Archive

Category Archives for "Networking"

Troubleshooting challenge lab solutions

We hope that you not only enjoyed the lab, but also learned TS techniques and advance R&S topics. ...Remember that practicing TS, not only good for the TS section, but it also a great tool for sharpening your advance R&S config skills. ...Please stay tuned to this blog for more TS mini labs and other TS/R&S related topic.

The TS challenge has ended

I hope that you have enjoyed the lab, and most important also learned in the process about TS and advance R&S topics. If you want to dive deeper into CCIE R&S troubleshooting and advanaced CCIE R&S topics, you are welcomed to have a look at the TS workbook. In the following days I’ll publish the list of winners and the solutions.

TS Challenge is on

The following routes are sent from BB4 to R1: 24.24.24.24 /32, 24.24.24.1 /32, 24.24.24.2 /32 and 24.24.24.3 /32 R1 is configured with the following policy for routes coming from BB4: • R1 should be configured such that R5 does NOT advertise network 24.24.24.2 /32 to R6 • R1 should filter network 24.24.24.1 /32 However, R5 does NOT see network 24.24.24.24 /32 and network 24.24.24.3 /32 that should have come from BB4.

Ticket #10

Please follow the instructions found here about how to use the lab file. ...R6 was configured to summarize R3's Lo30,Lo31,Lo32 and Lo33, so R4 would see only one summarized route for them. ...Fix the problem while, making sure R6 sees all R3's routes.

Infiniband and it’s unique potential for Storage and Business Continuity

It’s one of those technologies that many have only had cursory awareness of. It is certainly not a ‘mainstream’ technology in comparison to IP, Ethernet or even Fibre Channel. Those who have awareness of it know Infiniband as a high performance compute clustering technology that is typically used for very short interconnects within the Data Center. While this is true, it’s uses and capacity have been expanded into many areas that were once thought to be out of its realm. In addition, many of the distance limitations that have prevented it’s expanded use are being extended. In some instances to rather amazing distances that rival the more Internet oriented networking technologies. This article will look closely at this networking technology from both historical and evolutionary perspectives. We will also look at some of the unique solutions that are offered by its use.

Not your mother’s Infiniband

The InfiniBand (IB) specification defines the methods & architecture of the interconnect that establishes the interconnection of the I/O subsystems of next generation of servers, otherwise known as compute clustering. The architecture is based on a serial, switched fabric that currently defines link bandwidths between 2.5 and 120 Gbits/sec. It effectively resolves the Continue reading

Breaking firewalls with SSH and puTTY – NOT with a proxy.

I’ve been seeing a lot out on the internet about proxy servers and how to use them to circumvent your school or workplace internet filters. Lifehacker recently posted an ~EIGHT PAGE~ walkthrough on how to set up such a proxy at home. This is entirely too complicated. Not only is it a long walkthrough, but your traffic is still unencrypted. Unless your school, work or other bought their filter technology more than 4 years or so ago, they can still see the header of your packets and where they’re headed.

Breaking firewalls with SSH and puTTY – NOT with a proxy.

I’ve been seeing a lot out on the internet about proxy servers and how to use them to circumvent your school or workplace internet filters. Lifehacker recently posted an ~EIGHT PAGE~ walkthrough on how to set up such a proxy at home. This is entirely too complicated. Not only is it a long walkthrough, but your traffic is still unencrypted. Unless your school, work or other bought their filter technology more than 4 years or so ago, they can still see the header of your packets and where they’re headed.

Breaking firewalls with SSH and puTTY – NOT with a proxy.

I’ve been seeing a lot out on the internet about proxy servers and how to use them to circumvent your school or workplace internet filters. Lifehacker recently posted an ~EIGHT PAGE~ walkthrough on how to set up such a proxy at home. This is entirely too complicated. Not only is it a long walkthrough, but your traffic is still unencrypted. Unless your school, work or other bought their filter technology more than 4 years or so ago, they can still see the header of your packets and where they’re headed.

CCIE Flyer and the TS workbook

Just finished our Troubleshooting labs, I partnered with a VERY GOOD FRIEND OF MINE CALLED Dan Shechter, what a gentleman, a Triple CCIE with unbelievable amount of knowledge. ... We thought that each lab was going to take 5.5 hours to complete but they will take 8 hours each. ... They cover all aspect of CCIE R&S, and ALSO the NEW, YES the NEW “CCIE 2.0 Protocol specific Mock labs” hahahaha, these labs are really tough, I should put a warning and a disclaimer on the bottom of each page, guaranteed to frustrate the best of us.