Gadgets on web

     vlsm-calc.net  

     wireshark.org  

    MAC OUI search  

 

Related links

   cisco.netacad.net   

     gns3.org   

    cisco VoIP   

 

Start with CMS

    Drupal.org             

    Joomla.org           

    Wordpress.org    

 

What is new? Last 5 articles ...

17. Port security on access layer switchport

Port security is feature that enable permit or deny traffic for end user PCs connected to access layer switch. Port security enable specify a group of valid MAC address on port. If maximum secure MAC address  is reached then security violation modes lead to protect, restrict or shutdown of port.

 

There are 3 ways how to configure port security:

1) Static secure MAC addresses - manually configured with

   switchport port-security mac-address MAC_ADDRESS

16. Administrative Distance and route source preference

In environment with 2 or more enabled routing protocols must be present mechanism for selection of routing sources that are learned. What routing protocol obtained routes for remote network will be introduced to routers routing table? That is a big question.

 

Administrative Distance in short AD is considered parameter that will break the tie and say about trustworthiness of routing source.

 

 

15. PPP and Frame relay in small network

PPP and Frame relay are protocols operating at data link layer used in segment of private WAN connection. PPP enable establish communication through serial link between cisco and noncisco device where can not be used proprietary HDLC cisco encapsulation. Frame relay networks offer packet switched technology in providers network.  This article will focus on simple implementation of PPP serial link and Frame relay link in office environment.


 

 

UNIX and posix like OS administration

This section focus on Unix or posix like OS administration. Articles cover area of basic CLI commands with appropriate explanation, deployment of application layer services as FTP, SFTP, WWW, E-mail, NFS, SAMBA file server or LDAP, SSH access an certification key generation.

16. CUCM 8 - Call hunt configuration

As it was in CUCME call hunt enable one hunt pilot number to distribute calls to members of hunt list. For reference please read our article http://www.cdesigner.eu/content/12-hunt-groups-how.

 

CUCM configuration for call hunt is more flexible and robust. During creation of hunt environment we going through this steps:

Design

Section contain photos, photoshop made pictures with fun content, tutorials for video editing. Im interesting in these aplications:

  • Photoshop
  • CorelDraw
  • Flash
  • Premiere Pro
  • PowerDirector - ideal if you will "bend" your openCL or CUDA compatible graphisc card for HD editing
  • Encore

 

Collectibles

One of my interests is collecting old TV or radio receivers. They are from old Czechoslovakia manufacturer Tesla, but  some devices or displayed gadgets are Philips, Videoton etc. ... . This section will contain photos and technical description of these devices. I hope that it is not hard to guess i like vacuum tube or in deutsch rohren devices (TV sets, radios, measuring and diagnostic equipment).

VoIP

This section will focus on home VoIP training opportunities with minimal cost. In this time i will prepare for next cisco certification CCNA Voice 640 - 461 certification. There is hopefully cheaper way as buying hw equpement - GNS network simulator as i will show you next, use proprietary IOS images and sw IP communicator for virtual training lab creation. Your opinions and inventions how create home voice training labs are welcome.

Networks

This section will contain example of networking scenarios simulated in cisco packet tracer 5.2 or above. You can use it for private trainig purpouses or for teaching your students. They do not interfere with existing lerning scenarios of existing networking academy, they were created as my hobby training labs created during my preparation for CCNA 640 -802 certification.

Pages

Subscribe to cdesigner.eu RSS