Two videos which explain about VRF configuration and troubleshooting. the first is an excellent overview and the second a practical demonstration of VRF configuration:
- Ivan Pepelnjak – Introduction to Virtual Routing and Forwarding (VRF) tables
- Keith Barker – Cisco VRF and troubleshooting
Read more…
This video (1 hour 52 minutes in length) is an excellent tutorial / introduction / refresher on the subject of MPLS and MPLS VPN.
Read more…
Attacks on Asterisk-based telephony systems are not uncommon. This video explains how to mitigate some attack vectors:
Read more…
Another Aide memoir:
UNIX SECURITY TECHNICAL IMPLEMENTATION GUIDE
Version 5, Release 1
Can be downloaded from: http://iase.disa.mil/stigs/downloads/pdf/unix-stig-v5r1.pdf
At its core an X.509 certificate is a digital document that has been encoded and/or digitally signed according to RFC 5280.
In fact, the term X.509 certificate usually refers to the IETF’s PKIX Certificate and CRL Profile of the X.509 v3 certificate standard, as specified in RFC 5280, commonly referred to as PKIX for Public Key Infrastructure (X.509). (See this post for an explanation of the SSL/TLS Handshake and Record Protocols). Read more…
A nice little introduction to network monitoring (provided by my employer – registration required for obtaining the free download). This book does lean slightly towards using Cascade products to provide monitoring, troubleshooting and analytics – BUT I’m happy to say that it does remain a nice little read for anyone who has an interest in network monitoring. Read more…
RFC 2597 defines four Assured Forwarding groups, denoted by the letters “AF” followed by two digits: Read more…
How to install a static route only when an interface fails or a prefix drops out of the routing table. Read more…
Traffic Shaping involves in queueing traffic rather than dropping it. Traffic Shaping terminology is: Read more…