Tuesday, January 8, 2019

Explandio does it again - with Vidsting.

Vidsting video creator




This is an advisory for a new Launch of an exciting new Video Creation product from Explandio called VIDSTING.

VidSting is The World's First Video Sting Creator. 

VidSting Creates Fascinating Intros, Deluxe Logo Sting Animations, Incredible Outros & Even Irresistible Calls To Action In 60 Seconds!

This is going to totally change the way you make videos and advertise your brand to the world.


 It Creates Eye-Catching Video Animations in 3 Simple Steps. 

Watch the video on the link below to see how easy it is to create stunning videos.

 Add it to your advertising arsenal Today!

Watch the Video Five star Rating

Webtalk, the alternative to facebook.

Tuesday, December 25, 2018

Merry Christmas 2018


Merry Christmas

I hope you have an awesome day!








What is Christmas? It is tenderness for the past, courage for the present, hope for the future. 
Agnes M. Pahro 



Saturday, September 15, 2018




The following are some basic Cisco commands used for troubleshooting BGP in non-VRF and VRF environments.


Show a list of configured VRF's

        Show ip vrf

To see a quick status of all BGP connections, on a non-vrf router and a vrf router,

        show ip bgp summary
        show ip bgp vpnv4 vrf <name> summary


To see BGP routes, in the default table or an explicit VRF,

        show ip bgp
        show ip bgp vpnv4 vrf <name>


To see what routes you're getting from a neighbor, use one of these

        show ip bgp neighbor <IP-address-of-neighbor> routes
        show ip bgp vpnv4 vrf office neighbors x.x.x.x received-routes


  To see what routes you're sending to a neighbor, use the command

        show ip bgp neighbor <IP-address-of-neighbor> advertised-routes
        show ip bgp vpnv4 vrf office neighbors x.x.x.x advertised-routes


 To see what routes you're getting from an AS, use the command

        show ip bgp regexp <regluar-expression-for-an-AS>

 To clear a BGP session:

        clear ip bgp <ip-address of neighbor>

Notes: 

  • The same VPNv4 session is used to carry all VRF information, so it will clear all VRF's, not just 1
  • From my understanding, the use of "soft in" triggers an automatic ROUTE-REFRESH message to neighbors to resend their routing advertisements without dropping the neighbor.

Commands to configure VRF BGP routing - In Config Mode

ip routing
Enables IP routing on the device

ip vrf <name>
Names the VRF, and enters VRF configuration mode.

rd 2:2
An RD is a route-distinguisher, and it does just that, distinguishes this VPN, or routing table from others.

route-target export 2:2
route-target import 2:2

An RT is a route-target and allows the routes to be imported and exported into and out of the VRF.




When BGP is not behaving correctly, a way to temporarily stop peering with a neighbor is to use the following command:

        router bgp 194
        neighbor <ipaddress>
        password xxx


or on VRF enabled devices
   
      router bgp 1
      address-family ipv4 vrf <name>
      neighbor <ipaddress>
      password xxx


Since the other router doesn't have the same password, the two routers will stop talking to one another, without you having to do anything else. Later, when the problem is resolved, simply remove the line to reestablish peerage.


To see what's happening with BGP, use the commands

        terminal monitor
        debug ip bgp events


To find out who owns and Autonomous System, go to http://www.arin.net/ and type AS<number> in search. 


Note - AS64512 to AS65535 are Private use Autonomous System Numbers for Internal use only, think Private IP ranges:
 

192.168.0.0 - 192.168.255.255 (65,536 IP addresses)172.16.0.0 - 172.31.255.255 (1,048,576 IP addresses)
10.0.0.0 - 10.255.255.255 (16,777,216 IP addresses)


I hope this may be of use and I welcome any feedback, 

please feel free to comment below.




Thursday, January 25, 2018

Happy Australia Day 2018

Happy Australia Day 2018



Australia Day celebrations are as different and diverse as Australians themselves. From fireworks to food trucks, live music and indigenous cultural ceremonies, cricket matches and even jumping castles, there are many ways you can celebrate Australia Day this year.

A HIGHLIGHT of summer is January 26 when we celebrate our national day, often accompanied by beers, barbecues and beaches.

Lets celebrate everything that makes Australia great!!!



Have a great weekend everyone :-) 

Monday, January 1, 2018

Happy New Year 2018

HAPPY NEW YEAR
From: Life Is An Adventure
Wishing you a Great 2018





Lets make it awesome :-)

"The only thing that stands between a person and what they
want from life is often merely the will to TRY it and the
faith to BELIEVE that it is possible."
- Anthony Robbins





Monday, December 25, 2017

Merry Christmas


I'm not going to join the PC brigade!!!

I want to wish everyone a 

*****Merry Christmas*****


I hope Santa brings you everything you wish for.


Have a great Holiday - From Life Is An Adventure.

Tuesday, December 19, 2017

IT Acronyms in a fast pased world.

The IT world is SO full of acronyms and the list is growing and changing all the time as new technologies come in and old technologies disappear. 

Here are some of the current acronyms from the Carrier/Telco perspective:


ATM:           Asynchronous Transfer Mode
b/s:               Bits per second
CE:              Carrier Ethernet
CEN:           Carrier Ethernet Network. A network that supports MEF services
CCM:           Continuity Check Message
CIR:             Committed Information Rate
CoS:             Class of Service
CRC:            Cyclical Redundancy Check
CSMA/CD:   Carrier sense, multiple access/collision detection
DA:               Destination Address
DEI:              Discard Eligibility Indicator
EIR:               Excess Information Rate
EVPL:           Ethernet Virtual Private Line service
EMS:            Element Management System
ENNI:           External Network-to-Network Interface
EPL:              Ethernet Private Line
EVC:             Ethernet Virtual Connection
FC:                Fibre Channel
FDV:              Frame Delay Variation (commonly “jitter”)
FIB:               Forwarding Information Base
FLR:              Frame Loss Ratio
G.709:            ITU-T recommendation for interfaces for the Optical Transport Network
GbE:              Gigabit Ethernet (10 GbE = ten gigabit Ethernet, 100 GbE = hundred Gigabit Ethernet)
Gb/s:              Gigabits per second
GFP:              Generic Framing Procedure
IEEE:             Institute of Electrical and Electronics Engineers
IETF:             Internet Engineering Task Force
IP:                  Internet Protocol
ITU-T:            International Telecommunications Union – Telecommunication Standardization Bureau
LACP:            Link Aggregation Protocol
LAN:              Local Area Network
LBM:             Loopback Message
LSP:               Label Switched Path
LTM:              Linked Trace Message
MAC:            Media Access Control
MAN:            Metropolitan Area Network
Mb/s:             Megabits per second
MEF:             Formerly “Metro Ethernet Forum” and today known as simply
“MEF”;          organization that originated the Carrier Ethernet trend and established its service specifications
MPLS:           Multi-Protocol Label Switching
NFV:             Network Functions Virtualization

NMS:            Network Management System
OAM:           Operations, Administration, and Maintenance
OC-n:           Optical Carrier Level n (1, 3, 12, 48, 192, 768)
ODU:            Optical Data Unit
Operator:      The entity that administers a Carrier Ethernet network
ODU:             Optical Data Unit
OTN:             Optical Transport Networking (see G.709)
OVC:             Operator Virtual Connection
P2P:               Point-to-Point
PBB:              Provider Backbone Bridging
PCP:              Priority Code Point
PDU:             Protocol Data Unit
PHY:             Physical
QoS:             Quality of service
RFC:             Request for Comment: IETF’s designation for a standard
RFP:             Request for Proposal

SA:               Source Address
SDH:            Synchronous Digital Hierarchy
SDN:            Software-Defined Network
SLA:             Service-Level Agreement
SONET:        Synchronous Optical Network
STP:              Spanning Tree Protocol
Tb/s:              Terabits per second
TDM:            Time-Division Multiplexing
TWAMP:      Two Way Active Measurement Protocol
UNI:             User Network Interface
VLAN:         Virtual Local Area Network
VoIP:            Voice over IP
WAN:           Wide Area Network




 

Wednesday, February 1, 2017

February networking question



The February edition of random networking questions.

Another 10 questions to get the grey matter ticking :-)



1. A flat network can be best described as...

A) Physically flat
B) One collision domain
C) One broadcast domain
D) One VLAN


2. Where does routing occur within the DoD TCP/IP reference model?

A. application
B. internet
C. network
D. transport


3. What layer of the OSI model provides the physical transmission of data, handles error notifications, network topology and flow control?

A) Physical
B) Data Link
C) Presentation
D) Session
E) Transport


4. Bridges can only have one spanning tree instance, while switches can have many.

A) True
B) False


5. A Cisco router is booting and has just completed the POST process. It is now ready to find and load an IOS image. What function does the router perform next?

A. It checks the configuration register.
B. It attempts to boot from a TFTP server.
C. It loads the first image file in flash memory.
D. It inspects the configuration file in NVRAM for boot instructions.


6. A CIDR value of /30 equates to what subnet mask?

A) 255.255.255.253
B) 255.255.255.128
C) 255.255.255.248
D) 255.255.255.252


7. What is the maximum size of an Ethernet packet when the frames have ISL tagging?(Include the size of headers and CRC)

A) 64 bytes
B) 1500 bytes
C) 1518 bytes
D) 1522 bytes
E) 1548 bytes


8. Which item represents the standard IP ACL?

A. access-list 110 permit ip any any
B. access-list 50 deny 192.168.1.1 0.0.0.255
C. access list 101 deny tcp any host 192.168.1.1
D. access-list 2500 deny tcp any host 192.168.1.1 eq 22


9. Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch? (Choose two.)

A. SW1#show port-secure interface FastEthernet 0/12
B. SW1#show switchport port-secure interface FastEthernet 0/12
C. SW1#show running-config
D. SW1#show port-security interface FastEthernet 0/12
E. SW1#show switchport port-security interface FastEthernet 0/12


10. Which protocol can cause overload on a CPU of a managed device?

A. Netflow
B. WCCP
C. IP SLA
D. SNMP






CableChick.com.au








1. Correct Answer C

A switched network can be described as a flat network because broadcasts are transmitted to every device.

2. Correct Answer B

The picture below shows the comparison between TCP/IP model & OSI model. Notice that
the Internet Layer of TCP/IP is equivalent to the Network Layer which is responsible for
routing decision.






3. Correct Answer B

http://en.wikipedia.org/wiki/Data_Link_Layer

4. Correct Answer A

Bridges are software based and can only have one spanning-tree instance per bridge, while switches are hardware based and can have many.

5. Correct Answer A

Default (normal) Boot Sequence
Power on Router - Router does POST - Bootstrap starts IOS load - Check configuration
register to see what mode the router should boot up in (usually 0x2102 to read startupconfig
in NVRAM / or 0x2142 to start in "setup-mode") - check the startup-config file in
NVRAM for boot-system commands - load IOS from Flash.


6. Correct Answer D

http://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing#Assignment_of_CIDR_blocks

7. Correct Answer E

Cisco's proprietary VLAN tagging (ISL) has a maximum frame size of 1548 bytes.
IEEE 802.1q VLAN tagging has a maximum frame size of 1522 bytes.


8. Correct Answer B

The standard access lists are ranged from 1 to 99 and from 1300 to 1999 so only access
list 50 is a standard access list.


9. Correct Answers C and D

We can verify whether port security has been configured by using the “show runningconfig”
or “show port-security interface” for more detail. An example of the output of “show
port-security interface” command is shown below:


10. Correct Answer D

Sometimes, messages like this might appear in the router console:
%SNMP-3-CPUHOG: Processing [chars] of [chars]
They mean that the SNMP agent on the device has taken too much time to process a
request.



How did you go? very random selection huh :-)

let me know if you found any errors in the comments, more coming .

“Don't cry because it's over, smile because it happened.”
Dr. Seuss
 




Tuesday, January 10, 2017

Networking questions part 1

I'm going to try to submit questions at least once a month this year (hopefully more often)

Here's the first batch, enjoy....







1. What layer of the OSI Reference Model sends and receives bits and specifies the electrical, mechanical, procedural and functional requirements for maintaining a physical link between end systems?

A) Session
B) Transport
C) Network
D) Data Link
E) Physical


2. What Cisco IOS keyboard shortcut recalls the oldest command in the command history, beginning with the most recent command?

A) Ctrl+B
B) Ctrl+E
C) Ctrl+U
D) Ctrl+N
E) Ctrl+P


3. What does Router(config)# no access-list 1 command achieve?

A) Removes Access List 1
B) Disables ACL on interface 1
C) Nothing, this is not a Cisco command


4. When would an interface need a clock rate?

A) When the interface is DTE
B) When the interface is DCE


5, What is Cisco's default NAT table entry timeout (translation timeout)?

A) 1 hour
B) 12 hours
C) 24 hours
D) 36 hours
E) 48 hours


6. What is the maximum number of subnets given the following?

192.168.10.0 255.255.255.192
(Assume ip subnet-zero is enabled)

A) 4
B) 8
C) 16
D) 32
E) 64


7. What is port 21 used for?

A) FTP data
B) FTP program
C) Telnet
D) SMTP
E) TFTP


8. What does the term "Logical address" refer to?
A) MAC address
B) Physical address
C) IP address
D) Link-layer address


9. What is the maximum number of hosts you can assign to a class C network if it is not subnetted?

A) 1024
B) 254
C) 32
D) 512
E) 65025


10. A router has two Fast Ethernet interfaces and needs to connect to four VLANs in the local network. How can you accomplish this task, using the fewest physical interfaces and without decreasing network performance?

A. Use a hub to connect the four VLANS with a Fast Ethernet interface on the router.
B. Add a second router to handle the VLAN traffic.
C. Add two more Fast Ethernet interfaces.
D. Implement a router-on-a-stick configuration.










1. Correct Answer E

http://en.wikipedia.org/wiki/Physical_Layer

2. Correct Answer E

Keyboard Shortcut Action

Up Arrow Displays your previous commands.  (command history)
TAB Key Completes a partially typed CLI commands.
CTRL+Z Takes you back to Privileged EXEC Mode.

CTRL+A Places the cursor at the beginning of a line.
CTRL+E Places the cursor at the end of a line.
CTRL+R Redisplays the current command line.
CTRL+W Erases a word (behind the cursor).
CTRL+U Erases an entire line.


3. Correct Answer A

If you wish to remove an access-list, you use the no access-list (list #) command.

4. Correct Answer B

Cisco routers are DTEs by default (Data Terminal Equipment). The DCE (Data Circuit-Terminating Equipment) at the other end of the connection must supply a clock rate to the DTE.

5. Correct Answer C

When an entry is placed into the NAT table a timer begins, the duration of this timer is called the translation timeout, defaulted to 24 hours on Cisco routers.

6. Correct Answer A

192.168.10.0 is a class C address.  The subnet mask 255.255.255.192 implies 2 bits are borrowed.
22 = 4 subnets


7. Correct Answer B

File Transfer Protocol (FTP) is a network protocol used to copy files from one host to another over a TCP/IP-based network.
A client makes a TCP connection to the server's port 21. This connection remains open for the duration of the session called the control connection, with a second connection, called the data connection, opened by the server from its port 20 to a client port required to transfer file data.


8. Correct Answer C

A Logical address is normally a 32-bit IP address assigned to each host in an IPv4 network.

A Physical address is a unique 48-bit flat address normally burned into the ROM of the NIC card, and therefore cannot be changed. It is divided into 24-bit vendor code and 24-bit serial address.


9. Correct Answer B

For class C the number of bits for host address portion is 8. So 2^8 -2 = 256-2 = 254 hosts.

10. Correct Answer D

A router on a stick allows you to use sub-interfaces to create multiple logical networks on a
single physical interface.



How did you go? If you disagree with any of my answers or find errors, please leave a comment. More coming soon..stay tuned :-)


I remind myself every morning: Nothing I say this day will teach me anything. So if I'm going to learn, I must do it by listening.
Larry King

Welcome to 2017

Time to start a new round of networking questions.  

This year I'm going to expand and include more different types of technologies,

However, Cisco will still be the main focus for the questions 
(mainly to keep my own brain ticking lol)