Scrigroup - Documente si articole

Username / Parola inexistente      

Home Documente Upload Resurse Alte limbi doc  
AccessAdobe photoshopAlgoritmiAutocadBaze de dateCC sharp
CalculatoareCorel drawDot netExcelFox proFrontpageHardware
HtmlInternetJavaLinuxMatlabMs dosPascal
PhpPower pointRetele calculatoareSqlTutorialsWebdesignWindows
WordXml


Cursuri CISCO - Regulament de functionare

retele calculatoare



+ Font mai mare | - Font mai mic



Cursuri CISCO

Regulament de functionare

1. Desfasurarea cursului

Cursurile se vor desfasura dupa un program stabilit, de comun acord cu studentii, la inceputul fiecarui modul.



2. Desfasurarea laboratoarelor

In fiecare modul exista un numar de capitole, iar fiecare capitol poate sa aibe sau nu, un numar de laboratoare la care prezenta este obligatorie. Studentii sunt
obligati sa participe la lucrarile practice la datele stabilite in orarul cursului. Nu se poate efectua reprogramarea laboratoarelor. Cei care nu au efectuat un laborator, vor fi depunctati la sfarsitul modulului.

3. Uilizarea aparaturii de laborator si a laboratorului

- este interzisa bruscarea echipamentelor din laborator;

- in laborator sunt interzise: fumatul, bautura si consumul de alimente, utilizarea telefoanelor mobile;

- nu este permisa folosirea aparaturii laboratorului fara permisiunea si supervizarea instructorului sau a laborantului;

- orice defectiune a unui echipament este platita de catre cursantul vinovat;

- se interzice instalarea de soft pe calculatoare, precum si interzicerea folosirii disketelor si Cd-urilor proprii, in afara de cele specifice cursului;

4. Examene

- Dupa fiecare capitol, dintr-un modul, se va da un examen ON-LINE. Toate examenele de capitol sunt obligatorii.

- Toate examenele trebuiesc date in zilele programate, nefiind admise intarzieri. La mai mult de 3 absente, cursantii vor fi exmatriculati, fara preaviz;

- La 3 examene de capitol, obtinute cu un punctaj sub70 de puncte, cursantul va fi exmatriculat;

- La examenele de capitol, cursantii pot folosi notitele personale precum si curriculumul.

- Pentru examenul final, de modul, este interzisa folosirea oricarei surse de documentatie.

- Punctajul minim pentru examenul final, de modul, este de 80 puncte. Daca, cursantul nu obtine punctajul minim, atunci va fi exmatriculat.

- Examenele se dau individual, iar cursantii care sunt prinsi copiind, vor fi exmatriculati

5. Plata

- pentru cursanti, pretul este de 100$ pe modul;

- plata se face la inceputul fiecarui modul, la cursul oficial al BNR din ziua platii;

- in caz de exmatriculare, indiferent de motiv, banii nu vor fi returnati;

Obs. Fiecare student va semna, la inceputul modulului, ca este de acord cu prezentul Regulament.

Sus

Informatii utile

Multe informatii despre CISCO puteti afla la adresa: www.cisco.com

Dupa absolvirea celor patru semestre veti obtine 4 certificate de la CISCO care atesta ca ati urmat cursurile. Veti fi inregistrat in baza de date de la CISCO pentru a putea beneficia de o reducere de pret la examenul CCNA (CISCO Certified Network Associate) .

Instructorii sunt tineri profesori ai Academiei Tehnice Militare, specialisti in informatica, care au urmat toate cele 4 module ale cursului de CISCO cu experienta de peste 5 ani.

Oricine poate face acest curs, cu conditia sa cunoasca bine limba engleza.

Cursurile se defasoara la Academia Tehnica Militara, in laboratorul CISCO.

Derularea cursului

- studentii vor fi inscrisi intr-o clasa pe site-ul https://cisco.netacad.net, avand un nume de cont si o parola pentru autentificare.

- pentru sustinerea examenelor, studentii se vor loga pe site-ul https://cisco-aas.netacad.net, cu contul si parola respectiva, la data stabilita pentru examen, unde vor putea sustine ON-LINE examenul.

- la fiecare sedinta studentii citesc minim doua cursuri din Curriculum si vor da dupa fiecare, un examen.

- notarea examenelor se face automat pe site-ul CISCO.

- punctajul maxim este 100 puncte iar cel minim 80 de puncte.

- pentru examenul final, care contine un numar de intrebari ce poate varia intre 59 si 80, nota minima la acest examen este de 85 puncte.

- nu se poate trece la urmatorul semestru daca nu este absolvit cel anterior.

Contact

Pentru ca acest sit este inca in constructie, pentru orice informatie ne puteti contacta la:

email: cisco@mta.ro

tel: 01/3363309 (08:00-15:00)

Persoane de contact:

Instructori: Marcel Starparu, Ion Badoi, Valentin Sofronie

Sus

Programa de invatamant a cursului

Semester 1

1: The Basics of Computing.
1.1. Understand the Basics of Computer Hardware.
1.2. Understand the Basics of Computer Software.
1.3. Understand Basic Networking Terminology.
1.4. Understand the Binary Number System.
1.5. Understand Digital Bandwidth.
2: The OSI Model.
2.1. Understand a General Model of Communication in Terms of Layers.
2.2. Understand the OSI Model.
2.3. Understand How the OSI Model Compares and Contrasts With the TCP/IP Model.
3: Local Area Networks (LANs).
3.1. Understand Basic LAN Devices.
3.2. Understand the Evolution of Network Devices.
3.3. Understand the Basics of Data Flow Through LANs.
3.4. Understand the Building of LANs.
4: Layer 1 - Electronics and Signals.
4.1. Understand the Basics of Electricity.
4.2. Understand the Basics of Digital Multimeters.
4.3. Understand Some of the Basics of Signals and Noise in Communications Systems.
4.4. Understand the Basics of the Encoding of Networking Signals.
5: Layer 1 - Media, Connections, and Collisions.
5.1. Understand the Most Common LAN Media.
5.2. Understand Cable Specification and Termination.
5.3. Understand the Process of Making and Testing Cable.
5.4. Understand Layer 1 Components and Devices.
5.5. Understand Collisions and Collision Domains in Shared Layer Environments.
5.6. Understand the Basic Topologies Used in Networking.
6: Layer 2 - Concepts.
6.1. Understand Layer 2 - LAN Standards.
6.2. Understand Layer 2 Naming - Hexadecimal Numbers.
6.3. Understand Layer 2 Naming - MAC Addressing.
6.4. Understand Framing.
6.5. Understand Media Access Control (MAC).
7: Layer 2 - Technologies.
7.1. Understand the Basics of Token-Ring.
7.2. Understand the Basics of FDDI.
7.3. Understand the Details of Ethernet and IEEE 802.3.
7.4. Explain Layer 2 Devices in Detail.
7.5. Understand Effects of Layer 2 Devices on Data Flow.
7.6. Understand Basic Ethernet 10Base-T Troubleshooting.
8: Design and Documentation.
8.1. Understand the Process of Planning Structured Cabling - Wiring Closets.
8.2. Understand the Process of Planning Structured Cabling - horizontal and Backbone Cabling.
8.3. Understand Network Power Supply Issues.
8.4. Understand Basic Network Design and Documentation Issues.
9: Structured Cabling Project.
9.1. Understand How to Plan the Project.
9.2. Demonstrate Stringing, Running, and Mounting Cable.
9.3. Understand RJ-45 Jack and Outlet Installation.
9.4. Understand the Basics of Cable Installation.
9.5. Understand the Installation of Structured Cable Runs.
9.6. Understand the Basics of Wiring Closets and Patch Panels.
9.7. Understand the Range of Equipment for Testing Structured Cabling Projects.
10: Layer 3 - Routing and Addressing.
10.1. Understand Why It Is Necessary to Have a Network Layer.
10.2. Understand Path Determination.
10.3. Understand the Purpose and Operation of IP Addresses within the IP Header.
10.4. Understanding and Working with IP Address Classes.
10.5. Understand the Purpose of Reserved Address Space.
10.6. Understand the Basics of Subnetting.
10.7. Understand How to Create a Subnet.
11: Layer 3 - Routing Protocols.
11.1. Understand the Characteristics of Layer 3 Devices.
11.2. Understand How Network Layer Services Are Used to Achieve
Network-to-Network Communications.
11.3. Understand Advanced ARP Concepts.
11.4. Understand Routable Protocols.
11.5. Understand Routing Protocols.
11.6. Understand the Function of Other Network Layer Services in Internet Communication.
11.7. Understand ARP Tables.
11.8. Understand RIP and IGRP.
11.9. Understand Protocol Analyzer Software
12: Layer 4 - The Transport Layer.
12.1. Understand Layer 4 - Transport Layer.
12.2. Understand TCP and UDP.
12.3. Identify TCP Connection Methods.
13: Layer 5 - The Session Layer.
13.1. Understand the Basics of the Session Layer.
13.1.1. Explain session layer overview.
13.1.2. Explain the session layer in simple terms of analogies (like dialogues).
13.1.3. Dialogue Control.
13.1.4. Dialogue Separation -- Major and Minor Synchronization.
13.1.5. Recognize the following as layer 5 protocols: NFS, SQL, RPC, X-Window, ASP, SCP.
14: Layer 6 - The Presentation layer.
14.1. Understand the Basics of the Presentation Layer .
14.1.1. Explain the presentation layer in simple terms.
14.1.2. Give an overview of the presentation layer.
14.1.3. Recognize data format.
14.1.4. Describe file formats.
14.1.5. Describe graphics formats.
14.1.6. Describe multimedia formats.
14.1.7. Describe markup language formats.
14.1.8. Explain data encryption.
14.1.9. Describe data compression.
15: Layer 7 - The Application Layer.
15.1. Understand Client-Server Applications.
15.2. Understand Domain Name Services.
15.3. Understand Various Network Applications.
15.4. Understand Application Layer Examples: E-mail.
15.5. Understand Application Examples: Telnet.
15.6. Understand Application Examples: FTP.
15.7. Understand Application Example: HTTP.
15.8. Understand Application Example: Redirectors.
15.9. Understand the Basics of the Application Layer .



Semester 2


1: Review.
1.1. Understand the OSI Model.
1.2. Understand LANs.
1.3. Understand the Basics of TCP/IP Addressing.
1.4. Understand the Host Layers (the Upper 4 Layers of the OSI Model).
2: Routers.
2.1. Understand Basic Information about Routers and their Use in Networks.
2.1.1. Describe a router.
2.1.2. Describe the function of a router. .
2.1.3. Explain how WAN technologies relate to routers. .
2.2. Understand WANs.
2.2.1. Provide a simpledefinition of a WAN..
2.2.2. Describe WANs anddevices..
2.2.3. Provide an overview ofWAN technology..
2.2.4. Name five WANphysical layer standards..
2.2.5. Name eight WAN datalink protocols. .
2.2.6. Briefly describe the most common WAN technologies. .
2.2.7. Draw and explain the semester 2 lab topology..
2.2.8. Explain how the semester 2 topology relates to the Internet..
2.2.9. Describe the general parts of a router configuration file.
2.2.10. Perform the Network. Setup lab.
3: Using the Router.
3.1. Understand the Basics of Router's Command Line Interface.
3.2. Demonstrate How to Log into the Router.
3.3. Demonstrate How to Enter Router Modes.
3.4. Demonstrate Ability to Discern Different Router Modes and Commands.
4: Router Components.
4.1. Understand Router Components.
4.2. Understand Router Show Commands.
4.3. Understand Router's Network Neighbors.
4.4. Understand Basic Network Testing Commands.
4.5. Demonstrate Compentence with the Basic Show Commands.
4.6. Demonstrate Compentence with the CDP-Related Commands.
4.7. Demonstrate Remote Router Access Using Telnet.
4.8. Demonstrate Network Connectivity Using Ping.
4.9. Demonstrate Network Troubleshooting Using Trace IP.
4.10. Demonstrate Interface Status Using Show Interface.
4.11. Demonstrate Facility with a Range of Show and Testing Commands.



5: Router Startup and Setup.
5.1. Understand the Router Boot Sequence and Setup Mode.
5.2. Demonstrate Ability to Configure a Router from Setup Mode.
5.3. Demonstrate Ability to Configure a Router from Setup Mode - Challenge Lab.
6: Router Configuration.
6.1. Understand Where Router Configuration Files are Located.
6.2. Understand Router Configuration.
6.3. Demonstrate Basic Router Configuration Skills.
6.4. Demonstrate Router Interface Configuration .
6.5. Demonstrate a Network Configuration .
7: IOS.
7.1. Understand the Basics of IOS Versions.
7.2. Demonstrate the Ability to Use and Interpret the Show Version Command.
7.3. Demonstrate the Ability to Load IOS Images.
7.4. Demonstrate Loading IOS Image from a TFTP Server.
7.5. Demonstrate Loading a New IOS Image.
8: Individual Router Configuration Practice.
8.1. Demonstrate the Ability to Fully Configure a Router from the CLI, for a Router Which Has Had Start-up Config Erased.
8.1.1. Describe the importance of individual router configuration..
8.1.2. Make a flowchart showing the router configuration process..
8.1.3. Describe and perform the router password recovery procedure on 1600 and 2500 series routers..
8.1.4. Perform Individual Router Configuration lab.
9: TCP/IP.
9.1. Understand the Basics of Layer 4.
9.2. Understand Some Important Layer 3 Concepts.
9.3. Discuss the TCP/IP Protocol Suite.
9.4. Demonstrate Ability to Use the Show ARP Command.
9.5. Demonstrate Ability to Gather and Use ARP Table Information.
9.6. Demonstrate Ability to Remotely Troubleshoot a Router.
10: IP Addressing.
10.1. Understand IP Addressing and Subnetting.
10.2. Understand the Role of DNS in Router Configurations.
10.3. Demonstrate the Ability to Assign New Subnet Numbers to the Semester 2 Topology.
10.4. Demonstrate the Ability to Assign Subnet Numbers to a Real Network.

11: Routing.
11.1. Understand the Basics of Routing.
11.2. Understand Why Routing Protocols are Necessary.
11.3. Understand the Basics of Distance-Vector Routing.
11.4. Understand the Basics of Link-State Routing.
11.5. Understand the Context of Different Routing Protocols.
12: Routing Protocols.
12.1. Understand Static Routing and Default Routes.
12.2. Understand Interior and Exterior Routing Protocols.
12.3. Understand RIP.
12.4. Understand IGRP.
12.5. Demonstrate the Ability to Set Up Static Routes.
12.6. Demonstrate the Ability to Run RIP on a Network.
12.7. Demonstrate the Ability to Compare and Contrast Static and Dynamic Routes.
12.8. Demonstrate the Existence of a Routing Loop.
12.9. Demonstrate Techniques to Prevent Routing Loops.
13: Network Troubleshooting.
13.1. Demonstrate the Ability to Troubleshoot the 5-Router Network.
13.1.1. Explain the standard configuration..
13.1.2. Describe typical layer 1 errors..
13.1.3. Describe typical layer 2 errors..
13.1.4. Describe typical layer 3 errors..
13.1.5. Describe network troubleshooting strategies..
13.1.6. Perform the Troubleshooting lab on a 5-router network..

Semester 3

LAN Switching
LAN Switching
The Ethernet/802.3 Interface
Half-Duplex Ethernet Design (Standard Ethernet)
Congestion and Bandwidth
Propagation Delay
Ethernet Transmission Times
Extending Shared Media LANs using Repeaters
Improving LAN Performance
Why Segment LANs?
Segmentation with Bridges
Segmentation with Routers
Segmentation with LAN Switches
LAN Switch Latency
Full-Duplex Ethernet Overview
Full-Duplex Ethernet Design
LAN Switching Overview
How a LAN Switch Learns Addresses
Benefits of Switching
Symmetric Switching
Asymmetric Switching
Memory Buffering
Two Switching Methods
Introducing Spanning-Tree Protocol
Understanding STP States
What is a Virtual LAN (VLAN)?
Virtual LANs
Virtual LANs
Introduction to VLANs
Why Create VLANs?
Switches Are the Core of VLANs
Frame Filtering
IEEE 802 VLAN Standardization
Frame Tagging
Adding, Moving or Changing User Locations
Broadcasts Need Boundaries
VLANs Establish Broadcast Domains
Tightening Network Security
Remove the Physical Boundaries
Switches and Hubs
Using Legacy Hubs
Using Legacy Hubs (Cont.)
VLAN Implementation
Port-Centric Virtual LANs
Static VLANs
Dynamic VLANs
Transporting VLANs across Backbones
LAN Design
LAN Design
LAN Design Goals
Design Methodology
Step 1 - Analyze Requirements
Step 2 - Develop LAN Topologies
Step 3 - Addressing
Step 3 - Setting up VLAN Implementation
VLAN Operation
Gathering and Analyzing Network Requirements
Step 1 Analyze Requirements - Gather Data
Step 1 Analyze Requirements - Gather Data (cont.)
Step 1 Analyze Requirements
Step 1 Analyze Network Load and Requirements
Step 1 Analyze Requirements - Traffic-Intense Applications
What Are The Issues?
What Problem Are You Trying to Solve?
Ethernet Technology - Bus Topology
Ethernet Technology - Segmentation
Bandwidth Domain versus Broadcast Domain
Network Design
Developing a LAN Topology
Layer 1 Media and Topology
Developing Layer 1 LAN Topology
Cable Plant Type
Star Topology Using Category 5 Unshielded Twisted Pair
Extended Star Topology
Fast Ethernet - MDF to IDF Vertical Cabling
Layer 1 Documentation - Logical Diagram
Layer 2 LAN Switching
Developing Layer 2 LAN Topology
Use Switches to Reduce Congestion
Layer 2 Switching
Layer 2 Switch Collision Domains
Layer 2 Switch with Hubs
Layer 2 Migration to Higher Bandwidth
Documenting Port Speed
Layer 3 Routing
Layer 3 Routing Implementation
Use Routers for Scalable Internetworks
Use Routers to Impose Logical Structure
Layer 3 Router Implementation
Layer 3 Router for Segmentation
File Servers and Traffic Patterns
Enterprise VS Work Group Servers
Server Placement
Documenting Your Network
What to Document
Physical Network Maps
Logical Network Maps
Reasons to Document
IGRP
Network Layer Basics
Network Layer: Path Determination
Network Layer: Communicate Path
Addressing: Network and Host
Routing Uses Network Addresses
Routed versus Routing Protocol
Network-Layer Protocol Operations
Multiprotocol Routing
Static versus Dynamic Routes
Adapting to Topology Change
Dynamic Routing Operations
Representing Distance with Metrics
Routing Protocols
Classes of Routing Protocols
One Issue: Time to Convergence
Distance Vector Concept
Distance Vector Network Discovery
Distance Vector Topology Changes
IP Routing Learns Destinations
Autonomous Systems
Interior and Exterior Routing Protocols
Interior IP Routing Protocols
IP Routing Configuration Tasks
Dynamic Routing Configuration
Configuring IGRP
IGRP Overview
IGRP Configuration
IGRP Configuration Example
show ip protocol Command
show ip route Command



Access Control Lists
Access Lists Overview
Why Use Access Lists?
Why Use Access Lists? (cont.)
What are Access Lists
How Access Lists Work
A List of Tests: Deny or Permit
Access List Command Overview
How to Identify Access Lists
TCP/IP Access Lists
Testing Packets with Access Lists
Key Concepts for Ip Access Lists
How to Use Wildcard Mask Bits
How to Use Wildcard Mask Bits (cont.)
How to Use the Wildcard any
How to Use the Wildcard host
IP Standard Access Configuration
Standard Access List Example 1
Standard Access List Example 2
Standard Access List Example 3
Extended IP Access Lists
Extended Access List Configuration
Extended Access List Example 1
Extended Access List Example 2
Using Named IP Access Lists
Where to Place IP Access Lists
Monitoring Access Lists
Monitoring Access List Statements
Reserved TCP Port Numbers
Reserved UDP Port Numbers
Novell IPX
IPX Routing Overview
Cisco Routers in NetWare Networks
Novell NetWare Protocol Suite
Key Novell NetWare Features
Novell IPX Addressing
How to Determine the IPX Address
Multiple Novell Encapsulations
Cisco Encapsulation Names
Novell Uses RIP for Routing
SAP Service Advertisements
GNS Get Nearest Server Protocol
Configuring IPX Routing
Novell IPX Configuration Tasks
Novell IPX Global Configuration
Novell IPX Interface Configuration
Novell IPX Configuration Example
Verifying and Monitoring IPX Routing
Verifying IPX Operation
Monitoring the Status of an IPX Interface
Monitoring IPX Routing Tables
Monitoring the Novell IPX Servers
Monitoring IPX Traffic
Troubleshooting IPX Routing
Troubleshooting IPX SAP

Semester 4

WAN Lesson
Common WAN Technologies
Wide Area Networks and Devices
WAN Technology Overview
Physical Layer: WAN
Data Link Layer: WAN Protocols
Wide Area Networking
Overview of Wide Area Services
Interfacing WAN Service Providers
Subscriber to Provider Interface (DCE/DTE)
Using WAN Services with Routers
WAN Frame Encapsulation Formats
WAN Encapsulation Protocols
WAN Frame Format Summary
Serial Line Encapsulation
HDLC Encapsulation
PPP Encapsulation
WAN Link Options
WAN Technology Options
WAN Signaling Standards and Capacity
Dedicated Lines
Lease Line Connections
Dedicated Connectivity
Leased Line Usage
Multiple Path in Core WAN
Packet/Cell-Switched Connections (Frame Relay)
Frame RelayAccess Devices
Frame Relay Service and Circuits
Frame Relay: Cost Effective Connectivity
Circuit Switched Connections
Dial-on-Demand Routing
ISDN Overview
ISDN Services - Basic Rate Interface (BRI)
ISDN Data Link Encapsulation
WAN Design
WAN Design
Analyze Requirements - Gather Data
Analyze Requirements - Gather Data (cont.)
Analyze Requirements
Analyze Network Load Requirements
Analyze Requirements - Traffic-Intense Applications
Benefits of a Hierarchical Design Model
Three-Layer Model Components
Core-Layer Functions
Distribution-Layer Functions
Access-Layer Functions
One-Layer Design - Distributed
Two-Layer Design
Adding Frame Relay and ISDN WAN Links
Traffic Patterns
Traffic Patterns (cont.)
Traffic Pattern in a Two-Layer Hierarchy
Server Placement
Point-to-Point Protocol
Point-to-Point Protocol (PPP)
Point-to-Point Protocol (PPP) Overview
Layering PPP Elements
PPP Operation
PPP Frame Formats
PPP LCP Configuration Options
PPP Link Negotiation
PPP Authentication Overview
Selecting a PPP Authentication Protocol
Selecting a PPP Authentication Protocol (cont.)
Configuring PPP with Authentication
PPP Authentication Commands (cont.)
Verifying PPP
ISDN
Integrated Services Digital Network (ISDN) BRI Overview
Intergrated Services Digital Network (ISDN) Overview
Remote Access Issues
Dial-up Connections
Remote Node
Dedicated Telecomputer/Teleworker
Small Office/Home Office with LAN
What is ISDN?
ISDN Services - Basic Rate Interface (BRI)
ISDN Standards and the OSI Model
ISDN Standards
ISDN Components
ISDN Overview
ISDN Reference Points
Data-Link Encapsulation
ISDN Encapsulation Options
Point-to-Point Protocol
ISDN Access Options
ISDN Switch Types
Configuring ISDN
ISDN Configuratioon Tasks
Configuring ISDN BRI
Specifying Traffic to Trigger Call
Selecting Interface Specifications
Setting SPIDs if Necessary
BRI Simple Configuration Example
Verifying ISDN Operation
Verifying ISDN Operation (cont.)
Frame Relay
Frame Relay
Frame Relay Overview
Frame Relay Terminology
Frame Relay Terminology (cont.)
Frame Relay Data Link Connection Identifier (DLCI)
Frame Relay Frame Format
Frame Relay Addressing
Frame Relay Operation - LMI
Inverse ARP
Frame Relay Mapping
Frame Relay Operation - Switching
Frame Relay Operation
Frame Relay Operation (cont.)
Subinterfaces
Frame Relay Implementation without Subinterfaces
Frame Relay Subinterfaces
Reachability Issues with Routing Updates
Resolving Reachability Issues
Configuring Frame Relay
Configuring Basic Frame Relay
Configuring Basic Frame Relay (cont.)
Verifying Frame Relay Operation
Configuring Optional Commands (cont.)
Configuring Optional Commands
Configuring Subinterfaces
Configuring Subinterfaces (cont.)
Multipoint Subinterfaces Configuration Example
Point-to-Point Subinterfaces Configuration Example

Sus





Politica de confidentialitate | Termeni si conditii de utilizare



DISTRIBUIE DOCUMENTUL

Comentarii


Vizualizari: 1452
Importanta: rank

Comenteaza documentul:

Te rugam sa te autentifici sau sa iti faci cont pentru a putea comenta

Creaza cont nou

Termeni si conditii de utilizare | Contact
© SCRIGROUP 2024 . All rights reserved