How to convert Cisco AP521 back into stand alone mode

Tweet Are you sure you can convert Cisco AP521 Controller-based mode back to Standalone mode ? Cisco said once you convert to Standalone mode, you…

Continue Reading...

[Enterasys] How to configure Syslog server

Tweet While I was testing Splunk, I need to add more devices to Splunk index pages. This example shows how to configure Enterasys Switch to…

Continue Reading...
logo_splunk.png

How to use Splunk with tips

Tweet Yes, it is expensive tool, if you attempt to use it on large network. Yes, it is not easy to use if you are…

Continue Reading...
How to configure Cisco wireless controller WLC526 logo

How to configure Cisco WLC(Wireless Controller) 526?

Tweet If you are looking for reliable and powerful wireless network for your company? Budget is kinds of tight? If you are willing to spend…

Continue Reading...

Password Recovery Procedure – Tasman(Nortel)

Tweet Tasman network is now part of Nortel networks. This is a instructions to recovery Tasman router password. Manufacture login/password was tasman/tasmannet, but since Nortel…

Continue Reading...

How to install free TACACS+ on Ubuntu

Tweet Here is the simple steps to install free TACACS+ application.  1. Download TACACS+ 2. Install Free TACACS+ on Ubuntu 3. Configure tac_plus.conf 4. Testing…

Continue Reading...

Modifying Huge ACL & prefix- list ?

Tweet Probably, there are multiple way to achieve your goal. Here is one of simple way that I knew and used in my work. (using…

Continue Reading...
RFC1323_1_2.png

Internet Speed Issue – How to use TCP window scaling option

From few simplifying test results on previous article "Internet Speed Issue – Why TCP window size is matter", indeed TCP window size made difference of…

Continue Reading...

How to setup FreeRADIUS server?

Tweet Here is a simple documentation how to setup FreeRADIUS server. It’s written by Korean. http://www.ibm.com/developerworks/kr/library/l-radius/

Continue Reading...

Preventing Security Attacks from all OSI 7 Layer

Tweet Let’s quickly look what kinds of Security Attacks on OSI 7 Layer. Layer 7. Application /6. Presentation/5. Session Layer – Virus, Warms, Tro-hourse, Buffer…

Continue Reading...

How to hide an access-list applied?

Tweet Sometime, you even don’t want to reply ICMP unreachable message response back to requester. It’s very simple. Here is how you do it. (Assume…

Continue Reading...

Basic QoS

Tweet   There are 4 priority queues: high, medium, normal, low. The default queue is the normal queue, by default. The high and medium queues…

Continue Reading...