• Breaking News

    [Android][timeline][#f39c12]

    Sunday, October 3, 2021

    Structured Cabling Labeling Advice Networking

    Structured Cabling Labeling Advice Networking


    Structured Cabling Labeling Advice

    Posted: 03 Oct 2021 10:46 AM PDT

    I'm hoping someone here ha some experience pulling cable. Seemed like the best place to ask a question like this compared to other subs.

    I work for a commercial structured cabling contractor building out the MDFs and horizontal runs. There are two main philosophy's for labeling the cables when they are getting pulled. One is to label them with final labels. That is, if you have 500 drops, and the format is gonna be something like IDF01-01-B46, that's the label you wrap around the cable when its pulled. The other way is to make temp labels like 001 through 500 and then make a cut-sheet and 'convert' the temp labels to permanent ones at the end like in the previous example.

    Group 1 people think its more efficient because you are only having to label it once. Group 2 people think Group 1 creates a lot of problems when anything goes not according to plan (moves, add, changes, damaged cables that need to be re-pulled, etc). Because the final label was applied before everything was finished, it can cause the final labeling to be out of sync in certain rooms or areas. Whereas if you just use temp labels and a cut-sheet, you can adjust the final labels to accommodate the as-built status and it doesn't have any anomalies.

    Then there are the people that don't label anything when its getting pulled and just bundle it as it comes into the IDF and then tone and label everything after the fact which usually isn't an option for the type of clients we deal with but may be acceptable for small businesses with a couple dozen runs.

    If anyone has done cabling for large projects I would like to hear what you think the best practice is and why. Ive done both systems and have seen the flaws in each, but I'm guessing one's probably better than the other, I just don't know how to determine it. My current boss is a firm believer in using final labels as you go.

    submitted by /u/Ill_Mud
    [link] [comments]

    Live streams from space

    Posted: 03 Oct 2021 02:23 AM PDT

    I've been watching live feeds from the International Space Station on YouTube and found myself questioning how they're streaming video from space without being affected by latency/jitter? Is the latency/jitter not very high from where they are?

    I imagine they're using satellite internet to transmit back down to Earth and that's never been the greatest.

    Anyone know how it's all done to ensure the stream never suffers from poor network conditions?

    submitted by /u/Reece_56
    [link] [comments]

    Cable Tester - Netally lacking feature?

    Posted: 03 Oct 2021 04:19 PM PDT

    We want to simply unplug an end device and plug in the tester to see the estimated length and if there are issues with the run, while leaving the far side still plugged into the switch. Our previous Fluke LRAT 1000 could do this. We now have a Linkrunner 10G and etherscope nXG. Hopefully it's user error, but they do not do this if the far end is still plugged into a switch. The cable test app just shows a logo that a switch/device is plugged into the far end and gives no info. It needs the far end to be not plugged in to anything before it'll give a distance or info on the pairs.

    submitted by /u/BaconEatingChamp
    [link] [comments]

    Detecting and mitigating BGP peer black holes

    Posted: 02 Oct 2021 11:20 PM PDT

    We're a small regional ISP and data center. We have several upstream bandwidth providers and networks we peer with. One of the bandwidth providers we peer with on a 10G link recently had a power failure, and their link went down, no big deal, BGP handles that just fine.

    2 days later we started to see 35% of our traffic dropping. After investigating for 10 minutes, it became clear that traffic we send to them or traffic reaching them via BGP looking to hop into our network was being accepted and then dropped, creating a traffic black hole.

    Because the BGP sessions weren't flapping, flap protection didn't kick in, and because there's no downed link, BGP didn't bypass the link.

    1) There's got to be an elegant way of handling this without manual intervention? Massive networks with hundreds of similar providers can't be managing the quality of those peering relationships manually

    2) Are there route table rules that can detect these situations and downgrade it's weight to not get used?

    TIA!

    Edit: I am running Cumulus, now owned by NVIDiA. The underlying platform for BGP is FRR.

    submitted by /u/Legonator
    [link] [comments]

    Device should appear with same IP in LAN whether connected through VPN or connected directly

    Posted: 03 Oct 2021 08:25 AM PDT

    VPN gateways I know of are routing traffic. You could maybe throw heavy NAT artillery at it.

    The requirement would need a VPN solution that has direct access to the internal VLANs and allow to assign the user to a specific VLAN directly without routing.

    One of the issues here is that we're not quite at the stage where everything including firewalls would be user-based which would make the IP less important.

    How do people do this? Do they do it at all? Why (not)?

    Thoughts?

    Update: Laptops only, no VDI/TS hence no RDP

    submitted by /u/mro21
    [link] [comments]

    Need some advice on a multi-classroom setup

    Posted: 03 Oct 2021 10:31 AM PDT

    Hey all. I'm a (mostly) retired tech who has been out of the 'serious' networking business for 15+ years. I got my start as a desktop repair guy, got an associates degree in Networking and a diploma in Linux administration back in the early 00's. No certs, nothing fancy, just a low-level networking guy who because of life issues got out of it.

    Fastforward to today: I have a client that I've picked up (money's tight y'all) who has a network that I've been trying to get back into shape after the last guy left it ashambles. The client runs a rehabilitation facility for folks (up til now, only men) trying to reintegrate back into life after exiting prison, and they currently run a classroom with three-way display set up (on monitor for the instructor, two LED TV's set up as extended displays for powerpoint/video/etc.). Because they are going to begin taking on women tenants, the client has requested of me to be able to run two separate classrooms from a single point. They have another room setup with a computer & dual TV's in their dining hall where they wish to use the facility as a dual purpose building. We have run network cable from the DH to the server room, so both buildings are on the same subnet.

    I'm kind of at a loss as to how to proceed with their request, as they want the abilities to:

    • Have the single instructor be able to see the 'remote' classroom
    • Have the 'remote' classroom be able to see the instructor
    • Display the information the instructor is showing in the classroom they're physically in on the screens in the 'remote' classroom at the same time.
    • Have the 'remote' classroom be able to view what the instructor puts on the markerboard.

    I've discussed smartboards and the issues surrounding them, as well as the newer interactive flat panels, which are currently cost-prohibitive for the organization (a non-profit), so smartboards are out for the moment. I'm trying to figure out if there is even a way I can mirror her classroom display monitors across their intranet. I figure I'll likely set up an IP camera in the 'remote' class for the instructor to monitor on her primary monitor while instructing, and a webcam to display on the classroom displays of her that will be displayed in both classes simultaneously. I'll likely have to set up a microphone for her to use that will be played as output on the system (muted in the main class, not in the remote)...but I haven't been able to figure out how to get all of this to mesh together.

    I also considered adding an inexpensive huion tablet & pen that will let her use her displays as a 'whiteboard' of sorts that will allow both classrooms to see the board simultaneously to get over having to have yet another camera pointed at the whiteboard and taking up more display space.

    Any help y'all can offer will be mightily appreciated, as I've been out of the game so long, I'm not sure what software solutions for situations like this even exists or how to go about finding it without having to trial-and-error, costing the client more time and money getting a system set up.

    As for the network, it's currently running (mostly) Win10 machines with a few Win7's, and a Ubuntu 20.04 server (currently being configured as a backup server).

    There's much more that needs to be done on this network, so this likely won't be the last question I have, but this is my current stopping point.

    I thank you for your time.

    submitted by /u/taladan
    [link] [comments]

    Will two devices on same access point communicating go through router or within Access point?

    Posted: 03 Oct 2021 02:02 AM PDT

    Hi, this question is just out of curiosity. Currently I don't have seprate AP with router to test this out. So I'm asking here:

    If a access point (AP) is connected to router (R) and two wireless devices on different bands (W-2.4Ghz & W-5Ghz) are connected to AP.

    If both these wireless devices (W-2.4Ghz & W-5Ghz) need to tran5 data with each other. Will the data be routed directly within AP or will it go W-2.4Ghz --> AP --> Router --> back to AP --> W-5Ghz?

    Thank you

    submitted by /u/DankRevolutionBaba
    [link] [comments]

    Cisco ACLs between VLANs not preventing traffic

    Posted: 02 Oct 2021 04:36 PM PDT

    I have set up ACLs to deny most traffic between VLANs on a 3750x switch (which is also acting as the inter-vlan router), however it does not seem to work at all. More specifically, I have the Servers VLAN 10 and Clients VLAN 15.

    Despite the below configuration, Clients in VLAN 15 have full access to both servers in VLAN 10 (i.e. I can access the Web GUI on Server1 - 10.1.10.10 and can RDP into Server 2 - 10.1.10.11, while the ACLs do not allow that). Additionally, they can also access the Web GUI of the internet router that is on 10.1.20.1, while I believe the ACL below should not allow that.

    Ideally I would only want the Clients to have access to:

    a) DNS Server running on internet router (10.1.20.1)b) Access to DHCP server running on internet router (10.1.20.1) so as to receive addressesc) The TCP 10050 & 10051 ports on Server 10.1.10.12And then no further access to the internal network, while being allowed to access the internet.

    The configuration is as follows:

    VLAN 10 (Servers): 10.1.15.0/24VLAN 15 (Clients): 10.1.15.0/24VLAN 20 (Internet Gateway): 10.1.20.0/24

    interface Vlan10
    ip address 10.1.10.1 255.255.255.0
    ip access-group 110 in
    ip helper-address 10.1.20.1
    !

    interface Vlan15
    ip address 10.1.15.1 255.255.255.0
    ip access-group 115 in
    ip helper-address 10.1.20.1
    !
    interface Vlan20
    ip address 10.1.20.2 255.255.255.0
    !
    access-list 110 permit udp 10.1.10.0 0.0.0.255 host 10.1.20.1 eq domain
    access-list 110 permit udp any eq bootpc any eq bootps
    access-list 110 permit udp host 10.1.10.11 host 10.1.20.1 eq 2056
    access-list 110 permit udp host 10.1.10.11 host 10.1.10.1 eq 1645
    access-list 110 permit udp host 10.1.10.11 host 10.1.10.1 eq 1646
    access-list 110 permit udp host 10.1.10.12 host 10.1.10.1 eq snmp
    access-list 110 permit udp host 10.1.10.12 host 10.1.20.1 eq snmp
    access-list 110 permit tcp host 10.1.10.12 host 10.1.15.20 eq 10050
    access-list 110 permit tcp host 10.1.10.12 host 10.1.15.20 eq 10051
    access-list 110 permit ip 10.1.10.0 0.0.0.255 host 10.1.11.10
    access-list 110 permit ip 10.1.10.0 0.0.0.255 host 10.1.11.20
    access-list 110 deny ip 10.1.10.0 0.0.0.255 10.1.0.0 0.0.255.255
    access-list 110 permit ip 10.1.10.0 0.0.0.255 any
    access-list 110 deny ip any any
    !
    access-list 115 permit udp 10.1.15.0 0.0.0.255 host 10.1.20.1 eq domain
    access-list 115 permit udp any eq bootpc any eq bootps
    access-list 115 permit tcp host 10.1.15.20 host 10.1.10.12 eq 10050
    access-list 115 permit tcp host 10.1.15.20 host 10.1.10.12 eq 10051
    access-list 115 deny ip 10.1.15.0 0.0.0.255 10.1.0.0 0.0.255.255
    access-list 115 permit ip 10.1.15.0 0.0.0.255 any
    access-list 115 deny ip any any

    Is my configuration wrong? Is the latest IOS version for this switch buggy? I could post the entire configuration of the switch if need be, since this is a lab environment.

    Thanks!

    EDIT:

    Upon further investigation (i.e. starting from the bare minimum config and moving slowly towards the full config), I found that the above issue is caused by IP Source Guard.

    More specifically, the test Client that connects to physical port g1/0/12 had "ip verify source port-security". As soon as I remove this line (i.e. "no ip verify source port-security"), my ACLs work as expected and I cannot access the Servers subnet from the Client.

    If I re-enable IP Source Guard on the interface, I immediately have access again to the Servers VLAN despite my ACLs. Looks like a bug to me.

    submitted by /u/xrioann
    [link] [comments]

    No comments:

    Post a Comment

    Fashion

    Beauty

    Travel