Gadgets on web

     vlsm-calc.net  

     wireshark.org  

    MAC OUI search  

 

Related links

   cisco.netacad.net   

     gns3.org   

    cisco VoIP   

 

Start with CMS

    Drupal.org             

    Joomla.org           

    Wordpress.org    

 

What is new? Last 5 articles ...

17. Port security on access layer switchport

Port security is feature that enable permit or deny traffic for end user PCs connected to access layer switch. Port security enable specify a group of valid MAC address on port. If maximum secure MAC address  is reached then security violation modes lead to protect, restrict or shutdown of port.

 

There are 3 ways how to configure port security:

1) Static secure MAC addresses - manually configured with

   switchport port-security mac-address MAC_ADDRESS

16. Administrative Distance and route source preference

In environment with 2 or more enabled routing protocols must be present mechanism for selection of routing sources that are learned. What routing protocol obtained routes for remote network will be introduced to routers routing table? That is a big question.

 

Administrative Distance in short AD is considered parameter that will break the tie and say about trustworthiness of routing source.

 

 

15. PPP and Frame relay in small network

PPP and Frame relay are protocols operating at data link layer used in segment of private WAN connection. PPP enable establish communication through serial link between cisco and noncisco device where can not be used proprietary HDLC cisco encapsulation. Frame relay networks offer packet switched technology in providers network.  This article will focus on simple implementation of PPP serial link and Frame relay link in office environment.


 

 

UNIX and posix like OS administration

This section focus on Unix or posix like OS administration. Articles cover area of basic CLI commands with appropriate explanation, deployment of application layer services as FTP, SFTP, WWW, E-mail, NFS, SAMBA file server or LDAP, SSH access an certification key generation.

16. CUCM 8 - Call hunt configuration

As it was in CUCME call hunt enable one hunt pilot number to distribute calls to members of hunt list. For reference please read our article http://www.cdesigner.eu/content/12-hunt-groups-how.

 

CUCM configuration for call hunt is more flexible and robust. During creation of hunt environment we going through this steps:

14. Wrong default route propagation in OSPF enabled network

Default route introduce ultimate outgoing interface for L3 PDU from our network. Most common use is in stub-networks where is only one interface pointing to outside network (in this case is no need for load balancing between two or among ISPs interfaces). Instead of routers having to store routes for all of the networks in the internet, they can share a single default route to represent any network that is not in the routing table.

 

14. CUCM 8 - free sftp solution for backup on ubuntu 10.04 server

All application based elements of cisco unified communication platform offer disaster recovery system that enable backup and recovery after failure. Backup can be made to two devices. First option is tape device, second is secure FTP (sftp). Because we need cost saving solution in training environment we decided for open-ssh server on ubuntu server.

13. Elimination reliance of CUCM on DNS service

DNS name resolution is needed in voice network if DNS is in use. DNS lookup process must occur before any signaling occur. As result we can expect delay or in worst failure of DNS system on network environment lead to failure in voice placing. Conclusion is DNS is not recommended for use in voice network.

13. STP port roles selection

For port roles selection is important which switch is selected as root bridge. That mean after root bridge selection process (in fact during this process) are port roles determined. (we will discus 802.1d STP, difference in 802.1w rapid STP will be explicit marked in document).

 

In stable converged L2 topology with STP support are there these types of ports:

12. Hunt groups how to

Hunt groups enable set one phone number (this number is refered as pilot number) as distributor of call to extensions defined in number list. Hunt group selection algorithm defines who receive next call in list. Our lab will show you how to configure simple hunt group on Cisco Unified CME.

 

Basic terms bounded with hunting number in list from pilot number are:

Pages

Subscribe to cdesigner.eu RSS