In certain networks, for example; Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) applications rely upon Label Switched Paths (LSP’s) set up by Label Distribution Protocol (LDP), in these networks, it is possible for the IGP to become operational on a link on which LDP is not resulting in labeled traffic being blackholed. IP packets could still … Read more now..
Juniper Networks Certification Program team is now offering an online proctored (OP) exam option that will allow candidates to conveniently and easily take an associate-level written exam in the comfort of their home or office while being monitored by an offsite proctor. While this was originally open just for Associate-level exams the Juniper Networks Certification … Read more now..
Well-known IPv6 multicast addresses Source address is always unicast Router Advertisement(ICMPv6 type 134): Advertisements are sent periodically, every 200 seconds (cisco). They are also sent immediately as a response to a Router Solicitation message originated by an end host. Router Solicitation(ICMPv6 type 133): Sent upon an interface of a node being enabled (FF02::2). Redirect(ICMPv6 type … Read more now..
Serial interfaces can have different types of encapsulations and each encapsulation type determines the kind of keepalives that will be used. Enter the keepalive command in interface configuration mode in order to set the frequency at which a router sends ECHOREQ packets to its peer, keepalives can also be disabled with the “keepalive 0″ or … Read more now..
By: Bob Vachon Pages: 352 Published: Apr 4, 2016 Reviewed: 18/07/2016 ISBN-10: 1-58720-575-0 This book covers all the basics with real world examples and best practices. The first few chapters covered the basic concepts in relation to security and provides a basis for the rest of the book. You should not expect in depth explanations … Read more now..
Cisco VIRL allows you to add support for 3rd Party VM’s. I’m going to show you how to add the FortiGate virtual appliance to VIRL. First of all you will need the FortiGate Virtual Machine from http://www.fortinet.com. We will be using the KVM image provided by Fortinet, other versions are available i.e. ESXi, Hyper-V, etc so make you get the … Read more now..
MACsec is the IEEE 802.1AE standard for authenticating and encrypting packets between two MACsec capable devices. The Catalyst 3750-X and 3560-X switches support 802.1AE encryption with MACsec Key Agreement (MKA) on downlink ports for encryption between the switch and host devices. The switch also supports MACsec link layer switch-to-switch security by using Cisco TrustSec Network … Read more now..
Bruno van der Werve from Cisco has provided a sneak preview over at The Cisco Learning Network of a new product known as the CCIE Lab Builder. This will run on the exact same infrastructure as the actual lab exam, including the virtual devices (ie. IOL) and will also use the the web interface from the … Read more now..
Adding VLAN’s and updating the vNIC templates is straightforward in the GUI; But if you have a lot of VLAN’s and vNIC templates to update then it quicker to add them via some kind of script. There are a number of ways to ways to script the UCS platform using the API. The CLI is one of the … Read more now..
Adding a certificate to the vShield manager should be a straightforward process according to the documentation a dozen steps at most. But my experience has been anything but straightforward. A few additional steps are required to successfully import a signed certificate. Firstly we need a certificate on the vShield Manger to enable us to encrypt information sent to the vShield Manager web server. You … Read more now..