You can deploy some modern firewalls in Layer 2 mode such that they are transpart
I’ve got wireless problems that I can’t solve. I’m using the MetaGeek Chanalyser and a Wispy DBx to perform spectrum analysis and I can’t work out what these bursts are.
It’s a common discussion about when Cisco VTP protocol is actually forwarded through Cisco switches and when it’s isn’t. I’ve always gotten it somewhat confused and when I stumbled across some old notes on the topic I had an ah-hah moment. I’m answering the equation about when using VTP in your network, which versions are risky – that’s risky is terms of how do you prevent VTP updates from ‘crossing’ a switch.
Microsoft announces zero-day exploitable RDP flaw that gets full compromise of server. Expects worm to be available within thirty days. I get to gloat and say “I told you so” to all Microsoft admins everywhere.
I’ve been considering a small but vital problem in naming conventions in Networking. Namely, the use of underscores and hyphens in object names and devices. It’s a hot topic for argument when the time comes for corporate standards (and when Network Engineers have beverages in a public house). Now, I figure that there are three possible grammar options for making names – hyphens, underscore and CamelCase.
Short Answer is “It depends, but usually yes.” Long answer follows with a discussion of launch power, receiver sensitivity, and cable losses.
I’m responding to Brad Hedlund’s post “On optimizing traffic for network virtualization” where he seems to missed a key point. It’s about cost of ownership in terms of ability to troubleshoot.
There is a significant numbers of ASA5110 chassis that have been reworked to look and act like ASA5520 or ASA5540 firewalls. Refer this bug toolkit for more details.
Why does Nexus NXOS use ‘switchto’ instead of ‘changeto’ for the CLI ?