Tuesday, August 14, 2012

Sunshine Coast




Friday, July 6, 2012

802.1x for FortiOS


A, client side. how to enable 802.1x on win 7.

To enable 802.1X on a wired network

You must be logged on as an administrator to perform these steps.
To complete this procedure, you must first enable the Wired AutoConfig service, which is turned off by default.
  1. Click the Start button Picture of the Start button, and then, in the Search box, type services.msc, and then press ENTER. Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
  2. In the Services dialog box, click the Standard tab, right-click Wired AutoConfig, and then click Start.
  3. Open Network Connections by clicking the Start button Picture of the Start button, clicking Control Panel, clicking Network and Internet, clicking Network and Sharing Center, and then clicking Manage network connections.
  4. Right-click the connection that you want to enable 802.1X authentication for, and then click Properties. Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
  5. Click the Authentication tab, and then select the Enable IEEE 802.1X authentication check box.
  6. In the Choose a network authentication method list, click the method you want to use.
    [Note] I am using PEAP which works with FortiOS.

   
   7. PEAP setting. 
         7.1-Uncheck "validate server certificate"
         7.2- EAP-MSCHAP v2  (Config: don't use windows logon)
         7.3-Enable fast reconnect
   8. Additional setting: 
         8.1 specify auth method:  user authentication
         8.2 save credential (jkxxx/qa6xxxxx)

   B, FortiOS side:
config system interface
    edit "switch"
        set vdom "root"
        set ip 3.2.4.111 255.255.255.0
        set allowaccess ping https ssh snmp http telnet fgfm auto-ipsec
        set type physical
        set security-mode 802.1X
            set security-groups "remote_auth"            
    next
end

#802_1x # d debug application fnbamd 255
_1x #
802_1x # fnbamd_fsm.c[1395] handle_req-Rcvd auth req 5636109 for host/jkxxx-Win7 in remote_auth opt=256 prot=4
fnbamd_radius.c[971] fnbamd_radius_auth_send-Sent radius req to 172.18.9.28: code=1 id=16 len=173 user="host/jkxxx-Win7" using MS-CHAPv2
fnbamd_auth.c[582] auth_tac_plus_start-Didn't find tac_plus servers (0)
fnbamd_auth.c[323] ldap_start-Didn't find ldap servers (0)
fnbamd_auth.c[1843] fnbamd_auth_handle_radius_result-->Result for radius svr 172.18.9.28(0) is 1
fnbamd_comm.c[146] fnbamd_comm_send_result-Sending result 1 for req 5636109
fnbamd_fsm.c[1395] handle_req-Rcvd auth req 5636110 for jkxxx in remote_auth opt=256 prot=4
fnbamd_radius.c[971] fnbamd_radius_auth_send-Sent radius req to 172.18.9.28: code=1 id=17 len=163 user="jkxxx" using MS-CHAPv2
fnbamd_auth.c[582] auth_tac_plus_start-Didn't find tac_plus servers (0)
fnbamd_auth.c[323] ldap_start-Didn't find ldap servers (0)
fnbamd_auth.c[1843] fnbamd_auth_handle_radius_result-->Result for radius svr 172.18.9.28(0) is 0
fnbamd_auth.c[1867] fnbamd_auth_handle_radius_result-Skipping group matching
fnbamd_comm.c[146] fnbamd_comm_send_result-Sending result 0 for req 5636110





Thursday, June 21, 2012

Grouse Mountain Dining

http://www.grousemountain.com/the-observatory

step 1:

Dine at The Observatory

Your Grouse Mountain Admission is complimentary with advance dinner reservations and includes admission to the Skyride and mountaintop activities such as Ranger Talks at the Wildlife Refuge, Scenic Chairlift Ride, and the Theatre in the Sky. 


step 2: reservation

Hours of Operation

The Observatory is open for dinner 7 nights a week from 5pm-10pm. An Alpine Experience ticket for your each member of your dinner party is complimentary with advance dinner reservations and includes admission to the Skyride and mountaintop activities such as Grouse Mountain’s Theatre in the Sky. Please call 604.980.9311 or reserve online. 
 
 
 

Sunday, June 10, 2012

Tennis tutor

-1, helpful video step by step:
如果刚入门,首先推荐汤姆爱弗瑞的网球教学片,讲基本动作和纠正,是比较基础的;
如果这个觉得太浅,就《尼克网球教程》,教父级的指导。
如果还觉得浅,那就央视5运动空间那套系列片,这片子涉及一些战术运用了。



汤姆网球教程-1,基本技术

-lesson 1, grip
为了击球是球拍垂直,半西方,西方最容易。


-lession 2, backswing is crucial for consistency 引拍是稳定的关键。
拍面略微关闭。击球时从下向上,保证垂直击球。


-lession 3, why the balls go in the net? how to correct it? 解决下网问题。
200 mile/h 才能使得平击球过网。所以要从下向上。 降低重心 曲膝。
小臂动了, 球就没了。
用手腕和小臂打球是头号杀手。
击球时球拍降低一尺,肩膀到下巴  (每个动作1-2要领) 拍面向下,起来。 垂直接触球。

-lession 4, why the ball goes long. 拍面太开

-lession 5, 保持垂直拍面的练习。 对着网或墙,挥拍

-lession 6, 截击, 下网原因: 没侧身, 没动脚。 目标网上1-1.5米位置。 左手托拍(帮助转身)。向前击球。

-lession 7, serve.  in the net. 向上击球,抬头挺胸。 向上刷7点到1点。 瞄准底线。
-lession 8, serve goes long. 抛球向后。

-lession 9, overhead goes in the net.  头过早低下。 抬头挺胸, 向前击球。可能2, 低估网的高度。抬头挺胸,多等一下

-lession 10, 


===================================

汤姆网球教程- 2,单双打战术
网中间91公分,两边102.

-lession 2, 截击技术

-双打抢网: 45度向前抢网。
肘关节远离身体。
反手切削只能打开5-10度。
=======================================
汤姆网球教程- 3, 发球

侧旋球水平方向, 削的薄,有人甚至打到框上。

上旋 7-1点, 练习: 左手手掌托球,右手持牌撮球。
伸直手臂, 多等一下 (抛球手)



Wednesday, June 6, 2012

Tennis

 

如何选择儿童网球拍

 


    年龄段                球拍长度
         0-4
周岁                  19英寸
         4-6
周岁                  21英寸
         7-8
周岁                  23英寸
         9-10
周岁                25英寸
         10-12
周岁              26英寸
         12
周岁以上           成人拍长度

对初学者尤其是儿童来说,选择好网球拍是很重要的,现在的网球拍在形状、长度、重量、材料、头部尺寸、厚度以及串线模式方面种类繁多,很多家长在选择儿童网球拍的时候无从下手,在这里,我介绍一些选择要素,希望对家长和孩子们有所帮助。
       
先让我们把选择范围缩小,首先决定你要选择网球拍的正确长度。
       
从一般原则上来讲,一个初学者应该选择握起来比较舒服的网球拍。这使他能够利用力量转换和肌肉的协调比较顺利的击球。球拍太小会使手腕和肘部过度运动,从长远来看,这一点会影响击球并且伤害他的手臂。一旦体重达到39公斤左右,他就可以使用成人球拍了。
       
标准的球手年龄和球拍长度的搭配如下图所示,但你也应该考虑一些额外因素对此进行调整。如果一个8岁的儿童长了10岁儿童的个头,他就应该选择10岁儿童 应该使用的球拍长度。如果他的力气比较大的话,也应该把长度上调12个单位,但是没有必要因为力气小而下调长度。现在的初级球拍都是很轻的,即使他力气 再小,也能挥得动为他的年龄所设计的球拍。经验也是一个因素。图中的数据都是假定儿童为初学者,在有经验的情况下通常使用比图中数据大一两个单位的球拍是 最好的,使用这种长度的球拍会令他们有足够感觉呈现完美击球。
 
然后,我们来考虑球拍的重量问题。
        现在成人球拍的重量轻达227克,但轻于284克的球拍可以适应的相应重量的网球却很少。我发现平均年龄为12岁的选手使用重量为284克到326克的球 拍正合适。网球初学者仅凭一次球场上的演示无法对球拍做出坚定的选择,但如果在两个重量的球拍之间无法选择时,下面这个测试可以帮助他做出决定。让他把球 拍举到身后,使球拍顶部接触到他背部下方,这时他的手肘部分处于胳膊的最高点。然后让他把球拍慢慢挥动着举到头上方,如果球拍对他来说太重的话,这就是他 需要感觉的地方了。
        初学者淘汰球拍的频率比较高,好在儿童网球拍价格一般不贵。像BABOLATWILSON这些儿童网球拍做得比较好的品牌折后价格一般在200—600 元之间。检查球拍质量的最笨的办法就是用你的拳头的骨节重击球拍上的线来感觉它的韧性。一定要避免买那种虽然便宜但重量很轻而且弹性很大的球拍。
        这里主要讨论了儿童网球拍选择的长度和重量问题,以后的文章会向你们阐述需要考虑的其他因素。


不同等级球手如何控球?(一)

 

 一、初学者

目标:获取基础性的控球能力



短距离击球练习是初学者掌握控球能力的快捷方式。训练开始时,初学者要先站在发球区内靠近球网的区域,在对面球场相同位置放置一个标靶。你和你的球拍,连 同对面的标靶都需要处在发球区的中线上,这样一来你就没有任何角度上的难度了。接着你就可以用正拍将球送过球网,争取打中对面的标靶10次。

在打中标靶10次之后,你就可以增加点儿难度了。在不改变击球线路的前提下,人和标靶同时稍向后退一点儿,但别走出发球线,打中10次标靶后再一起向后退 一点儿。在你已经后退到发球线的时候,停止正拍练习,回到最早开始的位置,改用反拍做同样的练习(如果你有个同伴能在对面给你喂球的话,这种方法也适合水 平较高的球员练习截击)。一旦你可以轻松地在任何位置上打中标靶10次,就可以逐渐退到底线附近开始和别人练习底线球了。如果很想体会竞技感觉的话,不妨 先参加些短式网球的比赛。用不了多长时间你就可以成长为一个真正的网球好手了



二、中级水平

目标:在拥有良好控球能力的基础上增加击球的旋转


对中级水平的人来说,在发球线以内维持住回合球已是小菜一碟。现在是到了该磨练线路和较深落点的时候了。站到底线以内(不进入发球区)和同伴练习打正拍斜线球,几分钟之后再换到反手位置继续打反拍斜线球。

如果你已经能适应这种训练了,就继续退到底线以后,同时增加击球的深度(这恰恰是网球制胜的最佳手段)。你可以和同伴进行一种特殊的比赛来磨练击球的深 度。两人均站到底线附近,对拉斜线和直线球,要求是必须将球打进底线以内的后场。如果谁的回球落在了发球区之内,就视为出界,输掉一分;如果你能够连续五 次将球打入发球区的话,就可以得到一分;先得到21分的就算赢。保证落点深度的一个重要的方法就是要控制好球的飞行高度,让它飞过球网上空较高的位置,这 一点在双打中尤其重要,因为你还要防止网前球员的封杀呢。


现在是不是感觉自己的击球已经像模像样了,那就开始练习加快挥拍的速度吧。处在这一阶段,你已经可以学习打上旋球了。因为使用上旋击球的方法不仅可以施加 更多的力量,还可以大幅减少失误。为了找到打上旋的感觉,你可以让挥拍沿一个圆弧的轨迹移动,击球前让拍头处在来球的下方,再向上迅疾地刷过球的上部。开 始学习打正拍上旋球的时候最好先只打斜线球(这样相对较容易些),等成功率提升后再尝试用上旋技术打直线。



三、高级水平

目标:学会在压力下控制球路,游刃有余地处理对手击球速度和旋转的变化

处于高水平的球员应当已经学会了各种击球技巧,现在需要提高的是如何在不同的情况下自然而然地运用到相应的技术。能打出上旋高球是一回事儿,但能否在需要的时候打出上旋高球可就是另外一回事儿了。要想达成这一目标,没有场下反复的练习和比赛场上多次实践是不行的。

不过高水平球员在提高过程中最大的挑战是来自于同样也在提高的对手。此阶段打球的主要战略是用更多的旋转和速度变化来限制对手的发挥,当然较高的成功率仍 然是前提。如果你赶上对手犀利无比的发球或是正拍,要想接得到位也绝非易事。在这种对抗压力下,尽可能保证击球质量对高水平球员来说尤为重要了。比如,通 常我们的击球动作都由三个部分组成:转肩、引拍和挥拍击球。但当你需要打出更加迅猛的回球时,就完全可以将其中的某个环节简化或是合并。转肩当然不能改 变,但却可以将引拍和挥拍击球之间的间隔去掉,一气呵成地完成两个动作,更快地击球,为自己争取到更多的时间,抢到更好的击球点。

在高水平球员之间进行的比赛中,球的速度会很快,所以我建议大家在训练的时候为可能的失误提前打出富裕。当然,处在高水平阶段,你自然可以打出刚好压在边 线上的好球,但那要冒的风险毕竟太大了。其实,只要能用强烈上旋将球控制在底线附近较深的位置高高反弹的话,即便落点就在中场,也不会让对手捡到半点便宜 的。我这里介绍一种有趣的训练方法,你可以在两侧单打边线以内半米的位置上用粉笔自己画上一条边线。然后再要求练习者以那条线为“真正的”边线进行比赛。 现在,即便他们将球打出了“边线”不要紧了,只要出去的不多就仍可以将比赛继续下去。
 





=========================================

细说初学网球的“六字十二点”

 

一、 轻:

1、球要轻。根据不同的年龄段要选择不同的网球,就是成年人在初学网球时,最好选择气压低的球练习球,有的叫“低压球”、“过渡球”“软球”和“迷你球” 等。如果没有这样的球,可将标准球(旧球)挫一个洞,使内部气压降低,也可代替使用。气压的球,在击球的瞬间,对球拍的振动小,控制能力就提高,来回球就 多。在国外使用这样的球作为“球感训练”,从04年我先国外带回部分彩色低压球(现在国内也有)使用至今,教学效果还可以。这也是李德添老师提倡的“简易 法”中希望使用“过渡球”教初学者使用的球。

2、球拍要轻。球拍要根据学员的年龄、性别等因素考虑,选择相对较轻的球拍,以减缓肌肉的疲劳程度,也可减轻手臂的负重,从而就易控制球。

二、近:

1、距离近。对于初学网球的学员来说,特别是第一节课,学员对打网球的感觉是“盲点”,同时又是对能否再坚持学网球的关键。通俗的说法叫“兴趣”,有了兴 趣才有信心学下去。此时的教学,就先近后远的培训原则,距离近是关键。距离近是指教练与学员相对击球的距离。先在半场内无网对练,但要提示学员中间有假设 球网,击球的抛物线要高。由于是无网训练,来回球的次数多,球感和步伐意识提高很快。这就叫“球感训练”。再逐步过渡到隔网近距离到远距离的击球训练。这 就是李德添老师说的小小场地、小场地到大场地。

2、语言要亲近。多使用鼓励性语言,激发学员的积极性,增强学员的自信心。不能使用批评性语言,更不能使用蔑视、责骂的语言。由于有激发性的作用,会调动视神经系统,注意力就会提高,击球的准确性就好。

三、慢:

1、速度慢。击球的力量不能大,速度要慢,抛物线要高。留给学员准备击球的时间就多,击球的质量就提高。

2、动作慢。初学者都有加速挥拍的特点,用力大。一定要提示挥拍动作要慢,球速就减慢,控球就好。

四、松:

1、心松。告诉学员身心一定要放松,不要太紧张,更不要在乎一两个没击好的球,或别人的感受。是否紧张,可通过手在握球拍时看指甲是否发白,白就是紧张的表现。用深呼吸的办法调节心理紧张的情绪。心情放松,动作就不会僵硬,击球的方向性就好。

2、体松。心理的放松才有身体神经、肌肉等松弛。肌肉的放松,会储备能量,在击球时的肌肉收缩会更加握紧球拍,对拍面的控制会更加稳定。

五、动:

1、心动。要提示学员用心打球,体会感受击球的感觉,协助分析击球的效果,培养学员逐步自我分析,增强球感意识、击球意识、动作意识。教练在作出示范动作 后,要让学员不仅模仿练习,更主要的是闭目模仿练习,在大脑中像放电影一样,闪念教练的示范动作。闭目模仿和心理模仿是一般性模仿的十倍以上的神经系统记 忆储存能量。

2、身动。全身要动,需要协调性,连贯性。特别是脚步的移动对以后的击球效果至关重要,移动是培训击球距离感的最佳手段。网球是用“脚”打球的比喻。

六、易:

1、动作要简易。对初学者来说,从准备动作到击球结束。先不要要求都做到,这样作会分散关注力,造成大脑在击球时视神指挥系统的紊乱 ,让记忆无法存储。结果影响击球效果。

2、教学方法要先易后难。如先提示学员在击球时的拍面角度是首要的,其它的随学员水平的提高不断增加。
 

=============================

初学者正手速成

 

 

1、 握拍必须正确,主要握拍方法有东方式,大陆式,西方式。其中东方式又包括东方正手握法及东方反手握法。此外,还有双手握法,不同握法打出不同特点的球。不 管用何种握拍方法,都要做到握拍的手腕牢牢固定,与球拍几乎成90度,这样击球时能将手臂乃至全身的力量通过手腕传递到拍面上,向后引拍时,另一只手臂向 反方向挥动,以保持身体平衡。在挥拍击球前,另一只手则要扶着拍颈,以减轻握拍手臂的负重,同时握拍的手可充分放松,在挥拍击球时再握紧拍柄。

  2、眼睛要集中精力盯住球,当在对方拍下时,就要开始 盯着它,判断运动的轨迹,然后开始移动身体一直盯球过网到自己的半场,调理好击球的姿势,开始击球。眼睛再盯着球被球拍击出,目光随着球又转移到对方的半场。

  3、击球前的一瞬间,不能正面对着球网,而是先侧身,以肩膀的一侧对着球网,而身体的正面与球飞行的路线平行,这样可击出速度快,落点准的球。

  4、在球向自己一方飞来时,一边侧身,边尽早地将手臂向后摆动,形成有推动力的弧线,使球拍与球轻松和谐地接触,将球从下往上斜推过网。如果你想让球飞得更快,就应在球拍触球时加力,使球产生加速度。

  5、双腿要不停的保持运动状态,以腿部的运动来寻找最佳的击球位置,但在击球的一瞬间要及时“刹车”,站稳脚跟,这样击球才会准确有力。

  6、身体尽量保持低位蹲式,重心低才能移动快,这对于打球尤其重要。保持低位,只是要将两腿微微岔开,双膝弯曲,而上身要尽量保持垂直状态,胸部略微向前但不要弯腰,两眼直视前方。

  7、应站在底线中点附近等对方击球,根据来球的路线调整击球的站位,尽量把球打到对方的后半场,然后恢复原来的站位。当对方来球较浅时,可上前随击球并上网,或退到底线,不可站在底线与发球线之间等球。

  8、击球的位置最好是在身体的斜前方,高低与髂平行,球拍击球的一刹那与球飞行的方向垂直。


  对于初学者来说,有这8条就可以了,要特别认真地对待这几条管你可能成为“顶尖高手”,而且有着自,严格按照这8条来训练。当你已经学会了打网球,这几条就成为你下意识的自觉行为。你会在以后的进步中发现,尽己独特的打法,但是这几条要领却永远与你的网球生涯同在。
 

===========================

怎样像职业选手一样快速移动

 1、在你的对手触球前做一个“小整步”

“小垫步”就是由准备姿势开始的,在原地双脚离地的一个“小跳”。双脚离地时,其间距与肩间宽。“小垫 步”是形成快速启动和保持身体平衡的关键。

你的对手每次触球前你都应该做这样的“小垫步”。掌握好时机是个关键。做“小整步”的时候应该恰恰是对手挥拍向前的时候。当球从你的对手球拍上击出时,你应该仍然停留在空中。当你落地时,你的眼睛恰好可以告诉你球的方向。落地前,你的双脚是不应该同时着地的。

落地前,你的大脑应该已经判断出来球的方向,并且会“下意识” 地决定哪一只脚先落地,以便迅速启动,使身体移向正确的方向上。你可以左脚先着地,也可以右脚先着地。

做“小垫步”的另外一点好处是,当对手将球击出时,“小垫步”能够使你更加注意对手的击球,使你能够最大限度地对来球作出预测和判断。

2、完成:、“小垫步”后的一组移动

在“小垫步“后应该立即转为一组连续的移动。当你完成“小垫步”着地后,向你准备移动的方向跨出同侧的脚。即如果你向左侧移动,你就需要跨出左脚;而你如 果要向右侧移动,就应该跨出右脚。并且在你跨出脚的时候,你的后和臀部也应同时转向同一方向。这 时你就会保持身体的平衡,并且能够向来球的方向启动。

3、采用开立姿势抽球

在过支的10多年里,大多数网球运动员在正手击球时都采用开立姿势,其中一部分原因就是采用开立姿势能够让你速转向并返回场地中央。如果你被对手的来球逼迫到场地外侧,但还不至于全速疾跑,就需要将后脚站稳,并且在回球时让身体得心落在后腿上,便于尽快回位。

如果你必须采用快速奔跑去回球,为抑制你身体前冲的惯性,你可以采用一个并步小跳,上你的后脚迅速地将身体制动,然后扎住后脚,前脚的方向与你移动的方向一致。击球后,后脚蹬地,前脚向场地中央的方向跨出,迅速准备回击下一个来球。

如果你的技术水平已经比较高了,在反手击球时也可以打用开姿势。同样,后脚需要站牢,必要时也可以采用一个并步小跳。击球后,后脚向相反的方向蹬出,以便 到场地中央。今天,双手握拍反手击球的选手中采用开立姿势的要多于单手击球的选手,但这种站姿在单手握拍的选手中也越来越流行。 

4、只有情况危急时才采用急速跑

有时当你回击来球后,你的位置已远离下一个来球,你必须快速调转方向,向下一个来球方向快速奔跑,这时你的身体也必须转向同一个方向。所以当来 球打在你的身后,你就几乎没有机会调转方向去回球。因此,除非你处于非常因难的境地,否则不要采用急速跑,当然如果你能够确定你的对手将会把球打到场地外 侧,你可以向那个方向疾跑。

5、采用两步跳从急速跑中回复

如果你被迫采用急速跑去回击正手球,你应试图在击球时将身体重心留在后腿上。因为你身体有惯性的原因,你会紧接着做一个两步跳,第一步是你的前脚,第二步 是你的后脚。紧接着第二步,站稳后脚并蹬地转向相反的方向。因为你疾跑后远离场地中央,向回跑需要的时间相对较长,这时你需要像职业选手一样做一件或两件 事,以便从中解困;回击一个防守球,以便给自已较多的时间归位,或者打出一个制胜球。

采用急速跑回击反手球时,应该你的前腿外侧回球,然后脚跟上制动、蹬出、变向。同正手击球一样,你应该根据情况回击一个防守球或制胜球。


============================================
 课程

初学:学习底线正手、底线反手、反手削球,教会网球规则,初级战术打法、运动保护等相关知识 (适合无任何网球练习者或者基础薄弱)
中级:学习发球,网前正反手截击,网前高压球。场地对打,高级战术。
高级:学习上下旋击球、挑高球、中场截击、侧旋发球,模拟比赛。
赛前培训:实战比赛,战术指导,比赛相关辅导
1 步法,东方式反手握拍,半西方式正手握拍,大陆式握拍,击球练习
目标:Stage1正确了解和掌握正反手握拍姿势,原地击球动作,移动击球动作。
2 正手平击抽球 反手平击抽球
3 正手上旋抽球
4 正手截击球,反手截击球
5 放小球,挑高球
6 初级发球——平击球
7 高级发球——上旋发球与侧旋发球
目标 :Stage2
通过循序渐进的学习,可以让学员达到与教练进行底线对打的水平。在掌握正反手底线对打技术的基础上,进一步学习正反手网前截击、上手高压发球的握拍方法及击球动作,学习综合脚步动作结合正反手移动击球,进一步加强学员底线对打的能力。



 

Friday, May 25, 2012

350-001 Routing & Switching .

Day 1, May 23, .

Q1, In order to maintain security, with which hop count are IPv6 neighbor discovery packets sent?
[A]A suggestion (RFC 3682) of using a "hop count of 255" has only rather limited value.

 Q2, Which command will define a VRF with name 'CCIE' in IPv6?
 [A] vrf definition CCIE

 Q3, LDP advertise which route?
 [A] IGP

 Q4, Which command can be used on a PE router to connect to a CE router (11.1.1.4) in VRF red?
[A] telnet 11.1.1.4 /vrf red

 Q5, The routing inside the VPN RED will work without any special OSPF configuration

 Q6, Which two statements are correct about Nonstop Forwarding? (Choose two.)
[A] B. It is a Layer 3 function that works with SSO to minimize the amount of time a network is unavailable to users following a switchover
E. The main objective of NSF is to continue forwarding IP packets following a switchover SSO=> stateful switchover

 Q7, Which three fields are optional in an OSPFv3 external LSA? (Choose three.)
 [A] A. Forwarding Address B. External Route C. Reference Link-State ID

 Q8, On a router, interface S0 is running EIGRPv6, and interface S1 is running OSPFv3. A redistribution command is issued under OSPFv3, redistribute EIGRP 1 metric 20 under ipv6 router nospf 1. What will happen after applying this redistribution command?
[A] All routes showing up as D and D EX in the routing table will be redistributed into OSPFv3.

 Q9, Which type of domains is interconnected using Multicast Source Discovery Protocol?
[A] PIM-SM 

Q10, Which two multicast address ranges are assigned as source-specific multicast destination addresses and are reserved for use by source-specific applications and protocols? (Choose two.)
[A] 232.0.0.0/8 and FF3x::/32

 Q11, How is RPF used in multicast routing?
[A] to prevent multicast packets from looping and to instruct PIM where to send a (*,G) or (S,G) join message

 Q12, What does the incoming interface of the above (*,G) entry indicate?
 [A] the interface closest to the RP, according to the unicast routing table

 Q13, Which interface(s) will show ip rpf 1.1.1.2 indicate as RPF interface(s)
[A] ethernet 1/0

 Q14, Apart from interdomain multicast routing, what else is MSDP used for?
[A] anycast RP

 Q15, Which IGMPv2 message contains a non-zero "Max Response Time"?
A. Membership Query

 Q16, Which IGMPv2 message is displayed in the output of the packet capture?
B. Membership Report 

Q17, What is Phantom RP used for?
B. it is used for redundancy in bidirectional PIM

 Q18, Which three statements are true about TACACS+? (Choose three.)
A. It is a Cisco proprietary protocol. C. Authentication and authorization are done at different stages. D. TACACS+ encrypts the entire body of the packet, but leaves a standard TACACS+ header.

 Q19, Which two statements are correct? (Choose two.)
B. The access list has logging enabled. D. The command ip access-list logging hash-generation is enabled

 Q20, C. NTP is not configured on the router.



Q21, What does Cisco recommend when you are enabling Cisco IOS IPS?
A. Do not enable all the signatures at the same time

Q22, B. OSPF peers are using Type 2 authentication. (MD auth)

Q23, Which two statements are true about Unicast Reverse Path Forwarding Loose Mode? (Choose two.)
A. It is used in multihome network scenarios.
B. It can be used with BGP to mitigate DoS and DDoS.


Q24, ##aaa authentication login default group tacacs+ none.
D. If the TACACS+ server failed, no authentication would be required

Q25, Which three protocols should be explicitly managed by using a CoPP policy on an Internet border router? (Choose three.)
B. ICMP
C. BGP
D. SSH

Q26, What is true about IP Source Guard with port security?
C. The DHCP server must support option 82, or the client is not assigned an IP address



Wednesday, April 11, 2012

TC Command Sequencer from T1728

a, start



b, edit sequence


c, ARP learning


d, IGMP join.

Wednesday, April 4, 2012

Multicast Latency TTC

a, temporary license

b, port1 simulated the client side and need to enable the access protocol




c, server side just regular setup for device, but need to config "Traffic Generator"





d, latency parameter







Tuesday, April 3, 2012

TCC Latency Test, Step by Step






























============================


Report:


Thursday, March 15, 2012

Tax

StudioTax:

1, import the last year data (SIN, name, company)
2, T slips
---2.1 T4
---2.2 RC62 (child care)
---2.3 T4E EI
---2.4 T5 Interest
3, RRSP/HBP
4, Dependant (fitness, art..)

Check:
T1 General => T1 page 2, 3 , line by line ,. T1 page 4: result

UFILE: ufile.ca username: emailaddress/passwd: same as gmail
1, interview
---1.1 T4
---1.2 RRSP
---1.3 HBP (home buyer plan)
---1.4 UCCB (RC62)
---1.5 Child care, fitness,art....

Thursday, March 1, 2012

SSL Protocol

在该部分,将上图所示的示意图进行说明。为了说明的方便,在本文中称客户端为B,服务
器端为S。
STEP 1: B——〉S(发起对话,协商传送加密算法)
你好,S!我想和你进行安全对话,我的对称加密算法有 DES,RC5,我的密钥交换算法有
RSA 和DH,摘要算法有MD5 和SHA。
STEP2: S——〉B(发送服务器数字证书)
你好,B!那我们就使用DES-RSA-SHA 这对组合进行通讯,为了证明我确实是S,现在
发送我的数字证书给你,你可以验证我的身份。
STEP 3: B——〉S(传送本次对话的密钥)
(检查S 的数字证书是否正确,通过CA 机构颁发的证书验证了S 证书的真实有效性后。
生成了利用S 的公钥加密的本次对话的密钥发送给S)
S, 我已经确认了你的身份,现在将我们本次通讯中使用的对称加密算法的密钥发送给
你。
STEP4: S——〉B(获取密钥)
(S 用自己的私钥解密获取本次通讯的密钥)。
B, 我已经获取了密钥。我们可以开始通信了。
STEP5: S<——>B(进行通讯)
说明:一般情况下,当B 是保密信息的传递者时,B 不需要数字证书验证自己身份的真
实性,如电子银行的应用,客户需要将自己的账号和密码发送给银行,因此银行的服务器需
要安装数字证书来表明自己身份的有效性。在某些B2B 应用,服务器端也需要对客户端的
身份进行验证,这时客户端也需要安装数字证书以保证通讯时服务器可以辨别出客户端的身
份,验证过程类似于服务器身份的验证过程。



此外需要说明的是,在一些电子商务的应用中,可能还会使用到电子签名,或者为了信
息交换的更加安全,会增加电子签名和消息校验码(MAC)。
为了便于了解SSL,下面在简要介绍一下信息加密相关知识。使用密钥类型加密信息的加密
算法可以分为以下几类:HASH 编码、对称加密和非对称加密三类。
HASH 编码是使用HASH 算法从任意长度的消息中计算HASH 值的一个过程,HASH 值可
以说是消息的指纹,因为对于任何不同的消息,几乎总有不同的HASH 值。因此在SSL 通讯
过程中,可以对消息的HASH 值进行加密,确保传递的消息在传输过程中没有被修改。
非对称加密或称之为公钥加密使用数学上相关的两个数值来对信息进行编码(加密),
其中一个数字称为公钥,另一个称为私钥。公钥加密的信息可以用私钥解密,私钥加密的信
息可以用公钥解密。由于公钥可以大面积发放,因此公钥加密在SSL 加密通信中应用于对密
钥的加密或者进行数字签名。
对称加密和非对称加密相比的区别在于对称加密中,加密信息和解密信息使用同样的密
钥,因此该密钥无法公开。但是其具有加密、解密快速的特点。
在SSL 通讯中,首先采用非对称加密交换信息,使得服务器获得浏览器端提供的对称加
密的密钥,然后利用该密钥进行通讯过程中信息的加密和解密。为了保证消息在传递过程中
没有被篡改,可以加密HASH 编码来确保信息的完整性。








Friday, February 10, 2012

T1672-T1682 LACP in details.

a, topology:

FG-A =====----- Nexus-A
|.......\.../....|
|........\./.....|
(ha)........X......|
|......../.\.....|
|......./...\....|
FG-B =====----- Nexus-B


b, LACP.
--1, output from FGT side.
5060-s1 # d switch fabric-channel trunk list 156Trunk
Switch Trunk Information, fabric-Channel
Trunk Name: 156Trunk
Port Selection Algorithm: src-dst-ip

Active Port Update Time
___________ ____________________

f2 04:17:25 Aug-16-1985
f3 03:39:07 Aug-16-1985

Non-Active Port Status
_______________ ____________________

LACP flags: (A|P)(S|F)(A|I)(I|O)(E|D)(E|D)
(A|P) - LACP mode is Active or Passive
(S|F) - LACP speed is Slow or Fast
(A|I) - Aggregatable or Individual
(I|O) - Port In sync or Out of sync
(E|D) - Frame collection is Enabled or Disabled
(E|D) - Frame distribution is Enabled or Disabled

status: up
ports: 2
LACP mode: active
LACP speed: fast
aggregator ID: 1
actor key: 1
actor MAC address: 00:09:0f:62:0d:d2
partner key: 1
partner MAC address: 00:22:56:b9:6e:40

slave: f2
status: up
link failure count: 2180
permanent MAC addr: 00:09:0f:62:0d:d2
actor state: ASAIEE =>FSW works as Active, slow,Aggregate, in sync, collection enabled and distribution enabled.
partner state: PSAIEE =>Nexus works as passive, slow,Aggregate, in sync, collection enabled and distribution enabled.
aggregator ID: 1

slave: f3
status: up
link failure count: 2172
permanent MAC addr: 00:09:0f:62:0d:d3
actor state: AFAIEE
partner state: PSAIEE
aggregator ID: 1


5060-s1 #


========================
output from ticket:
Active Port Update Time
___________ ____________________

f1 15:42:50 Feb-09-2012
f2 15:53:00 Feb-09-2012

...

actor state: ASAIEE
partner state: PFAIDD ==> Nexus is passive, fast mode, in sync, but collection disabled and distribution disabled.

FGT will send the traffic to the peer since the trunk is under the condition that distribution enabled. packet lost.


fast|slow is the setting to tell the peer how fast it should send LACP bpdu out.
FSW:
set lacp-speed fast
Cisco:
lacp rate fast ( not support in 4900)

Wednesday, February 8, 2012

python video list


python programming Tutorial
1, installing
2, numbers and math
3, variables
4, Modules and Functions
5, how to save your program
6, string
7, More on Strings
8, raw input
9, sequence and list
10, slicing
11, editing sequence
12, more list function
13, slicing list
14, intro to method
15, more method
16, sort and tuples
17, string and stuff
18, cool string method
19, dictionary
20, if statement
21, else and elif
22, nesting statement
23, comparison operator
24, and and or
25, for and while loop
26, infinite loops and break
27, building function
28, default parameter
29, multiple parameter
30, parameter type
31, tuples as parameter
32, object oriented program
33, class and self
34, subclass and superclass
35, overwrite variable on sub
36, multiple parent classes
37, constructor
38, import modules
39, reload the module
40, getting module info
41, work with files
42, reading and writing
43, writing lines





Google Class

Day 1 part 1: Introduction and string
Day 1 part 2: List, sorting and Tuples
Day 1 part 3: Dict and files
Day 2 part 1: RE
Day 2 part 2: OS and command
Day 2 part 3: url and HTTP, exceptions
Day 2 part 4: closing thoughts

Sunday, January 22, 2012

CCIE 2012 Renew

1. Which four of these areas can be characterized for network risk assessment testing methodology?
(Choose four)
A. Router hostname and IP addressing scheme
B. Router filtering rules
C. Route optimization
D. Database connectivity and RTT
E. Weak authentication mecharisms
F. Improperly configured email servers
G. Potential web server exploits

2. What does the “authoritative” flag in the show ip nhrp command output indicate?
A. It indicates that information was learned from the source mapping information of an NHRP resolution
request received by the local router or from an NHRP resolution packet being forwarded through the
local router.
B. It indicates an NHRP mapping entry for networks local to this router for which this router has
answered an NHRP resolution request
C. It indicates that the NHRP information was obtained from the next-hop server or router that
maintains the NBMA-to-IP address mapping for a particular destination
D. It indicates that this NHRP mapping entry must be unique; it cannot be overwritten with a mapping
entry that has the same IP address but a different NBMA address.

++Note:To display Next Hop Resolution Protocol (NHRP) mapping information, use the show ip nhrp command in user EXEC or privileged EXEC mode.
++Cisco: LINK
Flags
•authoritative—Indicates that the NHRP information was obtained from the Next Hop Server or router that maintains the NBMA-to-IP address mapping for a particular destination.

NHRP:下一跳解析协议
(NHRP:Next Hop Resolution Protocol)

  下一跳解析协议(NHRP)用于连接到非广播、多路访问(NBMA)式子网络的源站(主机或路由器)决定到达目标站间的 “ NBMA 下一跳 ”的互联网络层地址和 NBMA 子网地址。如果目的地与 NBMA 子网连接, NBMA 下一跳就是目标站;否则, NBMA 下一跳是从 NBMA 子网到目标站最近的出口路由器。 NHRP 被设计用于 NBMA 子网下的多重协议互联网络层环境中
思想类似以太网的ARP,ARP是在一个网段中广播请求/单播应答进行,但NHRP协议穿越非广播NBMA网。

3, Refer to the exhibit From the ASDM NAT Rules table, inside host 10.1.0.4 is translated to which IP address on the outside?
A. 203.0.113.254
B. 192.168.3.3
C. 192.168.3.4
D. 203.0.113.113
E. 203.0.113.114

4. Unicast Reverse Path Forwarding(Uncast RPF) is a protection mechanism that can be used against which of these?
A. TCP session hijacking attacks
B. Brute-force attacks
C. Teardrop attacks
D. Password attacks
E. Birthday attacks
F. Spoofing attacks

5. You run the show ipv6 port-map telnet command and you see that the port 23 (system-defined) message and the port 223 (user-defined) message are displayed. Which command is in the router configuration?
A. Ipv6 port-map port telnet 223
B. Ipv6 port-map port 23 port 23223
C. Ipv6 port-map telnet port 23 223
D. Ipv6 port-map telnet port 223


6. Which three of these are among the implicit IPv6 ACL rules in Cisco IOS allowing ICMPv6 neighbor discovery? (Choose three)
A. permit icmp any any nd-na
B. deny icmp any any nd-na
C. permit icmp any any nd-ns
D. deny icmp any any nd-nn
E. permit ipv6 any any
F. deny ipv6 any any
LINK

7. Hypertext Transfer Protocol (HTTP) version 1.1 introduced several improvements over HTTP 1.0, which resulted in improved performance (faster page displays) for end users. Which three of these of these enhancements were added to the HTTP 1.1 protocol over the HTTP 1.0 protocol? (Choose three)
A. GET requests
B. Persistent connections (reduce CPS load)
C. Selective acknowledgements
D. Chunked encoding
E. HTTP pipelining (reducing network load, get index, eicar in one TCP packet)

++Note from wiki: HTTP pipelining is a technique in which multiple HTTP requests are sent on a single TCP connection without waiting for the corresponding responses.[1] Since it is usually possible to fit several HTTP requests in the same TCP packet, HTTP pipelining allows fewer TCP packets to be sent over the network, reducing network load.
chunked encoding: 如果一个HTTP消息(请求消息或应答消息)的Transfer-Encoding消息头的值为chunked,那么,消息体由数量未定的块组成,并以最后一个大小为0的块为结束。

每一个非空的块都以该块包含数据的字节数(字节数以十六进制表示)开始,跟随一个CRLF (回车及換行),然后是数据本身,最后块CRLF结束。在一些实现中,块大小和CRLF之间填充有白空格(0x20)。最后一块是单行,由块大小(0),一些可选的填充白空格,以及CRLF。最后一块不再包含任何数据,但是可以发送可选的尾部,包括消息头字段。消息最后以CRLF结尾。
example:
HTTP/1.1 200 OK
Content-Type: text/plain
Transfer-Encoding: chunked

25
This is the data in the first chunk
1C
and this is the second one
3
con
8
sequence
0
-----------------------
anatomy:
"This is the data in the first chunk\r\n" (37 chars => hex: 0x25)
"and this is the second one\r\n" (28 chars => hex: 0x1C)
"con" (3 chars => hex: 0x03)
"sequence" (8 chars => hex: 0x08)
decoded:
This is the data in the first chunk
and this is the second one
consequence


================================
8. What is the default TCP port used to remotely manage a Cisco Secure ACS v4.x software application
server?
A. 2000
B. 2001
C. 2002
D. 2005
E. 2020

=================================

9. Before you can configuration Professional, you must do what?
A. Create a default password, and then attach it to the router list in the community map
B. Create a community, and then add devices to that community
C. Create a discovery map, and then bind this map to the community
D. Create a hostname-to-IP-address mapping, and then add this map reference in the community

==================================
10. Which two of these correctly describe the following command?(Choose two)
Aaa authentication ppp user-radius if-needed group radius
A. RADIUS authentication will be used for lines using PPP with CHAP only
B. RADIUS authentication will be used for lines using PPP with CHAP or PAP
C. RADIUS authentication is not performed if the user has been authenticated/authorized

D. If the action returns an error, the user will be allowed access without authentication
E. The user radius keyword specifies that all RADIUS servers are to be used

===============================
11. Which three of these are security properties that TLS v1 .2 provides?(Choose three)
A. Confidentiality
B. Integrity

C. Availability
D. Authentication
E. Authorization

==================================
12. Which three of these are performed by both RADIUS and TACACS+ servers?(choose three)
A. Login authentication
B. EXEC authorization

C. Command authorization
D. EXEC accounting
E. Command accounting

=================================
13. In the context of Cisco Configuration Professional, to discover a router means to establish a session to the router using either secure or nonsecure means, do which of the following, and populate a screen with the information obtained?
A. read the configuration present in the router
B. read the IOS version in the router
C. read the interface(s) information in the router
D. read the CPU information in the router
E. check if the router is UP or Down

====================================

14. When a failover takes place on an adaptive security appliance configured for failover, all active connections are dropped and clients must reestablish their connections, unless the adaptive security appliance is configured in which two of the following ways?(Choose two)
A. active/standby failover
B. active/active failover
C. active/active failover and a state failover link has been configured
D. active/standby failover and a state failover link has been configured
E. to use a serial cable as the failover link
F LAN-based failover

=======================================

15. What is the main purpose of FlexConfig in Cisco Security Manager?
A. to share configuration between multiple devices
B. to configure device commands that are not supported by Cisco Security Manager
C. to duplicate/clone basic configuration of a device
D. to merge multiple policies into a simplified view
E. to configure complex commands for a device

========================================

16. The communication between Cisco Configuration Professional and a Cisco router is secured using which of these?
A. IPsec
B. ESP
C. SSL
D. GDOI
E. Cisco proprietary encryption

==========================================

17. Which of these is a core function of the risk assessment process?
A. performing regular network upgrades
B. performing network optimization
C. performing network posture validation
D. establishing network baselines
E. performing network roll-outs

========================================

18.ASDM on the Cisco ASA adaptive security appliance platform is executed as which of the following? Select the best response.
A. an ActiveX application or a JavaScript application
B. a JavaScript application and a PHP application
C. a fully compiled .Net Framework application
D. a fully operational Visual Basic application
E. a Java applet or a standalone application using the Java Runtime Environment

Table 1-1 lists the supported and recommended client operating systems and Java for ASDM.

LINK
=============================================

19.Which two of these are the components of a Certificate Signing Request (CSR)?(Choose two)
A. private key
B. information identifying the applicant
C. public key
D. pre-shared key
E. host key
====================================

20. Which two of these statements about SMTP and ESMTP are the most correct?(Choose two)
A. Open mail relays are often used for spamming
B. ESMTP does not provide more security features than SMTP
C. SMTP provides authenticated e-mail sending
D. Worms often spread via SMTP
++NOTE: 什么是ESMTP?所谓ESMTP,即认证的邮件传输方式,是邮件服务器系统为了限制非本系统的正式用户利用本系统散发垃圾邮件或其他不当行为而开设的一项安全认证服务。在ESMTP服务器上,发送邮件需要对用户的身份进行验证。它与传统的SMTP方式相比,只是多了一道用户身份的验证手续,验证之后的邮件发送过程与传统的SMTP方式一致。
===================================
21. Which two of these are valid TACACS+ Accounting packets?(Choose two)
A. REQUEST
B. REPLY
C. RESPONSE
D. CONTINUE
E. START

===================================

22.Which of these Cisco IOS features implements a simple packet filter?
A. Cisco IPS
B. IPsec
C. IP routing
D. NBAR
E. access control list

====================================

23. Using FTP passive mode, after the client opens the command channel (port 21) to the FTP server
and requests passive mode, what will be the next step?
A. The FTP server sends back an acknowledgment (ACK) to the client
B. The FTP server allocates a port to use for the data channel and transmit that port number to the client
C. The FTP server opens the data channel to the client using the port number indicated by the client
D. The FTP client opens the data channel to the FTP server on Port 20
E. The FTP client opens the data channel to the FTP server on Port 21
======================================
24. Refer to the exhibit which command is required to fix the issue identified by Cisco ASDM packet tracer
in the image?
A. nat (inside) 1 10.0.0.4
B. global (outside) 1 203.0.113.100
C. global (outside) 10 203.0.113.110
D. access-list outside permit tcp host 10.0.0.4 host 198.133.219.25 eq www
E. nat (outside) 10 198.133.219.25

=======================================

25.All of these correctly describe SNMPv3 except which one?
A does not provide any protection against denial of service attacks
B provides a mechanism for verification that messages have not been altered in transit
C requires the use of NTP to correctly synchronize timestamps and generate public/private key pairsused for encryption of messages
D provides a mechanism for verivication of the identily of the device that generated the message
E includes timeliness indicators in each message so the receiving SNMP engine can determine if it was sent recently

==================================
26.A DNS open resolver is vulnerable to which three of these malicious activities?(choose three)
A. cache poisoning attack
B. amplification attack
C. ping of death attack
D. resource utilization attack
E. Blue screen of death
F. nachi worm attack

++ Note from cisco:
DNS Open Resolvers

A DNS open resolver is a DNS server that allows DNS clients that are not part of its administrative domain to use that server for performing recursive name resolution. Essentially, a DNS open resolver provides responses (answers) to queries (questions) from anyone asking a question. DNS open resolvers are vulnerable to multiple malicious activities, including the following:

* DNS cache poisoning attacks
* DNS cache poisoning attacks‡
* Resource utilization attacks

‡Denial of Service (DoS) or Distributed DoS (DDoS)
DNS Cache Poisoning Attacks

DNS cache poisoning occurs when an attacker sends falsified and usually spoofed RR information to a DNS resolver. Once the DNS resolver receives the falsified RR information, it is stored in the DNS cache for the lifetime (Time To Live [TTL]) set in the RR. To exploit this flaw in the DNS resolver implementation so it will store the falsified information, an attacker must be able to correctly predict the DNS transaction identifier (TXID) and the UDP source port for the DNS query (request) message. Attackers use this exploitation technique to redirect users from legitimate sites to malicious sites or to inform the DNS resolver to use a malicious name server (NS) that is providing RR information used for malicious activities.
DNS Amplification and Reflection Attacks

DNS amplification and reflection attacks use DNS open resolvers to increase the volume of attacks and to hide the true source of an attack, actions that typically result in a DoS or DDoS attack. These attacks are possible because the open resolver will respond to queries from anyone asking a question. Attackers use these DNS open resolvers for malicious activities by sending DNS messages to the open resolvers using a forged source IP address that is the target for the attack. When the open resolvers receive the spoofed DNS query messages, they respond by sending DNS response messages to the target address. Attacks of these types use multiple DNS open resolvers so the effects on the target devices are magnified.
Resource Utilization Attacks

Resource utilization attacks on DNS open resolvers consume resources on the device. Examples of such resources include CPU, memory, and socket buffers. These types of attacks try to consume all available resources to negatively impact operations of the open resolver. The impact of these attacks may require the device to be rebooted or a service to be stopped and restarted.
==================================

27. Which of these statements best describes the advantage of using cisco secure desktop which is part of the cisco ASA VPN solution?
A. Secure desktop will create a completely separate computing environment that will be deleted when you are done. This ensures that no confidential data has been left on the shared/public computer.
B. Secure desktop is used to protect access to your registry and system files when browsing to SSL/VPN protected pages.
C. Secure Desktop ensures that an SSL protected password cannot be exploited by a main in the middle attack using a spoofed certificate.
D. Secure desktop hardens the operating system of the machines you are using at the time secure desktop is launched.

======================================

28. For a router to obtain a certificate from a CA , what is the first step of the certificate enrollment process
A. the router generates a certificate request and forwards it to the CA
B. the router generates an RSA key pair
C. the router sends its public key to the CA
D. the CA sends its public key to the router
E. the CA verifies the identity of the router
F. the CA generates a certificate request and forwards it to the router

=====================================
29. What is the default username and password set for cisco security deyice manager(SDM)?
A. sdm/sdm
B. sdm/cisco
C. cisco/sdm
D. cisco/cisco
E. cisco/cisco123
======================================
30. The BPDU guard feature disables which kind of port when the port receives a BPDU packet?
A. any port
B. nonegotiate port
C. access port
D. portfast port
E. root port

NOTE: At the reception of BPDUs, the BPDU guard operation disables the port that has PortFast configured. The BPDU guard transitions the port into errdisable state, and a message appears on the console. This message is an example:
2000 May 12 15:13:32 %SPANTREE-2-RX_PORTFAST:Received BPDU on PortFast enable port.
Disabling 2/1
2000 May 12 15:13:32 %PAGP-5-PORTFROMSTP:Port 2/1 left bridge port 2/1
=====================================
31. Refer to the exhibit the exhibit illustrates which type of attack?
A. virus infection
B. worm propagation
C. port scanning
D. denial of service (Dos)
E. distributed Dos (DDos)

=======================================

32. All of these phases of the Security Incident Response methodology except which one?
A. planning
B. preparation
C. identification
D. classification
E. reaction
F. restructuring
G. post-mortem

======================================
33. Which four routing protocols are supported when using Cisco Configuration Professional? (Choose four.)
A. RIPv1
B. RIPv2
C. IGRP
D. EIGRP
E. OSPF
F. BGP

=======================================
34. Refer to the exhibit. Switch SW2 has just been added to Fa0/23 on SW1. After a few seconds, interface Fa0/23 on SW1 is placed in the error-disabled state. SW2 is removed from port Fa0/23 and inserted into SW1 port Fa0/22 with the same result. What is the most likely cause of this problem?
A. The Spanning-tree PortFast feature has been conigured on SW1.
B. BPDU filtering has been enable either globally or on the interfaces of SW1.
C. The BPDU guard feature has been enabled on the FastEthernet interfaces of
SW1.
D. The FastEthernet interfaces of SW1 are unable to autonegotiate speed and duplex with SW2.
E. PAgP is unable to correctly negotiate VLAN trunk characteristics on the link between SW1 and SW2

========================================
35. Application layer protocol inspection is available for the Cisco ASA 5500 Series Adaptive SecurityAppliance. This feature performs which type of action on traffic traversing the firewall?
A. classification and policing (for QoS)
B. deep packet inspection
C. flexible packet matching
D. reverse path forwarding
E. remote triggering of a black hole

================================================

36. Which two of these are true about TFTP? (Choose two.)
A. TFTP includes a basic username/password authentication mechasim.
B. While "putting" files via TFTP is possible. It is good practice to disallow it, because TFTP lacks access control mechanisms.
C. TFTP uses a very basic "stop and wait" mechanism for flow control, for which each packet needs tobe acknowledged before the next one is sent.
D. TFTP root directories need to be world-readable and -writable due to the lack of security controls in the protocol.
E. TFTP can list remote directory contents, but only if advanced options (as defined in RFC 2347) are negotiated between client and server at initial connection time.

======================================================

37. Routing loops can occurs in distance vector routing protocols if the network has inconsistent routingentries. Which three of these methods can be used to avoid them? (Choose three.)
A. split horizon
B. route poisoning
C. route suppression
D. route splitting
E. hold-down timers

======================================================

38. CustomerA has set up a central syslog server to receive all syslog messages from its routers. The IP address of this central server is 1.1.1.1, and the customer wants all messages of level "error" and above to be sent there. In addition, it wants all messages of level "warning" and above to be stored locally on the router. Assuming logging is already enabled, which three commands on the router would
accomplish these goals? ( Choose three.)
A. logging host 1.1.1.1 level errors
B. logging buffered warnings
C. logging device 1.1.1.1
D. logging buffer enable
E. logging host 1.1.1.1
F. logging facility local-buffer
G. logging trap errors

====================================================

39. When using Cisco Easy VPN Remote (hardware client deployment) in the client-mode setup, all of the following statements are correct except which one?
A. Perform split tunneling on the Cisco Easy VPN Remote device.
B. Initiate a connection from a network behind the Cisco Easy VPN Server to the network behind the Cisco Easy VPN Remote client.
C. Set the Cisco Easy VPN Remote to allow an administrator or user to manually
initiate a connection.
D. Set the Cisco Easy VPN Remote to automatically connect to the Cisco Easy VPN Serer

=====================================================
40. Which three of these are properties of the Authentication Header (AH) protocol?(choose three)
A. Provides data integrity
B. Provides data confidentiality
C. Provides data authentication
D. Use IP protocol number 50
E. Optionally provides replay protection

====================================================

41. Which two of these statements regarding Authentication Header (AH) are true?(choose two)
A. AH requires the use of Encapsulation Security Payload (ESP) to work correctly
B. AH provides authentication for most of the “outer” IP header, as well as the upper layer protocols
C. AH can be deployed in tunnel mode only
D. AH is not commonly used, because it can only encrypt the original packet using a DES encryption algorithm.
E. AH will work through a NAT (one-to-one) device, but not through a PAT(one-to-many) device
F. AH use an IP protocol number of 51

==========================================================

42. DNS Security Extension (DNSSEC) adds security functionality to the Domain Name System for which three purposes? (Choose three)
A. Origin authentication of DNS data
B. Protection against denial of service (DoS) attacks
C. Integrated data encryption using ESP
D. Inclusion of the authorization flag in the DNS lookup
E. Providing of confidentiality of data
F. Data integrity

============================================================
43. What is the net effect of using ICMP type 4 messages to attack RFC 1122-compliant hosts?
A. Hosts will perform a ã€soft〠TCP reset and restart the connection.
B. Hosts will perform a ã€oehard〠TCP reset and tear down the connection
C. Hosts will reduce the rate at which they inject traffic into the network
D. Hosts will redirect packets to the IP address indicated in the ICMP type 4 message
E. Hosts will retransmit the last frame sent prior to receiving the ICMP type 4 message

--note: ICMP type 4, Source quench
The ICMP type 4 packet is a message to the sending host to slow down the sending of data because it cannot keep up.
===========================================================

44. All of these are available from Cisco IPS Device Manager (Cisco IDM) except which one?
A. Interface Status
B. Global Correlation Reports
C. Sensor Information
D. CPU, Memory, and Load
E. Top Signatures
F. Top Applications

==========================================================

45. Which three of these protocols are supported when using TACACS+?(choose three)
A. Apple Talk
B. CHAP
C. NASI
D. NetBIOS
E. Kerberos

==========================================================

46. Which are the three benefits of Cisco IPS Manager Express (Cisco IME) compared to Cisco IPS Device Manager (Cisco IDM) ? (Choose three)
A. Advanced Cisco IPS signatures can be configured with Cisco IME, while only base Cisco IPS signatures can be configured with Cisco IDM.
B. Cisco IME can manage up to 10 Cisco IPS device while Cisco IDM can only manage a single Cisco IPS device.
C. A live RSS feed for cisco security alert can be set up on Cisco IME, but not on Cisco IDM.
D. The sensor health dashboard can only be viewed on Cisco IME, not on Cisco IDM
E. Email notification can be set from Cisco IME if an event is being triggered by Cisco IPS, but cannot be sent from Cisco IDM
F. Automatic signature updating can can only be provisioned from Cisco IME, not from Cisco IDM.


==============================================

47. Identity NAT translates which of these?
A. The source IP address to the interface IP address
B. The local IP address to a global IP address
C. An IP address to itself
D. The destination IP address to an RFC 1918 address
E. The local IP address to a DNS-resolved IP address
F. The global IP address to a local IP address

======================================

48. Which two of these commands are required to implement a Cisco Catalyst 6500 Series Firewall Services Module (FWSM) in a Catalyst 6500 running Cisco IOS?(Choose two).
A. firewall multiple-vlan-interfaces
B. firewall module xvlan-groupy
C. Module xsecure-traffic
D. Firewall vlan-groupy
E. Firewall module xsecure-traffic

===============================

49. Which of these statements is true about EIGRP?
A. It conserves network bandwidth by using periodic, incremental updates to propagate network changes to its neighbors
B. It can install up to eight equal-cost paths to a given destination in its routing table
C. It is possible for two EIGRP routers to become neighbors even if the hello and hold timers do not match.
D. EIGRP updates can be sent between two discontinuous autonomous systems via a virtual link.
E. EIGRP packets can be both authenticated and encrypted to ensure that the information exchange is reliable and confidential

===================================
50. In ISO 27001 ISMS, which three of these certification process phases are required to collect information for ISO 27001? (Choose three.)
A. discover
B. certification audit
C. post-audit
D. observation
E. pre-audit
F. major compliance

======================================

51. The Internet Engineering Task Force (IETF) is a collaborative effort by the international community of Internet professionals to improve the design.use,and management of the Internet.
Which international organization charters the activity of IETF?
A. IANA
B. ISO
C. ISOC ===>internet society
D. RIR
E. IEC

====================================

52. When configuring a Cisco adaptive security appliance in multiple context mode, which one of these capabilities is supported?
A. multicast
B. dynamic routing protocols
C. VPN configurations
D. static routes

===================================

53. What is the main purpose of a denial of service attack?
A. unauthorized data manipulation
B. the gaining of system access
C. privilege escalation on a victim or compromised host
D. impeding (阻碍) of the availability of a resource to authorized users
E. unauthorized discovery and mapping of systems, services, or vulnerabilities

====================================

54. When sending an e-mail message using Simple Mail Transfer(SMTP),the client must signal to the mail server that the message is complete by terminating the message with which of these?
A. END
B. SEND
C.
D. .
E. CTRL+C

=====================================

55. Which of these best represents a typical attack that takes advantage of RFC 792, ICMP type 3 messages?
A. blind connection-reset
B. large packet echo request
C. packet fragmentation offset
D. broadcast-based echo request
E. excessive bandwidth consumption

=======================================

56. ALL of these Cisco security products provide event correlation capabilities except which one?
A. Cisco ASA adaptive security appliance
B. Cisco IPS
C. Cisco Security MARS
D. Cisco Guard/Detector
E. Cisco Security Agent

=======================================

57. Which two U.S. government entities are authorized to execute and enforce the penalties for the Sarbanes-Oxley (SOX) act?(Choose two)
A. Federal Trade Commission (FTC)
B. Federal Reserve Board
C. Securities and Exchange Commission (SEC)
D. Office of Civil Rights (OCR)
E. United States Citizenship and Immigration Services (USCIS)
F. Internal Revenue Service (IRS)


========================================

58. Which five of these are criteria for rule-based rogue classification of access points by the Cisco Wireless LAN Controller?(select five)
A. minimum RSSI
B. open authentication
C. MAC address range
D. whether it matches a managed AP SSID
E. whether it matches a user-configured SSID
F. whether it operates on an authorized channel
G. time of day the rogue operates
H. number of clients it has

=========================================

59.Which four of these hash functions are part of the SHA-2 family named after their digest lengths? (choose four)
A SHA-168
B SHA-224
C SHA-256
D SHA-384
E SHA-448
F SHA-512

=========================================

60. The ARP functionality in IPv4 is accomplished using which type of messages as defined in ICMPv6?
A router solicitation and advertisement
B neighbor solicitation and advertisement
C redirect
D neighbor solicitation and router advertisement
E router solicitation and neighbor advertisement

===========================================

Friday, January 20, 2012

T1506
/linuxscript/t1506

import os
import sys
import time

if len(sys.argv) < 2:
....print "usage: python loop2.py IP Port"
....exit()
while True:
....time.sleep(1)
....ip = sys.argv[1]
....port = sys.argv[2]
....os.system("ssh admin@{0} -p {1} < cmd.txt".format(ip,port))

Python Youtube


Google Class

Day 1 part 1: Introduction and string
Day 1 part 2: List, sorting and Tuples
Day 1 part 3: Dict and files
Day 2 part 1: RE
Day 2 part 2: OS and command
Day 2 part 3: url and HTTP, exceptions
Day 2 part 4: closing thoughts





python programming Tutorial
1, installing
2, numbers and math
3, variables
4, Modules and Functions
5, how to save your program
6, string
7, More on Strings
8, raw input
9, sequence and list
10, slicing
11, editing sequence
12, more list function
13, slicing list
14, intro to method
15, more method
16, sort and tuples
17, string and stuff
18, cool string method
19, dictionary
20, if statement
21, else and elif
22, nesting statement
23, comparison operator
24, and and or
25, for and while loop
26, infinite loops and break
27, building function
28, default parameter
29, multiple parameter
30, parameter type
31, tuples as parameter
32, object oriented program
33, class and self
34, subclass and superclass
35, overwrite variable on sub
36, multiple parent classes
37, constructor
38, import modules
39, reload the module
40, getting module info
41, work with files
42, reading and writing
43, writing lines

Monday, January 2, 2012

Sponsor your parents
1, Nov 25, 2011. LG Received a letter (FILE: 201110010910)
2, summit the following doc on Jan 2, 2012:
--a,008M for SZ.H. copy to c:/j/tuanju/
--b,5669 for SZ.H and HY.G. copy to c:/j/tuanju/
--c,5406 for SZ.H and HY.G. copy to c:/j/tuanju/
--d, passport for SZ.H and HY.G. copy to c:/j/tuanju/
--e, proof of relationship to sponsor
--f, photo x2 for each person
--g, payment proof for RPRF (right of permanent residence fee)
--h, received the letter.
--i, address (english and chinese)