Oct
15
2008
Skills Pursuit 2008
NetSpace_Skills_Pursuit

The new competition of the NetSpace Skills Pursuit is designed to recognize the top student and alumni players in the world and reward them with real prizes. Will you be one of the top players in your category (PC Technician, Network Technician, Network Associate, or Network Professional) and win a prize package? Starting 23 October 2008 at 12:01 a.m. Central time (GMT-5hrs) students and alumni are encouraged to apply their networking skills to real world problems in a new online NetSpace Skills Pursuit competition. Join in the fun and explore how networking can be used to solve a multitude of […]

Oct
10
2008
Authentication Bypass in Cisco Unity
Cisco-vulnerabilities

A vulnerability exists in Cisco Unity that could allow an unauthenticated user to view or modify some of the configuration parameters of the Cisco Unity server. Cisco has released free software updates that address this vulnerability. A workaround that mitigates this vulnerability is available. Vulnerable Products All Cisco Unity versions, 4.x, 5.x and 7.x, may be affected by this vulnerability.

Oct
10
2008
Cisco basic configuration
cisco-basic-configuration

There are some “standards” steps used for basic configuration on your Cisco router/switch: Define the hostname Assign the privileged level Secure console port Secure VTY lines Encrypt the passwords

Oct
6
2008
Cisco Compatible Extensions
Cisco-Compatible-Extensions

How do you know if a client device is interoperable with a Cisco wireless LAN (WLAN) infrastructure – supporting the latest WLAN standards and Cisco innovations? Look for the Cisco Compatible logo, which is earned through the Cisco Compatible Extensions (CCX) program for WLAN client devices. The Cisco Compatible Extensions program ensures the widespread availability of client devices that are interoperable with a Cisco WLAN infrastructure and take advantage of Cisco innovations for enhanced security, mobility, quality of service, and network management. Cisco Compatible client devices are sold and supported by their manufacturers, not Cisco.

Oct
2
2008
How many CCIEs are in the world?
How-many-CCIEs-are-in-the-world

CCIE (Cisco Certified Internetwork Expert) is the highest level of professional certification offered by Cisco. Less than three percent of all Cisco certified professionals earn their CCIE. Experience is the best preparation for the hands-on CCIE lab exam. Have you ever asked how many CCIEs are in the worlds? Well, surfind the web, I have find the answer :) Now (last updated 9/9/2008) there are 17840 CCIEs: Total of Routing and Switching CCIEs: 15852 Total of Security CCIEs: 1764 Total of Service Provider CCIEs: 961 Total of Storage Networking CCIEs: 139 Total of Voice CCIEs: 802 There a are 1729 […]

Sep
29
2008
How to analyze traffic with SPAN feature
Cisco-Span

Usually when we admin a network, we need to know what are the protocols used more frequently, and why not, discover if someone are using improper P2P software; so we can use SPAN. The Switched Port Analyzer (SPAN) feature, which is sometimes called port mirroring or port monitoring, selects network traffic for analysis by a network analyzer. For example, if you want to capture Ethernet traffic that is sent between host A and host B, you must implement SPAN feature. In this diagram, the sniffer is attached to a port (destination SPAN port) that is configured to receive a copy of […]

Sep
28
2008
Routed versus routing protocols
Routed-versus-routing-protocols

Two categories of protocol exist at the network layer: routed and routing. A routed protocol is a Network Layer protocol that is used to move traffic between networks. Routed protocols allow a host on one network to communicate with a host on another, with routers forwarding traffic between the source and destination networks. IP, IPX, and AppleTalk are all examples of routed protocols. Routing protocols let routers route routed protocols after a path has been determined. RIP, IGRP, EIGRP, OSPF, IS-IS, BGP are all examples of routing protocols.

Sep
25
2008
Sep.24, 2008?! 12 new Cisco vulnerability advisories!
Cisco-vulnerabilities

On September 24, 2008, at about 16:00 GMT, the The Cisco Product Security Incident Response Team (PSIRT) has published 12 new vulnerability advisories. Mainly these vulnerabilities are DOS attack.

Sep
23
2008
The configuration register
The-configuration-register

The configuration register can be used to change router behavior in several ways, such as: how the router boots (into ROMmon, NetBoot) options while booting (ignore configuration, disable boot messages) console speed (baud rate for a terminal emulation session) To view the current setting of the configuration register, use the show version command:

Sep
20
2008
Cisco to acquire Jabber
Cisco-to-acquire-Jabber

Cisco has agreed to purchase open-source instant messaging firm Jabber. The company plans to use the Jabber messaging software within its WebEx Connect and Unified Communications packages. “Enterprise organizations want an extensible presence and messaging platform that can integrate with business process applications and easily adapt to their changing needs,” said Doug Dennerline, Cisco senior vice president, Collaboration Software Group. “With the acquisition of Jabber, we will be able to extend the reach of our current instant messaging service and expand the capabilities of our collaboration platform. Our intention is to be the interoperability benchmark in the collaboration space.”