% Declare Document Class \documentclass[a4paper,12pt,twoside,twocolumn,landscape]{book} \include{structure} % Load structure cfg for document %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % % BEGIN DOCUMENT % % % %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% \begin{document} \include{frontpage} \tableofcontents % Only applied after generation of TOC \setlength{\parskip}{0.35em} % Define length between paragrahps \renewcommand{\baselinestretch}{1.15} % Define lineheight %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % % BEGIN chapters % % % %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % \include{chapter/baseconf} % \chapter{Layer 2} \input{chapter/section/switchednetwork} \newpage \input{chapter/section/spanningtree} % \chapter{L2 to L3} \input{chapter/section/intervlanrouting} % \chapter{DHCP} \input{chapter/section/dhcp} % \chapter{1st hop failure/failover/redundancy} \section{VRRP} \section{GLBP} \section{HSRP} % \chapter{Triple A\tsq{s}} \myquote{}{Remember to log the details, too.} \xkcd{latitude}{Remember logging when necessary} \newpage \begin{itemize} \item \textbf{Authentication:} \begin{enumerate} \item Identify the user, \item Validate the user, \item Allow/Disallow user based upon credentials. \end{enumerate} \item \textbf{Authorization:} \begin{enumerate} \item Have defined levels of allowed operations/tasks divided into groups, \item Validate user-to-groups relations, \item Allow/Disallow user actions. \item On network gear the Allow/Disallowed actions can be stored on either the central AAA server or locally\footnote{May not apply to all network gear} in the network node. \end{enumerate} \item \textbf{Accounting:} \begin{enumerate} \item Network nodes collect user and session information from start to end when connecting to a node, \item All information is transferred back to AAA server, \item Transferred info can be leveraged for several purposes. Typically logged info is: \begin{itemize} \item session duration, \item user commands, \item disallowed commands \end{itemize} \end{enumerate} \end{itemize} \input{chapter/aaa/radius} \input{chapter/aaa/tacacsplus} % \chapter{Network Time Protocol} \section{The old NTP from \tsq{85}} \section{Secure NTP} % \chapter{Managemnt} \section{Network management} \subsection{Routers} \subsection{Switches} \subsection{Firewall} \section{Out-of-band management} \subsection{Console server} % \chapter{Protocols Layer 3} \input{chapter/section/routednetwork} % \chapter{The Internet {\footnotesize "Post cold-war modern times"}} \section{Service Providers} \section{IXP} \section{MPLS} \section{BGP} \section{eVPN} %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % % BEGIN list of figures % % % %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% \renewcommand{\listfigurename}{List of {\footnotesize hidden} Figures} \listoffigures %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % % BEGIN list of tables % % % %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% \renewcommand{\listtablename}{Tables {\footnotesize hidding} on the pages} \listoftables %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % % BEGIN references % % % %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% \bibliography{references} %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% % % % END DOCUMENT % % % %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% \end{document}