing, switching and security devices. -
Bab 9 Pengenalan Jaringan Komputer
11 BAB 9 PENGENALAN JARINGAN KOMPUTER Jaringan komputer, atau jaringan data, adalah jaringan telekomunikasi digital yang memungkinkan simpul untuk berbagi sumber daya. Dalam jaringan komputer, perangkat komputasi jaringan bertukar data satu sama lain menggunakan data link. Sambungan antar simpul dibuat menggunakan media kabel atau media nirkabel. Perangkat komputer jaringan yang berasal, rute dan penghentian data disebut node jaringan. Node dapat mencakup host seperti komputer pribadi, telepon, server serta perangkat keras jaringan. Dua perangkat seperti itu dapat dikatakan jaringan bersama bila satu perangkat dapat bertukar informasi dengan perangkat lain, apakah mereka memiliki hubungan langsung atau tidak langsung satu sama lain. Dalam kebanyakan kasus, protokol komunikasi khusus aplikasi berlapis (yaitu dibawa sebagai muatan) melalui protokol komunikasi umum lainnya. Koleksi teknologi informasi yang tangguh ini membutuhkan pengelolaan jaringan yang terampil agar tetap berjalan dengan andal. Jaringan komputer mendukung sejumlah besar aplikasi dan layanan seperti akses ke World Wide Web, video digital, audio digital, penggunaan bersama dari server aplikasi dan penyimpanan, printer, dan mesin faks, dan penggunaan aplikasi email dan pesan instan serta banyak lainnya Jaringan komputer berbeda dalam media transmisi yang digunakan untuk membawa sinyal mereka, protokol komunikasi untuk mengatur lalu lintas jaringan, ukuran jaringan, topologi dan maksud organisasi. Jaringan komputer yang paling terkenal adalah Internet. 9.1 Sejarah Kronologi perkembangan jaringan komputer yang signifikan meliputi: l Pada akhir 1950-an, jaringan komputer awal mencakup sistem radar militer A.S. Semi-Automatic Ground Environment (SAGE). l Pada tahun 1959, Anatolii Ivanovich Kitov mengusulkan kepada Komite Sentral Partai Komunis Uni Soviet sebuah rencana terperinci untuk pengorganisasian kembali kendali angkatan bersenjata Soviet dan ekonomi Soviet berdasarkan jaringan pusat komputasi , OGAS. -
P-660R-Tx V2 Series
P-660R-Tx v2 Series ADSL2+ Router Support Notes Version3.40 Dec. 2006 P-660R-Tx v2 Series Support Notes FAQ .................................................................................................................3 ZyNOS FAQ .................................................................................................3 1. What is ZyNOS? ...................................................................................3 2. What’s Multilingual Embedded Web Configurator?...............................3 3. How do I access the P-660R-Tx v2 Command Line Interface (CLI)? ...3 4. How do I update the firmware and configuration file? ...........................3 5. How do I upgrade/backup the ZyNOS firmware by using TFTP client program via LAN?.....................................................................................3 6. How do I restore P-660R-Tx v2 configurations by using TFTP client program via LAN?.....................................................................................4 7. What should I do if I forget the system password? ...............................4 8. How to use the Reset button?...............................................................4 9. What is SUA? When should I use SUA? ..............................................5 10. What is the difference between SUA and Full Feature NAT? .............5 11. Is it possible to access a server running behind SUA from the outside Internet? How can I do it?.........................................................................6 12. When do I need select -
Nessus 6.8 User Guide
Nessus 6.8 User Guide Last Updated: 8/17/2016 Table of Contents Getting Started 11 About Nessus Products 12 About Nessus Plugins 15 Hardware Requirements 17 Supported Operating Systems 18 Nessus License & Activation Code 21 Setup Nessus 22 Product Download 23 Pre-install Nessus 25 Deployment 26 Host Based Firewalls 27 IPv6 Support 28 Virtual Machines 29 Anti-virus Software 30 Security Warnings 31 Install Nessus and Nessus Agents 32 Nessus Installation 33 Install Nessus on Mac OS X 34 Install Nessus on Linux 36 Install Nessus on Windows 37 Nessus Agent Install 39 Install a Nessus Agent on Mac OS X 40 Copyright © 2016. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc. SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners. Install a Nessus Agent on Linux 43 Install a Nessus Agent on Windows 47 Upgrade Nessus and Nessus Agents 51 Nessus Upgrade 52 Upgrade from Evaluation 53 Mac Upgrade 54 Linux Upgrade 55 Windows Upgrade 56 Nessus Agents: Upgrade 57 Installation - Web Browser Portion 58 Nessus (Home, Professional, or Manager) 60 Link to Nessus Manager 61 Link to Tenable Cloud 64 Managed by SecurityCenter 66 Install Nessus while Offline 67 Register Nessus Offline 71 Generate Challenge Code 73 Generate Your License 74 Download and Copy License File (nessus.license) 75 Register Your License with Nessus 76 Download and Copy Plugins 77 Install Plugins Manually 78 Remove Nessus and Nessus Agents 79 Nessus Removal 80 Copyright © 2016. -
Nessus 8.12 User Guide
Nessus 8.12.x User Guide Last Updated: September 24, 2021 Table of Contents Welcome to Nessus 8.12.x 13 Get Started with Nessus 16 Navigate Nessus 18 System Requirements 19 Hardware Requirements 20 Software Requirements 24 Customize SELinux Enforcing Mode Policies 28 Licensing Requirements 29 Deployment Considerations 30 Host-Based Firewalls 31 IPv6 Support 32 Virtual Machines 33 Antivirus Software 34 Security Warnings 35 Certificates and Certificate Authorities 36 Custom SSL Server Certificates 38 Create a New Server Certificate and CA Certificate 40 Upload a Custom Server Certificate and CA Certificate 42 Trust a Custom CA 44 Create SSL Client Certificates for Login 46 Nessus Manager Certificates and Nessus Agent 49 Install Nessus 51 Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade- marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective Download Nessus 52 Install Nessus 54 Install Nessus on Linux 55 Install Nessus on Windows 57 Install Nessus on Mac OS X 59 Install Nessus Agents 61 Retrieve the Linking Key 62 Install a Nessus Agent on Linux 63 Install a Nessus Agent on Windows 67 Install a Nessus Agent on Mac OS X 73 Link an Agent to Nessus Manager 77 Upgrade Nessus and Nessus Agents 80 Upgrade Nessus 81 Upgrade from Evaluation 82 Update Nessus Software 83 Upgrade Nessus on Linux 86 Upgrade Nessus on Windows 87 Upgrade Nessus on Mac OS X 88 Upgrade a Nessus Agent 89 Downgrade Nessus Software 95 Configure Nessus 97 Install Nessus Essentials, Professional, or Manager 98 Link to Tenable.io 100 Link to Nessus Manager 102 Copyright © 2021 Tenable, Inc. -
EVE-NG Community Cookbook
EVE-NG Community Cookbook Version 1.02 Author: Uldis Dzerkals Editors: Michael Doe Christopher Lim © EVE-NG LTD The information contained in this document is the property of EVE-NG Limited The contents of the document must not be reproduced or disclosed wholly or in part or used for purposes other than that for which it is supplied without the prior written permission of EVE-NG Limited. EVE-NG Community Cookbook Version 1.02 Table of Contents PREFACE .................................................................................................................................. 7 1 INTRODUCTION ................................................................................................................ 8 1.1 WHAT IS EVE-NG? ....................................................................................................... 8 1.2 WHAT IS EVE-NG USED FOR? ....................................................................................... 8 1.3 WHO IS EVE-NG FOR? ................................................................................................. 8 2 SYSTEM REQUIREMENTS............................................................................................... 9 2.1 HARDWARE REQUIREMENTS ........................................................................................... 9 2.1.1 Minimal Laptop/PC Desktop system requirements .............................................. 9 2.1.2 Recommended Laptop/PC Desktop system requirements ................................ 10 2.1.3 Virtual Server system requirements .................................................................. -
Nessus 6.4 User Guide
Nessus 6.4 User Guide July 7, 2015 (Revision 2) Copyright © 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc. SecurityCenter is a trademark of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners. Table of Contents Introduction ........................................................................................................................................................................................ 6 Standards and Conventions ........................................................................................................................................................................................ 6 Official Nessus Product Names ................................................................................................................................................................................. 6 New in Nessus 6.4 .......................................................................................................................................................................................................... 6 Overview .............................................................................................................................................................................................. 7 Installation .......................................................................................................................................................................................... -
Extreme Networks Openstack Plugin 2.0 Installation Guide Copyright © 2014 Extreme Networks
Extreme Networks OpenStack Plugin 2.0 Installation Guide Copyright © 2014 Extreme Networks AccessAdapt, Alpine, Altitude, BlackDiamond, Direct Attach, EPICenter, ExtremeWorks Essentials, Ethernet Everywhere, Extreme Enabled, Extreme Ethernet Everywhere, Extreme Networks, Extreme Standby Router Protocol, Extreme Turbodrive, Extreme Velocity, ExtremeWare, ExtremeWorks, ExtremeXOS, Go Purple Extreme Solution, ExtremeXOS ScreenPlay, ReachNXT, Ridgeline, Sentriant, ServiceWatch, Summit, SummitStack, Triumph, Unified Access Architecture, Unified Access RF Manager, UniStack, XNV, the Extreme Networks logo, the Alpine logo, the BlackDiamond logo, the Extreme Turbodrive logo, the Summit logos, and the Powered by ExtremeXOS logo are trademarks or registered trademarks of Extreme Networks, Inc. or its subsidiaries in the United States and/or other countries. sFlow is the property of InMon Corporation. iBooks is property of Apple, Inc. Specifications are subject to change without notice. All other registered trademarks, trademarks, and service marks are property of their respective owners. For additional information on Extreme Networks trademarks, please see: http:// www.extremenetworks.com/company/legal/trademarks/. 120873-00 Rev 2 Table of Contents Chapter 1: Prerequisites 4 Software Requirements 4 Hardware Requirements 4 OpenStack Requirements 5 Chapter 2: Reference Topology 6 Reference Topology Setup 6 Chapter 3: Installing Ubuntu 12.04 LTS on the Hosts 10 Installing Ubuntu 12.04 LTS on the Hosts 10 Chapter 4: Preparing the Servers and Switches -
XGS-4728F Intelligent Layer 3+ Switch
XGS-4728F Intelligent Layer 3+ Switch Default Login Details IP Address http://192.168.0.1 (Out-of-band MGMT port) http://192.168.1.1 (In-band ports) User Name admin Password 1234 www.zyxel.com Firmware Version 3.90 Edition 2, 04/2010 www.zyxel.com Copyright © 2010 ZyXEL Communications Corporation About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the Switch using the web configurator. Related Documentation • Web Configurator Online Help The embedded Web Help contains descriptions of individual screens and supplementary information. • Command Reference Guide The Command Reference Guide explains how to use the Command-Line Interface (CLI) and CLI commands to configure the Switch. Note: It is recommended you use the web configurator to configure the Switch. • Support Disc Refer to the included CD for support documents. Documentation Feedback Send your comments, questions or suggestions to: [email protected] Thank you! The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 30099, Taiwan. Need More Help? More help is available at www.zyxel.com. XGS-4728F User’s Guide 3 About This User's Guide • Download Library Search for the latest product updates and documentation from this link. Read the Tech Doc Overview to find out how to efficiently use the User Guide, Quick Start Guide and Command Line Interface Reference Guide in order to better understand how to use your product. • Knowledge Base If you have a specific question about your product, the answer may be here.