Monday, December 22, 2008
CCNA Lab: Copy to TFTP Server
Items of practical training certificates Cisco CCNA: Copy to TFTP Server
Start practicing: Link here Read more..!
CCNA Lab: RIP Routing
Items of practical training certificates Cisco CCNA: RIP Routing
Start practicing: RIP Routing Read more..!
CCNA Lab: IGRP Routing
Items of practical training certificates Cisco CCNA: IGRP Routing
Start practicing: Link here
Read more..!
CCNA Lab: Initial Switch Configuration
Items of practical training certificates Cisco CCNA: Initial Switch Configuration
Start practicing: Initial Switch Configuration Read more..!
CCNP_BCMSN Lab: Configuring a Distribution Switch
Items of practical training certificates Cisco CCNP_BCMSN (Building Cisco Multilayer Switched Networks)
Start practicing: Configuring a Distribution Switch Read more..!
Saturday, December 20, 2008
CCNA EIGRP LAB Question
Question:
After adding R3 router, no routing updates are being exchanged between R3 and the new location. All other inter connectivity and Internet access for the existing locations of the company are working properly.
The task is to identify the fault(s) and correct the router configuration to provide full connectivity between the routers.
Access to the router CLI can be gained by clicking on the appropriate host. All passwords on all routers are cisco.
IP addresses are listed in the chart below.
R1 Fa0/0: 192.168.77.33 | R2 Fa0/0: 192.168.60.97 |
R3 Fa0/0: 192.168.77.34 | R4 Fa0/0: 192.168.60.129 |
Answer and explanation:
We should check the configuration of the new added router first because it does not function properly while others work well. From the command line interface of R3 router, enter the show running-config command
From the output above, we know that this router was wrongly configured with an autonomous number (AS) of 22. When the AS numbers among routers are mismatched, no adjacency is formed.
(You should check the AS numbers on other routers for sure)
To solve this problem, we simply re-configure router R3 with the following commands:
R3>enable (you have to enter cisco as its password here)
R3#configure terminal
R3(config)#no router eigrp 22
R3(config)#router eigrp 212
R3(config-router)#network 192.168.60.0
R3(config-router)#network 192.168.77.0
R3(config-router)#no auto-summary
R3(config-router)#end
R3#copy running-config startup-config
Check R1 router with the show running-config command:
Notice that it is missing a definition to the network R3. Therefore we have to add it so that it can recognize R3 router
R1>enable (you have to enter cisco as its password here)
R1#configure terminal
R1(config)#router eigrp 212
R1(config-router)#network 192.168.77.0
R1(config-router)#end
R1#copy running-config startup-config
Now the whole network will work well. You should check again with ping command from router R3 to other routers!
Read more..!CCNA: Cisco Certified Network Associate: Fast Pass
Organized by exam objectives, this is a focused, concise review guide that works hand-in-hand with any learning tool, including the Sybex CCNA: Cisco Certified Network Associate Study Guide, 6th and Deluxe editions.
The book will consist of four high-level chapters, each mapping to the four main Domains of the exam skill-set. The book will drill down into the specifics of the exam, covering the following:
* Designing Cisco internetworks
* Developing an access list
* Evaluating TCP/IP communication
* Configuring routers and switches
* Configuring IP addresses, subnet masks, and gateway addresses
* Performing LAN, VLAN, and WAN troubleshooting
* Understanding rules for packet control
The interactive CD contains two bonus exams, handy flashcard questions, and a searchable PDF of a Glossary of Terms.
The perfect companion to Sybex's CCNA: Cisco Certified Network Associate Study Guide, Sixth or Deluxe editions, or any CCNA study tool
The Perfect CCNA Preparation and Review Tool
Many candidates who complete a Study Guide or course also appreciate a review tool that helps them brush up on key topics. Sybex's CCNA Fast Pass, Third Edition, is that tool. This streamlined book hones in on critical information for the new CCNA exam 640-802, including network planning and design, implementation and operation, troubleshooting, and technology. Study, review, and practice with this practical study aid, then take the exam with confidence.
* Easy-to-use book is organized by exam objectives for quick review
* Flexible Fast Pass goes hand-in-hand with any learning tool on the market
* Exam Essentials in each chapter helps you zero in on what you need to know
* Book includes review questions, practice tools, and two practice exams
* Targeted and expert content from leading Cisco networking authority, Todd Lammle
Look inside for complete review coverage of all exam objectives for CCNA Exam 640-802
Download here (8.3M pdf) Read more..!
Friday, December 19, 2008
Cisco IOS access lists: 10 things you should know
People who read this, also read...
Playing with Cisco access lists
Use advanced parameters on your Cisco IOS ACLs
Traffic filtering with Cisco access lists: Why, how, and what to consider
Learn additional uses for Cisco IOS access control lists
Protect your network with the Cisco IOS Firewall
If you work with Cisco routers, you're more than likely familiar with Cisco IOS access control lists (ACLs). But that doesn't mean you know all there is to know about these important gatekeepers. Access lists are an integral part of working with routers, and they're vital to security.
Because ACLs are a fundamental part of router administration, I want to address 10 things you should know about working with these lists. If you're new to working with Cisco routers, this list offers a good foundation to get you started. But even if you've worked with Cisco routers for a while, it never hurts to review the basics—you might even learn something new.
So, without any further ado, here are 10 things you need to know about Cisco IOS access lists, beginning with the basic definition of an ACL.
What is an access control list?
In the Cisco IOS, an access control list is a record that identifies and manages traffic. After identifying that traffic, an administrator can specify various events that can happen to that traffic.
What's the most common type of ACL?
IP ACLs are the most popular type of access lists because IP is the most common type of traffic. There are two types of IP ACLs: standard and extended. Standard IP ACLs can only control traffic based on the SOURCE IP address. Extended IP ACLs are far more powerful; they can identify traffic based on source IP, source port, destination IP, and destination port.
What are the most common numbers for IP ACLs?
The most common numbers used for IP ACLs are 1 to 99 for standard lists and 100 to 199 for extended lists. However, many other ranges are also possible.
Standard IP ACLs: 1 to 99 and 1300 to 1999
Extended IP ACLs: 100 to 199 and 2000 to 2699
How can you filter traffic using ACLs?
You can use ACLs to filter traffic according to the "three P's"—per protocol, per interface, and per direction. You can only have one ACL per protocol (e.g., IP or IPX), one ACL per interface (e.g., FastEthernet0/0), and one ACL per direction (i.e., IN or OUT).
How can an ACL help protect
my network from viruses?
You can use an ACL as a packet sniffer to list packets that meet a certain requirement. For example, if there's a virus on your network that's sending out traffic over IRC port 194, you could create an extended ACL (such as number 101) to identify that traffic. You could then use the debug ip packet 101 detail command on your Internet-facing router to list all of the source IP addresses that are sending packets on port 194.
What's the order of operations in an ACL?
Routers process ACLs from top to bottom. When the router evaluates traffic against the list, it starts at the beginning of the list and moves down, either permitting or denying traffic as it goes. When it has worked its way through the list, the processing stops.
That means whichever rule comes first takes precedence. If the first part of the ACL denies traffic, but a lower part of the ACL allows it, the router will still deny the traffic. Let's look at an example:
Access-list 1 permit any
Access-list 1 deny host 10.1.1.1
Access-list 1 deny anyWhat does this ACL permit? The first line permits anything. Therefore, all traffic meets this requirement, so the router will permit all traffic, and processing will then stop.
What about traffic you don't specifically address in an ACL?
At the end of an ACL is an implicit deny statement. Whether you see the statement or not, the router denies all traffic that doesn't meet a condition in the ACL. Here's an example:
Access-list 1 deny host 10.1.1.1
Access-list 1 deny 192.168.1.0 0.0.0.255What traffic does this ACL permit? None: The router denies all traffic because of the implicit deny statement. In other words, the ACL really looks like this:
Access-list 1 deny host 10.1.1.1
Access-list 1 deny 192.168.1.0 0.0.0.255
Access-list 1 deny ANYCan I name an ACL?
Numbers—who needs numbers? You can also name your ACLs so you can more easily identify their purpose. You can name both standard and extended ACLs. Here's an example of using a named ACL:
router(config)# ip access-list ?
extended Extended Access List
log-update Control access list log updates
logging Control access list logging
resequence Resequence Access List
standard Standard Access List
router(config)# ip access-list extended test
router(config-ext-nacl)#
router(config-ext-nacl)# 10 deny ip any host 192.168.1.1
router(config-ext-nacl)# exit
router(config)# exit
router# show ip access-list
Extended IP access list test 10 deny ip any host 192.168.1.1What's a numbering sequence?
In the "old days," you couldn't edit an ACL—you could only copy it to a text editor (such as Notepad), remove it, edit it in notepad, and then re-create it. In fact, this is still a good way to edit some Cisco configurations.
However, this approach can also create a security risk. During the time you've removed the ACL to modify it, the router isn't controlling traffic as needed. But it's possible to edit a numbered ACL with commands. Here's an example:
router(config)# access-list 75 permit host 10.1.1.1
router(config)#^Z
router# conf t
Enter configuration commands, one per line. End with CNTL/Z.
router(config)# ip access-list standard 75
router(config-std-nacl)# 20 permit any
router(config-std-nacl)# no 10 permit 10.1.1.1
router(config-std-nacl)#^Z
router# show ip access-lists 75
Standard IP access list 75 20 permit any
router#How else can I use an ACL?
ACLs aren't just for filtering traffic. You can also use them for a variety of operations. Let's look at some of their possible other uses:
To control debug output: You can use the debug list X command to control debug output. By using this command before another debug command, the command only applies to what you've defined in the list.
To control route access: You can use a routing distribute-list ACL to only permit or deny certain routes either into or out of your routing protocol.
As a BGP AS-path ACL: You can use regular expressions to permit or deny BGP routes.
For router management: You can use an ACL to control which workstation or network manages your router with an ACL and an access-class statement to your VTY lines.
For encryption: You can use ACLs to determine how to encrypt traffic. When encrypting traffic between two routers or a router and a firewall, you must tell the router what traffic to encrypt, what traffic to send unencrypted, and what traffic to drop.
To wrap up this review, I'll leave you with one last tip: Don't forget to use remark statements in your ACLs. They'll come in handy when you have to troubleshoot something later. Read more..!
Cisco Network Magic Pro 5.0.8282
Cisco has introduced a suite of network management software named Network Magic 5.0 . This tool will improve various network tasks like- connecting and sharing computers(content & printer), control computers on network while accessing Internet, connection repairing features, manage performance problem to provide optimize performance and many more. This tool run in the background and indicate/alert each time when new device connect to your network.
The Network Magic 5.0 suit provide the various functionality and provide capability to
* Connect and share content or a printer across a network
* Manage, monitor and control how computers on the network access the Internet
* Diagnose and repair connection and performance problems
* Optimize performance and reliability
* Track network history and usage through reporting capabilities
* Manage active connections and get status updates Control user
* Access and help secure the network from intruders
Features:
* Connect your devices together in minutes.
* Share Internet connections, printers and files.
* Protect your network with enhanced WPA security capabilities and status alerts.
* Repair your network and Internet connections to stay online and productive.
* Control access to the Internet and track online activity with remote desktop screenshots.
* And much more!
Download Read more..!
Thursday, December 18, 2008
Lab 2, Modelling the CCNA Topology
Skills Required
The CCNA Lab Topology
Creating the Project
Placing Subnets on the Map
Subnet_A
The Network we have Created
Adding Traffic to the Network
Creating Servers for the Network
Running the Simulation
Extension Work
PacketTrap Ping Scan 1.1.3301
Download link 1: Download now | |
Download link 2: Download now |
Friday, November 28, 2008
Pix Firewall Simulator
- 04 - Basic PIX Configuration
- 05 - Config NAT Stats and Conduits
- 06 - Configure Multiple Interfaces
- 07a - Configure the PIX as a DHCP Server
- 07b - Configuring PIX as a DHCP client
- 08 - Configuring Logging
- 08b - Configuring Logging - Verification
- 09a - Denying outbound Traffic
- 09b - Allowing Outbound Traffic
- 09c - Configure PIX to work with WebSense
- 09d - Installing WebSense
- 09e - Configure WebSence to block by URL
- 09f - Configure Websense to block by workstation
- 10 - Configure the Fixup Protocol on PIX
- 11 - Configuring PIX for IDS signature
- 12a - CSACS Install and Add User
- 12b - Configuring Authentication
- 13 - Confg the Primary PIX Firewall
- 14 - Configure IKE and IPSec on the PIX
- 14b - Verify IPSec Configuration
- 15 - Password Recovery & Image Update
- 17 - Configuring the CSIS Feature Set
- 18a - Configure Cisco Secure ACS Set
- 18b - Configure AAA and Authentication Proxy
- 18c - Verify Authentication Proxy Configuration
MCSA
MCSAThe Microsoft Certified Systems Administrator (MCSA) certification will advance your career by ensuring that you have the skills to successfully manage and troubleshoot system environments running on the Microsoft Windows operating system. | |
|
Cisco 6509 Lab
- 01 Verifying the VTP Domain.htm
- 02 VACLs.htm
- 03 Testing the VTP Domain.htm
- 04 Supervisor & Power Redundancy.htm
- 05 Standard Access Lists.htm
- 06 Spanning Tree.htm
- 07 RIP Routing.htm
- 08 Prepare the MSFC for MLS.htm
- 09 Port Security.htm
- 10 Multicast Routing.htm
- 11 Limiting VTY Access.htm
- 12 Layer3 Filtering.htm
- 13 Inter-VLAN Routing.htm
- 14 HSRP Using Multiple Routers.htm
- 15 Creating a VTP Domain.htm
- 16 Configuring Distribution Swit.htm
- 17 Configure ML Son Router & Switch.htm
- 18 Activating & Limiting Trunking.htm
Latest News
- Ebooks
- Cisco 6509 Lab
- MCP
- MCSE
- MCSA
- CCIE Service Provider
- CCIE SECURITY
- Cisco CCIE Routing and Switching
- CCVP Certification
- CCIP Certification
- CCSP Certification
- CCDP Cisco Certified
- CCNP Certification
- CCDA Certification
- CCNA Certification
- 70-291
- Win Server (70-290)
- ISA Server 2004 (70-350) Lab
- Tesking
- Win Server 2152
BSMSN Knowledgenet Labs
Building Converged Cisco Multilayer Switched Networks (642-812 BCMSN)
Exam Description
The Building Converged Cisco Multilayer Switched Networks (BCMSN 642-812) is a qualifying exam for the Cisco Certified Network Professional CCNP® and the Cisco Certified Design Professional CCDP® certifications. The BCMSN 642-812 exam will certify that the successful candidate has important knowledge and skills necessary to implement scalable multilayer switched networks. The exam includes topics on Campus Networks, describing and implementing advanced Spanning Tree concepts, VLANs and Inter-VLAN routing, High Availability, Wireless Client Access, Access Layer Voice concepts, and minimizing service Loss and Data Theft in a Campus Network.
BCMSN Lab
- 01Chap 3 Configuring Access Switch
- 02Chap 3 Configuring a Distribution Switch
- 03Chap 3 Backup Ethernet - ASW1 to DSW2
- 04Chap 3 Modifying Switch Mask
- 05Chap 4 Trunk Configuration
- 06Chap 4 Activating & Limiting Trunking
- 07Chap 4 Creating a VTP Domain
- 08Chap 4 Verifying the VTP Domain
- 09Chap 4 Testing the VTP Domain
- 10Chap 4 VLANs to Access Switch Ports
- 11Chap 4 Creating a VTP Management Domain
- 12Chap 5 Verifying Spanning - Tree-Access Switch
- 13Chap 5 Configuring Fast Etherchannel
- 14Chap 5 Configuring Uplink - Fast - Access Switch
- 15Chap 6 Configuring the Route Processor
- 16Chap 7 Configuring MLS on Router and Switch I
- 17Chap 7 Configuring MLS on Router and Switch II
- 18Chap 7 Access Lists
- 19Chap 8 HSRP and IP Multicast Routing
- 20Chap 10 Multicast Routing
- 21Chap 11 Standard Access Lists
- 22Chap 11 Limiting VTY Access
- 23Chap 11 Modifying Redistributed Administrative Distances
- 24Chap 11 Redistribution with Route Filters
CIT Lab
- 01Chap 4 Network Discovery- Host Mapping
- 02Chap 4 Network Discovery- Verification
- 03Chap 4 Serial Connectivity
- 04Chap 4 Intermittent Connectivity
- 05Chap 4 Layer Three Connectivity
- 06Chap 4 Wrong Encapsulation for Serial Link
- 07Chap 6 Troubleshooting an IP Network
- 08Chap 6 Connectivity in an IP Network
- 09Chap 6 TCP-IP Trbleshooting - AR1 & Core
- 10Chap 6 TCP-IP Trbleshooting - Vegas
- 11Chap 7 Connectivity in an IPX Network
- 12Chap 7 Troubleshooting an IPX Network
- 13Chap 11 ISDN Connectivity - Extended Ping
- 14Chap 11 ISDN Connectivity - Static Routes
- 15Chap 11 ISDN Connectivity - Ping Debugging
- 16Chap 11 ISDN Connectivity - External Debug
- 17Appendix-A AppleTalk Networking Problems
BCRAN Knowledgenet Labs
- 01Chap 4 Initial Configuration
- 02Chap 4 Configure Serial Interface & Line
- 03Chap 4 Configuring the Central Modem
- 04Chap 4 Configuring the PC Modem
- 05Chap 5 PPP and Telnet on the Central Site
- 06Chap 7 Configure ISDN - BRI
- 07Chap 7 Configure ISDN - PRI
- 08Chap 7 Verifying the ISDN Connection
- 09Chap 8 Incoming Async. Calls
- 10Chap 9 Configure Home to Comm. Central
- 11Chap 9 Configuring the 3640
- 12Chap 10 Configuring X.25 Transport
- 13Chap 11 Frame Relay Subinterfaces
- 14Chap 11 Config. Frame Relay - Branch
- 15Chap 11 Frame Relay Traffic Shaping
- 16Chap 11 Verifying frame-Relay Operation
- 17Chap 12 Preparing BRI Int - Backup Dialup
- 18Chap 12 Establish a Backup Connection
- 19Chap 13 Configuring Custom Queuing
- 20Chap 13 Preparing the Network
- 21Chap 13 Constructing the Priority List
- 22Chap 13 Verifying Custom Configuration
- 23Chap 14 Static Network Addr. Translation
- 24Chap 14 Dynamic Network Address Translation
- 25Chap 15 Securing Access
- 26Chap 15 AAA Login Authentication
BSCI Knowledgenet Labs
BSCI Lab
- 01Chap 2 Network Discovery - Router 1
- 02Chap 2 Network Discovery - Router 2
- 03Chap 2 Network Discovery - Router 3
- 04Chap 3 IP Address - Helper Command
- 05Chap 4 Configuring Single Area OSPF
- 06Chap 4 Verifying Single Area OSPF
- 07Chap 4 Config OSPF- NBMA Environment
- 08Chap 4 Enabling OSPF- NBMA Network
- 09Chap 5 Configure Multi-area OSPF Network
- 10Chap 5 Configure Multi-area OSPF Network II
- 11Chap 5 Stub Areas
- 12Chap 5 Totally Stubby Areas
- 13Chap 5 Not So Stubby Areas - Creation
- 14Chap 5 Virtual Links - Setup
- 15Chap 5 Virtual Links - Creation
- 16Chap 6 Redundant EIGRP - Routers A-C
- 17Chap 6 Redundant EIGRP - Routers D-E
- 18Chap 6 Redundant EIGRP - Testing
- 19Chap 6 EIGRP Across Frame - Relay I
- 20Chap 6 EIGRP Across Frame - Relay II
- 21Chap 7 Configuring BGP
- 22Chap 7 Configuring Basic BGP
- 23Chap 8 Creating a BGP Route Reflector
- 24Chap 8 BGP Route Reflection AS 100
- 25Chap 8 BGP Route Reflection AS 100 and 300
- 26Chap 8 BGP Route Reflection - Router C
- 27Chap 8 Configuring BGP Connection Weight
- 28Chap 9 Route Redistribution - Routers A and B
- 29Chap 9 Route Redistribution - Routers C and D
- 30Chap 9 Route Redistribution - Verification
- 31Chap 9 Modifying Redistributed Administrative Distances
- 32Chap 9 Redistribution with Route Filters
- 33Chap 9 Route Map Creation
- 34 Supplemental IGRP Integration
- 35 Supplemental Directed-Broadcast Handling
CCNP lab online
Free CCNP lab online
CCNP CertificationCCNP certification validates a network professional's ability to install, configure and troubleshoot converged local and wide area networks with 100 to 500 or more nodes. Network Professionals who achieve the CCNP have demonstrated the knowledge and skills required to manage the routers and switches that form the network core, as well as edge applications that integrate voice, wireless, and security into the network.
| |||||||||||||||||||||||
| |||||||||||||||||||||||
CCNA lab
CCNA Certification
The Cisco CCNA network associate certification validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks, including implementation and verification of connections to remote sites in a WAN. This new curriculum includes basic mitigation of security threats, introduction to wireless networking concepts and terminology, and performance-based skills. This new curriculum also includes (but is not limited to) the use of these protocols: IP, Enhanced Interior Gateway Routing Protocol (EIGRP), Serial Line Interface Protocol Frame Relay, Routing Information Protocol Version 2 (RIPv2),VLANs, Ethernet, access control lists (ACLs)
* 1 Console Login* 2 Router Configuration
* 3 Examine the Router
* 4 Copy to a TFTP server
* 5 Copy from TFTP server
* 6a Clear the backup config
* 6b Saving the backup configuration
* 7 Copy to NVRAM
* 8 Initial router configuration
* 9 Initial Switch Configuration
* 10 RIP routing
* 11 IGRP routing
* 12 Create Accesslist
* 13 IPX Access List Security
* 14 IPX router configuration
* 15 IPX SAP filtering
* 16 Limitting VTY address
* 17 Load 2600 OS
* 18 Navigating the IOS
* 19 Password recovery
* 20 Telnet to a remote Router Read more..!
Sunday, November 23, 2008
CCNA full course including simulators dumps etc
(including simulators,dumps etc)
http://rapidshare.com/files/118832966/CCNA_Full_Course_ImediaR.part1.rar
http://rapidshare.com/files/118852361/CCNA_Full_Course_ImediaR.part2.rar
http://rapidshare.com/files/118858157/CCNA_Full_Course_ImediaR.part3.rar
http://rapidshare.com/files/118820225/CCNA_Full_Course_ImediaR.part4.rar Read more..!
CBTN CCIE Video Practice Lab CCIE Labs Mega Package
CBTN CCIE Lab Prep - CCIE Practice Labs Introduction
CBTN CCIE Lab Prep - CCIE Lab Setup
CBTN CCIE Lab Prep - Bridging and Switching: Frame Relay
CBTN CCIE Lab Prep - Bridging and Switching: 3550
CBTN CCIE Lab Prep - IGP Protocols: OSPF
CBTN CCIE Lab Prep - IGP Protocols: RIPv2
CBTN CCIE Lab Prep - IGP Protocols: EIGRP
CBTN CCIE Lab Prep - EGP Protocols: BGP
CBTN CCIE Lab Prep - ISDN: Connectivity and Dial Restrictions
CBTN CCIE Lab Prep - Cisco IOS Features: DHCP
CBTN CCIE Lab Prep - Cisco IOS Features: Redundant Routing
CBTN CCIE Lab Prep - Cisco IOS Features: SNMP
CBTN CCIE Lab Prep - Cisco IOS Features: NTP
CBTN CCIE Lab Prep - Cisco IOS Features: Miscellaneous Tasks
CBTN CCIE Lab Prep - Quality of Service
CBTN CCIE Lab Prep - Multicast
CBTN CCIE Lab Prep - Security
Download:
rapidshare.com/files/143873763/cbtn-ccie-lab01_intro.rar
rapidshare.com/files/143885118/cbtn-ccie-lab02_setup.rar
rapidshare.com/files/143891596/cbtn-ccie-lab03_frame.rar
rapidshare.com/files/144088713/cbtn-ccie-lab04_3550.rar
rapidshare.com/files/144108099/cbtn-ccie-lab05_ospf1.rar
rapidshare.com/files/144108100/cbtn-ccie-lab06_ospf2.rar
rapidshare.com/files/144094970/cbtn-ccie-lab07_ripv2.rar
rapidshare.com/files/143942698/cbtn-ccie-lab08_eigrp.rar
rapidshare.com/files/143957721/cbtn-ccie-lab09_bgp1.rar
rapidshare.com/files/143961006/cbtn-ccie-lab10_bgp2.rar
rapidshare.com/files/143967847/cbtn-ccie-lab11_bgp3.rar
rapidshare.com/files/143974956/cbtn-ccie-lab12_isdn.rar
rapidshare.com/files/143977176/cbtn-ccie-lab13_dhcp.rar
rapidshare.com/files/143982175/cbtn-ccie-lab14_hsrp.rar
rapidshare.com/files/143987662/cbtn-ccie-lab15_snmp.rar
rapidshare.com/files/144035520/cbtn-ccie-lab16_ntp.rar
rapidshare.com/files/144002612/cbtn-ccie-lab17_misc.rar
rapidshare.com/files/144039972/cbtn-ccie-lab18_qos.rar
rapidshare.com/files/144042297/cbtn-ccie-lab19_mcast.rar
rapidshare.com/files/144046132/cbtn-ccie-lab20_security.rar
Password: thebb Read more..!