Gadgets on web

     vlsm-calc.net  

     wireshark.org  

    MAC OUI search  

 

Related links

   cisco.netacad.net   

     gns3.org   

    cisco VoIP   

 

Start with CMS

    Drupal.org             

    Joomla.org           

    Wordpress.org    

 

What is new? Last 5 articles ...

17. Port security on access layer switchport

Port security is feature that enable permit or deny traffic for end user PCs connected to access layer switch. Port security enable specify a group of valid MAC address on port. If maximum secure MAC address  is reached then security violation modes lead to protect, restrict or shutdown of port.

 

There are 3 ways how to configure port security:

1) Static secure MAC addresses - manually configured with

   switchport port-security mac-address MAC_ADDRESS

16. Administrative Distance and route source preference

In environment with 2 or more enabled routing protocols must be present mechanism for selection of routing sources that are learned. What routing protocol obtained routes for remote network will be introduced to routers routing table? That is a big question.

 

Administrative Distance in short AD is considered parameter that will break the tie and say about trustworthiness of routing source.

 

 

15. PPP and Frame relay in small network

PPP and Frame relay are protocols operating at data link layer used in segment of private WAN connection. PPP enable establish communication through serial link between cisco and noncisco device where can not be used proprietary HDLC cisco encapsulation. Frame relay networks offer packet switched technology in providers network.  This article will focus on simple implementation of PPP serial link and Frame relay link in office environment.


 

 

UNIX and posix like OS administration

This section focus on Unix or posix like OS administration. Articles cover area of basic CLI commands with appropriate explanation, deployment of application layer services as FTP, SFTP, WWW, E-mail, NFS, SAMBA file server or LDAP, SSH access an certification key generation.

16. CUCM 8 - Call hunt configuration

As it was in CUCME call hunt enable one hunt pilot number to distribute calls to members of hunt list. For reference please read our article http://www.cdesigner.eu/content/12-hunt-groups-how.

 

CUCM configuration for call hunt is more flexible and robust. During creation of hunt environment we going through this steps:

2. Packet and frame delivery

When data segment is encapsulated into packet appropriate PC must examine destination address when preparing frame creation. If destination IP is on same network as sending PC data are send to to appropriate host. Else data are sent to network interface that act as a default gateway.

Blog section

After long time im decide to create Drupal web for support gain some more networking skills. This solution can share ideas and training topologies created by me during self study networking technology. I hope that this approach is useful also for other people around the world preparing for industrial certification or only for your private interest on this knowledge segment. Because this is my first blog content and also first greater web project your opinions are invited.

My Photoshop compositions

During hardening knowledge of Photoshop  concepts (layers, masks, adjustment layers, selections tools, selective reconstruction, quick masking ...) i have been create this funarts.

Philips Boccaccio BA453A

Description of this radio is on

http://www.radiomuseum.org/r/philips_boccaccio_ba453a.

But for this radio i can not obtain schematics for free, if you have one please send me it.

Photos of reconstruction process with closer look at heating tube ...

Pages

Subscribe to cdesigner.eu RSS