"Most companies exist to provide a service, hopefully making money at the
same time. They are not there to simply make money devoid of any marketable
service."
How do you figure that? Besides some businesses that exist for strictly
social reasons, money is the sole reason people go into busine
t;Mark E. Hayes"
>To: "Jeff Smith" ,
>Subject: RE: Technology, Certification, Skill Sets, and Loo [7:70953]
>Date: Fri, 20 Jun 2003 12:51:01 -0500
>
>I'm starting a business to provide a service first. If the service is
>good, then hopefully I will make mon
Mark, I think it is safe to say that "corporate greed" is never going to go
away. You cannot legislate or force morality on someone - unless they are
breaking the law they should be able to do whatever is best for their
business. The trick is to stay valuable so you don't have to rely on their
I am looking for some snmp OIDs or MIBs that I can incorporate into my
network management that will give me specific port counters - errors,
overall throughput per port and things like that. I have tried Cisco's site
but cannot seem to find them. Any ideas? Thanks.
Jeff
_
You are not getting any Data Carrier Detect (DCD=Down) to the interface. If
it uses an external csu/dsu try a loopback from the csu back toward your
router- if everything goes up then it is a most likley problem with the
carrier or cable from demarc to your equipment. I assume this was up and
Try to find out exactly which ports are needed, allowing all IP is
dangerous. In terms of what the vendor said about only that box being
affected- the hacker can gain control of that box and possibly have his way
with your network from there or use you to spread his treachery. Key is to
find
outing
>protocols, to place into the routing table in the first place.
>
>John N's post on this topic is an excellent explanation of the two
>different
>processes.
>
>Chuck
>
>
>""Jeff Smith"" wrote in message
>[EMAIL PROTECTED]">
Sean, the longest match is the first characteristic considered. So, using
your example, IOS will choose the route that has the longest prefix match-
only when they are the same will the decison come down to administratice
distance between protocols.
P.S.
Due to your connections can I get some
I have heard it used as another name for collision domain. Theory is that
everyone in same collsion domain is competing for bandwidth.
>From: "Love Cisco"
>Reply-To: "Love Cisco"
>To: [EMAIL PROTECTED]
>Subject: What is bandwidth domain? [7:38887]
>Date: Tue, 19 Mar 2002 21:44:44 -0500
>
>I
This is a remote access vpn situation? If you can ping the server then we
can assume that the tunnel was set up correctly and it is not a situation
where IPSec protocols are being blocked. Try playing with the IPSec over
NAT setting on the client itself.
>From: "Leonardo Borda"
>Reply-To:
I had them out last week to install mine, but there was no clear path to the
satellite from my roof, due to large trees, so they couldn't do it. I am
going to try someone else and hope they have a satellite in a different
spot. I think he said if there is no clear line of sight from your roof
Is 165.5.x.x the range of your internal network or the range of addresses
that your dial in users are assigned to? This list says that any packet
whose source address is 165.5.x.x can be destined for anywhere. If you want
to restrict which subnets they can get to make some more lines specifyi
Go Fish? ;->
>From: "Chuck Larrieu"
>Reply-To: "Chuck Larrieu"
>To: [EMAIL PROTECTED]
>Subject: RE: OT: who do you trust: WAS: RE: Does session layer [7:28642]
>Date: Mon, 10 Dec 2001 17:43:12 -0500
>
>you probably need two for it to be meaningful ;->
>
>kinda like another activity we all kno
You could also try firetower.com - a good security consulting firm.
>From: "Paul Holloway"
>Reply-To: "Paul Holloway"
>To: [EMAIL PROTECTED]
>Subject: RE: VPN between Checkpoint and Pix [7:27787]
>Date: Fri, 30 Nov 2001 20:05:29 -0500
>
>Ramesh,
>Here is what you are looking for:
>http://www
Chris, did you try shutting down interface vlan1 on that switch? AFAIK, you
can only have 1 vlan/interface up at a time for the management interface on
the 3548.
Jeff
>From: "chris"
>Reply-To: "chris"
>To: [EMAIL PROTECTED]
>Subject: RE: Suggestions welcome [7:27378]
>Date: Mon, 26 Nov 200
Chris, the 3548 has nothing to do with layer 3 (aside from its management
interface) and doesn't know nor care what protocol is being used.
>From: "Chris Fredrickson"
>Reply-To: "Chris Fredrickson"
>To: [EMAIL PROTECTED]
>Subject: Catalyst 3548 [7:25943]
>Date: Mon, 12 Nov 2001 10:30:26 -0500
I have taken four courses there- 1 excellent instructor, 2 very good, and 1
average, all classes taken were for the ccnp track. Good enough amount of
equipment per person to play with/configure during labs, but some of the
stuff was in tough shape, that's a crapshoot though.
>From: "D'Wayne S
Phil,
OSPF does not use tcp or udp, which are IP types 6 & 17 respectively or
vice-versa, it uses IP type 89, not port.
Jeff
>From: "Phil Barker"
>Reply-To: "Phil Barker"
>To: [EMAIL PROTECTED]
>Subject: CertificationZone OSPF I white paper ? [7:23885]
>Date: Tue, 23 Oct 2001 09:20:30 -0400
Did the nic card on the server change?
>From: "John McCartney"
>Reply-To: "John McCartney"
>To: [EMAIL PROTECTED]
>Subject: ARP question [7:21920]
>Date: Wed, 3 Oct 2001 15:26:09 -0400
>
>I have a question that is bugging me. I have a couple of 6509's that we
>have
>for customers. One custome
You said everything was working fine. What changed?
>From: "Rajeev Karamchand"
>Reply-To: "Rajeev Karamchand"
>To: [EMAIL PROTECTED]
>Subject: Need Help on pix [7:21135]
>Date: Wed, 26 Sep 2001 09:53:49 -0400
>
>Hi all
>
>I am facing the a strange problem.
>
>All the site were working fine ti
Patrick,
I don't think you will have a choice of passing EIGRP through a firewall
because I don't think you can do it. An eigrp packet uses multicast
addressing and has no layer 3 address. I would think that a firewall would
not pass this traffic.
>From: "Patrick Donlon"
>Reply-To: "Patric
Make sure that the users are assigned to the right group and that the group
is configured on the client correctly. If these connection attempts are
getting to your Concentrator the live log is pretty good and telling you
what is going on.
>From: "cisco skin"
>Reply-To: "cisco skin"
>To: [E
Mark, not sure what you mean by putting a pc on a trunk link. Were the two
boxes plugged into the same switch at one time and now they are plugged into
two joined by a trunk? If so, make sure the config for the two trunked
ports is consistent.
>From: "Mark Kinley"
>Reply-To: "Mark Kinley"
Bob,
I have had a couple versions of 3.x on my w2000 machine with no problems at
all. Also, I use netzero and it has been good to me so far, 9 months with
this client. I would agree that the Concentrator is solid, haven't had to
touch it for anything except user management, config. for over a
If this a trunked linked, make sure you manually set the parameters on each
end, no auto. Also, I have seen some servers with teamed nic's try to
etherchannel and it will flap like that unless the switch is also configured
for it. Hope this helps.
Jeff
>From: "TP"
>Reply-To: "TP"
>To: [E
I believe you will have to enable split tunneling on the concentrator. With
this enabled packets destined for networks defined on the concentrator will
be encrypted and sent to that gateway, and all others will use local
routing.
Jeff
>From: "George Kallingal"
>Reply-To: "George Kallingal"
1 network. I plan to use sub-interface in interface Ethernet 1
>instaed
>of secondary IP. Interface Ethenet is connected to hub.
>
>Some people told me that we can only create sub-interface on FastEthernet
>and NOT Ethernet ( 10Base ). Is it true ? What is the minimum IOS versio
Certainly can. Used often when routing between vlans when the router is
external to the switch (non- rsm, msfc, etc)- the old "router on a stick"
scenario.
>From: "Jimmy Leong"
>Reply-To: "Jimmy Leong"
>To: [EMAIL PROTECTED]
>Subject: sub-interface on Ethernet or FastEthernet [7:19394]
>Date
Bob,
Is your PIX default gateway the router in question? If yes, it should not
even know what is going on in terms of bgp at the edge. The bgp changes
should not affect its routing, as long as there is a path available beyond
that router when the change occurs, which you said there is. I hav
I am pretty sure that Citrix uses port 1604 also.
>From: "[EMAIL PROTECTED]"
>Reply-To: "[EMAIL PROTECTED]"
>To: [EMAIL PROTECTED]
>Subject: Re: PIX & Citrix/nfuse access [7:18938]
>Date: Fri, 7 Sep 2001 10:23:19 -0400
>
>make a static mapping
>
>static (inside,outside)
>conduit permit tcp glb
Cisco suggests Routing, Switching, Remote Access and then Support. I would
say that you could take either of the first two initially.
>From: "Tel Khan"
>Reply-To: "Tel Khan"
>To: [EMAIL PROTECTED]
>Subject: New to CCNP [7:18933]
>Date: Fri, 7 Sep 2001 05:22:31 -0400
>
>Hi guys i passed my CC
If I remember correctly you cannot have an ip address on the actual
interface if you have sub-int's with ip's. That true?
>From: "Sean Knox"
>Reply-To: "Sean Knox"
>To: [EMAIL PROTECTED]
>Subject: VLAN configuration question [7:18696]
>Date: Wed, 5 Sep 2001 17:39:23 -0400
>
>On a Cisco route
Try setting the baud to 1200 or 2400 and hit the space bar while the router
reboots (won't be able to see anything on screen). You will have to guess
on the time it takes to boot, etc. Then set your baud back and you should
have the rommon prompt. Has worked for me.
>From: "xie rootstock"
Does a VTP advertisement have a layer 3 address? I thought these were only
heard within a broadcast domain. How does the router know who to pass these
to on the other side?
>From: "Priscilla Oppenheimer"
>Reply-To: "Priscilla Oppenheimer"
>To: [EMAIL PROTECTED]
>Subject: Re: does vtp can s
I believe it means that the router will not listen to the vtp messages. It
will also not pass them along- it is strictly layer 2.
>From: "Guest"
>Reply-To: "Guest"
>To: [EMAIL PROTECTED]
>Subject: does vtp can span the router [7:18545]
>Date: Tue, 4 Sep 2001 23:54:23 -0400
>
>i am reading th
35 matches
Mail list logo