• Breaking News

    [Android][timeline][#f39c12]

    Sunday, November 29, 2020

    Voice VLAN / LLDP for Voip Question Networking

    Voice VLAN / LLDP for Voip Question Networking


    Voice VLAN / LLDP for Voip Question

    Posted: 29 Nov 2020 12:22 AM PST

    Hi r/networking

    First timing posting and this is quite possibly a silly question (i'll preface this with i'm pretty network savvy, but far from being an expert, i did my CCNA many years ago because the knowledge helped with understanding more network related issues within my role of cloud/virtual infrastructure), but here it goes?

    If a switch is configured to have its ports as access vlan 100 and voice vlan 120 does this mean that any device plugged directly into the switch (that is not a phone supporting lldp) is using access vlan 100 by default?

    For context, when dealing with VoIP we always went the way of trunking the ports and running a vlan for data/voip (tag voip untag data or in cisco terms trunk+native) along with manual config or DHCP options. With a new building we are in the early stage of designing the network, and the provider we will be using (Avaya) suggested using LLDP along with a voice vlan command (which is fine) but personally I have no exp with (first time I'll implementing it).

    Are there also any additional hidden things enabled in the background when running the access/voice vlan commands (i've seen stp mentioned a few times for some vendors)

    TLDR: I might be over thinking this, but is setting access/voice commands just setting a tag/untag (or trunk with native vlan) pair and LLDP is just telling the phone "hey buddy, voice vlan is 120 you should use that instead..."?

    submitted by /u/SimpleIsNice
    [link] [comments]

    What software allows you to do routing as code?

    Posted: 29 Nov 2020 05:19 AM PST

    I have a server with 2x 10gbit uplinks and i am looking to create a system to do some more advanced filtering (mainly for stopping basic UDP ddos attacks)

    What i want to end up doing is: wait for a client to do a TCP handshake to port 30120, and then open up that port on UDP too for that specific client.

    This Should lower the load on that machine during a ddos attack (given that all other udp ports are blocked. My provider should be able to handle TCP ones)

    I can handle the coding part. But i was not able to find any frameworks that let you do this kind of routing without breaking far into the linux kernel.

    I've looked at pfsense but that does not seem to have a easy way to add custom rule packages.

    submitted by /u/Ayoungcoder
    [link] [comments]

    ARP reply without a request or a sign of it being a gratuitous reply?

    Posted: 29 Nov 2020 03:11 PM PST

    https://en.cnki.com.cn/Article_en/CJFDTotal-SCLH200803028.htm

    The sender IP/MAC is sending it to a certain destination which has not requested any information. Is the information simply in transit? But it should not be, as the Target IP Address has not requested that information.

    The ARP reply does not have the signs of being gratuitous. The receiver IP did not send out a "who is" before getting it.

    Am I still simply intercepting something intended for someone else? If so, why is the target IP my own?

    This is from analyzing a PCAP file.

    In disclaimer---Yes this is homework. Yes I have looked into this. All I have been able to find on the topic is the above link on an algorithm to detect suspicious behavior...but is that the case? I am at a loss here...

    Edit---Ok Example.

    Ok. Here is an example. My Ip4 is A.A.A.A.

    The messages on the PCAP file are

    A.A.A.B is at X

    A.A.A.C is at Y

    A.A.A.D is at Z

    There was not a "who has" for any of them from my IP.

    Also, my IP did an arp request. However it appears to have not been a broadcast.

    "Who has A.A.A.F" and the destination was not all F or 0. Instead it sent the request to a specific IP address, and then that IP address responded with the correct MAC. This appears to be unusual behavior. I mean, the professor is trying to make us figure things out....but I am at a loss. This does deviate from textbook ARP behavior.

    submitted by /u/Hike_N_Forage_N_Live
    [link] [comments]

    Question about age and compensation

    Posted: 29 Nov 2020 12:21 PM PST

    A lot of young talented engineers exist in the networking area of IT.

    Have you ever been directly denied compensation or pay due to age/young appearance? How did you approach it?

    Obviously it's illegal in the states, but something that probably happens a good bit. Personally I've had it happen during salary negotiations (having solid experience, certs, etc.) and am wondering if anyone else had similar stories. It went something like "I can't give you the salary asked due to your age" - directly.

    submitted by /u/orange_tones
    [link] [comments]

    Learning to spot weaknesses in enterprise network diagram

    Posted: 29 Nov 2020 01:28 AM PST

    I have a network diagram but I have an issue translating certain characteristics of its topology.

    For example I have an edge router, a firewall, then another router which connects with 3 others (these are used for vlan communication ). I know that the router right after the firewall propably causes a weakness but I don't know what.

    Also I would like to ask if two vlans are connected to the same router via switches (one for each) are possing a security issue.

    Are there any resources available for studying and learning about such topics? Or am I just failing to combine the things I already know about networks?

    submitted by /u/possum_programmer
    [link] [comments]

    No comments:

    Post a Comment

    Fashion

    Beauty

    Travel