Filters








935 Hits in 3.8 sec

Hardening CISCO Devices based on Cryptography and Security Protocols - Part One: Background Theory

Faisal Waheed, Maaruf Ali
2018 Annals of Emerging Technologies in Computing  
The hardening of network devices refers to the hardware and software components, device operating system's features, management controls, access-list restrictions, operational configurations and above  ...  This article investigates the use of cryptography and network protocols based on encryption, to meet the need for essential security requirements.  ...  Used Access-list controls in order to check authentication settings in IOS router. Software required further fine-tuning.  ... 
doi:10.33166/aetic.2018.03.004 fatcat:zp3smgjrqjcg5mshw4se6htm6u

Book Reviews: Cisco Mobile IP Configuration, Troubleshooting, and Management

R. Puzmanova
2006 IEEE Distributed Systems Online  
Although wireless Internet access with smart phones, PDAs, and even laptops (at popular hot spots) has spread widely, this doesn't create true mobility for end users.  ...  Not only must the physical and data layers support handovers and roaming between cells and various types of wireless networks, but networking protocols must support moves between subnets and networks seamlessly  ...  The book is useful for network administrators and other networking professionals who wish to become familiar with Mobile IP both in theory and in practice.  ... 
doi:10.1109/mdso.2006.24 fatcat:o72u7n5aevgjhll2bsv3pboasq

Design and Implementation of a Network Security Model using Static VLAN and AAA Server

Salah A. Jaro Alabady
2008 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications  
access the network.  ...  Also this paper provides a checklist to use in evaluating whether a network is adhering to best practices in network security and data confidentiality.  ...  This facility is available in IOS releases for many, but not all, Cisco routers.  ... 
doi:10.1109/ictta.2008.4530276 fatcat:2i3m4mig7nda7pnweo2yt3am2e

The use and usability of direction-based filtering in firewalls

Avishai Wool
2004 Computers & security  
This discrepancy makes it very confusing for firewall administrators to use the packet direction correctly, and creates a significant usability problem.  ...  However, most firewalls are also capable of filtering based on a packet's direction: which network interface card the packet is crossing, and whether the packet is crossing the interface from the network  ...  Acknowledgements I thank Tom Limoncelli for many stimulating discussions and for showing me some of his system administration tricks. Michele Rizack brought RFC 2267 to my attention.  ... 
doi:10.1016/j.cose.2004.02.003 fatcat:lln2wfya7vbvbk5o2viuu5m3fi

Virtual Switch Security - An Overview

Andrea Covello
2013 Zenodo  
Virtual switches manage and route traffic in a virtual environment, but often network engineers don't have direct access to these vSwitches.  ...  Nexus 1000v Here is an overview of the features on the Cisco 1000v virtual switch solution: Components Description Cisco NX-OS Interface It offers the well-known Cisco IOS command line interface to manage  ...  authorization and accounting (AAA), access control lists Optional VSG Module You can add the VSG module for statefull inspection firewall functionality as a separate licensed feature.  ... 
doi:10.5281/zenodo.3521241 fatcat:wgpuunq22zbdtfjqmcxqgvikn4

Network Automation using Ansible for EIGRP Network

Mohd Faris Mohd Fuzi, Khairunnisa Abdullah, Iman Hazwam Abd Halim, Rafiza Ruslan
2021 Journal of Computing Research and Innovation  
Network automation helps to assist network administrators in automating and verifying the EIGRP configuration using scripting.  ...  Ansible can help network administrators minimized human mistakes, reduce time-consuming and enable device visibility across the network environment.  ...  It helps the network administrator to manage devices efficiently and reduce the configuration time.  ... 
doi:10.24191/jcrinn.v6i4.237 fatcat:lydqzo5odba27dlmp56yiiadda

Re-engineering Grep and Diff for NERC CIP

Gabriel A. Weaver, Sean W. Smith, Rakesh B. Bobba, Edmond J. Rogers
2012 2012 IEEE Power and Energy Conference at Illinois  
In this paper, we propose our two tools, Context-Free Grep and Hierarchical Diff, to help utilities and auditors generate reliable and reproducible evidence to support or refute NERC CIP compliance.  ...  ACKNOWLEDGMENT The authors would like to thank Sergey Bratus, and Jun Ho Huh for their discussions of these tools and their applicability to power system networks.  ...  DATASETS FOR CIP AUDIT A. Cisco IOS Utilities must manage their computer networks.  ... 
doi:10.1109/peci.2012.6184603 fatcat:7xnm3ilc7rbrldhhrdua7hq4ha

Cisco Secured Virtual Private Networks: A Review

Yusera Farooq Khan
2018 Asian Journal of Computer Science and Technology  
Now-a-days the significance of security has been greater than before because of the fact that data has been accessed and transferred through public network.  ...  The data which has been transferred could be sniffed which may be a loss for us. When data is transferred in to public network we need confidentiality, integration and authentication.  ...  For example, in Cisco routers and PIX Firewalls, access lists are used to determine the traffic to encrypt.  ... 
doi:10.51983/ajcst-2018.7.2.1886 fatcat:43z67upavraaxbnapsr4yfcoii

The Risk Assessment And Treatment Approach In Order To Provide Lan Security Based On Isms Standard

Marzieh Sameni Toosarvandani
2012 International Journal in Foundations of Computer Science & Technology  
Local Area Networks(LAN) at present become an important instrument for organizing of process and information communication in an organization.  ...  Becase these network do work with valuable information, the problem of security providing is an important issue in organization.  ...  Using an ACL to Traffic Characterize Smurf: The Cisco IOS Access Control List (ACL) is the technique to classify the packets into various attack streams, and it is valuable for characterizing attacks  ... 
doi:10.5121/ijfcst.2012.2602 fatcat:xjosugigdzcczei3b6epobbaya

Cloud Solution to assist in Mobile Technology Learning

Mohammed Tabbara
2014 Journal of Education and Training  
This research will show how using cloud solutions in conjunction with mobile smart devices, such as the iPad, could technically and pedagogically facilitate the educational process both for students and  ...  will also discuss the student's acceptance of such system and the tremendous opportunities cloud technology could offer to higher education students in terms of learning mobility and computer software accessibility  ...  The HCT networking students integrates all CISCO courses within their standard lab studies. Unfortunately all iOS devices don't support CISCO materials and Cisco network academy simulations.  ... 
doi:10.5296/jet.v1i2.5315 fatcat:jawwzslr6jea5lrkr5e6omcnui

Integrating Cisco Systems' Educational Programs in ICT Security Academic Curricula

Oleksandr Gordieiev, Taras Lobur, Ruslan Kozak
2016 Information & Security: An International Journal  
In this article, we review courses provided by Cisco Systems, describe their organization, nomenclature and structure, and provide recommendations on their use in the academic curricula in the field of  ...  Acknowledgement We thank to all colleagues from Britain, Estonia, Italy, Bulgaria, Sweden and Ukraine for full support and possibility of discussions and development of SEREIN courses as part of the TEMPUS  ...  Security Threats Explain network threats, mitigation tech- niques, and the basics of securing a network 2 Modern Network Security Threats Secure administrative access on Cisco routers 3 Authentication  ... 
doi:10.11610/isij.3508 fatcat:5nh444lpzbhchbpk6x2t6e6f44

Bayesian detection of router configuration anomalies

Khalid El-Arini, Kevin Killourhy
2005 Proceeding of the 2005 ACM SIGCOMM workshop on Mining network data - MineNet '05  
In this paper, we propose a method for detecting misconfigurations that does not rely on a priori expectations of their form.  ...  We present three detection algorithms based on this framework and show that they are able to detect errors in the router configuration files of a university network.  ...  Acknowledgments The authors are grateful to David Maltz for his significant contribution in providing us with data, reviewing our results, and revising this paper.  ... 
doi:10.1145/1080173.1080190 dblp:conf/minenet/El-AriniK05 fatcat:kddto7nexfaolngaovfki4urey

New approaches and techniques for teaching network courses at the faculty of management science and informatics

Pavel Segec
2017 New Trends and Issues Proceedings on Humanities and Social Sciences  
At universities therefore emerge a need to ensure and organize a simple access to educational and information resources (supporting tools), which should be helpful with a better understanding of the taught  ...  The article provides and explains the process of creation a new tool, that helps us solving the problem of high utilization of laboratories and limited access to real devices, on which could students obtain  ...  IOS in our case).  ... 
doi:10.18844/prosoc.v2i11.1912 fatcat:bgpl755gxrga7pcmgfkdekb754

A Holistic Approach to Develop IS Curricula: Focusing on Accreditation and IT Certification

Akram Mahmoud Al-Rawi, Azzedine Lansari, Faouzi Bouslama
2005 Journal of Information Technology Education  
These are: MS MOUS or ECDL, CompTIA Network +, Cisco CCNA, CompTIA A+, and Sun Certified Programmer for Java 2 Platform.  ...  An example showing how to integrate Net-work+ certification, Cisco CCNA, is presented with a comparison between Cisco CCNA and CompTIA Network+.  ...  RIP Version 2, EIGRP, OSPF OSPF Concepts & Operation Lab # 10 Advanced Routing Protocols + Test # 2 Access Lists: Usage and Rules, Standard IP Access Lists Standard IP Access List Examples Extended IP  ... 
doi:10.28945/279 fatcat:5ti7fafv65g5bpsyr4nx63cene

Will the Butterfly Cipher keep your Network Data secure? Developments in Computer Encryption [article]

Vita Hinze-Hoare
2006 arXiv   pre-print
Examples of their relative uses are discussed and suggestions for future developments considered.  ...  In addition application to network security together with a substantial review of classification of encryption systems and a summary of security weaknesses are considered.  ...  Networks are secured through the use of access control lists (ACLs), which are used to filter and secure the network traffic.  ... 
arXiv:cs/0604048v1 fatcat:yvbnijbwcbgqrlkbbh5xu4r2em
« Previous Showing results 1 — 15 out of 935 results