Below I am going to give some examples for Policy Static NATs and Regular Basic NATs. Configuring Policy Static NAT...
JoinedMay 2, 2023
Articles673
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
When a switch stack forms a port-channel, the active stack member’s MAC Address is used for the LACP ID. The...
Below I will go over the different security threats that can happen on our network and a way to mitigate...
RIB vs FIB In Cisco networking, the Routing Information Base (RIB) and Forwarding Information Base (FIB) are two separate but...
Here I’m going to show a basic configuration on how to Encrypt a 10G link that has a stretched subnet....
Some common ones I use:...
RFC1918 name IP address range number of addresses largest CIDR block (subnet mask) host id size mask bits classful description...
Here’s something you can come accross. When you do a “sh vpc“, you’ll notice that your Type-2 consistency status is...
There are times you might have to find the PSK in order to share it with a 3rd party vendor...
Recommended Temperature Ranges Low – end temperature = 64.4°F (18°C) High – end temperature = 80.6°F (27°C) Low – end...