Cybrary Pro Day is here!

Network Storage Types & Configuration

Video Activity

This module discusses protocols: Simple Network Management Protocol (SNMP) Windows Management Instrumentation (WMI) Out of Band Management Short Message Service (SMS) In addition; the module also teaches about Remote Access Tools: Console Port 1. Remote Desktop Protocol (RDP) Remote Hypervisor Access Secure Shell (SSH) HTTP

Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

2 hours 28 minutes
Video Description

This module discusses protocols:

  1. Simple Network Management Protocol (SNMP)
  2. Windows Management Instrumentation (WMI)
  3. Out of Band Management
  4. Short Message Service (SMS)

In addition; the module also teaches about Remote Access Tools: Console Port 1. Remote Desktop Protocol (RDP)

  1. Remote Hypervisor Access
  2. Secure Shell (SSH)
  3. HTTP
Video Transcription
Welcome back to Cyberia. IittIe My name's Justin Lingle. Today we'll be talking about network stories, types and configuration
they were viewed. This will be protocols baseline threshold, automatic event response, a remote access tools,
some protocols that will be used with network storage configuration, R S and M P W. My out of band management and short message service
at seven p stands for a simple network management protocol, and it is a protocol that is used with most routers and switches that allow them to send out an assessment of if they're there or if their status are or other aspects that they have is used and most networks as a monitoring tool.
But in a lot of networks, they actually turn this protocol up for security reasons.
Purpose behind that is, if a hacker gets into your network, then they're able to see all the advice is that you have connected up W. M. I. A. Is another protocol of that Most networks shoes, and it sends for Windows management instrumentation and W. My gives admissibility to create scripts. So that way they can see the CPU uses or C
what's going on inside the network
very easily. And in one file most of time, Adams will come in the log into their machine, and then they'll double click a file. And whenever the double click that file, it will give them the health assessment of their networks that were there to see what switches air turned on when the last time they were rebooted
and other aspects like that that they're using, maybe how much CPU uses or how much memory uses their utilizing.
The next thing is out of band management, not a band. Management is a tool that lets you mess with the
server. Even if the servers turned off is 1/3 party software. Sometimes it it isn't saw it as a life cycle controller. It allows them to get inside the machine and mess with the BIOS, settings or other features that they might need to mess with inside that computer that usually require functions directly in front of that PC. Out of Ben, management
intelligence platform management interface or I p m. I. This was a protocol. Those introduce it allows them to missile that computer and not have to be directly in front of it s a mess
is a text messaging service and it allows admin is to get a text message whenever there's an outage at a network. Say, for instance, the work day's over around eight o'clock, you're going home, and then you get a text that one of your service have went off line.
Well, since you got that text, you're able to respond to that. Maybe you'll use your out of bad management to see what's going on with that server and then be able to get back that server back on line. And if you didn't get that text, you don't have this feature enabled. Well, then you wouldn't know until the very next day. And then whenever you start work in the morning,
you'll see that the service turned off and some of the employees might lose some of their work day.
Because of this
baseline is whenever you have a computer and you have the how it looks on the first day of production, this allows you to see what resource is you're utilizing. At that time, a lot of companies will use that baseline as a troubleshooting tool, and I'll take that baseline and compare it to their current state
and this allows them to see if they're using more CPU or if they're using more memory
and allows them to
update to figure out what the issue is with their program may be on their baseline. They have what processes air running whenever they look at their baseline notes, and they look at the current CPU uses they're seeing process is running that weren't previously running. Then they kill those processes, and it fixes. The issue special was very similar to a glass of water.
The threshold for the glass of water is the ram.
Once you exceed the round water starts spilling out for a computer is very similar that once the computer reaches its threshold service, is there going to start dying? Or possibly the memory will be full and I'll be over. Utilized in the computer might freeze. Once it has that threshold,
you use the threshold
and use the threshold in conjunction with the baseline. To find out what's wrong with your computer,
I may have revenge. Response is a valuable tool that allows you to see what is going on with your computer
whenever you're unable to monitor it. At that time,
for example, you might have an automatic event, respondents, for whenever the server is consuming more CPU uses than normal.
Maybe all the course we're running at full bless. Well, then you would have that set up. So that way it sends you a text message anytime, so that what you can fix the issue before it becomes a disaster. Most of time automated event response is
uses the threshold to trigger the event, and that's how it's able to determine what it needs to do at that point in time.
Next, we're going to talk about some remote access tools. The Consul port Remote Desktop protocol, remote hopper visor access secure shell and http Consul Port is a physical cable that allows you to get into a device to see what is going on with it.
Most switches and routers have a consul port, which will be through a crossover cable and allows you to access that
switch or router
to perform functions that you need to perform.
That's not protocol
allows you to remote into a PC so that the way you can access it and perform functions as if you're directly on that PC remote happen. Visor access connects to a hyper visor from your work station. It allows for multiple High Advisor's into a single consul.
If you've ever used VM wear or possibly hyper V from Microsoft, that is an actual hopper visor access. You're able to see the status of all those virtual she's that you have running, and you're able to manage them from one program from one central location. Secure Shell allows you to remote into a device over the network,
but securely lost you to modify the switch, router or server behind encryption. A CP is commonly what most Web browsers choose. Knowing the port for a C T. P for 80 is very important. Also, knowing the port for a city P s for 43 is extremely important. Also,
some hopper visors can be configured through a Web browser.
The hyper visor might have that resource enabled so that the way you could be at home or at another PC and still be able to access what you need to access on that virtual machine. In this lesson, we talked about resource monitoring techniques and remote access soul. My name is Justin Linguine with Library I t. And hope you guys learned a lot
Up Next