1
0
Fork 0
mirror of https://gitlab.com/netravnen/NetworkLabNotes.git synced 2024-11-11 18:39:40 +00:00
NetworkLabNotes/main.tex
2017-06-01 13:57:26 +02:00

183 lines
4.6 KiB
TeX

% Declare Document Class
\documentclass[a4paper,12pt,twoside,twocolumn,landscape]{book}
\include{structure} % Load structure cfg for document
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
% %
% BEGIN DOCUMENT %
% %
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\begin{document}
\include{frontpage}
\tableofcontents
% Only applied after generation of TOC
\setlength{\parskip}{0.35em} % Define length between paragrahps
\renewcommand{\baselinestretch}{1.15} % Define lineheight
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
% %
% BEGIN chapters %
% %
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
% <!-- CONFIGURATION EXAMPLES -->
\include{chapter/baseconf}
% <!-- LAYER 2 -->
\chapter{Layer 2}
\input{chapter/section/switchednetwork}
\newpage
\input{chapter/section/spanningtree}
% <!-- INTERVLAN -->
\chapter{L2 to L3}
\input{chapter/section/intervlanrouting}
% <!-- DHCP -->
\chapter{DHCP}
\input{chapter/section/dhcp}
% <!-- VRRP, GLBP, HSRP -->
\chapter{1st hop failure/failover/redundancy}
\section{VRRP}
\section{GLBP}
\section{HSRP}
% <!-- ACCOUNTING AND LOGINS, RADIUS, TACACS+ -->
\chapter{Triple A\tsq{s}}
\myquote{}{Remember to log the details, too.}
\xkcd{latitude}{Remember logging when necessary}
\newpage
\begin{itemize}
\item \textbf{Authentication:}
\begin{enumerate}
\item Identify the user,
\item Validate the user,
\item Allow/Disallow user based upon credentials.
\end{enumerate}
\item \textbf{Authorization:}
\begin{enumerate}
\item Have defined levels of allowed operations/tasks divided into groups,
\item Validate user-to-groups relations,
\item Allow/Disallow user actions.
\item On network gear the Allow/Disallowed actions can be stored on either the central AAA server or locally\footnote{May not apply to all network gear} in the network node.
\end{enumerate}
\item \textbf{Accounting:}
\begin{enumerate}
\item Network nodes collect user and session information from start to end when connecting to a node,
\item All information is transferred back to AAA server,
\item Transferred info can be leveraged for several purposes. Typically logged info is:
\begin{itemize}
\item session duration,
\item user commands,
\item disallowed commands
\end{itemize}
\end{enumerate}
\end{itemize}
\section{RADIUS}
\section{TACACS+}
% <!-- NTP -->
\chapter{Network Time Protocol}
\section{The old NTP from \tsq{85}}
\section{Secure NTP}
% <!-- NETWORK MANAGEMENT -->
\chapter{Managemnt}
\section{Network management}
\subsection{Routers}
\subsection{Switches}
\subsection{Firewall}
\section{Out-of-band management}
\subsection{Console server}
% <!-- LAYER 3 STUFF -->
\chapter{Protocols Layer 3}
\input{chapter/section/routednetwork}
% <!-- DESCRIBE THE INTERNET -->
\chapter{The Internet {\footnotesize "Post cold-war modern times"}}
\section{Service Providers}
\section{IXP}
\section{MPLS}
\section{BGP}
\section{eVPN}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
% %
% BEGIN list of figures %
% %
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\renewcommand{\listfigurename}{List of {\footnotesize hidden} Figures}
\listoffigures
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
% %
% BEGIN list of tables %
% %
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\renewcommand{\listtablename}{Tables {\footnotesize hidding} on the pages}
\listoftables
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
% %
% BEGIN references %
% %
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\bibliography{references}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
% %
% END DOCUMENT %
% %
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\end{document}