Overcoming Enterprise WAN Challenges: Building for Agility and Scalability

Next related post can be found here -> Building an Agile Enterprise WAN: Key Design Considerations In today’s digital landscape, the enterprise network serves as a crucial foundation for connectivity and innovation, enabling seamless collaboration and access to new applications and services for employees, suppliers, and customers. However, as networks have evolved to meet the … Read more

Building an Agile Enterprise WAN: Key Design Considerations

Previous related post can be found here -> Overcoming Enterprise WAN Challenges: Building for Agility and Scalability In the realm of enterprise networking, the design of Wide Area Networks (WANs) stands as a critical pillar supporting seamless connectivity and efficient operations. Understanding the intricacies of WAN design is essential for organizations aiming to optimize performance, … Read more

Understanding Route-Maps in Networking: Enhancing Flexibility and Control

n the realm of network engineering, the ability to control and manipulate the flow of data is paramount. Route-maps are a powerful tool in network configuration, particularly useful in complex scenarios such as policy-based routing, route redistribution, and selective BGP path manipulation. This blog post explores what route-maps are, how they work, and their benefits, … Read more

Mastering Prefix Lists: Enhancing Network Filtering with LE and GE

In the realm of network administration, maintaining precise control over traffic flow is crucial for security, performance optimization, and resource management. Among the arsenal of tools available to network engineers, prefix lists stand out as a powerful mechanism for filtering and controlling traffic with granularity and flexibility. Unveiling Prefix Lists: Prefix lists are a cornerstone … Read more

EVE-NG Node Credentials List

Instance Name Username Password Console type Cisco ASA 802   no passwd, hit enter telnet Cisco ASA 8.4.2, 9.1.5   no passwd, hit enter telnet Cisco ASAv   no passwd, hit enter telnet Cisco IPS cisco ciscoips123 telnet Cisco WSA admin ironport telnet/http://ip:8080 Cisco ESA admin ironport telnet/https Cisco WAAS admin default telnet SourceFire/FirePower 5.4       FMC … Read more

Extend default LVM Volume

After the disk has been extended, then rescan for changes. This guide is based on the SDA disk and the 3 partition. Change the device and partition to match your needs Rescan for changes in the sda disk Extend the partition and disk EXT4 XFS

Active Directory Environment: Understanding the Tiering Model

In today’s interconnected digital landscape, safeguarding sensitive data and maintaining robust security measures is paramount for businesses of all sizes. For organizations utilizing Microsoft Active Directory, implementing a tiering model can provide a structured approach to securing critical assets and services. In this blog post, we’ll delve into Microsoft’s Active Directory tiering model and explore … Read more

The Essential Guide to DSCP Values for QoS: Who, Why, and Where to Use Them

Quality of Service (QoS) is a fundamental technology in networks that require reliable and predictable data delivery. It allows for traffic prioritization and management, ensuring that critical applications and services function at their best. At the heart of QoS lies the Differentiated Services Code Point (DSCP), which defines the level of service for IP packets. … Read more

Unraveling the Mysteries of BGP Path Selection

In the grand tapestry of the internet, Border Gateway Protocol (BGP) plays the pivotal role of the postal service, ensuring data packets are delivered through the most efficient routes across autonomous systems (AS). Understanding how BGP makes routing decisions is crucial for network administrators aiming to optimize network performance and reliability. This blog post demystifies … Read more

Rsyslog Troubleshooting Guide

Initiating Debug Mode To kick off debug logging from the get-go, prepend your rsyslog.conf file with these lines. This ensures debug logging activates immediately upon the rsyslog service launching: After implementing the above and restarting rsyslog, it will start generating a detailed debug log. Note: Debug logging can quickly consume disk space, leading to potential … Read more