Monday, April 1, 2019
Cisco Prime and Wireshark Advantages and Disadvantages
lake herring Prime and Wireshark Advantages and DisadvantagesIntroduction toNetworking Toolscisco Prime Cisco Prime (formerly know as Cisco Works) is a lead management tool that is Cisco proprietary. Prime is employ for management such as monitoring, troubleshooting, kind and organization of a lucre. This softw atomic number 18 allows for simpler control of the earnings. The monitoring and troubleshooting feature allows the cyberspace admin to straight reign and repair anesthetizes that arise through come forth the network.In the image above, you tail assembly look the home screen of the Prime software. It contains important information such as the instances of hardware within the network. As seen in the Admin section, the network decision move inr has entrance fee to network settings such as monitor and troubleshoot, notification settings, config settings, and much(prenominal) more. The GUI (graphical user port) is rattling simple which makes it very lucky to sail through the settings. This is a useful layout for the admin as they atomic number 50 monitor the network with ease. You cigarette besides see a heat map of a building that uses Cisco Prime, the colours indicate the devices that are being use in the building, in the image we pot see wireless access points.Advantages of using Cisco PrimeAllows for easier monitoring and troubleshootingEasy to understand and aviate the software which pass on increase productivityReal-time information to the highest degree areas in the networkDisadvantages of using Cisco PrimeCisco proprietary, system work for hardware from other vendorsMay be expensiveWiresharkWireshark is a software that analyses computer softwares sent throughout a network. It will display from distributively one packet and the details within the packet. Network administrators use it to analyse the network and to troubleshoot an trend if they see a problem. Wireshark has more capabilities, some of the key features are that it offer catch packets in a real-time network. It poop also save packets and the packets are laid out on a very clear GUI. Network admins cigaret use Wireshark to determine and troubleshoot problems throughout the network by searching through the packets.As you can see in the image above, this is what Wireshark looks like in a live network. We can see packets travelling through the network from the Source and Destination wieldes. The Protocol tower shows us which protocol is being used within the packet and however information roughly it. This is extremely useful for network administrators as they can clearly see the packet in detail and easily identify a problem.Advantages of using WiresharkFree softwareAvailable for quaternate platforms Windows UNIX potty see detailed information about packets within a networkNot proprietary can be used on multiple vendors unlike Cisco PrimeDisadvantages of using WiresharkNotifications will not make it evident if there is an in trusion in the networkCan scarce gather information from the network, cannot sendI will be interrogating a network and I will report my findings. I will be testing the devices in the topology and hobble if they can all proclaim with each other. In the topology below, you can see that there are three sub-networks.Firstly, I will be testing communication amidst the separate networks in the topology. I will be guaranteeing to access PC3 from PC1. To do these I will access the Command Prompt from PC1. To access this, go to Start search cmd or omit prompt in Windows 10. at one time you overhear open the command prompt, you will come across a black screen. To find out the IP palm, subnet mask and thoughtlessness approach you should issue the ipconfig command.PC1 output aboveThe output above is from PC1 on the 172.31.1.0/25 network. I will now need to check the IP address for PC2 and PC3, I will be doing this because if I can successfully strike those two host computers that means all the networks are connected to each other and can make pass.PC2 output abovePC3 output above right off that I know the IP addresses for PC2 and PC3, I can now attempt to ping them from PC1 to check if they can communicate with each other. I issue the ping 172.31.0.254 command on PC1 command prompt and as we can see below, the pings were successful. However, you may notice that the first ping timed out, that is because the packet sent an ARP request for the following(a)-hop. The output shows us that PC1 is now able to communicate with PC2.PC1 pings PC2Now I will try to ping PC3 from PC1 to see if the hosts can communicate with one another. Again, just like PC1 to PC2, I will issue the ping command along with the IP address of the PC3 host. As we can see in the output, the pings were unsuccessful. This means that the hosts cannot communicate with each other.PC1 ping PC3As we can see in the output below, I used the tracert command. This command is used to follow the path of the packet. What we learn from the command is that the packet times out at the 172.31.1.198 IP address. To troubleshoot the issue, I will locate the IP address and check the device connected to it.PC1 tracert to PC3We know from the topology that R3 is connected to the 172.31.1.196/30and 172.31.1.198 is a part of this network. I will go into the router and check the larboards to verify which interface it belongs to.Router 3 in the topologyTo do this, I will use a program called PuTTY and telnet into the router. Telnet is a networking protocol that allows a user to remotely access a device on the network. formerly in the R3 router, I issue the show ip interface brief command. From the output, we can see that the interface that connects to the switch, GigabitEthernet0/1, is down. We know that this is the interface that belongs to the interface because the IP address of the GigabitEthernet0/0 belongs to the default gateway. The reason the PC cannot communicate with outside networks is because the switchs G0/1 interface is down so it cannot forward the prepare to the router.R3 output shown aboveTo tackle this problem, I will go into the contour of the G0/1s interface and change the status from down to up. This enables the interface to communicate and make information. As we can see in the output below, I entered the configuration mode for the interface and switched it on. To verify, I will ping the PC1 host from PC3. enabling the G0/1 interface on R3The pings were received successfully on R1. We abide entered multiple devices in the networks and by doing this we amaze learned information about the network.PC3 pings PC1By using the command prompt I was able to find the status of the devices in this network. This section will be about fear in a network that will need to be carried out frequently for the network to run efficiently.In this section, I will be showing how to create and delete a user account on Windows 10. Firstly, from the Start menu go to Cont rol Panel or alternatively, type Control Panel in the search bar.Once it has opened, pick out the substance abuser Accounts section. From that section divide the Add or remove user accounts option. Once you have entered the next window, riffle on Add a vernal user in PC settings to create a new user. This will direct you to PC settings.Now that you are in PC settings, select Add someone else to this PC. This will require the new users email address or phone number to create an account with their Microsoft account.Once you have created the account, it will look like this. You will be presented with the option flip-flop account type which will allow you to change the account type. You can give the user administrator rights or leave it as the default setting standard user.You can remove the account as easy as it was to create it. You can simply press the remove button. in that location are many antivirus software applications that can be used. I have chosen McAfee LiveSafe to re gister this PC. The interface is very simple and easy to use.Firstly, I launch the application from the Start menu. Secondly, I click the Virus and Spyware certificate section. Within this section, you can see the date of the last look and the next scheduled scan. This is very useful as it automatically does scheduled scans to nurture your PC. To manually scan your PC, click the Scan your PC option. Once you click it, you can choose to run a quick scan, full scan or a custom scan.Once a full scan is done it will look like this. It outlines how many issues were found and how many files it searched. If any viruses were found it would automatically remove them from the PC.computer complementFile co-occurrence is crucial for every PC because if any of the files become corrupt or are deleted, they will be saved. This is very important in businesses and individual(prenominal) computers as mountain must keep their files safe in persona of any damage. This can be done very easily on Windows 10. Firstly, go to Settings, then Update security, from this section there is a Backup section.Once you are in the Backup section, click More options and select See advanced settings.From the File History window, once you plug in an external hard drive, you can select a folder to backup from. This will then give you the option to select how often you fatality it to backup your files.RestoreTo deposit a backup that you saved onto a hard drive, return to File History so you can bear upon your files using the Restore personal files option on the sidebar. Once it has opened you will be able to select the files you had backed up and restore them to a drive on your computer.How to keep it secureVPN accessA VPN (Virtual Private Network) allows companies connect their branches from all over the world. VPN is a network used through the internet that allows a private connection between users. You can keep information within this network secure by configuring a password and encryp ting it on both ends. This will not allow people to see what is going on in the network unless they have the password.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment