Articles in the Networking category

  1. Cisco IOS Interface Load-Balancing

    Posted on in Networking

    ConnectorsLet me start by saying this article is not about server load-balancing. That's a different topic, and I apologize if that's what you were looking for. That said, interface load-balancing is an interesting topic and one that comes up quite frequently.

    A time will come when it becomes necessary to …

  2. Securing Virtual Terminal (VTY) Lines

    Posted on in Networking

    Cisco LogoOne possible security risk on any Cisco-based network is the <acronym title="Virtual Terminal">VTY</acronym> lines of routers and switches. These lines are used for remote access (via telnet, by default) and are prime targets for remote brute force password attacks. There are a few simple steps you can …

  3. Defining Management IPs in Cisco IOS

    Posted on in Networking

    Cisco LogoOn most networks, there is a subset of IP addresses assigned to "management" hosts. These hosts might be the workstations of network administrators or monitoring servers. One of the keys to network security is restricting who has access to the device. Generally, we think of access restriction in terms of …

  4. Username / Password Authentication in Cisco IOS

    Posted on in Networking

    The last thing I want to do when some network administrator leaves my organization is change all the login passwords on the Cisco network devices. (For now, let's just assume the administrator in question didn't know the enable secret.) If you have relatively few machines, it's easy to setup username …

  5. Easy Traffic Shaping in Cisco IOS

    Posted on in Networking

    Cisco Router Close UpIf you followed my recent Cisco Catalyst rate-limiting post, you already know that policing traffic on a Cisco Catalyst switch requires a bit of thought. Mainly, you have to do a bit of calculating to determine the best bucket size for your application. The good news is that achieving the …

  6. Inbound Rate Limiting on Cisco Catalyst Switches

    Posted on in networking

    If you need to limit the inbound bandwidth of a switch port on a Cisco Catalyst, the key is in the QoS configuration. Rather than going into an depth discussion of QoS and how it works, let's skip that (check out Wikipedia to get started with that) and jump into …

  7. Cisco Catalyst Configuration Using Cluster Commands

    Posted on in Networking

    If you work on a fairly spread out network (or have remote clients), you might be managing Cisco Catalyst switches that are far, far away. For a long time, I thought the only option was to have someone on site to pre-configure the switch just enough to get it on …

  8. Send Cisco Debug Messages to Syslog

    Posted on in Networking

    Sending log messages from your Cisco network equipment to a centralized syslog server is a fairly normal activity. Most of the time, this setup works fine and there's no reason to do anything out of the ordinary. Occasionally though, you might need to run a debugging session over an extended …

« Page 22 / 25 »

My Bookshelf

Reading Now

Other Stuff