One thing that I noticed while studying for the SWITCH exam is that VTP sections always skip a very important note about how VTP can cause a lot of trouble. A lot of folks including me don't use VTP unless we've been told we have to. But the fact still remains it's on our Cisco exams, it has to be explored and that exploration can lead to some of us deploying it. That's why we go and learn about this stuff, to roll it out into production if it makes sense. So from what we all read and experience, . . . → Read More: VTP Client Mode – It Can Still Wipe Out Your VTP Server!
In my last Interesting Packets post I linked you to an excellent TSHOOT post from @showlette describing and providing his TSHOOT Dynamips/GNS3 setup. Over a week later he nailed it and has successfully passed the TSHOOT exam – Go give him warm congrats as well as snag his setup if you’re working on the TSHOOT or if you just need general a troubleshooting lab environment. Congrats dude!
Speaking of TSHOOT – Did you sign up for the Free TSHOOT webinar from @PearsonITCert?
Pearson IT Certification presents our Webcast series where our authors connect with you via the web for live . . . → Read More: Interesting Packets On The Web – 8/21/2010
Warning – This topic I’m sure has been covered more then a few million times
So today I was called on after one of the guys on the team couldnt get external RDP access to an internal host working for a user. I logged onto the ASA and did the normal “show run” and at first even I was even fooled. Mainly because I manage most of my host naming using” names”
name 10.1.31.26 hosta_int name 220.127.116.11 hostb_ext
Skimming quickly through the config didn’t help, so I removed names, slowed down and began looking again. I was looking at . . . → Read More: ASA Static NAT & ACL Configuration Confusion
Yesterday it seems that @DNSMadeEasy the service with the untouchable IP Anycast network sent customers an email of apology in regards to the most recent DDoS attack they suffered Saturday (8/7/2010). The attack came from a 50GB strong bot-net from China that flooded their core networks and caused several DNSMadeEasy clusters to come to a total halt. As they explain it in their email, some regions / customers did not experience any outages. They worked with their upstream providers to implement a combination of null routing and other tactics to outwit the vicious attackers. DNSMadeEasy plans to issue an unrequested . . . → Read More: Interesting Packets On The Web – 8/10/2010