startanim.blogspot.com
Tech bite from Shamim: March 2010
http://startanim.blogspot.com/2010_03_01_archive.html
Tech bite from Shamim. Tuesday, March 2, 2010. MIKROTIK: How to apply different limits for Local/Overseas traffic. First we create Local country address-list, where are placed list of network numbers belonging to ISPs in Latvia (any other country network addresses can be used instead). Full address-list configuration is not included (too many address-list entries), but address-list idea is clear. Networks added to the list 'Latvia':. Add list=Latvia address=159.148.0.0/16 comment=" disabled=no. First we ...
startanim.blogspot.com
Tech bite from Shamim: December 2009
http://startanim.blogspot.com/2009_12_01_archive.html
Tech bite from Shamim. Monday, December 21, 2009. Introducing Basic MPLS Concepts. Introducing MPLS Labels and Label Stacks. Label Assignment and Distribution. Introducing Typical Label Distribution in Frame-Mode MPLS. Introducing Convergence in Frame-Mode MPLS. Introducing MPLS Label Allocation, Distribution, and Retention Modes. Frame-Mode MPLS Implementation on Cisco IOS Platforms. Configuring Frame-Mode MPLS on Cisco IOS Platforms. Monitoring Frame-Mode MPLS on Cisco IOS Platforms. Promiscuous (̶...
ccie20728.wordpress.com
VSS and QoS on Cat6500 SUP2T | Just another CCIE
https://ccie20728.wordpress.com/2013/04/12/vss-and-qos-on-cat6500-sup2t
April 12, 2013. VSS and QoS on Cat6500 SUP2T. But it does not work that way, if you configure a VSL port, the system automatically actives QoS for that link and deactivates all QoS commands (and I think some others too) on all ports that share the same ASIC with the VSL port. So if you have a look at the SUP2T architecture, you’ll pretty sure see the problem:. Thanks to Cisco Live for the picture. Cisco Catalyst 6500 Series 16-Port 10 Gigabit Ethernet Module. Leave a Reply Cancel reply. You are commentin...
cesarcabrera.info
Automatización de scripts usando mail merge de Word 2007
http://cesarcabrera.info/blog/automatizacion-de-scripts-usando-mail-merge-de-word-2007
Automatización de scripts usando mail merge de Word 2007. Hace rato que no escribo algo nuevo para éste blog y quiero retomar la buena costumbre, así que esta es la primera de una nueva serie de escritos para los aprendices, ingenieros o fanáticos de las redes y la tecnología. Estén pendientes, hoy les explico cómo automatizar la creación de scripts usando una hoja de cálculo y un procesador de texto. Disfrútenlo. O cómo generar documentos rápidamente con base en una hoja de cálculo? El siguiente ejemplo...
startanim.blogspot.com
Tech bite from Shamim: January 2010
http://startanim.blogspot.com/2010_01_01_archive.html
Tech bite from Shamim. Sunday, January 10, 2010. Associate NCE Program (Network Consulting Engineer). Advanced Services - Associate NCE Program (Network Consulting Engineer). All participants will begin training at Cisco's RTP (Research Triangle Park, NC) facilities. Your final work location in the USA will be determined at a later date. Work Locations - You will be hired and must be willing to relocate to the Cisco campus in the Research Triangle Park (RTP), North Carolina for Phases I-III. Upon com...
startanim.blogspot.com
Tech bite from Shamim: Securing Debian Configuration checklist
http://startanim.blogspot.com/2010/06/securing-debian-configuration-checklist.html
Tech bite from Shamim. Saturday, June 12, 2010. Securing Debian Configuration checklist. Limit physical access and booting capabilities. Set a LILO or GRUB password (. Respectively); check that the LILO or GRUB. Configuration file is read-protected. Disallow MBR floppy booting back door by overwriting the MBR (maybe not? Separate user-writable data, non-system data, and rapidly changing run-time. Data to their own partitions. On ext2 partitions such as /tmp. Password hygiene and login security. Tighten u...
startanim.blogspot.com
Tech bite from Shamim: June 2010
http://startanim.blogspot.com/2010_06_01_archive.html
Tech bite from Shamim. Saturday, June 12, 2010. Securing Debian Configuration checklist. Limit physical access and booting capabilities. Set a LILO or GRUB password (. Respectively); check that the LILO or GRUB. Configuration file is read-protected. Disallow MBR floppy booting back door by overwriting the MBR (maybe not? Separate user-writable data, non-system data, and rapidly changing run-time. Data to their own partitions. On ext2 partitions such as /tmp. Password hygiene and login security. Tighten u...
SOCIAL ENGAGEMENT