$ ls -t posts/
-
TCL ping
I useful method to script the pinging of multiple IP addresses; tclsh foreach address {10.1.1.1 10.2.2.2} {ping $address repeat 2} tclquitRead more → -
RIP Configuration
The following are the various RIP configuration commands on Cisco routers. Notes on RIP can be found here. RIP router rip network #subnet to advertise/enable RIP on passive-interface #dont send/process updates neighbour #unicast message to destination IP offset-list (in|out) #manipulate route metric β¦Read more → -
RIP
General RIP UDP-520 2 message types; - Request Message (used to ask neighbours to send updates) Response Message (Carries an update) Metric is hop-count On startup RIP broadcasts a request message packet out each RIP enabled interface - The RIP process then enters a loop - Listening for RIP requests β¦Read more → -
USB->Serial (MAC)
I bought a USB Serial port that had MAC drivers. Check before you buy it that it has drivers. Not all USB Serial have MAC support. I assume that you have installed the correct drivers from here. First, open Terminal (Applications/Utilities/Terminal). Next, type ls /dev/tty.* to get a list of your β¦Read more → -
Checkpoint Firewall Lab
We got a new Nokia Firewall and I tried to login with the default username βadminβ and the default password βPasswordβ however that didnt not work. What comes in this case: Password Recovery. Checkpoint has already imported the Solution from Nokia Support, this is: sk41239 β How do I change the β¦Read more → -
Port Security
Port security allows you to control the number of MAC addresses that can be learned on a single switch port. It is enabled on a per interface basis. It can protect against malicious applications that can sned thousands of of frames into a network with a different MAC address therefore exhausting the β¦Read more → -
BPDU Guard
When BPDU Guard is enabled and a switch port receives a BPDU it stops forwarding and disables itself. It is common to enable this on a access port, usually in addition to portfast. In theory a user should never generate legitimate BPDUs therefore this mechanism helps prevent malicious alteration of β¦Read more → -
Common L2 threats (and how to mitigate)
The best practices for securing switches; Select an unused VLAN (other than VLAN1) and use for the native VLAN on all trunks Avoid using VLAN1 anywhere because it is the default Admin configure access ports as access ports so users cannot negotiate a trunk and disable the negotiation of trunking (no β¦Read more → -
CCNA Security
I have found myself using the Cisco ASA more and more in the day job. This is mainly due to me changing jobs back in March and looking after customers who have ASA deployed (and some PIX :-)) for both firewalls and VPNβs, as a result I really need to learn more about them so I though the best way β¦Read more → -
First step with Brocade networking......
The new estate that I look after has some BrocadeΒ switches (wellΒ plannedΒ at time of writing), as a result I thought I should start to gain some knowledge of their area. While getting access sorted to the myBrocade (like CCO) pages I started to look around the certifications site. The first that β¦Read more →