Patrick Denis > Cisco
Cisco
admin
April 29, 2016
Before starting this post this is something that has been very theoretical and had a hard time to visuals so i intend to make the best effort to deep in and explain it. Lots of pleasure ahead. Control Plane…
Read more
admin
April 29, 2016
IOS runs all necessary modules to perform network operations into one single process .So if anything happen to the routing engine the entire IOS kernel could Crash. IOS-XE software architecture run under a Linux Platform “system daemon” giving the ability to…
Read more
admin
April 28, 2016
Iv Decided to follow the blueprint and will put everything on my site as a reminder and a nice challenge. In the blueprint there is over 400 different topics between section 1 to 6. So i will cut this in…
Read more
admin
February 8, 2016
Label Stack Fields Label = 20 bits EXP = 3 bits map the standard IP packet ToS into the Experimental field for MPLS CoS S = Stack bit is use to identify the end of the last label of the…
Read more
admin
October 18, 2015
OSPF Filtering Using Distribute List with Prefix-List ! ip prefix-list BLOCK_L0 deny x.x.x.x/xx ip prefix-list BLOCK_L0 permit x.x.x.x/x ! router ospf 1 distribute-list prefix BLOCK_L0 in or out ! OSPF Filtering Using Distribute List with ACL ! ip access-list standard…
Read more
admin
September 28, 2015
This checklist is a collection of all the hardening steps that are presented in this guide. Administrators can use it as a reminder of all the hardening features used and considered for a Cisco IOS device, even if a feature…
Read more
admin
September 24, 2015
Took a Course from Coursera.org and will post everything that i have learn here . Because behind all that technology there is history 🙂 So i will try to make a resume of everything related to that here .But i…
Read more
admin
September 14, 2015
Diffie-hellman Modulo Given two numbers, a (the dividend) and n (the divisor), a modulo n (abbreviated as a mod n) is the remainder from the division of a by n. For instance, the expression “7 mod 5” would evaluate…
Read more
admin
September 14, 2015
To make it simple as for the configuration you need 5 things : Crypto Policy Transform-set Access-list Defining your crypto map Applying it to the interface Example of configuration : Key Components of creating an IPSec tunnel in chronological order:…
Read more
admin
September 14, 2015
Ce document utilise la configuration réseau suivante : Remarque: Les schémas d’adressage d’IP utilisés dans cette configuration ne sont pas légalement routables sur Internet. Ce sont des adresses RFC 1918 qui ont été utilisées dans un environnement de laboratoire. Exécutez ces étapes afin…
Read more