Cisco Vs Juniper |
- Cisco Vs Juniper
- Trend Micro makes push into desktop virtualization security
- Protect Your PCs Against Adobe Security Flaws
- Security Manager's Journal: Without patch management, you are nothing.
- CCNA Cisco Certification Case Study
- LTE vs WiMAX
- Cisco vs Juniper
- Cisco goes social with Quad
- How vulnerable is Cisco?
- Facebook vs. Twitter
Posted: 07 Jun 2010 11:34 AM PDT I have found the following article at pcworld.com and thought about sharing with you. Its a good overall comparison between Cisco and Juniper, the two biggest players in the networking arena. It's been an ongoing debate for much of the last 14 years – Cisco or Juniper? Increasingly, that argument will hinge on which router manufacturer has the more compelling unified data center fabric architecture: Cisco's Unified Computing System or Juniper's single-layer Stratus. The Battle Between JUNOS and IOS The argument began in 1996 with Juniper's founding; until then, Cisco had ruled the router roost in both the enterprise and service provider markets since its founding in 1984. But with the growing importance of the Internet, venture capitalists and unhappy Cisco customers sunk money into the idea of forming a start-up to build a better mousetrap, specifically for service providers. Juniper's first year was nurtured with early investments from the Anschutz family (Qwest's majority stakeholder), AT&T, Ericsson, Lucent, Nortel, Siemens/Newbridge Networks, 3Com and UUNET. IBM agreed to develop custom ASICs for Juniper's Internet routers, the first of which was the M40. With all the heavyweight backing, Juniper became and is still Cisco's most formidable challenger in service provider routing. The company gradually attained a roughly 30% share of the $8 billion market, virtually all at Cisco's expense, and has been the technological darling of some bitheads over the past decade for the purity – or purpose-built specialty – of its silicon and software. This remains Juniper's chief differentiator from Cisco. Cisco was viewed as a packager of enterprise-class products that were being deployed in more demanding service provider requirements. Cisco's dominance and ubiquity in routing made many of its customers hungry for an alternative. Cisco isn't standing still. It's been re-energized by the emergence of Juniper and the recent gains of Alcatel-Lucent in service provider edge routing. In 2009, Alcatel-Lucent leapfrogged Juniper's nine-year hold on the No. 2 market share position in the service provider edge, according to Dell'Oro Group. And Cisco still holds the lion's share of the enterprise and service provider router market, with a customer base that's mostly loyal to its incumbency. But it is Cisco and Juniper that try to leapfrog each other technologically in the service provider core and edge. Right now, the multi-chassis core race pits Cisco's Carrier Routing System against Juniper's T Series for tens – even hundreds — of terabits supremacy. Juniper is taking the battle to enterprise data centers and cloud computing environments. Emboldened by its success in carrier routing, Juniper unveiled enterprise Ethernet switches two years ago in an attempt to become a credible alternative to Cisco's dominance in that market, too. The company believes it can carve a niche in the elite networking arenas of financial trading, high-performance computing and other demanding enterprise environments just like it did in service provider routing. In the data center, both companies are surrounding themselves with high-profile partners to help push their competing visions: Cisco with EMC and VMware, and Juniper with IBM. At stake, just as in service provider routing, is a multibillion dollar opportunity – $85 billion in private clouds by 2015, according to Cisco – to become the primary supplier of next-generation data centers, further entrench new and existing customers, and lock its rival out of lucrative, big ticket accounts. http://www.pcworld.com/businesscenter/article/198147/cisco_vs_juniper.html |
Trend Micro makes push into desktop virtualization security Posted: 07 Jun 2010 09:00 AM PDT |
Protect Your PCs Against Adobe Security Flaws Posted: 07 Jun 2010 09:00 AM PDT Adobe has been very successful at establishing its products as cross-platform, operating system agnostic tools for delivering content. Unfortunately, those same attributes are also attractive reasons to attack Adobe products, and Adobe has been a little less successful at ensuring those products are secure. IT administrators need to exercise increased diligence to protect against Adobe software flaws and malicious PDF files. |
Security Manager's Journal: Without patch management, you are nothing. Posted: 07 Jun 2010 09:00 AM PDT Does it all come down topatch management? As a security manager, I pursue many initiatives, striving to protect the company on many fronts. But patch management is a key metric of our risk exposure, since there is a direct correlation between security incidents and patch compliance. So, in a way, it does all come down to something as basic as patch management, because if we fail there, we can't be secure. |
CCNA Cisco Certification Case Study Posted: 07 Jun 2010 05:16 AM PDT Your CCNA certification exam efforts must include practicing with different password types and knowing how to configure them on a Cisco router - but for CCNA exam success and to thrive in real-world networks, you also have to know how to examine a Cisco router configuration and determine the level of network security that is already present.? After all, most routers you work with already have passwords set, and it's up to you to determine if those passwords are getting the job done. Let's start with a telnet password.? Telnet passwords are configured on the VTY lines, and no telnet access is enabled on a Cisco router by default.? If you saw the following configuration, what would it mean? line vty 0 4 ?privilege level 15 ?password baseball ?login That small Cisco router configuration means three things - first, Telnet access is enabled.? Second, the password is baseball.? Third, the "privilege level 15″ command means that any user who attempts to Telnet to the router and knows the password will automatically be placed into privileged exec mode.? (If that command were not present, the user would be placed into user exec and then prompted for the enable password before being allowed into privileged exec.) You may not want to give that level of access to all incoming Telnet connections.? If you walked into a client's router room and saw this configuration on a router, what would it mean to you? username halas password 0 bears username ewbank password 0 jets username ed privilege 15 password 0 mcdaniel line vty 0 4 ?? login local This configuration means three things as well.? Each user attempting to telnet in will be prompted for both a username and password.? Each individual user must enter the password that's been assigned to them.? For example, the user "halas"would have to enter the password "bears" to successfully Telnet into this router.? The command "login local" under the VTY lines means that this local database of usernames and passwords will be used for authentication.? Again, by default, users who are Telnetting in will be placed into user exec mode by default.? Only users with "privilege 15″ in the middle of their username / password definition will be placed into privileged exec immediately upon login. Notice that zero in each of the username / password statements?? I didn't enter that when I configured these statements.? This number indicates the level of encryption the password is currently under; a zero is the lowest level of encryption, indicating that the passwords aren't encrypted at all.?? There's a single line near the top of a Cisco router configuration that tells you why.. which of these three is it? service timestamps debug uptime service timestamps log uptime no service password-encryption Simple enough!? The password encryption service is off by default.??? To turn it on. just run the command service password-encryption.? Let's do so here and then take a look at the configuration. R1(config)#service password-encryption username halas password 7 1415170A1E17 username ewbank password 7 070524585D username ed privilege 15 password 7 082C4F4A08170C121E Now that's what I call encryption!?? Note that the zero has changed to a "7″ - that's the highest level of encryption on a Cisco router, and as you can see, it's very effective. Knowing how to read a Cisco router configuration is a valuable skill for both the CCNA certification exam and working with production networks.? Keep practicing, keep studying, and you'll have the coveted letters "CCNA" behind your name soon! |
Posted: 07 Jun 2010 09:00 AM PDT |
Posted: 07 Jun 2010 09:00 AM PDT |
Posted: 07 Jun 2010 09:00 AM PDT |
Posted: 07 Jun 2010 09:00 AM PDT Cisco has been the dominant vendor of enterprise switches and routers for the last 20 years and that is not likely to change anytime soon. There are, however, some transitions taking place in the overall IT marketplace that indicate that Cisco could be vulnerable to losing at least some market share. We will use the next two newsletters to discuss our thoughts on how vulnerable Cisco is in the enterprise networking market. |
Posted: 07 Jun 2010 09:00 AM PDT |
You are subscribed to email updates from "Cisco" via ehsan in Google Reader To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment