Gadgets on web  

    MAC OUI search  


Related links   

    cisco VoIP   


Start with CMS                    


What is new? Last 5 articles ...

17. Port security on access layer switchport

Port security is feature that enable permit or deny traffic for end user PCs connected to access layer switch. Port security enable specify a group of valid MAC address on port. If maximum secure MAC address  is reached then security violation modes lead to protect, restrict or shutdown of port.


There are 3 ways how to configure port security:

1) Static secure MAC addresses - manually configured with

   switchport port-security mac-address MAC_ADDRESS

16. Administrative Distance and route source preference

In environment with 2 or more enabled routing protocols must be present mechanism for selection of routing sources that are learned. What routing protocol obtained routes for remote network will be introduced to routers routing table? That is a big question.


Administrative Distance in short AD is considered parameter that will break the tie and say about trustworthiness of routing source.



15. PPP and Frame relay in small network

PPP and Frame relay are protocols operating at data link layer used in segment of private WAN connection. PPP enable establish communication through serial link between cisco and noncisco device where can not be used proprietary HDLC cisco encapsulation. Frame relay networks offer packet switched technology in providers network.  This article will focus on simple implementation of PPP serial link and Frame relay link in office environment.



UNIX and posix like OS administration

This section focus on Unix or posix like OS administration. Articles cover area of basic CLI commands with appropriate explanation, deployment of application layer services as FTP, SFTP, WWW, E-mail, NFS, SAMBA file server or LDAP, SSH access an certification key generation.

16. CUCM 8 - Call hunt configuration

As it was in CUCME call hunt enable one hunt pilot number to distribute calls to members of hunt list. For reference please read our article


CUCM configuration for call hunt is more flexible and robust. During creation of hunt environment we going through this steps:

5. Reconstruction discovered network topology along Activity 8.1.2 (CCNA Exploration)

During me preparation for CCNA examen there was some challenges. One from it was discovering hidden network topology in CCNA Exploration course 4. chapter 8. Network troubleshooting with name Activity 8.1.2.

4. Best path selection in multiple protocol environment with - RIPv2, EIGRP and OSPF

Dynamic routing protocol can decrease administrative overhead in large network environment. But what path will be selected for data traveling from point A to point B. Today published scenario will take closer look at path selection process in "academic" multi protocol environment. 


Routing protocols that we can found in intra domain routing environment can be break down into two distinct category.

Tesla Máj 623A

Very interesting construction of this radio use separate tunning indicators. Description of construction is on Schematics can be found on this link. Device in working state is show on YouTube.

Snapshots of my collected device

3. Internet connection for small office with VLAN

This scenario is extension of article 1 where we have enabled internet access for our simple home or small office network. Our scenarios focus only proper connectivity without any access lists for adding local office policy.

For expecting work of this network you must:

Preparation of basic VoIP environment with CME

Baseline for our first training environment created with support of GNS is . testing environment will use cloud component mentioned in earlier topics for interconnection virtual and real pc environment. Me home network use private addressing scheme. For training pc where will run also software IP communicator use static assigned IP.


Subscribe to RSS