Skip to main content

Posts

Showing posts from May 3, 2020

What is DHCP Snooping? Explain it

DHCP is one of those basic fundamentals that all Systems and Network admins should have a firm grasp on. DHCP servers are responsible for providing PCs and devices on your network information such as IP addressing, the default gateway and DNS server information. DHCP snooping is a DHCP security feature that provides security by filtering untrusted DHCP messages and by building and maintaining a DHCP snooping binding table. An untrusted message is a message that is received from outside the network or firewall and that can cause traffic attacks within your network. The DHCP snooping binding table contains the MAC address, IP address, lease time, binding type, VLAN number, and interface information that corresponds to the local untrusted interfaces of a switch; it does not contain information regarding hosts interconnected with a trusted interface.  DHCP snooping acts like a firewall between untrusted hosts and DHCP servers. It also gives you a way to differentiate between unt

How to configure IPSEC static route?

Secure data traffic flow between vEdges, IPSEC is the mode of transport for data traffic to flow from one vEdge to another vEdge as overlay network. IPsec tunnels that run the Internet Key Exchange (IKE) protocol provide authentication and encryption to ensure secure packet transport. Internet Protocol Security is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks. Tunnel Redundancy: The interface is the IPsec tunnel interface in VPN 0. You can configure one or two IPsec tunnel interfaces. If you configure two, the first is the primary IPsec tunnel, and the second is the backup. With two interfaces, all packets are sent only to the primary tunnel. If that tunnel fails, all packets are then sent to the secondary tunnel. If the primary tunnel comes back up, all traffic is moved back to the primary IPsec tunnel

What is IPSLA? How to configure in your CISCO Device?

IP SLAs sends data across the network to measure performance between multiple network locations or across multiple network paths. It simulates network data and IP services and collects network performance information in real time. IP SLAs generates and analyses traffic either between Cisco devices or from a Cisco device to a remote IP device such as a network application server. Cisco IP SLAs is Layer 2 transport independent, you can configure end-to-end operations over disparate networks to best reflect the metrics that an end user is likely to experience. IP SLA is an active method of monitoring and reliably reporting on network performance. By "active," I refer to the fact that IP SLA will generate and actively monitor traffic continuously across the network. Operations of IP SLA: Source: A device that creates and inserts IP SLA packets into the network. The source is where all IP SLA operation tests are initiated. Target: The ultimate destination of the packets cr

PAGP and LACP Protocol - Ether Channel with Computer Network

Here I am going to discussion about Ether-Channel standards name as PAgP and LACP protocol. So, first of all I am giving you some details for what is Ether-Channel. What is Ether-Channel? Ether-channel port channel is the way to connect two different switches with two or more links and make them bundled in such a way that it looks like to be a single link. It is used to provide high speed links and redundancy. Maximum of 8 links can be aggregated to form a single logical link. Ether Channel PAgP Protocol: PAgP is a Cisco proprietary negotiation protocol. Port Aggregation Protocol is used to achieve the same goal as LACP. also it is used for the automated, logical aggregation of Ethernet switch ports, Which know n as an Ethernet Channel. This protocol over Static configuration is that is one, it does a configuration check on participating interfaces, as well as confirms that the neighboring interfaces are also using PAgP. That means that it guarantees that interfaces that don’t

What are the IOPS commands ? - Linux Performace Testing and debugging basic Commands

In this generation if you are using an Linux System then you should have basic knowledge to debugging on performance side, Hence here I am providing you few commands list with the information of how to use and how the output of that. As a QA Engineer in Networking domain I am very well aware of the how is hard and needed to know debug an Linux System Performance related problems are coming in the client side along with needed to check during the Performance Testing after being withing the 3 years in IT industry. These commands are available under all flavors of  Linux  and can be useful to monitor and find the actual causes of performance problem. 1. Top – Linux Process/Performance Monitoring Linux  Top  command is a performance monitoring program which is used frequently by many system administrators to monitor Linux performance and it is available under many  Linux/Unix  like operating systems. The top command used to dipslay all the running and active real-tim