Most engineers think that cable is simply plug and play. And mostly, that true. In recent years, Ethernet standards and manufacturing Here are 20 things that Network Engineers have forgotten or don’t know about network cabling in a two part series on things I have learned in twenty years of looking after networks.
I’ve talked bit about the problems of using Category 6 copper cabling in the data centre. The sheer size and weight of the cable is a serious problem. Here are some photos showing the comparison of Category 5 and Category 6 cable bundles.
BPDU Guard and Root Guard are enhancements to Spanning Tree Protocol (STP) enhancements that improve the reliability of the protocol to unexpected events ad are primarily to ensure design enforcement ( integrity / security). There they must configured in specific locations in the networks.
When working on NX-OS it’s kind of annoying to attempt to use a feature that hasn’t been enabled and get an error message. Why not get an “not enabled” or “not licensed” error message ?
Sometimes you need to use many different Proxy Auto Configuration files with a web browser, usually when testing or trying out new installation of the proxy servers.
You can deploy some modern firewalls in Layer 2 mode such that they are transpart
I’ve got wireless problems that I can’t solve. I’m using the MetaGeek Chanalyser and a Wispy DBx to perform spectrum analysis and I can’t work out what these bursts are.
It’s a common discussion about when Cisco VTP protocol is actually forwarded through Cisco switches and when it’s isn’t. I’ve always gotten it somewhat confused and when I stumbled across some old notes on the topic I had an ah-hah moment. I’m answering the equation about when using VTP in your network, which versions are risky – that’s risky is terms of how do you prevent VTP updates from ‘crossing’ a switch.
Microsoft announces zero-day exploitable RDP flaw that gets full compromise of server. Expects worm to be available within thirty days. I get to gloat and say “I told you so” to all Microsoft admins everywhere.
I’ve been considering a small but vital problem in naming conventions in Networking. Namely, the use of underscores and hyphens in object names and devices. It’s a hot topic for argument when the time comes for corporate standards (and when Network Engineers have beverages in a public house). Now, I figure that there are three possible grammar options for making names – hyphens, underscore and CamelCase.