Working with the Cisco Packet Tracer program, often noticed in it different telephone devices, and also software on client devices by means of which, it is possible to organize phone calls. In this regard, there was an idea to make a model of the network consisting of all devices of this simulator (cisco packet tracer 6.2) which can call and receive calls. When writing this article, there was a question: Whether "It is possible to be prepared for examination of CCNA Voice, by means of this program?". And on this question, I will try to answer in this article.
1 year ago
At the classical scheme of connection of two ISP to one router, there is an opportunity to use at once two channels for Natirovaniya of internal clients with balancing of loading, and not just for a feylover at failure of one of providers.
1 year, 1 month ago
Continuation of transfer of chapter of the book Chris Bryant "CCNP Route Study Guide". Its website — thebryantadvantage.com. The book is available on amazon.
From all watched videos, the read books for preparation for CCNP ROUTE, material from this seemed to the easiest for assimilation. Allows to classify everything. Except the theory I also liked practical examples. At the end of each chapter there are links to lessons to youtube. Part 1, Part 2.
Hi everyone! Today would like to talk about standard mistakes which we make at setup of network equipment. I think, the feeling when you enter the next command into the console is familiar to all and suddenly you understand that the console stopped responding, and the equipment on other side of Earth (which you just also configured) does not respond any more. At this moment for a second breath fades, you begin to hear a beating of the heart clearly. The aggravated hearing completely concentrates on a telephone call which will just about be distributed. The organism shrinks and you understand that it is the end. Search, of course, not the end, but the beginning of heroic overcoming of that situation into which you just drove yourself. And the feat, the story about your feat and, perhaps, even will be farther than an ovation from colleagues. And the most important, you once again will pledge to yourself that you more so will NEVER do. Many will object me that it not about them and that they, true professionals, do not allow it. It is fine, and I am sincerely glad for them. But are not born true professionals and do not become suddenly.
Today enough similar would be desirable to talk about two technology of virtualization of switches which allow to integrate several switches in one logical. It will be a question about the Cisco Virtual Switching System (VSS) and HPE Intelligent Resilient Framework (IRF) technologies. Within article we will consider in more detail as the VSS technology then we will talk about the IRF technology works.
In the previous article I considered setup of two-factor authentication of users for connection to corporate resources through Cisco AnyConnect based on the Active Directory and Microsoft Azure Multi-Factor Authentication Server (MFAS). Today I suggest you to consider option with use of FreeRadius and Google Authenticator.
1 year, 1 month ago
Development of technologies of virtualization allowed to make training of IT of specialists much more available. 10 years ago to get acquainted with new OS or to unroll laboratory infrastructure for testing it was necessary to look for iron, now it is enough to turn one or several virtual computers.
But technologies and desire of vendors to increase sales do not stand still. Now for testing and demonstration of the products many companies offer free test stands, so-called hands on labs or HOL. Me such solutions at Microsoft are known, to VMWare and Cisco. About test stands of the last company the speech in my article will also go.
It is considered to be that server solutions of Cisco UCS — it is very difficult. We decided to demonstrate all simplicity of setup of such solutions. Under a cat the video overview, and also the shorthand report with screenshots (Carefully, a traffic! Many screenshots in the complete size if to compress them — to sort nothing).
Already practically at anybody that why two factor authentication are necessary, especially at access to resources of remote users does not raise questions. A priori the user treats rather irresponsibly storage of the passwords protecting working information as it is not surprising, considering how many personal passwords it is necessary to remember also priorities of the ordinary person in respect of protection of personal or working information.
Implementation of authentication of remote users by the principle "+ something I have" allows to make by something I know the attack directed to interception or selection of passwords senseless and to considerably reduce threats of IB from receipt of a user password by the malefactor.
I submit you the guide to the Microsoft Azure Multi-Factor Authentication Server (MFAS) setup as the second authentication factor at connection of domain users to resources of the company by means of Cisco AnyConnect.
1 year, 2 months ago
I want to describe the scheme about DMVPN constructed at us in the organization, allowing to use unlimited number of communication channels on a remote point through Public Internet along with IPVPN channel from one of several providers.
What is: the constructed scheme DMVPN with (generally) two communication channels. The main — IPVPN (with guarantee speed) from one of providers, reserve — Public Internet (any, it is possible even 3G\LTE a router) from other provider.