Hardening Cisco routers
نویسنده
چکیده
منابع مشابه
RCM: A User Friendly Router Configuration Machine
In this paper a router configuration machine for Cisco routers using GUI is presented. It is developed using Visual C# .NET programming, in which the interface provides GUI platforms for various types of configuration for entire series of Cisco routers. It communicates with the Cisco Internetwork Operating System to configure the router. It includes the configuration for all interior routing pr...
متن کاملGuide to Cisco Routers Configuration - Becoming a Router Geek, Second Edition
This work provides a guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. A collection of detailed “how-to” instructions are presented, which will be of use to all professionals and students who engage with Cisco routers in the field or in the lab. The guide starts with the simple step-by-step task of connecting the router and performing basic configurat...
متن کاملMultiprotocol Label Switching (MPLS) on Cisco Routers
This document describes commands for configuring and monitoring Multiprotocol Label Switching (MPLS) functionality on Cisco routers and switches. This document is a companion to other feature modules describing other MPLS applications. This document includes the following sections: • Feature Overview • Supported Standards, MIBs, and RFCs • Configuration Tasks • Glossary The following table outl...
متن کاملConstruction of Cisco Virtual Lab Platform
In experiment of network engineering and network construction, students are required to configure Cisco network equipment. Due to limit of lab environment, amount of equipment is not enough and some experiments require much more expensive and higher level equipment that are not practical to purchase and maintain. It is meaningful to use network equipment simulator on PCs. The proposed platform ...
متن کاملKilling the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design
IOS firmware diversity, the unintended consequence of a complex firmware compilation process, has historically made reliable exploitation of Cisco routers difficult. With approximately 300,000 unique IOS images in existence, a new class of version-agnostic shellcode is needed in order to make the large-scale exploitation of Cisco IOS possible. We show that such attacks are now feasible by demon...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002