Microsoft wasn't believed to be hacked but instead the reasons for
the limited access were due to a misconfiguration of their DNS servers
or router that serves the traffic for said DNS servers. See the
article below
http://news.cnet.com/news/0-1003-200-4583218.html?tag=unkn
On 24 Jan 2001 2
I think you may be referring to secondary networks for an Interface
and then Sub-interfaces.
Secondary refers to secondary network or IP for an interface. Say you
want to assign more than (1) IP or block of IP's to an interface what
already has an IP address/block assigned.. say.:
interface
Route-maps are typically used to filter ROUTING PROTOCOL
advertisements either inbound or outboud. An ACL applied to an
interface specifically instead of a routing protocl process using the
"ip access-group" command with filter the interface traffic.
For instance (and clarity):
You
## The packet will never make it to the route map comparison. ##
If a packet comes from a source that is blocked inbound on your
ethernet port by an ACL, the packet will get dropped right there
regardless of what a route-map says..
ACL's and route-maps don't work in the way I believe you
According to Cisco's site:
Was this switch actively switching traffic at the time you reset
the switch?
http://www.cisco.com/univercd/cc/td/doc/product/lan/cat5000/c5krn/sw_rns/78_3829.htm#xtocid2465133
On 30 Jan 2001 15:50:05 -0500, [EMAIL PROTECTED] ("Mask Of
Zorro") wrote:
>What does
Below is a link to the CDR section on CNET.com. They have reviews and
Top 5 devices etc etc. Useful info.
http://cnet.search.com/search?timeout=3&tag=ex.cn.1.srch.cnet&q=CDR
On 30 Jan 2001 19:41:11 -0500, [EMAIL PROTECTED] ("hao vu") wrote:
>TDK and Plextor burners have good review.
>HTH
>
Only thing that comes to mind for me is Bit Interleaved Parity..
For error monitoring on a signal...
On 2 Feb 2001 11:27:40 -0500, [EMAIL PROTECTED] (Dan West) wrote:
>Hi All,
>
>Any telco guys know what a "BIPP" (BIP)? refers to?
>One of our guys here says it's a circuit "out to the
>
DMZ stands for Demilitarized Zone and is also called a Permiter
network. A DMZ adds another layer of security between an external and
internal network. The purpose of the DMZ is that if someone is able
to break into your network like the WAN router or other device they
won't be able to see the
I found the Cisco Press book to be most useful filling in the gaps and
will suit anyone well that doesn't know a thing about switching and
just beginning. The book has excellent case studies and questions
although they are not asked in the same manner as they are in the
test.
Plus. When I to
Those are symbols for use with Regular expressions.
^ = Matches the beginning of the input string
$ = Matches the end of the input string
What your example is doing is permitting advertisement(s) for any BGP
learned networks whose path either begins or ends with 100. In other words,
accep
The address space you were assigned from the Mother ISP is more than
likely going to be out of a larger block the Mother ISP was assigned from
ARIN. Say your /24 prefix (Class C) is part of a /16 (Class B) that they
own.. They only announce the /16 to their peers unless a specific situation
a
Unless specifically stated in the debug output that these are OSPF
neighbor hello's then the hello's you are seeing sent are not to verify the
neighbor still exists, rather the link/interface.
To test you can specify a longer hello-interval for OSPF, and then debug.
If you set the OSPF neigh
Check out:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios11/cbook/cip.htm
should you want further reference.
""Tony van Ree"" <[EMAIL PROTECTED]> wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Hi,
>
> Use a secondary address.
>
> Example
>
> router#conf t
> router#
13 matches
Mail list logo