Community ForumCommunity Wiki * Blog Home  * Log in

Posts Tagged ‘Tutorial’

Networking Appliances Explained

posted in Education, Training
by on January 5th, 2012 tags: , ,

If you’re new in the networking field and are faced with a complex network design, or are asked to design one, it can be a difficult task understanding what everything does. The certifications don’t cover it all: there’s so much more to networking than just routers and switches.

Therefor: an explanation about various appliances you’ll likely meet or need in a company. An appliance is a device that performs a specific purpose. Most simple example is a router: it’s actually a computer, but it can only provide routing. Here’s a list of other common devices:

Read the rest of this post »



Rsync On CentOS 5.6

posted in General, Technical
by on September 9th, 2011 tags: , , , , ,

Just a quick blog about Rsync on A CentOS 5.6 box. I’m currently using Rsync to backup our Samba Server – all 500 Gigs of it!!

It’s going to take a few days but it will have an exact replica of the Samba server on the Rsync server and you don’t have to have any clients installed on other machines for Rsync to work. All you need is administrative credentials on the machine you are going to Rsync with.

Once I’ve figured all of this out, I will be setting my Rsync box to start backing up automatically every night (full backup) and also, when a file is changed on the Samba Server. I’m going to try and figure out the latter as I haven’t figured out how Rsync will be able to detect that a file has changed or been removed, etc. Once I have done so though I’m sure it’s going to be very handy, also I’ll be setting the Rsync box to backup all of the the user areas and profiles held on the DCs and also the users folder on the PCs.

Read the rest of this post »



Lock-and-Key Security (Or how I learned to love the Dynamic ACL)

posted in Cisco Networking, Technical
by on April 4th, 2011 tags: , , , ,

I’ll be honest. I have no idea where you would ever use this feature. But yet Dynamic ACLs exist and Lock-and-Key security is a tool that a Cisco network administrator has at his or her disposal. As such, I’m now going to blog about this because I need to make sure I know them in case they show up on my CCIE lab attempt and perhaps you might find this at least interesting if not actually useful.

So what is Lock-and-Key security? Well the short version is that Lock-and-Key security allows for an ACL to have dynamic entries that become active under certain conditions thereby allowing or disallowing network traffic to flow in a predetermined manner.

Read the rest of this post »



MPLS VPN with BGP Customers

posted in Cisco Networking, Technical
by on November 23rd, 2010 tags: , , ,

Objectives

Company 1 and Company 2 have decided to sign up with ISP for their MPLS VPN service to connect their two sites. CE routers IP addresses and routing protocols are already configured. ISP already has MPLS and iBGP peering between the PE routers configured.

We will complete these six steps to complete and verify the setup of a MPLS VPN for C1 and C2:

  1. Configure C1 and C2 VRFs on PE1 and PE2 router. Assign a RD and RT for each VRF
  2. Configure PE1 and PE2 CE-facing interfaces
  3. MP-BGP IPv4 address family BGP configuration
  4. Verification of configuration for both C1 and C2
  5. Remove TTL propagation so that P routers are hidden from customer during traceroutes
  6. MD5 authentication added to LDP sessions for PE1-P and PE2-P

Read the rest of this post »



MPLS VPN with OPSF and OSPF-Sham Link Customers

posted in Cisco Networking, Technical
by on November 1st, 2010 tags: , , ,

Objectives

Company 1 and Company 2 have decided to sign up with ISP for their MPLS VPN service to connect their two sites. CE routers IP addresses and routing protocols are already configured. ISP already has MPLS and iBGP peering between the PE routers configured.

We will complete these six steps to complete and verify the setup of a MPLS VPN for C1 and C2:

  1. Configure C1 and C2 VRFs on PE1 and PE2 router. Assign a RD and RT for each VRF
  2. Configure PE1 and PE2 CE-facing interfaces
  3. PE-CE routing protocol setup
  4. MP-BGP IPv4 address family configuration
  5. OSPF sham link configuration
  6. Verification of configuration for both C1 and C2

Read the rest of this post »