Static Routes That Track Interfaces or Other Routes

December 3rd, 2010 No comments

How to install a static route only when an interface fails or a prefix drops out of the routing table. Read more…

Categories: CISCO Tags:

Understanding Traffic Shaping

November 25th, 2010 No comments

Traffic Shaping involves in queueing traffic rather than dropping it. Traffic Shaping terminology is: Read more…

Categories: CISCO, QoS Tags:

SMB Opportunistic Locking

November 22nd, 2010 No comments

Concurrent writes to a single file are not desirable in any operating system. To prevent this, most operating systems use locks to guarantee that only one process can write to a file at a time. Operating systems traditionally lock entire files, although newer ones allow a range of bytes within a file to be locked. If another process attempts to write to a file (or section of one) that is already locked, it will receive an error from the operating system and will wait until the lock is released. Read more…

Categories: Network Design Tags:

QoS values for IP precedence, DSCP and MPLS EXP

November 20th, 2010 No comments

This table compares QoS values for IP precedence, Differentiated Services Code Point (DSCP) and Multiprotocol Label Switching (MPLS) Experimental (EXP) values along with standard values used in Cisco IOS  Software for configuration. Read more…

Categories: Network Design, QoS Tags:

Understanding Packet Counters in show policy-map interface Output

November 19th, 2010 No comments

To understand how to interpret the show policy-map interface command, you first need to understand the concept of congestion.Conceptually, congestion is defined by the Cisco IOS software configuration guide as: “During periods of transmit congestion at the outgoing interface, packets arrive faster than the interface can send them.” Read more…

Categories: CISCO, QoS Tags:

Kerberos Realms Usage

November 18th, 2010 No comments

In order to authenticate against Kerberos realms and perform remote administration, the system must have the krb5-workstation package installed. Read more…

Categories: Unix(*nix) Tags: ,

How Kerberos Works

November 9th, 2010 No comments

Kerberos1The Kerberos authentication method originated at the Massachusetts Institute of Technology in the 1980s.

It was part of a project called Athena that involved integrating the computers on the MIT campus, which ran on different operating systems, in a network that offered single sign-on (SSO).

At that time, most UNIX systems allowed users to access their resources as long as they had an account name and password. Read more…

Multiple Spanning-Tree

November 3rd, 2010 No comments

An aide-memoir.  This example uses dual distribution layer switches for load-balancing VLAN traffic using MST: Read more…

Categories: Network Design Tags:

Wireshark – New Corporate Sponsor (Riverbed Technology)

October 22nd, 2010 No comments

By now you may have seen the press release and announcement about the purchase of CACE Technologies by Riverbed Technology (my  employer).

Wireshark is more than a protocol analyzer. It is the foundation for relationships between several groups of people: the user community, the developer community, Wireshark University (driven by Laura Chappell), and CACE Technologies. Each one is an important part of Wireshark as a whole. Read more…

Categories: Diary of Events Tags:

Disabling SMB v2.0 on Windows Vista / Win7 / Server 2008

October 14th, 2010 No comments

Server Message Block (SMB) Protocol  is the file sharing protocol used by default on Windows-based computers. SMB 1.0 was designed for early Windows network operating systems such as Microsoft LAN Manager and Windows for Workgroups, but until Windows Server 2008 and Vista, all Microsoft-based operating systems continued to use it more or less in its original format.

SMB 2.0 was introduced in Windows Vista and Windows Server 2008. SMB 2.0 is designed for the needs of the next generation of file servers. Windows Server 2008 and Windows Vista support both SMB 1.0 and SMB 2.0 in order to preserve backward compatibility. Read more…