One fun thing about being in a small ISP... Networking |
- One fun thing about being in a small ISP...
- Book Recommendations for a Deeper Understanding Of Large Scale Network Design
- Can you help me become famous?
- Do you still get to rack and stack?
- Designing Wi-Fi for 5GHz - What do I do with 2.4GHz?
- How to encrypt RADIUS secret on 2960X
- What Type of "Abnormal" or Interesting Environments/Networks do You Work On?
- Cisco ASA Tunnel VPN and L2TP/IPsec
- Internet Access Bandwidth
- DOCSIS Packet drop. Speed test report correct speed.
- RioRey DDoS Appliance
- How does connecting a phone to the network work exactly?
- 200 ricoh printers not working on dhcp, how to troubleshoot?
- Private VLAN for users/endpoints?
- 10gbase-t (copper) switches.
One fun thing about being in a small ISP... Posted: 09 Feb 2020 06:29 AM PST ... Is when we sit together with sales around a map and start playing 'capture the building'. [link] [comments] |
Book Recommendations for a Deeper Understanding Of Large Scale Network Design Posted: 09 Feb 2020 11:05 AM PST I am looking for recommendations for books to deepen my understanding of fundamental networking protocols and architecting large scale networks. I am a software engineer that has been working in networking for the past 10 years. While I have a decent understanding of the protocols used in our network (ISIS, BGP, MPLS, GRE, etc), I tend to get lost in conversations where the design of the network or behavior of deployed protocols is discussed. Can anyone suggest books I could pick up? [link] [comments] |
Can you help me become famous? Posted: 09 Feb 2020 03:39 PM PST I want to become a famous DJ. I can split the money with you if you introduce me to the right people [link] [comments] |
Do you still get to rack and stack? Posted: 09 Feb 2020 01:05 PM PST I am just curious if there are many sr. Positions out there that make good $ that get a chance to get their hands dirty? I am a sys admin and I enjoy networking, maybe even enough to make it my specialty. One of the things that I appreciate the most is a nice clean rack, it is fun to take a spaghetti monster and clean it up nice. I do like the more technical aspects of networking as well, but something about organized equipment that makes you feel like you accomplished something. [link] [comments] |
Designing Wi-Fi for 5GHz - What do I do with 2.4GHz? Posted: 09 Feb 2020 08:24 AM PST Hey, I just wanted to find out/discuss what peoples opinions are when designing Wi-Fi for 5GHz use? Are you guys disabling 2.4GHz on the APs and using only 5GHz - if so, what are you doing if you have devices that only use 2.4GHz? I have an issue where I've designed the Wi-Fi for 5GHz, however due to the amount of interference on 2.4GHz - any devices that associate to 2.4GHz get extremely poor Wi-Fi (packet loss etc). What are everyone's thoughts? [link] [comments] |
How to encrypt RADIUS secret on 2960X Posted: 09 Feb 2020 07:21 AM PST Hello I would like to encrypt my radius key on my 2960X running 15.2(7)E0a I can't find how though... I've disabled the password-encryption service and enable "password encryption aes" but now the secret just stay plain text... Why? [link] [comments] |
What Type of "Abnormal" or Interesting Environments/Networks do You Work On? Posted: 08 Feb 2020 07:40 PM PST I'm curious to see what kind of "non-standard" networking roles some of you work in and how you ended up there. I'm in an odd place where I like what I do, I like the freedom I have, but I'm getting burnt out and feel like I should be paid more for all of the extra project design/engineering I'm doing. I'm a tech in a union job so I'm kind of really limited in upwards growth where I'm at so there is no incentive to go above and beyond (which is my personality and frankly why I'm getting burnt out). Personally, I work at a large Electric/Gas Utility. We have a large private infrastructure that consists of many sites (Offices, Power Plants, Substations, Radio Towers, etc). Our small team manages this infrastructure consisting of Microwave backhaul, dark fiber, private owned fiber as well as two-way radio systems, paging infrastructure (yes some still carry those sweet Motorola pagers around), and SCADA radio systems (substation data, poletop devices, Gas gates, etc). Our private MPLS network extends to all of our offices throughout multiple states, all of our power plants, and to over 100 substations (Honestly don't know how many substations at this point, we add more every week it seems). Almost all of these sites are private connections save for a few rural sites that are away from everything else. A lot is happening in terms of expanding infrastructure; New towers, upgrading backhaul, major private fiber build-outs coming down the pipeline. It's insane and our team and my group can't keep keeping on like this. Budgets for projects increasing exponentially each year. It's a literal shit show. What other type of different things do you all do? I feel like my knowledge of TDM, Microwave, and Nokia 7705 gear doesn't help me much anywhere else besides another utility.. [link] [comments] |
Cisco ASA Tunnel VPN and L2TP/IPsec Posted: 09 Feb 2020 06:23 AM PST Hey there, I'm trying to create L2TP/IPsec for Windows clients and IPsec for Android clients using Cisco ASA 5505. A problem is that I don't know how to organize dynamic-crypto-maps. Both of them (IPsec and L2TP/IPsec) supposed to work simultaneously, but now I can use either IPsec on Android or L2TP/IPsec. https://i.imgur.com/xe7dByp.png I've marked commands that relate to Android IPsec by red color and Win L2TP/IPsec by yellow one. When the both commands are entered I can use only Android IPsec. If I delete that Win L2TP/IPsec starts working. What should I do to force work both of them? [link] [comments] |
Posted: 09 Feb 2020 09:59 AM PST Is there a rule of thumb or guideline for the bandwidth per user on a DIA circuit? Should there be any extra considerations for Exchange online and Office 365 usage? [link] [comments] |
DOCSIS Packet drop. Speed test report correct speed. Posted: 08 Feb 2020 09:16 PM PST Any DOCSIS experts in here? One of my sites is having traffic loss. The ISP has replaced the cable modem with three different models. Almost no correctable on downstream, SNR is 41 to 43 db +5 on down, Up is 42 to 43. RF Plant reported no noise in the line after a couple days. Down Channels 16 Channels DOCSIS 3.0 QAM256 1 OFDM Up Channels 3 DOCSIS 3.0 QAM64 Channels Packet loss of 2-14% It creates a pattern when using ping plotter. See attached pictures. Same pattern happen when directly connected to the modem with a PC. So it not my router. If pinging the modem externally its only dropping in the last route which makes me believe its a RF issue or CMTS issue. [link] [comments] |
Posted: 09 Feb 2020 05:47 AM PST I have inherited responsibility for a RioRey appliance which seems to have only the out-of-the box configuration. I've done a fair amount of Googling and am not finding much in the way of like an admin setup guide or blog posts describing configuration. I am wondering if anyone here has any advice or experience they'd be willing to share. Right now I don't feel like it's catching near enough of the incoming DDoS traffic and I am specifically wondering about customizing the traffic configuration but open to any tips and tricks. [link] [comments] |
How does connecting a phone to the network work exactly? Posted: 09 Feb 2020 07:49 AM PST And what is the best practice / safest way to do this? Let me get into the gory details: When you plug in a phone, there are two scenarios:
In the first case (no NAC):
In the second case (NAC):
However: It does not seem that the phone connects if NAC includes Cisco-AVPair with "device-traffic-class=voice" and "switchport voice vlan XXX" is NOT configured on that port. Which brings me to the question: Why do we need to make our lives miserable and take care of the NAC responding using special attributes for phones (e.g. Cisco-AVPair) in order for the switch to apply special configuration ("switchport voice vlan"...) when we could just treat the phones like "normal" clients, use the NAC-assigned VLAN and call it a day? [link] [comments] |
200 ricoh printers not working on dhcp, how to troubleshoot? Posted: 08 Feb 2020 09:27 PM PST We have something like 200 ricoh, all are configured static due to that issue. I'm there since December and would like to make the servicedesk life easier to configure and manage those printers. There's one big default vlan where there's like 1500 devices. Infra is made of hp/Aruba. When a ricoh printer is connected on this vlan it doesn't acquire an dhcp address. On all other vlan the process work. We captured the network traffic on the dchp server and he doesn't receive anything for the ricoh when connected on this particular vlan. The network administrator verified all the switch and router parameters and they are identical to him. Now the magical touch, on Friday a ricoh technician came to debug, he connected the ricoh on a 8 ports switch he bring, he connect his switch to ours, and bam... it works. We made the same test with a hub we had and it worked as well. We also made a test with a 8ports hp switch we have and it doesn't worked... Previously we made our network capture using port mirroring so we didn't detect that difference. We wiresharked the issue, and in the scenario where it doesn't work the ricoh doesn't emit a dhcp discovery/request. I still don't know what to think about that, if there's something misconfigured on the network or not, or if the ricoh receive something in his boot process that prevent her to launch the dhcp process. Thank you for any hint you can provide, I would really appreciate any help and would be happy to answer any more questions [link] [comments] |
Private VLAN for users/endpoints? Posted: 08 Feb 2020 06:55 PM PST Is it feasible to put user workstations in a private VLAN?* They shouldn't really need to talk to each other, and it would be more secure in the event that one of them gets malware or compromised in any way. Have any of you tried this or considered it? Is there a better way to achieve client isolation on a wired network? [Edit] * I'm referring to the "Private VLAN" feature on Cisco switches where hosts are only allowed to send packets to one port (e.g. the default gateway), and traffic between hosts is forbidden. [link] [comments] |
Posted: 09 Feb 2020 03:54 AM PST My data centres are 10gbase-t with cat 6a standardized, using extreme x670 switches. Seems manufacturers are dropping 10gbase-t (yes I know DAC is probably better for low latency, does not help me) and extreme have nothing in the product lineup that really fits the requirements any more. Can anyone recommend some decent 48 port 10gbase-t units. I'm keeping away from white box, I'm not paid enough to worry about that also. [link] [comments] |
You are subscribed to email updates from Enterprise Networking news, blogs and discussion.. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment