Archive for the ‘Uncategorized’ Category

poem

Sunday, October 20th, 2013

So live your life that the fear of death can never enter your heart.
Trouble no one about their religion
Respect others in their view
And demand that they respect yours
Love your life, perfect your life, beautify all things in your life
Seek to make your life long and its purpose in the service of your people
Prepare a noble death song for the day when you go over the great divide
Always give a word or a sign of salute when meeting or passing a friend
Even a stranger when in a lonely place
Show respect to all people and grovel to none
When you arise in the morning give thanks for the food and for the joy of living
If you see no reason for giving thanks, the fault lies only in yourself
Abuse no one and nothing
For abuse turns the wise ones to fools and robs the spirit of its vision
When it comes your time to die
Be not like those whose hearts are filled with the fear of death
So that when their time comes
They weep and pray for a little more time
To live their lives over again in a different way
Sing your death song
And die like a hero going home

Introduction to access-lists part 2

Thursday, October 16th, 2008

In the second installment of our guide to access-lists we are going to talk a little about named access-lists, how they work, what the benefits are, and how using them allows us to create reflexive access-lists. Named access-lists are exactly what they sound like, they are an extended access-list that has a name instead of a number. One of the nice features of named access-lists is that each line of the access-list has a number. this way you can delete just one line in an access-list without removing the whole access-list. You can create a named access list by using the following command.

(more…)

Encrypting GRE tunnels!

Monday, September 8th, 2008

In our Last article we looked at creating GRE tunnels between networks to allow non-routable traffic to pass between remote offices.  GRE tunnels are a great solution however the traffic passing inside these tunnels is not encrypted and thus could be intercepted by unauthorized parties. In this article we are going to look at tunneling GRE inside of IPSEC. This will allow us to get the benefits of GRE and the security of IPSEC.

 

(more…)

Create a GRE tunnel between endpoints!

Monday, September 8th, 2008

Many time it is necessary to link a remote office to your main site and today we have many technologies to accomplish this task. We have IPSEC tunnels, IP-IN-IP tunnels, and GRE or Generic Routing Encapsulation Tunnels.

Each type of connectivity offers advantages and disadvantages. Some of these tunnels can even be overlaid on top of one another. For instance IPSEC can be used in a transport mode, which allows you to use the encryption with other tunnels or protocols. For this article we are going to discuss GRE tunnels. GRE is unique as tunneling technologies go in that is started out as a proprietary protocol developed by Cisco and later adopted as a standard. GRE was invented as a way of encapsulating non routable protocols in IP which is a routable protocol. In this way protocols such as multicast (this include OSPF, EIGRP), and other protocols like IPX could be tunneled across routable links.

  (more…)

Video tutorial on IPV6

Thursday, May 15th, 2008

You can download or watch the full video at IPV6

Life the Universe and Everything

Monday, July 9th, 2007

Today I realized that even though the world is cruel and unfair, irony is not lost. I realized this while I was sitting on hold with my ISP, and the rep came back on the line and told me the reason why I had to hold a little longer was because he himself was on hold…… 5 minutes later he hung up on me while transferring my call….?

Categories
Support Our site