$ ls -t posts/
-
Checkpoint Firewall Lab
We got a new Nokia Firewall and I tried to login with the default username βadminβ and the default password βPasswordβ however that didnt not work. What comes in this case: Password Recovery. Checkpoint has already imported the Solution from Nokia Support, this is: sk41239 β How do I change the β¦Read more → -
Port Security
Port security allows you to control the number of MAC addresses that can be learned on a single switch port. It is enabled on a per interface basis. It can protect against malicious applications that can sned thousands of of frames into a network with a different MAC address therefore exhausting the β¦Read more → -
BPDU Guard
When BPDU Guard is enabled and a switch port receives a BPDU it stops forwarding and disables itself. It is common to enable this on a access port, usually in addition to portfast. In theory a user should never generate legitimate BPDUs therefore this mechanism helps prevent malicious alteration of β¦Read more → -
Common L2 threats (and how to mitigate)
The best practices for securing switches; Select an unused VLAN (other than VLAN1) and use for the native VLAN on all trunks Avoid using VLAN1 anywhere because it is the default Admin configure access ports as access ports so users cannot negotiate a trunk and disable the negotiation of trunking (no β¦Read more → -
CCNA Security
I have found myself using the Cisco ASA more and more in the day job. This is mainly due to me changing jobs back in March and looking after customers who have ASA deployed (and some PIX :-)) for both firewalls and VPNβs, as a result I really need to learn more about them so I though the best way β¦Read more → -
First step with Brocade networking......
The new estate that I look after has some BrocadeΒ switches (wellΒ plannedΒ at time of writing), as a result I thought I should start to gain some knowledge of their area. While getting access sorted to the myBrocade (like CCO) pages I started to look around the certifications site. The first that β¦Read more → -
OSPF
Include the external cost as well as the internal cost to the ASBR. Used to exit the AS as close as possible to the destination. Mostly used if multiple exit points out an AS exist. β OSPF External Type2 (E2) routes: Include only the external cost of the route. Used to exit the AS via closest ASBR. β¦Read more → -
Persistence cookie F5 LTM
NOTE: This entry is to be completed! The BIG-IP combines the two encoded values and inserts them into the persistence cookie. For example, using the IP address and port 10.1.1.100:8080 as encoded above, the persistence value BIG-IP LTM encodes in the cookie is as follows: 1677787402.36895.0000 Note: β¦Read more → -
VTP
The VTP password can be done in 3 places; privilege mode VLAN database global config mode VTP can be configured under the VLAN database; vlan database vtp domain CCIE exit VTP password can be configured in 3 places; privileged mode VLAN database global configuration modeRead more → -
Frame Relay
Frame relay is; High Performance WAN protocol Layer 2 Originally designed for use in ISDN links but now for a variety of others Packet Switched Types of Frame Relay Point-to-point; L2-L3 mapping not required as only one DLCI is allowed on P2P interface Broadcast capability is automatically enabled β¦Read more →