Author archive: admin

During designing and implementation of wireless network you will come across on Layer 2 and 3 roaming. Both of them improve scalability of the wireless network  and simplify end user life, but work differently.

When we think AAA server we think about Radius and TACACS+ servers. The servers that are responsible for authentication, authorization and accounting. What is, what we may get of AAA server and how to use its, let’s check it on real examples.

Since routers and multilayer switches use Cisco Express Forwarding feature, the true that switches are much more faster than routers is not a true anymore. Nowadays routers can make decision with the wirespeed likely switches with ASICS. What is CEF, how works and how helps out the routers in packets routing ?

In simple network that doesn’t consists of a large numbers of routers, doesn’t relay on more than one routing protocol or doesn’t use BGP you may never come across Route Maps, but if one of above conditions is fullfiled then for sure sooner or later you will have to consider using route maps. What are, when and…

Usually if we mention about Public Key Infrastructure we think about external Certificate Authority like Verisign or GoDaddy. It turns out, there is a SCEP protocol that enables us running our own CA in Cisco environment and that certificates we may use during ISAKMP IKEv1 or IKv2 authentication.

In the course of time the CLI tools that have appeared in particular versions of Linux distributions evolved significiantly. From ifconfig through ip to the nmcli and many other like ss, isof etc. Let’s have a look at Linux from  the perspective of networking, its configuration, management and troubleshooting.

Crone and NTP (network time protocol) services are to some extent linked with each other despite they do completely different things. Crone is responsible for automating of processes, NTP for keeping time on our server up to date, but correct work of Crone is dependant on correct work of NTP.

You may be familiar very well with BGP protocol but probably until you don’t start use MPLS L3 VPN or IPv6 you will not have awareness that the other kind of BGP addresses exist. For carrying the other BGP addresses responsible is Multi Protocol BGP,  that we  break down right now.

Vmware vSphere offers two amazing solutions in regard to ensuring high availability. One of them is called High Availability and the second one Fault Tolerance feature. Both of them complement each other providing uninterrupted working of the virtual machines in cluster.

Zone Based Firewall in IOS, combines 2 concepts: Modular Policy Framework and well-known Zones from ASA firewalls. ZBF solution is more secure than ACLs, easier to implement and to troubleshoot. Rely on statefull filtering what is also well-known from ASA firewalls. Despite this, is not fresh solution, but still works out very well.  

Menu