Scenario III is probably the most recommended. It is incorrect to say that
the VPN Concentrator does not have filtering capabilities. It generally
only allows traffic in its public interface necessary for VPN connections,
so it is not any more inherently insecure as a PIX. It does not have all
If you happen to be running PIM Sparse-Dense mode with auto-RP and
duplicate loopback IP addresses then you need a special patch for
CiscoWorks in order for it to properly discover the 6509's... This probably
effects anything that has duplicate loopback IP addresses.
Fred Reimer - CCNA
VitalNet from Lucent Technologies can use Cisco SAA, so in a way it's
distributed polling. Any (recent) IOS device would become a
sensor/collector.
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
delete it from your computer.
-Original Message-
From: milind tare [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 11, 2003 12:45 PM
To: Reimer, Fred
Cc: [EMAIL PROTECTED]
Subject: RE: ciscoview-urgent [7:75227]
hi reimer,
Thanks for ur reply but not getting wht u want to
say
SAP, SAP, what the heck is SAP? At first I thought it was SIP, but that
doesn't sound right. Maybe it's referring to the COMPANY SAP? If so, what
specific application are you talking about?
I must say SAP's website is a nightmare. Looks like all marketing speak to
me. Bunch of mumbo jumbo
it from your computer.
-Original Message-
From: milind tare [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 11, 2003 1:11 PM
To: Reimer, Fred
Cc: [EMAIL PROTECTED]
Subject: RE: ciscoview-urgent [7:75227]
hi reimer,
Thanks for ur reply, and extremely sorry for mis
communication. i
Er, yes you can. Two people have already replied on how. Use a WILDCARD
mask of 0.0.0.254. Simple, easy, effective. I'd hate to have to type in
128 permit statements. Probably end up writing a Perl one-liner, but the
easier way is to use the proper WILDCARD mask.
Fred Reimer - CCNA
Well, we have two right answers (you can do it with a wildcard mask of
0.0.0.254) and two wrong answers (it's not possible). I'll break the tie
and say you can do it ;-)
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071
No offense, but this is CCNA material. If you are going for your CCNP, then
you should already have your CCNA and know the answer. But anyway...
If you need a network with 400 hosts, the smallest subnet would have a /23
mask. So take the first part of your given network and assign it to that:
think I got it.
Man I love this news group!
Steve
Priscilla Oppenheimer wrote:
Reimer, Fred wrote:
No offense, but this is CCNA material.
Do they still teach classful for CCNA, though? Perhaps the only thing
that's
hard for him is that 192.168.24.0 has a mask of 255.255.255.0
: Tuesday, September 09, 2003 6:59 PM
To: [EMAIL PROTECTED]; 'Reimer, Fred'; [EMAIL PROTECTED]
Subject: RE: Please Help - CIDR - How the bits work [7:75050]
And one last point, No LAN is an island, why two IG(P) protocols and no
EG(P) protocol?
A NA should at least a some understanding of how
extended vpn_tunnel
permit ip 172.16.254.0 0.0.0.255 192.168.0.0 0.0.255.255
access-list 120 permit ip 172.16.254.0 0.0.0.255 192.168.0.0 0.0.255.255
!
route-map static_servers_bypass_NAT permit 10
match ip address 120
set ip next-hop 1.1.1.2
!
Phoenix_Colo#
Reimer, Fred wrote:
You do need
- www.sysdom.org
-Original Message-
From: Dom [mailto:[EMAIL PROTECTED]
Sent: 09 September 2003 23:37
To: 'Reimer, Fred'; '[EMAIL PROTECTED]'
Subject: RE: Please Help - CIDR - How the bits work [7:75050]
Oh, and while I'm on the subject - why EIGRP? This is a
proprietary
Cisco Protocol. OK
6:37 PM
To: 'Reimer, Fred'; [EMAIL PROTECTED]
Subject: RE: Please Help - CIDR - How the bits work [7:75050]
Oh, and while I'm on the subject - why EIGRP? This is a proprietary
Cisco Protocol. OK, I believe that Juniper may have implemented it, but
to the best of my knowledge no one else has.
Best
Yes, but the CCIE labs are supposed to be for ISP level engineers, who
almost certainly won't be using default routes most of the time. It should
be assumed that by the time you get to the CCIE level you have much
experience in default routing.
Fred Reimer - CCNA
Eclipsys Corporation, 200
That is correct. Or at least it can only support one VLAN in common with
the Cisco gear. It can have all the VLANs it wants as long as it does not
have dual links to the Cisco gear, creating a loop which will not be blocked
with Spanning Tree, because it doesn't support PVST+.
BTW - what are
I've always liked hex myself. A hex mask of FF.FF.F8.00 can be written as
F800 and still mean the same thing. You obviously can't do that with
255.255.128.0 (255.255.128.0 != 2,552,551,280). While binary works the same
way as hex in this manner, it is much to long for my tastes. Plus, hex
Oh, it's just getting fun. It's not like we are flaming anyone. We are
just expressing our opinions! ;-)
I'd agree with you. No BGP for NA's. And as far as who I'd want touching
my Internet facing router, it would depend on what type of business it was.
If it was a small business, where all
.
-Original Message-
From: Howard C. Berkowitz [mailto:[EMAIL PROTECTED]
Sent: Wednesday, September 10, 2003 12:57 PM
To: [EMAIL PROTECTED]
Subject: RE: Please Help - CIDR - How the bits work [7:75050]
At 11:34 AM -0400 9/10/03, Reimer, Fred wrote:
Yes, but the CCIE labs are supposed to be for ISP
Heh, I installed quite a few of those Cisco router blades in Synoptics hubs!
I also liked their SPARC network management modules, but I don't think that
had anything to do with Cisco.
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell:
Well, I'm not a CCIE, but I don't think you need to be a CCIE to answer this
question. The subnet mask has nothing to do with the amount of load on the
network. A side effect of having a small network mask is that there are
potentially more hosts on the network, which could mean that there is
No offense, but this is CCNA material. If you are going for your CCNP, then
you should already have your CCNA and know the answer. But anyway...
If you need a network with 400 hosts, the smallest subnet would have a /23
mask. So take the first part of your given network and assign it to that:
-
From: Reimer, Fred [mailto:[EMAIL PROTECTED]
Sent: Tuesday, September 09, 2003 10:26 AM
To: [EMAIL PROTECTED]
Subject: RE: Please Help - CIDR - How the bits work [7:75050]
No offense, but this is CCNA material. If you are going for your CCNP, then
you should already have your CCNA and know
on this email, and should immediately delete it from your computer.
-Original Message-
From: Priscilla Oppenheimer [mailto:[EMAIL PROTECTED]
Sent: Tuesday, September 09, 2003 12:33 PM
To: [EMAIL PROTECTED]
Subject: RE: Please Help - CIDR - How the bits work [7:75050]
Reimer, Fred wrote
think I got it.
Man I love this news group!
Steve
Priscilla Oppenheimer wrote:
Reimer, Fred wrote:
No offense, but this is CCNA material.
Do they still teach classful for CCNA, though? Perhaps the only thing
that's
hard for him is that 192.168.24.0 has a mask of 255.255.255.0
, and should immediately delete it from your computer.
-Original Message-
From: Chuck Whose Road is Ever Shorter [mailto:[EMAIL PROTECTED]
Sent: Tuesday, September 09, 2003 3:56 PM
To: [EMAIL PROTECTED]
Subject: Re: Please Help - CIDR - How the bits work [7:75050]
Reimer, Fred wrote
We've installed tons of 6509's with EtherChannel ports spanned between
modules.
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
NOTICE; This email contains confidential or proprietary information
8 max, not 4.
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
NOTICE; This email contains confidential or proprietary information which
may be legally privileged. It is intended only for the
Why would you want to?
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
NOTICE; This email contains confidential or proprietary information which
may be legally privileged. It is intended only for
Theoretically, you don't even need a switch in the middle. If these are
ISP-connected routers, and the firewall is doing the NAT, then the three
routers must be doing BGP to the ISPs by definition. They would each have
full routing tables. On the inside (external to PIX) segment, the three
I just received confirmation that my NetworkSim project has been approved by
SourceForge. It will take me a while to get the proper licensing materials
embedded in the source files, but look for it to become active in the next
few days. I'll need to look into what I need to do to get the files
You do need NAT traversal if you only change the IP addresses.
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
NOTICE; This email contains confidential or proprietary information which
may be
If you're not getting more than a few MB of transfer speed out of a 100Mb
link, then it is undoubtedly a autonegotiation / speed issue.
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
NOTICE;
I'm confused. Assuming that the users are separated from their servers by
at least one router hop (otherwise if the servers failed, so would the
users, so what's the use of the DR?), then why can't you just assign the
same IP addresses to the servers at the DR site? If the production servers
are
No, what was your experience??? I expect from your question that you had
issues...
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
NOTICE; This email contains confidential or proprietary
Wow! Given your CCIE number you must be using a REALLY old router for that
ping. Most newer models send five echo requests, not three. Either that or
some packets got lost somewhere...
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177
Neiberger [mailto:[EMAIL PROTECTED]
Sent: Wednesday, September 03, 2003 5:36 PM
To: [EMAIL PROTECTED]
Subject: RE: OT Gibberish in email [7:74740]
Reimer, Fred wrote:
It is an attempt by the SPAMers to avoid SPAM software that
takes a hash of
the SPAM and blocks SPAM on machines based
A dial-list can specify an extended access list, why don't you just create
one with time ranges.
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
NOTICE; This email contains confidential or
I'm sure this HAS to be somewhere on Cisco's web site, but a brief general
explanation is this: Cisco, and most other vendor's hardware now-adays, has
ASIC chips that inspect ingress traffic coming into the switch. It also has
a shared memory buffer that it stores cached route-switch
With some prodding by Doug Stevenson, and probably in the wrong direction,
I'm working on a router simulator in my spare time. It's written in Perl
using POE. So far you can add interfaces, assign addresses, enable RIP, add
networks to RIP, connect interfaces together. The RIP process (POE
How about Cisco Systems? Just use their SAA.
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
NOTICE; This email contains confidential or proprietary information which
may be legally privileged.
Cisco routers don't have the ability to capture packets. However, you can
use an ACL and the debug ip packet command to get some limited information.
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager:
.
-Original Message-
From: dre [mailto:[EMAIL PROTECTED]
Sent: Wednesday, September 03, 2003 12:37 PM
To: [EMAIL PROTECTED]
Subject: Re: Ip snooping in cisco routers [7:74708]
Reimer, Fred wrote in message ...
Cisco routers don't have the ability to capture packets. However, you can
use
It is an attempt by the SPAMers to avoid SPAM software that takes a hash of
the SPAM and blocks SPAM on machines based on these hash values. There are
some anti-SPAM solutions out there that basically relies on the users to
mark email as SPAM. When they do, the client machines send the hash of
The subject should be renamed Amazing Answers...
Whether a port is blocking or not, or even if Spanning Tree is running on
the device, has absolutely no bearing on whether the port is physically up
or down.
The rest of the info is acceptable, but to throw that little nugget of
information in the
Are you using unnumbered on your serial interface? Try using an assigned IP
address and see if that makes a difference.
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
NOTICE; This email
Windows automatically adds a dynamic route once the PPTP connection is
established, or at least it should. Basically, it sets the metric to 2 for
your old default router, and adds in a new default route with a metric of
1 once the tunnel is established. If you are not getting the tunnel
You wrote:
A few years ago we were all (well some of us) scared about the
scalability of OSPF - how much memory, processing power and how many
AS's could it scale to. This is why IS-IS was looked at by tier 1 and 2
carriers. In those days, a 7206 with a 150MHz proc was common place, and
we were
The problem with analogies is that they often help you understand the
correct answer to a question, but seldom help you understand the why
behind the answer. The analogies I like to use most often are the models of
the protocols themselves. Think of each protocol as a state machine, or
rather
Hmm, that's bizarre. I'm running 4.02B and I can use SHA. Where did you
get the information that 3.6 and above don't support SHA???
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
NOTICE;
There is none. Other than the fact that it is the last Class A address.
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
NOTICE; This email contains confidential or proprietary information which
are not authorized to use, disclose, distribute, copy, print
or rely on this email, and should immediately delete it from your computer.
-Original Message-
From: Bharani [mailto:[EMAIL PROTECTED]
Sent: Tuesday, September 02, 2003 10:54 AM
To: Reimer, Fred
Subject: Re: Interesting Question
Think of it like this. Each switch is supposed to block redundant ports
leading to the root bridge. Say Switch1 and Switch2 are interlinked, and
also have downlink connections to the root bridge, like this:
Switch1 -- Switch2
| |
| |
Core1 -- Core2
What are you trying to accomplish? A configuration using specific protocols
for some lab, or are you just trying to get some connectivity up and
running? Why don't you just use backup interface? Ah, it looks like you
are doing this for a lab, and not a real-life reason. O.K., is your IPsec
From the Cisco Security Configuration Guide:
When CHAP is enabled on an interface and a remote device attempts to
connect to it, the access server sends a CHAP packet to the remote device.
The CHAP packet requests or challenges the remote device to respond. The
challenge packet consists of an ID,
recipient, you are not authorized to use, disclose, distribute, copy, print
or rely on this email, and should immediately delete it from your computer.
-Original Message-
From: Wilmes, Rusty [mailto:[EMAIL PROTECTED]
Sent: Tuesday, September 02, 2003 2:59 PM
To: 'Reimer, Fred'; [EMAIL
I would hope so, especially if they support Spanning Tree. It would be kind
of hard to run the Spanning Tree protocol without a MAC address...
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
No, what was your experience??? I expect from your question that you had
issues...
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
NOTICE; This email contains confidential or proprietary
The new exams will include features that are available in the 12.2 version
of code
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
NOTICE; This email contains confidential or proprietary
But you always have to consider caveat lector
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
NOTICE; This email contains confidential or proprietary information which
may be legally
CHAP authentication does not use a TCP/UDP port. CHAP is handled in the PPP
protocol between the client and the router. The router may use some other
type of authentication (RADIUS, TACACS+, etc) to authenticate the user to
some outside security server, but the CHAP communications is carried
CHAP authentication does not use a TCP/UDP port. CHAP is handled in the PPP
protocol between the client and the router. The router may use some other
type of authentication (RADIUS, TACACS+, etc) to authenticate the user to
some outside security server, but the CHAP communications is carried
It depends on Company B's firewall, and how it is setup to allow IPsec
traffic (or not). Theoretically, there is no difference between connecting
to Company A via an ISP connection and connecting to Company A through
Company B, except that Company B's firewall may not allow or be capable of
]
At 7:10 PM + 8/25/03, Reimer, Fred wrote:
A structured threat is a threat from someone who has experience and
knowledge as far as breaking into networks. An unstructured threat is a
threat by a script kiddie. I guess they use structured because a
knowledgeable black-hat would have
Indubitably - Checked on www.m-w.com :-)
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
NOTICE; This email contains confidential or proprietary information which
may be legally privileged. It is
We tend not to answer specific short questions like those that appear they
may come from an actual test, especially when presented in a list like that.
There is a confidentiality agreement you should have read when you took the
test... The purpose of the exams is to test your understanding of the
Please pass this on to Annlee.
I've already sent another message with an excerpt (fair use!) from the new
Cisco training materials that refutes this.
The threats are:
Structured
Unstructured
Internal
External
The attacks are:
Reconnaissance
Access
Denial of Service
I don't know what data
Structured
Unstructured
Internal
External
It's covered in every training course I've taken so far on my way to CCSP.
CSVPN covers it, SECUR covers it, CSI covers it, I believe CSPFA covers it,
and CSIDS probably covers it.
Joshua covered the four remote-access types nicely...
Fred Reimer - CCNA
Difference between Cisco and Nortel - main diff is cli and menu driven? Not
necessarily. If you are talking about the old Wellfleet/Bay Nortel routers,
then they certainly have a CLI. You just need to know the MIB very well,
and you should be able to configure it with the CLI. I know it used
MCNS is old material. The new material is SECUR. The new material, all
five courses, say it's unstructured, structured, internal, and external...
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
on this email, and should immediately delete it from your computer.
-Original Message-
From: Priscilla Oppenheimer [mailto:[EMAIL PROTECTED]
Sent: Monday, August 25, 2003 1:46 PM
To: [EMAIL PROTECTED]
Subject: RE: SAFE and the Holy Hand Grenade of Antioch [7:74304]
Reimer, Fred wrote
That would kind of be like finding out the DLCI numbers for a Frame Relay
network without the telco telling you what they are Wouldn't it?
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
I think you want the next hop in your route-maps to be 192.168.10.2 and
192.168.20.2 respectively. Send it through the GRE tunnel.
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
NOTICE; This
No you don't (have a couple of VLANs, some with ISL and others with 802.1q).
The trunking protocol is not an attribute of a VLAN, it is an attribute of a
physical (trunking) port. You have some VLANs, put them on whatever trunk
port you desire.
Fred Reimer - CCNA
Eclipsys Corporation, 200
No you don't (have a couple of VLANs, some with ISL and others with 802.1q).
The trunking protocol is not an attribute of a VLAN, it is an attribute of a
physical (trunking) port. You have some VLANs, put them on whatever trunk
port you desire.
Fred Reimer - CCNA
Eclipsys Corporation, 200
It depends on the configuration of the hub. If the hub supports both 3DES
and DES, then the client will be able to connect. What, exactly are you
asking???
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager:
Cisco PIX and IOS software (with the FW/IDS feature set) includes some
virus/attack blocking capabilities. It is more limited than their
stand-alone IDS products. For more detail, I think it would be helpful to
know exactly what your friend said. What were they trying to suggest?
Fred Reimer -
The default route on your TFTP server is not set properly.
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
NOTICE; This email contains confidential or proprietary information which
may be legally
: Saturday, August 16, 2003 11:26 PM
To: [EMAIL PROTECTED]
Subject: Re: OT Microsoft worm [7:74045]
Reimer, Fred wrote in message
news:[EMAIL PROTECTED]
For reasons of confidentiality I won't and can't name any names, but I am
aware of several hospitals that were affected pretty seriously
There are know bugs in the IOS/CatOS hybrid code where the cef adjacencies
are not updated correctly. Basically, the MSFC thinks it programmed the SUP
caches correctly, when it did not. If you are on an old version of code, I
would suggest upgrading to a later version. I don't have the bug ID
I don't know about the DMVPN, or what it even is, but for a standard IPsec
VPN the ports would be UDP 500, and PROTOCOLS 50 and 51. Now, that is
assuming that there is no NAT going on, and you are using tunnel mode, so
that you don't see the GRE tunnel in the first header. If there is NAT,
then
For reasons of confidentiality I won't and can't name any names, but I am
aware of several hospitals that were affected pretty seriously. Everyone
here knows that Cisco Call Manager runs on Windows, so imagine what happens
to your entire phone infrastructure if you are running VoIP. Network
Hmm, PSPF definitely sounds interesting, but I'd recommend requiring the
integrated Cisco firewall in the VPN client, and not allowing split
tunneling.
Also, there is apparently a working group working on VPN multicast...
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North,
It is VERY important to know what interfaces is used for the OSPF router ID,
and to make sure that interface is a loopback interface. If you let it
choose a normal interface, and that interface goes down, your OSPF process
will essentially bounce because it will select another interface IP as the
Being in healthcare, I have some strong views on this topic. Unfortunately,
I'm cramming for the CSI test I have tomorrow, and I still have two chapters
to go through on the KnowledgeNet course. So, you will just have to wait...
LOL Expect some comments on EAP-TLS, WPA, and assorted
No, that would not make sense.
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
NOTICE; This email contains confidential or proprietary information which
may be legally privileged. It is intended
Well, I thought for sure I was going to fail, but I passed the CSI test with
a score of 902. Needed 825 out of 1000...
After giving it some thought, I think it's probably better if I don't
comment on the wireless questions at this point. I had typed up quite a bit
of observations that I just
bitten by the URL in the first line problem. If the first line
in a post is a URL it sometimes gets munged. It's helpful to add some
padding at the beginning to get the URL off of the first line.
John
Reimer, Fred 8/5/03 12:23:39 PM
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center
For TCP traffic you want to use:
1) 1518 bytes * (window size * 2)
2) rate / 8000
Whichever is HIGHER. The minimum is 8000 bytes on the 3550. You want to
use this so that the policer does not take effect before TCP flow control
kicks in. The formula uses 8000 because the policer uses a
.
-Oorspronkelijk bericht-
Van: Reimer, Fred [mailto:[EMAIL PROTECTED]
Verzonden: zaterdag 2 augustus 2003 14:49
Aan: [EMAIL PROTECTED]
Onderwerp: Largest CA Keylength on VPN 3000 [7:73409]
Let's see if anyone here can answer faster than Cisco TAC.
What is the largest CA root key
May I suggest making some very short ones with a plug on one end and a jack
on the other.
Make it at least 1 meter if you want to be in spec...
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
IP Directed Broadcast - used to send a directed broadcast packet, or a
packet to a whole remote subnet. For instance, say you have your
workstation management software on subnet 10.1.1.0/24, and you have three
remote subnets 10.1.2.0/24, 10.1.3.0/24, and 10.1.4.0/24. The workstations
have client
I would certainly hope that the remotes wouldn't use different platforms. I
don't know the business model, but it sounds to me like it's some kind of
service offering or something. Maybe they have a 2000 site Frame Relay
network used to offer a service or something, and they want to switch to
recipient, you are not authorized to use, disclose, distribute, copy, print
or rely on this email, and should immediately delete it from your computer.
-Original Message-
From: Lynne Padgett [mailto:[EMAIL PROTECTED]
Sent: Friday, August 08, 2003 11:15 AM
To: Reimer, Fred; [EMAIL PROTECTED
Why would there be? Not unless R3-R6 are in a different area, in which case
they would need to create a Virtual Link to R1.
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071 Pager: 888-260-2050
NOTICE; This email
Go in the client and choose Options | Windows Logon Properties and make sure
the Enable start before logon checkbox is checked. Download the latest
client. Enjoy.
Fred Reimer - CCNA
Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177 Cell: 770-490-3071
I think he is referring to a RJ45 jack on one end, and a RJ45 connector on
the other, so that you can turn a normal patch cable into a cross-over
cable.
I'd actually suggest plugging all of the router Ethernet ports into a switch
so that you can create VLANs and match two routers up in an ad-hoc
that if you make a quicky of business
req's you'll pay afterwards, because it is not what customer had hoped
for
Trusted -untrusted client sites.
Martijn
-Oorspronkelijk bericht-
Van: Reimer, Fred [mailto:[EMAIL PROTECTED]
Verzonden: maandag 11 augustus 2003 16:02
Aan: Jansen, M; [EMAIL
I don't think attachments make it through. Go into the 3005 and modify the
events so that all of the IKE classes (under Configuration | System | Events
| Classes) have the highest level (1-13) and tell us what messages you get
when it tries to connect.
Fred Reimer - CCNA
Eclipsys Corporation,
Well, you could look here:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fsec
ur_c/fipsenc/scfipsec.htm#1001813
And here:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fsec
ur_c/fipsenc/scfike.htm#1012737
And here:
1 - 100 of 228 matches
Mail list logo