IT Issues

You may be familiar very well with BGP protocol but probably until you don’t start use MPLS L3 VPN or IPv6 you will not have awareness that the other kind of BGP addresses exist. For carrying the other BGP addresses responsible is Multi Protocol BGP,  that we  break down right now.

Zone Based Firewall in IOS, combines 2 concepts: Modular Policy Framework and well-known Zones from ASA firewalls. ZBF solution is more secure than ACLs, easier to implement and to troubleshoot. Rely on statefull filtering what is also well-known from ASA firewalls. Despite this, is not fresh solution, but still works out very well.  

Every network has to be measurable. It means that you have a view on processes, accidents that take place in the network. You have to be aware what happens and why, in the network that you administer. There is a couple of protocols that helps us to deal with this issue.

Converting decibels to miliwatts is a crucial skill when you deal with wireless networks. In this short article I will show how to do that fast and painlessly.

One of the first thing during designing campus network is an IP addressation scheme and its assigning at Access Layer. For handing out IP addresses responsible is DHCP protocol,  proper deployment of DHCP server in large environment can spare us a lot of trouble and issues.

There is no doubt, on the edge of the network some kind of the redundancy is always desireable.In this article I am going to discuss 2 examples to provide redundancy. First one: there is ONE router with 2 WAN connections leading to different ISPs and second one we have TWO switches with 2 WAN connections leading…

Simple RSA Private/Public key is not enough to provide secure connection between Client and Server. How do we really know that the server we want  connect to is actually correct server, not a bogus one ? Private Key might be stolen and somebody else can easily pretend the server.  3rd party Certificate Authority and Public Key Infrastructure…

There are two kinds of remote access which you may use in order to provide remote access for teleworkers in your company, namely IPSec and SSL. Both of them are reliable, secure and work very well but … there is always the catch. Based on one simple example of live, let me familiar you with advantages of…

If we can virtualize  layer 2 with Vlans, maybe there is a solution that enables us to virtualize layer 3 on a router? If we could separate the traffic within the same  interface and prevent particular flow in participating in choosen routing processes. In other words alike on ASA where we create contexts in order to split one single chassis…

Usually administrators focus more on threats that may come on WAN interface than LAN, what is understandable, cause we trust people that we work with. But sometimes it may be deceptive, especially if we administrate the network in rapidly changing environment (flow of people) with features like BYOD (Bring Your Own device) with no entire…

Backup is the keyword in case of data storage. Even the newest technologies deployed will not work out if one day turns out that some hard drives with crucial data don’t work, RAID may failed owing to the numbers of broken hard disks, your SAN has been destroyed or data have been accidentally (or not) permamently…

Access Control Lists are used not only to permit and deny traffic but for marking only interested traffic also. They may be used in cases like : NAT, Quality of service, policy routing, route filtering and VPN. Besides, there is a few kinds of ACLs depends on what traffic and where we are going to…

Widespread FTTx/GPON technology  has become one of the most interesting variant for Internet Service Providers in case of delivery Internet with other services like Video or IP telephony. Easy to implement, doesn’t require active components on the path from ISP to the client and very robust. What else makes FTTx/Gpon solution so interesting, how does it…

If we have no fault tolerance in Storage Area Network we are exposed to losing data. RAID solutions have been invented in order to provide mechanisms which keep our data safe. RAID in different variants has different level of safety. What are and what characterizes RAID variants , what they do and what is their influence…

Border Gateway Protocol has two features which enable improving scalability. Thanks to them BGP AS domain with a lots of routers will be working more efficient and seamlessly. They are similar to each other and because of that, they are very often confused. But first, in order to understand RR and Confederations we have to…

Menu