Networking

93K

Solutions

67K

Contributors

Networking is the process of connecting computing devices, peripherals and terminals together through a system that uses wiring, cabling or radio waves that enable their users to communicate, share information and interact over distances. Often associated are issues regarding operating systems, hardware and equipment, cloud and virtual networking, protocols, architecture, storage and management.

Share tech news, updates, or what's on your mind.

Sign up to Post

Scenario 7
This article is about building Dynamic Multipoint VPN tunnels in Cisco CSR1000V router with IOS XE. There are two spoke routers connected to single tier Phase 1 DMVPN Cloud hosted on CSR1000V router.
0
Ultimate Tool Kit for Technology Solution Provider
Ultimate Tool Kit for Technology Solution Provider

Broken down into practical pointers and step-by-step instructions, the IT Service Excellence Tool Kit delivers expert advice for technology solution providers. Get your free copy now.

Keeping businesses intact and secure is a skill which individuals lack. All you need is 5 social security tips to start to turn things around
0

If you're having problems where a lot of messages that Cisco Cloud Email Security would normally filter out have been coming in, it appears to be the result of an upgrade gone wrong. In our case, it took a P1 ticket to get resolved.


We found evidence of an issue by looking at the incoming mail policies (accessible by going to Mail Polices > Incoming Mail Policies):



You will notice that the Anti-Spam, Anti-Virus, and Graymail columns are all showing "Not Available". That is because they are all disabled. These all need to be enabled to get things working normally again.


When we accessed the Cisco IronPort Anti-Spam settings, it showed that it was globally turned off. (This can be accessed by going to Security Services > IronPort Anti-Spam).



However, we were completely unable to turn anything on, regardless of access level (I'm a Cloud Administrator, but my coworker is an Administrator).


The cause of the problem: Cisco upgrading our appliance, and it turned out the feature keys somehow got blown out. In setting them back in, there is a requirement of accepting an End User License Agreement. Somewhere within this area is where Cisco failed to properly handle things.


Resolving this required creating a ticket with Cisco (initially a P3 ticket, which eventually got escalated to P1). If you're seeing yourself with this exact same issue, know you're not alone. Hopefully, Cisco fixes this for all of their CES customers in one swoop, but just watch out for this just in case. 


This problem started this past Friday morning for us but has just gotten resolved as I'm creating this post. While getting the ticket resolved, I highly recommend requesting that Cisco adds an email address from your organization to Atlas so that you're notified of when upgrades are planned to take place.

1
Scenario 6
This article is about building a Route Based site to site VPN tunnels with Redundant Routers in DC (HUB) in Cisco CSR1000V router with IOS XE. There are four Route Based IPsec VPN tunnels configured on two CSR1000V routers as redundant routers pair.
0
Coming up with a good network security checklist can be challenging. The list below was created with input from not less than a dozen technology consultants and security experts.
4
LVL 98

Author Comment

by:Lee W, MVP
Comment Utility
Not a bad point.  BUT, keep in mind the general target audience is small to midsize companies and the consultants they use.  2FA on a Windows Domain in those environments isn't commonplace (I've not heard of any really good, really SMB affordable solutions... at least none come to mind).

If you have any recommendations, please feel free to make them.
0

Expert Comment

by:kevin_lovegrove
Comment Utility
I'd personally recommend ManageEngine PMP, it does a whole lot more than 2FA and I think the prices are very reasonable considering the risks it mitigates.

https://www.manageengine.com/products/passwordmanagerpro/

It supports a number of 2FA solutions:

https://www.manageengine.com/products/passwordmanagerpro/two-factor-authentication.html
0
Scenario 5
This article is about building a Route Based site to site VPN tunnels with VRF and dynamic routing protocol (OSPF) in Cisco CSR1000V router with IOS XE. There are two Route Based IPsec VPN tunnels configured on CSR1000V router, traffic from app server is with NAT and rest is without NAT.
0
A discussion and explanation about Application and Security issues in Wireless Sensor Networks
0
Assume that as a role of System Administrator in SMB (or a startup group), you are requested to (re)design the IT infrastructure of the company. In this article, I will describe the steps of design, configure and operate the IT devices in a small business environment. (<50 users).
0
When you have a Wi-Fi, you might want to isolate the untrusted network from your network, since Wi-Fi is more vulnerable to attacks, as is a guest network. You will still be able to manage guest/Wi-Fi from your network. This is possible to do with an Edge router
0
Fix RPC Server is unavailable Error in Exchange 2013, 2010, 2007, and 2003 Server. Different reason can such as network connectivity issue, name resolution issue, firewall, registry corruption that lead to RPC Server Unavailable error.
0
IT Degree with Certifications Included
IT Degree with Certifications Included

Aspire to become a network administrator, network security analyst, or computer and information systems manager? Make the most of your experience as an IT professional by earning your B.S. in Network Operations and Security.

In short, I will be giving a guide on how to install UNMS on a virtual machine in hyper-v and change the default port for security (you don’t need to have a server, since Windows 10 supports hyper-v)
0
Scenario 1
This article is about building a site to site VPN tunnels in Cisco CSR1000V router with IOS XE. There are two Policy Based IPsec VPN tunnels configured on CSR1000V router one with NAT and another without NAT.
0

Expert Comment

by:Isaivani Venkat
Comment Utility
ip nat outside source static 192.168.10.10 172.17.10.10 this NAT statement really required ???
0
LVL 3

Author Comment

by:Santosh Salunke
Comment Utility
Hi Isaivani Venkat

ip nat outside source static 192.168.10.10 172.17.10.10

This NAT is to change branch user IP from 172.17.10.10 to 192.168.10.10. I had used this to demonstrate how to do 'Destination IP NAT'.
0
Have a Cisco router that you forgot the password or maybe you bought a used router that is locked with a password? This article will guide you through the steps on how to recover the password on your Cisco gear.
0
How to Perform Full Migration from Elastix to Issabel
If you try to migrate from Elastix to Issabel, you will face a lot of issues. These problems are inevitable but fortunately, you can fix them. In the guide below, I will explain how I performed the migration while keeping all data and successfully transferring all configurations.
0

Expert Comment

by:sergio mak
Comment Utility
bonjour !!!
j'essaye d'installer issabel ,pas de soucy au niveaux de l'install,par contre je n'arrive pas à faire des appels sortant alors que mon trunk est registred
est il possible de faire un tuto sur la config du trunk de la route sortante et entrante je tourne en rond ca magace.
merci !!!
0
LVL 1

Author Comment

by:RoohAllah Godazgar
Comment Utility
bonjour !!!
j'essaye d'installer issabel ,pas de soucy au niveaux de l'install,par contre je n'arrive pas à faire des appels sortant alors que mon trunk est registred
est il possible de faire un tuto sur la config du trunk de la route sortante et entrante je tourne en rond ca magace.
merci !!!

Dear Sergio,
Would you please ask your question in English. I'm not familiar with French.
0
LinkedIn blogging is great for networking, building up an audience, and expanding your influence as well. However, if you want to achieve these results, you need to work really hard to make your post worth liking and sharing. Here are 4 tips that can help you do so.
1
LVL 39

Expert Comment

by:BillDL
Comment Utility
I personally feel that people should steer well clear of writing useful tips on "How to Write a Résumé" unless they are extremely well versed in what works and, of most importance, what does not work.  I think that the only people who are properly equipped to write such tips and articles are those who have a lot of experience in hiring staff for jobs and have therefore read or tried to read enough terrible, mediocre, and excellent résumés to be good judges of what grabbed their attention (good and bad).  Your linked page (How to Write a Good Resume - article on eliteessaywriters.com) demonstrates one of the pitfalls that becomes apparent when somebody tries to write an article on that subject, and the pitfall is trying to be too clever.

[A] Resume is not:
1. A summarization of the positions you held in the past

If I was the manager with the task of shortlisting applicants using their résumés and I saw the word "summarization" used in one, it would go straight into the "trying to be too clever" pile destined for the litter basket or shredder.  The word is either "summary" or "summation".  A conglomeration of the two words does not make a proper or better word because it has an "ize" in it.

There are already far too many "useful tips" articles about résumé writing floating around the Internet.  If the purpose of writing LinkedIn blogs is to "expand your influence", then I would suggest that unless you (LinkedIn member, not you personally) have already reached a level where you are expert on offering "Do and Don't" articles about how to succeed in job applications, then refrain from doing so.  The vast majority of LinkedIn members are there to find new or better jobs, and while sitting in that queue I do not think it is appropriate to try and provide tips to others in the same queue.  It equates to somebody on a modest income telling others how to get rich before managing to actually become rich.

I don't mean to sound scathing, but I feel quite strongly about this one aspect mentioned in your otherwise useful article.
1
In this article I will be showing you how to subnet the easiest way possible for IPv4 (Internet Protocol version 4). This article does not cover IPv6. Keep in mind that subnetting requires lots of practice and time.
3
LVL 4

Expert Comment

by:James Bunch
Comment Utility
This article is amazing. I am studying for the Network+ N10-006 test right now and was able to use this information along to correct mistakes I was making previously in trying to determine Subnets and ranges of given IP address/CIDR on the practice tests. This makes it easier to keep the math simple in my head as well as to follow how to finish the resolution of the problem without reworking parts of the scenario. Great work and thank you for sharing it with us!
1
This article will show you step-by-step instructions to build your own NTP CentOS server. The network diagram shows the best practice to setup the NTP server farm for redundancy.  This article also serves as your NTP server documentation.
0
In this article, the configuration steps in Zabbix to monitor devices via SNMP will be discussed with some real examples on Cisco Router/Switch, Catalyst Switch, NAS Synology device.
1
How to fix a SonicWall Gateway Anti-Virus firewall blocking automatic updates to apps like Windows, Adobe, Symantec, etc.
0
Creating Active Directory Users from a Text File
LVL 8
Creating Active Directory Users from a Text File

If your organization has a need to mass-create AD user accounts, watch this video to see how its done without the need for scripting or other unnecessary complexities.

Unable to change the program that handles the scan event from a network attached Canon/Brother printer/scanner. This means you'll always have to choose which program handles this action, e.g. ControlCenter4 (in the case of a Brother).
0
Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
5
This month, Experts Exchange’s free Course of the Month is focused on CompTIA IT Fundamentals.
0
This article explains the fundamentals of industrial networking which ultimately is the backbone network which is providing communications for process devices like robots and other not so interesting stuff.
0
This article is in regards to the Cisco QSFP-4SFP10G-CU1M cables, which are designed to uplink/downlink 40GB ports to 10GB SFP ports. I recently experienced this and found very little configuration documentation on how these are supposed to be configured.
1
This program is used to assist in finding and resolving common problems with wireless connections.
5
LVL 43

Expert Comment

by:Rob
Comment Utility
Found it: https://www.xirrus.com/inspector/.  Check this is right. I had to fill in their form first.
0

Expert Comment

by:Freda Driscoll-Sbar
Comment Utility
Thank you for sharing! Great work and methodology.
0

Networking

93K

Solutions

67K

Contributors

Networking is the process of connecting computing devices, peripherals and terminals together through a system that uses wiring, cabling or radio waves that enable their users to communicate, share information and interact over distances. Often associated are issues regarding operating systems, hardware and equipment, cloud and virtual networking, protocols, architecture, storage and management.