Skip to main content

Home/ Groups/ NTEN225
Phil Ashman

Utilizing the New Packet Capture Feature - Cisco Support Community - 1 views

  •  
    Capturing packets on a cisco router
Phil Ashman

Network Engineering Cheat Sheets - 1 views

  •  
    Cheat sheets for network engineering. eg: IPV6, EIGRP, OSPF, VOIP etc...
Phil Ashman

Cisco 10 Minutes on Webcast - SC Magazine US - 0 views

  •  
    Security Webcasts
Phil Ashman

Flexible-Packet-Matching.pdf - 0 views

  •  
    One of the issues facing network and security engineers is defending the network against dynamic threats. This means traffic that cannot easily be identified by regular means, such as an application that changes layer 4 ports or tunnels within an existing protocol. Because of this, a solution is needed to match and filter based on specific information within the packet that is unique to the application you want to block.
Phil Ashman

Pearson IT Certification: Network Troubleshooting Video Mentor, Downloadable Version - 0 views

  •  
    Network Troubleshooting Video Mentor, Downloadable Version
Phil Ashman

Cisco IOS Firewall Configuration Examples and TechNotes - Cisco Systems - 0 views

  •  
    Cisco configuration examples
Phil Ashman

Fibre Connectors - 0 views

  •  
    There are many different connectors in use for Fibre Optic Cabling. This is a brief overview of the different types of connectors, whether they are still relevant, and practical notes from my experience about the uses and purposes.
Phil Ashman

A World of Resources…… - 0 views

  •  
    Some good pointers to network engineering blogs, podcasts and other resources.
Phil Ashman

Generating Lab Traffic - 0 views

  •  
    A quick way to generate traffic using SLA Monitors
Phil Ashman

All Systems Down - An Epic IT failure - 0 views

  •  
    A blow-by-blow record of one of the worst health-care IT crises in history and what CareGroup CIO John Halamka learned from it.\n\nWhat can happen if an old network is asked to carry new applications\nHow standard disaster recovery protocols can fail\nLessons learned from the four-day crisis
Phil Ashman

DMVPN/GETVPN Design & Case Study - 0 views

  •  
    DMVPN/GETVPN Design & Case Study
Phil Ashman

» IOS 15 License FryGuy's Blog - 0 views

  •  
    Comparison of features available with the different IOS 15 licences.
Phil Ashman

GNS3 From Beginning To End By IPExpert Training - 0 views

  •  
    Full GNS3 And Dynamips Topology Config Files ..
Phil Ashman

Troubleshooting Commands for IOS Devices - 0 views

  •  
    A wiki page dedicated to explaining Troubleshooting Commands for IOS Devices in practical terms. The intent is to compile commands relevant to troubleshooting the behavior of a Cisco IOS device itself (CPU, memory, performance, etc.) and to provide an accompanying description of each.
Phil Ashman

IPv6 Access Lists on IOS - Packet Life - 0 views

  •  
    A very simple comparison between the syntax for ipv4 and ipv6 access lists.
Phil Ashman

Cisco Performance Routing (Pfr) Tutorial - 0 views

  •  
    Great introduction to PFR
Phil Ashman

PPP Cheat Sheet - 0 views

  •  
    A quick summary of the protocols and commands used for PPP. Includes PAP, CHAP and EAP as authentication mechanisms.
Phil Ashman

How to Hide Secret Messages and Codes in Audio Files - Lifehacker - 0 views

  •  
    To encode, you're going to need Coagula (Windows-only), and to decode you'll need Sonic Visualizer (Windows/Mac OS X/Linux). You can watch the video above for a visual walkthrough, but here are the steps you need to follow:
Phil Ashman

Cisco: Port-channel load-balancing explanation [Part I] | FirstDigest - 0 views

  •  
    Port-channel (or etherchannel) is a great way to increase the transport capacity between 2 switches or between a switch and an end device that suport load balancing (e.g. server). Today I don't want to focus on how the Port-channel are configured, but more on how they load-balance the traffic over the multiple interfaces included in a bundle.
Phil Ashman

Cisco Blog » Blog Archive » Securing IPv6 - 0 views

  •  
    In the previous installment of our series of IPv6 security posts, we covered some of the ways addressing has changed in IPv6 compared to IPv4. In this post, we'll talk about some of the things to consider when securing IPv6 compared to IPv4. Before digging into this topic, however, it is important to remember that while IPv6 may have different security concerns than IPv4, it is not necessarily any more secure than IPv4. Furthermore, the post will focus on those aspects that are different or unique to IPv6, since many of the common best practices for IPv4 networks also apply to IPv6 networks.
1 - 20 Next › Last »
Showing 20 items per page